Access and Usage Policy, 2003

Academic Computer Network: Policy on Access and Usage: Approved by the Faculty Council, October 2, 2003; approved by the Regents.

Introduction
Advisories
Access to Academic Computing Facilities
Client Priviliges and Responsibilities
Proper Use
Computer Staff Authorities and Responsibilities
Copyrights and Licenses
Violations
Bringing of Charges
Disciplinary Action
Appeal of Disciplinary Action
Discipline Policy
 

Introduction

Open access to the academic network and associated academic computer facilities (Academic 计算机网络或ACN)的新墨西哥矿业与技术研究所(技术) 世界是一种特权,要求个人用户负责任地行动. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. 制定本文件就是为了帮助人们保留这种特权. The preparation of this document included review and modification by the people using the Tech academic network and computers.

This document contains the official policy on access and use of the academic computing facilities and the academic network at Tech. In addition to this policy academic departments at Tech may have supplemental computer usage policies. You will need to contact them to find out about their policy.

The policy presented here applies to all academic computer systems at Tech, regardless of their operating system or manufacturer.

术语“学术计算机”意味着包括任何主要使用的计算机 for academic efforts at Tech. It may or may not be connected to the Ethernet network at Tech. 术语“学术计算机系统”也可能包括网络资源 as the computer.

“通用学术计算机设施”一词的意思是包括设施, 供多人使用的机器和外设 support of the Tech's educational mission. (This would, as an example, include user 一个系为参加其课程的学生创建的区域. 它不一定包括教授办公室里的计算机设备.)

The term "Computer Staff" includes any professional staff and part-time student employees who work in academic computer facilities.

本政策中的任何陈述都不能以下述方式加以解释 hinder the educational mission of Tech. If there is conflict, or ambiguity, between statements of this policy and those of other Institute policies, they will be resolved 由学术计算署署长及适当的技术代表.

This policy will naturally change over the course of time as required to stay abreast 技术、计算机领域和社会方向的变化. Any such 更改将受到技术社区的评论和审查,并将要求 经理工学院院长认为必要的机构批准后,方可进入 effect.

Advisories

在任何学术计算机上的所有数据都被认为是所有者的唯一财产 创建数据的帐户的,除非帐户所有者具有 先前将这些权利转让给他人或原创作品的,不属于作者 account owner.

Access to Academic Computing Facilities

任何技术人员都可以申请使用指定的通用学术账户 computing facilities. Accounts may also be created for faculty and staff of other schools by special arrangement. Valid identification must be presented when applying for an account. 学生也可能被要求出示当前的课程表 以及证明已支付所需费用的验证证明.

每个帐户持有人(或申请人)必须向电脑职员提供 正确维护系统帐户信息数据库所必需的信息. [It should be noted that portions of this data may be accessible to anyone with access to the system and that some of the Computer Staff would have full access to the database. In particular, no right to anonymity or privacy exists. That is, users should know 根据用户的登录id,其他人可以确定用户的名称.]

Persons granted special access means (e.g. means to access facilities outside the (正常操作时间)必须限制这种访问. If they wish to have permission to allow others access to their special privilege, they must specifically ask for it. 在任何情况下,他们必须明白对设施的责任 so accessed still rests with them. In no case should the means of access (keys, access cards, combinations, passwords, etc.) be lent or given to others and if this occurs, 随后,用户和借阅者都可能被拒绝访问.

Client Privileges and Responsibilities

Prior to receiving the privileges associated with an academic computer account, users must sign a statement that they also accept the responsibilities that accompany those privileges. 使用学术电脑设备的人必须随时负责 以符合本政策及其规定的方式使用这些设施 intent.

They are responsible for obeying all official notices posted in the user areas, attached 到设备,显示在当天的消息,张贴在本地政策新闻组 by appropriate staff members, or announced using electronic mail. They are also responsible for knowing and abiding by the policy set forth in this document, along with any changes announced by any of the means noted in this paragraph.

用户还对其帐户发起的任何和所有活动负责. For this reason, as well as to protect their own data, they should select a secure password for their account and keep that password secret at all times. Passwords should not be written down, stored online, or given to others. (Passwords should never be given to ANYONE, even to someone claiming to be a Computer Staff member.)

用户有责任保护自己的文件和数据不被读取和/或读取 由他人编写,使用操作方提供的任何保护机制 system in use. 他们还负责拾取打印机输出 timely fashion to avoid theft or disposal.

Those using the academic computing facilities must act in a manner that will not cause damage to the academic computing resources of Tech. Examples of acts that can damage 科技公司的计算资源包括但不限于电子分销 连锁信件,传销,骚扰邮件,非法邮件和张贴材料 inappropriate for a targeted Usenet news group.

被盗、意外损坏或其他原因造成的损坏必须报告给 尽快通知电脑职员,以便采取纠正措施.

Anyone observing or suspecting security violations, harassment, or other inappropriate 鼓励举报此类行为(例如,用户区域的噪音污染) behavior to the Computer Staff.

Proper Use

The academic computing facilities exist as a resource of Tech to support its missions. 学术计算设施不得用于任何商业活动 already associated with legitimate research activity. Commercial activities include, but are not limited to, consulting, typing services, and developing software for sale.

学校系统允许玩游戏和开发电脑游戏 only when resources and facilities permit. These activities may be limited by time and locations. 追求技术目标的工作比玩游戏更重要 and game development (unrelated to course work).

许多资源,如控制台、磁盘空间、CPU周期、网络带宽、打印机 队列、批处理队列和软件许可证由许多人共享. Use of one 或者以任何不合理的方式限制他人使用这些资源 是不适当的,并可能需要电脑职员采取行动释放该资源. 任何人以不合理的方式反复使用这些有限的资源,并表现出 willful disregard for this policy, may be seen as attempting to deny services to others and may lose their access.

Anyone conducting experiments on computer security or self-replicating code must have 该活动最初,然后定期进行审查,以解决风险 work may place upon the rest of the Tech community. The Director of Academic Computing 是否必须在此类工作活动发生前得到通知 in order to evaluate the risks involved. When possible, special arrangements will 必须为这些努力提供适当的环境,而不会造成损害 to, or impairment of, other's work. Codes that fall into the above categories would 包括但不限于病毒代码、蠕虫代码、密码破解代码和 password grabbing code.

在任何给定时间的系统安全状态都不能被解释为 opportunity for abuse either by attempting to harm the systems or by stealing copyrighted or licensed software. Deliberate alteration of system files can be considered vandalism or malicious destruction of Tech property.

通过网络连接到其他系统的能力并不意味着特权 使用或连接到这些系统,除非得到适当的授权 owner(s) of the system(s) in question. Tech facilities and network connections may 不得用于未经授权连接、闯入、 or adversely affecting the performance of other systems on the network, whether these systems are Tech owned or not.

操作可访问的计算和网络设施的其他组织 科技公司可能有自己的政策来管理这些资源的使用. When accessing remote resources from Tech facilities users are responsible for obeying both the policies 在本文件和其他组织的政策中规定.

Computer Staff Authorities and Responsibilities

Tech attempts to acquire and maintain resources that will be beneficial to most people. 科技也尽一切合理的努力提供足够的资源,以确保 that reasonable use is possible for all users.

技术部门不会自费购买、编写或维护程序或硬件 peculiar to a particular person's application. Tech will maintain a person's resources, 如果有足够的时间和人员,则由该人员承担费用. 电脑职员有责任在可能的情况下提供事先通知 为维护、升级或更改而关闭系统,以便人们进行计划 around periods of system unavailability.

然而,在某些情况下,电脑职员可能会关闭一个系统 little or no advance notification. Every effort will be made to give people a chance to save their work before the system is taken out of service.

电脑职员可能不时被要求对某人的工作产生不利影响 工作(例如,终止其进程)以保护计算机系统 (machines and/or network) or other people's work. When such action is required the 计算机工作人员将尝试联系有问题的用户,并告知他们什么 needs to be done. 如果在情况允许的时间内无法联系到他们, 然后负责影响用户工作的计算机人员必须交付 notification, to the user, of what happened and if possible what can be done to prevent it from happening again.

In accordance with federal and state law, the Computer Staff will undertake reasonable effort to maintain the privacy of a person's files, electronic mail, and printer listings. The following actions will require prior authorization, by the faculty or staff member responsible for granting accounts on the systems in question, before they can be carried out:

Computer Staff are also responsible for reporting any violations of Tech policy, state law, or federal law pertaining to the use of Tech computer facilities to the appropriate authorities whenever such violations come to their attention.

Copyrights and Licenses

侵犯版权或专利是违反联邦或州法律和本政策的. This applies to, but is not limited to: software, music, video, and any eligible digital item. 违反软件是违反这一政策和联邦或州法律的 license agreements.

复制许可软件是非法的,除非许可允许. Licensed 除非获得许可,否则任何人不得复制软件. Many software packages have a limited number of licenses and so require people to share the licenses. The license agreements for some software found on academic computing systems may specifically restrict the software to instructional use. The System Administrator for the system 在计划使用时,必须事先咨询软件所在的位置 third party software (found on academic computing systems) for research or administrative 代替购买本软件的研究或管理许可的任务. To ensure compliance, only the System Administrator for the system may install software on that system.

许可软件的源代码不得包含在本公司开发的任何软件中 Tech, in part or in whole, except as specifically permitted by the license pertaining to that source code.

如果您对复制任何软件的合法性有疑问或疑问,请 在进行任何复制之前,请与学术计算主任联系.

Violations

Students and other users of the New Mexico Institute of Mining and Technology Academic 计算机网络(ACN)设施和设备应始终保持正常 遵守州或联邦法律及本文件制定的规则和准则 and related documents adopted by other academic departments. Individuals who violate these rules are subject to disciplinary action as indicated below.

The disposition of situations involving a violation of the policies set forth in this document and the penalties that may be imposed upon the person guilty of the violation(s) are described in this section.

意外违反此策略,如选择不当的密码,超载 系统、磁盘空间消耗过多、判断力差等等,通常是 非正式的内部处理,通过电子邮件或面对面的讨论.

更严重的违规行为,如未经授权使用,拒绝服务,企图 steal passwords or data, attempts to steal licensed software, violations of Tech policies, 骚扰,或多次轻微违规,可能导致暂时或永久 在没有事先通知或警告的情况下失去学术计算机系统的特权.

违反州或联邦法律的违法行为会导致直接损失, 没有事先通知或警告,所有的学术计算特权. The appropriate 当局将被告知任何此类违规行为,并可能受到处罚 根据技术法规,新墨西哥州法律或美国法律,包括 the New Mexico Statutes 1978, Annotated, Chapter 30, Article 45.

Bringing of Charges

Charges of violations of these rules may be brought by any member of the student body, staff, and faculty. 费用应直接支付给负责的教职员工 for the academic computing system involved with the infraction. That person will determine if further action is required. He or she may require that the charges be made in writing. 通常情况下,指控将在涉嫌违规的十天内提出,但在 special cases the time limitation may be extended.

Notification of Charges

如果需要采取进一步行动,教师或工作人员将移交此事 to the ACN Discipline Committee. This committee is comprised of two members of the 涉及系统的教员、两名学生和一名计算机工作人员 whom are users of the ACN and familiar with its operations). Members are selected and appointed by the Vice President for Academic Affairs. The committee will, after 会见被控人员和其他掌握相关信息的人员 对于这种情况,决定什么样的处罚是适当的,如果有的话.

Disciplinary Action

任何被发现违反ACN规则和/或政策的个人都将受到处罚 to one or more of the following penalties:

The committee may also decide to file charges of violation of the General Campus Rules with the Dean of Students.

Appeal of Disciplinary Action

被发现违反ACN政策的学生可以对这一发现提出上诉 to the Dean of Students. Further appeals will follow Institute policies on appeals.

Discipline Policy

新墨西哥科技学术计算机网络(ACN)设施和设备的用户 are expected to fully adhere to the general Rules, Regulations, and Guidelines established 由主管学术事务的副校长在学生手册中注明. Students who violate 这些规则将受所列纪律程序和处罚的约束 请参阅《AG亚游集团app》的一般校园规则和纪律政策部分. Faculty and staff using ACN facilities and equipment are subject to the policies and procedures set forth in the Disciplinary Action section of the New Mexico Tech Employee Handbook. 一些涉及教师的情况可能由学术管理条例涵盖 freedom and tenure. Users are fully subject to the appropriate state and federal laws as well.

If a violation is sufficiently serious, the matter will be referred to the appropriate authority (e.g.,学术计算主任,学生主任,副校长 for Academic Affairs, Human Resources Director).

如果投诉涉及内容的适当性质,例如电子邮件 或万维网主页,由学生事务主任组成的调解委员会, 公共信息主任,学术计算主任,以及 学生协会或其指定人员将与个人会面讨论 the complaint. 如果不能达成自愿补救,问题将被提交 the ACN Discipline Committee.