Section 1: General Computing Policy
Once a student receives a unique identification number or other means of identification for use of computing or network resources, the student is solely responsible for all actions taken while using that identification. Therefore:
1.1 Applying for any access identification under false pretenses is prohibited.
1.2 Allowing or facilitating use of your unique computer/network identification or password by any other person is prohibited. In the event that you violate this policy by permitting access to WWU computing and network resources with your unique codes, you will be responsible for the actions of any other individual gaining such access.
1.3 Deletion, examination, copying, or modification of files and/or data belonging to other users without their prior consent is prohibited.
1.4 Unauthorized actions to evade or change assigned resource quotas are prohibited.
1.5 Continued impedance of other users through mass consumption of system resources is prohibited.
1.6 Use of facilities and/or services for commercial or illegal purposes is prohibited.
1.7 Any unauthorized action which damages or disrupts a computing system, alters its normal performance, or causes it to malfunction is a violation regardless of system location or time duration of the disruption.
1.8 All users must obey all posted regulations in University computer and network facilities, as well as instructions from supervisors and other employees of those facilities.
Section 2: Electronic Mail Policy
Whenever you send electronic mail, your name and user identification (user id) are included in each mail message. You are responsible for all electronic mail originating from your user id. Therefore:
2.1 Forgery (or attempted forgery) of electronic mail messages is prohibited.
2.2 Reading, deleting, copying, or modifying the electronic mail of other users is prohibited.
2.3 Sending harassing and/or threatening email is prohibited.
2.4 Sending unsolicited junk mail, "for-profit" messages or chain letters is prohibited.
2.5 Hiding your actual user id by "spoofing" or any other means is prohibited.
Section 3: Network Security
As a user of the network, you may be allowed to access other networks (and/or the computer systems attached to those networks). Therefore:
3.1 Use of systems and/or networks in attempts to gain unauthorized access to local or remote systems or data is prohibited.
3.2 Use of systems and/or networks to connect to other systems, in violation of the physical limitations of the remote/local system, is prohibited.
3.3 Decryption of system or user passwords is prohibited.
3.4 The copying of system files is prohibited.
3.5 The copying of copyrighted materials, such as commercial software, without either the express written permission of the owner or a proper license, is prohibited.
3.6 Intentional attempts to "crash" network systems or programs are not permitted.
3.7 Any attempts to secure a higher level of privilege on network systems are punishable disciplinary offenses.
3.8 The willful introduction of computer "viruses" or other disruptive/destructive programs into any computer system or network is prohibited.
3.9 Unauthorized use of software or devices (e.g. "sniffers") to gain access to private information or systems is prohibited.
Section 4: Other Resources
4.1 All users must abide by all posted regulations in computer labs.
Consequences of Failing to Abide by User Agreement
All students must certify that they have read and agreed to abide by all provisions of this user agreement before they will allowed access to WWU computing and network resources. Any violation of the provisions of this user agreement will result in disciplinary action that will fall into one of three defined classes of offenses: 1) Criminal actions referred to police agencies; 2) Student disciplinary actions referred to the student Judicial Officer; and 3) Rule violations referred for action to administrators of computing and network resources. User actions that threaten or severely impede access by other campus users may result in immediate revocation of computer or network privileges, pending a formal hearing. Possible disciplinary actions range from warnings, through probation or suspension, to criminal prosecution. In the event of violation of laws, WWU will cooperate fully with the authorities to provide any information necessary for a criminal investigation.
About this Policy
Permission to duplicate or distribute this document is granted with the provision that, if used in pieces, the original document source be referenced. This User Agreement is a modified version of a document copyrighted by Arlene Rinaldi and Florida Atlantic University (1998). --May 31, 1999