I.T. Times
Volume 2. No 1 Information Technology News of the University of California, Davis October 1993


Unacceptable Uses of Campus Systems and Network


Editor's Note: The following information is from UCD - Computer Use Policy, a document adapted in large part from UC Berkeley's Computer Use Policy. The UCD document was approved for dissemination and implementation on an interim basis by the Computing Administrative Advisory Committee/Academic Senate Committee on Computing at its June 11, 1993 meeting.

Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege, and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations.

Existing Legal Context

All existing laws (federal and state) and University regulations and policies apply, including those that are specific to computers and networks, as well as those also those that may apply generally to personal conduct.

Misuse of computing, networking or information resources may result in the loss of privileges on those resources that IT administers, and those that may exist in other departments associated with UC Davis and connected to its network. Also, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under all applicable University or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of IT resources will be directed to those responsible for taking appropriate disciplinary action as specified under Enforcement below. Illegal reproduction of software protected by US Copyright Law is subject to civil damages and criminal penalties including fines and imprisonment.

Other organizations operating computing and network facilities that are reachable via the UC Davis network may have their own policies governing the use of those resources. When accessing remote resources from UC Davis facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations.

Examples of Misuse

Here are guidelines to determine when misuse of UCD computer systems and the campus network has occurred. Examples of misuse include the activities in the following list.

Activities will not be considered misuse when authorized in writing by appropriate University officials for security or performance testing.

Enforcement

Penalties may be imposed under one or more of the following: University of California regulations, UC Davis regulations, California law, the laws of the United States. Minor infractions of this policy, such as poorly chosen passwords, overloading systems, excessive disk space consumption, and so on are typically handled internally to IT in an informal manner by electronic mail or in-person discussions. More serious infractions are handled via formal procedures.

Infractions such as sharing accounts or passwords, harassment, or repeated minor infractions may result in the temporary or permanent loss or modification of IT access privileges. Additionally, notification will be made to a student's academic advisor and/or Student Judicial Affairs, or the department chairperson in the case of staff or faculty.

More serious infractions, such as unauthorized use, attempts to steal passwords or data, unauthorized use or copying of licensed software, violations of University policies, or repeated violations as described in the above paragraph may result in the temporary or permanent loss of IT access privileges. In all cases, the offender's associated school or department will be notified of the infraction. If the offender is a student at the University, the case will also be referred to the Student Judicial Board for appropriate action.

Offenses which are in violation of local, state or federal laws will result in the immediate loss of all IT computing privileges, and will be reported to the appropriate University and law enforcement authorities.


ietpubs@ucdavis.edu