itpolicy.berkeley.edu:7015/usepolicy.html
Reporting Misuse In support of the University's mission of teaching, research, and public service, the University of California, Berkeley provides computing, networking, and information resources to the campus community of students, faculty, and staff. Rights and Responsibilities Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege, and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations. Students and employees may have rights of access to information about themselves contained in computer files, as specified in federal and state laws. In addition, system administrators may access user files as required to protect the integrity of computer systems. For example, following organizational guidelines, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged. Existing Legal Context All existing laws (federal and state) and University regulations and policies apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct. Misuse of computing, networking, or information resources may result in the restriction of computing privileges. Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable University or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of campus computing and network resources will be directed to those responsible for taking appropriate disciplinary action. Reproduction or distribution of copyrighted works, including, but not limited to, images, text, or software, without permission of the owner is an infringement of US Copyright Law and is subject to civil damages and criminal penalties including fines and imprisonment. Examples of Misuse Examples of misuse include, but are not limited to, the activities in the following list. Obtaining a password for a computer account without the consent of the account owner. This includes but is not limited to programs known as computer viruses, Trojan horses, and worms. Activities will not be considered misuse when authorized by appropriate University officials for security or performance testing. May 11, 2001 Additional Use Policies The Computer Use Policy applies to use of all Berkeley Campus computing resources. Additional computer and network use policies and terms and conditions may be in place for specific electronic services offered by the campus. In particular, the UCLink and Home IP services, as well as the Microcomputer Facilities, have additional policies that govern use of these services. The University of California Electronic Communications Policy applies to the use of UC computers and networks for electronic communications. You must familiarize yourselves with any of these when you agree to use these services. Appropriate Use UC Berkeley extends to students, faculty, and staff the privilege to use its computers and network. When you are provided access to our campus network, you are enabled to send and receive electronic mail messages around the world, share in the exchange of ideas through electronic news groups, and use Web browsers and other Internet tools to search and find needed information. The Internet is a very large set of connected computers, whose users make up a worldwide community. In addition to formal policies, regulations, and laws which govern your use of computers and networks, the Internet user community observes informal standards of conduct. These standards are based on common understandings of appropriate, considerate behavior which evolved in the early days of the Internet, when it was used mainly by an academic and highly technical community. The Internet now has a much wider variety of users, but the early codes of conduct persist, crossing boundaries of geography and government, in order to make using the Internet a positive, productive, experience. You are expected to comply with these informal standards and be a "good citizen" of the Internet. Enforcement Penalties may be imposed under one or more of the following: University of California regulations, UC Berkeley regulations, California law, or the laws of the United States. Minor infractions of this policy or those that appear accidental in nature are typically handled informally by electronic mail or in-person discussions. More serious infractions are handled via formal procedures. In some situations, it may be necessary to suspend account privileges to prevent ongoing misuse while the situation is under investigation. Infractions by students may result in the temporary or permanent restriction of access privileges, notification of a student's academic advisor and/or referral of the situation to the Student Conduct Office. Those by a faculty or staff member may result in referral to the department chairperson or administrative officer. Offenses which are in violation of local, state, or federal laws may result in the restriction of computing privileges, and will be reported to the appropriate University and law enforcement authorities.
|