By applying for a DECF account, you are agreeing to the following.
"I accept full responsibility for any use of this computer account.
I will use this account only for the purposes approved by my instructor/
advisor/sponsor and the Davis Etcheverry Computing Facility (DECF)."
Included among the activities that are prohibited are any illegal
activities and running an IRC server or persistent client.
Failure to abide by these rules may result in cancellation of your account.
RIGHTS AND RESPONSIBILITIES
Computers and networks can provide access to resources on and
off campus, as well as the ability to communicate with other
users worldwide. Such open access is a privilege, and requires
that individual users act responsibly. Users must respect the
rights of other users, respect the integrity of the systems and
related physical resources, and observe all relevant laws,
regulations, and contractual obligations.
Students and employees may have rights of access to
information about themselves
contained in computer files, as specified in federal and state
laws. Files may be subject
to search under court order. In addition, system
administrators may access user files as
required to protect the integrity of computer systems. For
organizational guidelines, system administrators may access or
examine files or
accounts that are suspected of unauthorized use or misuse, or
that have been corrupted
EXISTING LEGAL CONTEXT
All existing laws (federal and state) and University
regulations and policies apply,
including not only those laws and regulations that are
specific to computers and
networks, but also those that may apply generally to personal
Misuse of computing, networking, or information resources may result in
the loss of computing privileges. Additionally, misuse can be prosecuted
under applicable statutes. Users may be held accountable for their
conduct under any applicable University or campus policies, procedures,
or collective bargaining agreements. Complaints alleging misuse of DECF
resources will be directed to those responsible for taking
appropriate disciplinary action. Illegal reproduction of software
protected by U.S. Copyright Law is subject to civil damages and criminal
penalties including fines and imprisonment.
EXAMPLES OF MISUSE
Examples of misuse include, but are not limited to, the activities in
the following list:
Using a computer account that you are not authorized to
use. Obtaining a password for a computer account without
the consent of the account owner.
Using the Campus Network to gain unauthorized access to any computer
Knowingly performing an act which will interfere with the normal
operation of computers, terminals, peripherals, or
Knowingly running or installing on any computer system or network,
or giving to another user, a program intended
to damage or to place excessive load on a computer system or
network. This includes but is not limited to
programs known as computer viruses, Trojan horses, and worms.
Attempting to circumvent data protection schemes or uncover security
Violating terms of applicable software licensing agreements or
Deliberately wasting computing resources.
Using electronic mail to harass others.
Masking the identity of an account or machine.
Posting materials on electronic bulletin boards that violate
existing laws or the University's codes of conduct.
Attempting to monitor or tamper with another user's electronic
communications, or reading, copying, changing, or
deleting another user's files or software without the explicit
agreement of the owner. Activities will not be
considered misuse when authorized by appropriate University
officials for security or performance testing.