Getting Help

Lab Schedule

Home > Policies > Account Policy

Account Policy


By applying for a DECF account, you are agreeing to the following.

"I accept full responsibility for any use of this computer account.
I will use this account only for the purposes approved by my instructor/
advisor/sponsor and the Davis Etcheverry Computing Facility (DECF)."
Included among the activities that are prohibited are any illegal activities and running an IRC server or persistent client.

Failure to abide by these rules may result in cancellation of your account.

RIGHTS AND RESPONSIBILITIES

Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege, and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations.

Students and employees may have rights of access to information about themselves contained in computer files, as specified in federal and state laws. Files may be subject to search under court order. In addition, system administrators may access user files as required to protect the integrity of computer systems. For example, following organizational guidelines, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged.

EXISTING LEGAL CONTEXT

All existing laws (federal and state) and University regulations and policies apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct. Misuse of computing, networking, or information resources may result in the loss of computing privileges. Additionally, misuse can be prosecuted under applicable statutes. Users may be held accountable for their conduct under any applicable University or campus policies, procedures, or collective bargaining agreements. Complaints alleging misuse of DECF resources will be directed to those responsible for taking appropriate disciplinary action. Illegal reproduction of software protected by U.S. Copyright Law is subject to civil damages and criminal penalties including fines and imprisonment.

EXAMPLES OF MISUSE

Examples of misuse include, but are not limited to, the activities in the following list:

  • Using a computer account that you are not authorized to use. Obtaining a password for a computer account without the consent of the account owner. Using the Campus Network to gain unauthorized access to any computer systems.
  • Knowingly performing an act which will interfere with the normal operation of computers, terminals, peripherals, or networks.
  • Knowingly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes but is not limited to programs known as computer viruses, Trojan horses, and worms.
  • Attempting to circumvent data protection schemes or uncover security loopholes.
  • Violating terms of applicable software licensing agreements or copyright laws.
  • Deliberately wasting computing resources.
  • Using electronic mail to harass others.
  • Masking the identity of an account or machine.
  • Posting materials on electronic bulletin boards that violate existing laws or the University's codes of conduct.
  • Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner. Activities will not be considered misuse when authorized by appropriate University officials for security or performance testing.

 


Comments to consult@newton.berkeley.edu
© 1998-2017 UC Regents