As a student you are probably aware of certain ethical responsibilities you have, such as honesty in doing class- work. Another area in which you have important ethical responsibilities is in your use of computing resources. This document describes some of these responsibilities and explains ICS Department policy on student use of computing resources. Some of these policies might be different from what you would expect, so please read over and understand this document.
The ICS department provides for you, the student, a wide range of computing resources from X-Terminals to PC's to large multiuser UNIX systems. These machines are expensive to buy and expensive to maintain, but it is our goal to provide you with the very best computing environment that we can. Many users depend on these computers for doing class assignments, research, and for communications. We are a community of computer users, and like any community we can all make the best use of our resources if we establish some guidelines for how we can use them responsibly.
Some computing facilities, such as those which hold classified data, may establish expensive and complex security systems. In our department we do not do this; we have some security mechanisms which greatly decrease the risk that one user will accidentally interfere with another, but it does not require great ingenuity to get around these mechanisms. As a result, we need to trust the people who use our machines.
The fundamental principle behind our policies is this: While using the computers, you should never do anything that harms another user or prevents him or her from getting work done.
If you have any questions about these rules, or if you suspect that an account (your's or someone else's) has been broken into, please contact the ICS Computing Support Group. To do this, send mail to the address support, or go to Support's office, CS346, and explain the problem.
The ICS Department has a wide range of computers available, located in several different labs. Some of these labs are open only to people enrolled in certain classes, some are available for general drop-in use. Each ICS major is given both an NT account, and a UNIX account on the Sun workstations. Different courses will require different platforms to be used. Non-majors will be given accounts only if required for a course in which they are enrolled.
All ICS computers are to be used only by ICS students, faculty, and staff. People outside ICS who wish to use computers should go see the people in the Office of Academic Computing (Engineering Gateway, room 2130). They provide computing for non-ICS people.
Any computer account created for you remains the property of the Regents of the University of California. You are responsible for this account, and you may not allow any other person to use it. The primary purpose of your account is to allow you to carry out your computing assignments and other instructional activities. You may also make modest use of these resources for other purposes, such as sending electronic mail to friends on campus, reading the electronic bulletin boards, and playing games, provided that this usage does not significantly interfere with instructional use of the machines.
An example of how one might “significantly interfere” would be be to tie up a computer for game-playing when no other computers are free and someone else is waiting to use the computer to do an assignment. If you have a game or other program you would like to make available to other users, please give it to the system administrator for public installation (You can contact the system administrator by sending mail to support). You may not use the machines for commercial purposes, such as preparing bills for your company or advertising products, or for work related to non-UCI organizations, such as an off-campus political or religious group. More details about this are given below. If you are in doubt about whether some use of the machines is allowed, ask the Support Group.
Here is a list of some examples of activities that the department does not allow. If a student makes such unethical use of ICS computers, he/she will be subject to the penalties described in the Disciplinary Procedures section.
What happens if you violate any of these rules? It depends on the seriousness of the offense, but could be one or more of the following. Disciplinary procedures and sanctions will be consistent with those outlined in the UCI Implementation of “Interrim Policies and Procedures Applying to Campus Activities, Organizations, and Students, Part A.”
Your cooperation in the following areas will help us make efficient use of the computing resources and will avoid unnecessary impositions on the time of faculty, staff, and other students. These are not the sort of things which we can expect to enforce rigidly; rather, we are asking your cooperation for the benefit of the whole departmental community. Violations of these guidelines would not ordinarily result in any of the penalties listed above beyond number one, unless they were especially flagrant or persist after faculty or staff have asked you to stop.
Some of these polices are adapted from those used by the UCLA CS Department. They adapted some of their polices from Columbia University and the California Institute of Technology.