 | RLUG Computer Systems Acceptable Use Policy |
Guiding Principles
RLUG resources exist to facilitate the
goals of the Rice Linux Community. These goals include the providing peer Linux support,
encouraging collaboration between students on software projects, and the
advancement the the Open Source initiative. These resources should augment, not
duplicate those already available to students via other University resources.
Users of RLUG computer systems must also abide by the policies of Rice
University, host networks, state and national laws.
Responsibilites
- Users must sign a hardcopy of this policy, stating that they have read and understand this policy and other pertinent policies.
- Negligence or ignorance is not an excuse for any violation of this policy.
- The systems are not for schoolwork, including compilations, simulations, or services. Rice University provides other resources explicitly for these purposes.
- Users may not use an unreasonable amount of system resources. Any long-running program should be run with a reduced scheduling priority.
- Users must gain prior approval from system administrators to run a program providing network services.
- Users may not attempt to modify RLUG systems, network facilities, attempt system crashes, or cause denial of service. They should not tamper with software protections or restrictions on computer applications or files.
- Users may use only their own computer accounts. Accounts or passwords must not be shared.
- Users may not attempt to subvert any restrictions associated with their accounts.
- Users must supply only accurate and truthful information to system administrators.
- Users may not attempt to obtain other users' passwords through any means.
- Users are responsible for making use of software and electronic materials in accordance with University policy and any applicable copyright, licensing, and legal restrictions.
- Information distributed through RLUG systems is a form of publishing, and even with disclaimers the RLUG is represented though students, faculty, staff, etc. Appropriate language, behavior, and style is warranted.
- If sponsored by an approved Rice user, guest users may obtain accounts. Sponsors are responsible for managing such guests. Sponsors are culpable for the actions of their guests.
- Users must notify system administrators immediately if the suspect a security threat. This includes external threats or weak software.
- System administrators may search and/or place restrictions on any account if reasonable suspicion of a security threat exists. This includes credible requests from University or law enforcement professionals.
- Violation of this policy constitutes adequate grounds for having your account restricted or revoked.
I the undersigned, have read and understood this policy, by which I agree to abide.
______________________________