Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Cyber Law :: columbia.txt

Columbia University Computing Policies




(Administrative Policies)

(Overview)
The  Center  for  Computing  Activities   is
maintained   by   the   University   as   an
educational  and  research  facility for its
faculty, research staff, and students.
It also supports the data processing requirements  of
its  administrative offices.
Usage of the facility is allowed to other
organizations by special permission  and upon
the payment of appropriate fees.

(Illegal Usage)

Each user is responsible for  insuring  that
his/her use  of the computing facility does not
interfere with other users  or  with  proper
functioning  of the system.  The Director of
Computing  Activities  or   his   representative(s)
may take any of the actions listed
below against violators of this precept.
This list is not inclusive.



Termination  of  a  program  or   online
session:    an   irresponsible   user  at  a
terminal may be logged  off.   Similarly,  a
harmful   job   running   on any system may be
cancelled.

Improper use of a project number
may be reported to the project sponsor.

Invalidation of a project number  or  ID.
A  project  number or terminal system ID may
be invalidated.   Alternatively,  a  request
may  be  made  that  the  project  number or
terminal ID be changed.

Serious incidents  may be  referred directly  to the  appropriate
academic or outside authorities.   <Unauthorized use of  Center
facilities is  a  criminal  offense.   The  penalties  
may be as  severe as dismissal  from the University,  or
prosecution>.


Listed below are some examples of activities
which are harmful to  other  users  and  are
not allowed.   This  list  is illustrative and
not inclusive.


Unauthorized use of project numbers or ID's;  unauthorized  access
to   another   person's   files;   using   or  changing  
another person's password without authorization.

Use of a  University  project  number  to
perform computing services for commercial or
other  organizations outside the University, except for outside users.
Such prohibited services include development
of  programs  for  commercial  users,   data
processing,   computations,  preparation  of
advertising material, etc.

Possession in a   file,  or
use  of  programs  capable  of  fraudulently
simulating system responses; modification of
or    possession    of    systems    control
information,  especially that which reflects
program   state,   status   or   accounting;
attempts to modify or crash the system.

Frivolous,  disturbing,   or   otherwise
inconsiderate  conduct in the terminal areas, as well as the 
use of terminals for  sending
nuisance  or  obscene messages, wasteful use
of the facilities for making signs, posters,
calendars, etc., on the printers.  

No game playing is allowed on any CUCCA system.

(System Security)

CUCCA  makes  every  effort  to  ensure  the
integrity  of  its  various  systems.    All
computer systems available to users offer
some form of dataset protection which can be
modified  by  an authorized user as 
needed.   However,  none  of  the  systems
offer  absolute  dataset
security.   Thus,  users  should
never   place   sensitive   information   on
publicly  accessible online volumes (disks).
The Center cannot, under  any  circumstance,
be  held liable for the consequences of such
actions.

(System Performance)

CUCCA reserves the right  to   hold,   cancel, or  restart a    
job or program  to   improve  system performance.  The Computer Center also
reserves  the  right  to sign  off  any  user--if possible, 
with proper notification--if 
CUCCA   policy is violated,   or  it is believed that the programs
being  run  are  adversely affecting   the   performance   of   a
system. 

(Statement of Liability)

CUCCA  cannot  be  held  liable  for  any  losses,
including  lost  revenues, or  for  any  claims  or
demands against the user by any other  party.   In
no   event   can   CUCCA   be   held   liable  for
consequential  damages  even  if  CUCCA  has  been
advised of the possibility of such damages.  CUCCA
cannot be held responsible for  any damages due to
the loss of output,  loss  of  data,  time  delay,
system  performance,  software  performance, incorrect advice from a 
consultant, or any other damages
arising from the use of CUCCA's computer facilities.  CUCCA  will
attempt  to  correct  conditions  and make appropriate refunds in
accordance with the conditions outlined in  Chapter  3, ``Accounting,'' 
in  the section on CUCCA Refund Policy.




P.S.  Some of this goes too far, like no games and such, but I think it's
a pretty good document.
	You might want to put something about whether or not you will
	read a person's mail.  There is a federal law about that, but
	I'm not sure what it is.  I know the best thing to claim is that
	under normal cercumstances, you will not read a person's mail
	or files, but that you are not going to guarentee that the mail
	and/or files will *not* be read.  (Otherwise a person can sue
	your pants off!)




TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH