Acceptable Use Policy
Computers and networks can provide access to resources both within DCN and throughout the Internet, as well as the ability to communicate with other users worldwide. Such open access is a privilege, and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources, and observe all relevant laws, regulations, and contractual obligations.
Most tenets of "Acceptable Use" can be thought of as common courtesy and common sense, known colloquially as netiquette.
Existing Legal Context:
All existing federal, and state, and municipal laws apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct.
User files may be subject to search under court order if such files are suspected of containing information that could be used as evidence in a court of law. In addition, system administrators may access user files as required to protect the integrity of computer systems. For example, system administrators may access or examine files or accounts that are suspected of unauthorized use or misuse, or that have been corrupted or damaged.
Misuse of computing, networking or information resources may result in suspension or termination of the user's DCN account. Additionally, misuse can be prosecuted under applicable statutes. Complaints alleging misuse of DCN resources will be directed to those responsible for taking appropriate disciplinary action as specified under Reinforcements below.
Other organizations operating computing and network facilities that are reachable via DCN may have their own policies governing the use of those resources. When accessing remote resources from DCN facilities, users are responsible for obeying both the policies set forth in this document and the policies of the other organizations.
Examples of Misuse:
Examples of misuse include, but are not limited to, the activities in the following list.
- Using a computer account that you are not authorized to use. Obtaining a password for a computer account without the consent of the account owner. If you as an authorized user give out your account and password to another individual, you can still be held accountable for any actions that may arise that are associated with your account.
- Using DCN resources to gain unauthorized access to any computer systems.
- Knowingly or carelessly performing an act which will interfere with the normal operation of computers, terminals, peripherals, or networks.
- Knowingly or carelessly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan Horses, and worms.
- Attempting to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data. This also includes programs contained within an account, or under the ownership of an account that are designed or associated with security cracking.
- Violating terms of applicable software licensing agreements or copyright laws. Illegal reproduction of software protected by U.S. Copyright Law is subject to civil damages and criminal penalties including fines and imprisonment.
- Using electronic mail to harass others.
- Creating mail or electronic distribution lists larger than 10 addressees that send electronic communications to other accounts without prior permission of the receiving individual.
- Masking the identity of an account or machine. This includes, but is not limited to, sending mail with a forged return address, sending mail anonymously and anonymous postings to Usenet News.
- Indiscriminate postings to multiple Usenet newsgroups without regard for Subject matter.
- Posting on electronic bulletin boards materials that violate existing laws.
- Posting on Internet services information that may be slanderous or defamatory in nature. This includes, but is not limited to, posting of said type of material on Usenet News.
- Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner. Files owned by individual users are to be considered private property, whether or not they are accessible by other users.
Activities will not be considered misuse when authorized in writing by appropriate DCN personnel for security or performance testing.
Enforcement:
Penalties may be imposed under the laws of the City of Davis, of the State of California or of the United States.
Minor infractions of this policy, when likely accidental in nature, such as poorly chosen passwords, overloading systems, excessive disk space consumption, and so on are typically handled in an informal manner by electronic mail or in-person discussions. More serious infractions are handled via formal procedures.
Major infractions or repeated minor infractions described in, but not limited to, the above policies may result in the temporary or permanent loss of the use of DCN resources.
Offenses which are in violation of local, state or federal laws will result in the immediate loss of all access to DCN resources, and will be reported to the appropriate University and law enforcement authorities.