Following is the online policy document of PUCC, which is replicated in the PUCC official publication ZZ-MANUAL. ---- Statement of Policy on --------- -- ------ -- Use of Computing Center Facilities and Services --- -- --------- ------ ---------- --- -------- (section 1.7 Ethical Behavior in ZZ-Manual.) The Computing Center provides computing facilities and services for the legitimate instructional and research com- puting needs of the University. Proper use of those facili- ties and services supports the legitimate computing activi- ties of Purdue students, faculty and staff. Proper use respects intellectual property rights. Legitimate instructional computing is work done by an officially registered student in support of a recognized course of study. Legitimate research computing is work approved by an authorized official of a University depart- ment. Intellectual property rights begin with respect for intellectual labor and creativity. They include the right to acknowledgment, the right to privacy, and the right to determine the form, manner and terms of publication and dis- tribution. Proper computing use follows the same standards of com- mon sense and courtesy that govern use of other public facilities. Improper use violates those standards by preventing others from accessing public facilities or by violating their intellectual property rights. Therefore, the basic policy of the Computing Center on proper use is: o Any use of Computing Center facilities or services unrelated to legitimate instructional or research com- puting is improper if it interferes with another's leg- itimate instructional or research computing. o Any use of Computing Center facilities or services that violates another's intellectual property rights is improper. o Any use of Computing Center facilities or services that violates any local, state or federal law is improper. The following sections describe some known instances of improper use. They do not constitute a complete list. When new occasions of improper use arise, they will be judged and regulated by the basic policy stated above. Disruptive Conduct ---------- ------- Don't behave at any Computing center facility in a way that interferes with another's legitimate use of the facility. This includes noisy and over-exuberant con- duct. Damage ------ Don't damage Computing Center facilities, hardware or software. Enforcement ----------- When instances of improper use come to its attention, the Computer Center will investigate them. During those investigations the Computing Center reserves the right to access private information, including the contents of files and mailboxes. Investigations that discover improper use may cause the Computing Center to: o Limit the access of those found using facilities or services improperly; o Refer flagrant abuses to deans, department heads, the University Police, or other authorities for appropriate action; o Disclose private information to other University authorities. Access to Files ------ -- ----- Don't read or use others' files without their permis- sion. Proper usage standards require everyone to take prudent and reasonable steps to limit access to their files and accounts. Fraud and Forgery ----- --- ------- Don't send any form of electronic communication that bears a fraudulent origin or identification. This in- cludes the forging of another's identity on electronic mail or news postings. Harassment ---------- Don't use University computing facilities to harass anyone. This includes the use of insulting, obscene or suggestive electronic mail or news, tampering with oth- ers' files, and invasive access to others' equipment. Networks -------- Don't use local, national and international networks for things that are not legitimate instructional or research activities of the University. This includes, but is not limited to: purely personal electronic mail; articles for commercial gain posted on electronic news networks; and repeated attempts to access restricted resources. Unauthorized Use of Accounts ------------ --- -- -------- Don't access an account not specifically authorized to you, whether it is on a Computing Center system or one at another place. Don't use an account for a purpose not authorized when the account was established, in- cluding personal and commercial use. Don't engage in computing activities that are designed to invade the security of accounts at the Computing Center or any other place. Attempts to decipher passwords, to discover unprotected files, or to decode encrypted files are examples. Proper usage standards require everyone to take prudent and reasonable steps to prevent unauthorized access. Unauthorized Use of Software ------------ --- -- -------- Don't make unauthorized copies of licensed or copy- righted software. Don't violate the terms or restric- tions on the use of software defined in official agree- ments between the University and other parties. Examples include: the copying of software from personal computers unless it is clearly and specifically identi- fied as public domain software that may be freely redistributed; and the copying of restricted Unix source code. Read the policy topic "unix-licensing" for more information on Unix license restrictions. Rules for Access to UNIX Source Code ----- --- ------ -- ---- ------ ---- One of the big factors in the increasing popularity of the UNIX operating system at Purdue is how easily UNIX source code applications can be moved among different variations of the UNIX system. This process, commonly called porting, often requires nothing more than copying and compiling an application to move it from one UNIX platform to another. The porting process is so simple that it is easy to lose sight of the ownership of individual programs and the license agreement restrictions on their source code. 1. License Agreements -- ------- ---------- Source code for computer programs is usually owned by the organization that developed the programs. Since many of these organizations have an economic stake in their developmental investment, they don't just give it away. At a minimum, they usually declare their copyright on the programs. But legally, a more powerful means exists: a license agreement. Software license agreements are contracts in which the seller agrees to provide the program, and perhaps its source code, provided that the buyer agrees to abide by the rules of the license. Sellers can specify just about any rules they desire so long as the buyer agrees to those rules. And just to make life interesting, every seller of computer software seems to have its own special rules to follow. Some programs are distributed in source form without a license agreement. They may be totally unrestricted (called ``public domain'') or the owner may retain the copyright but allow free distribution. A lot of useful software designed to run on UNIX systems is distributed this way. As a user of one of Purdue's systems, you may find source code to such programs in various system directories. 2. Source Code at PUCC -- ------ ---- -- ---- Whenever possible, most UNIX system administrators at Purdue strive to obtain the source code for programs because it makes it easier to maintain systems and quickly fix problems. In order to obtain source code for commercial software systems, it is necessary to negotiate the ``Terms and Conditions'' of the software license agreement with each software vendor. Some of those agreements permit anyone at Purdue to have access to the source code while others stipulate restrictions. Therefore, you may find that you have access to source code which is restricted by a license agreement. Just because you have access does not mean you have the right to port a program to another system. When it comes to the UNIX operating system and its associated utilities and libraries, Purdue University adheres to license agreements with AT&T, the University of California at Berkeley, and other vendors who redistribute UNIX. These license agreements specify the rules under which we may have access to the source code in the first place. The primary UNIX license for Purdue is its educational software agreement with AT&T. The agreement, administered by the Engineering Computer Network (ECN), allows the use of the source code for AT&T's System V, Release 3.2 UNIX on systems at Purdue that have been registered with AT&T. Registration currently costs $400 per system and is the first step that every administrator of a Purdue UNIX system must take before gaining access to any AT&T System V source code or its derivatives. Purdue's agreement with the University of California at Berkeley for access to its Fourth Berkeley Software Distribution (BSD), currently known as 4.3BSD or 4.3BSD-Tahoe, grants BSD source access to any system at Purdue that is registered with the AT&T agreement. A variety of other UNIX license agreements also have been signed by Purdue and UNIX resellers. All of these licenses require AT&T registration, including Digital Equipment Corporation's ULTRIX, Hewlett-Packard's HP-UX, Sequent's DYNIX, and Sun Corporation's SunOS among many others. Vendors usually place additional restrictions on the redistribution of their sources to protect the value they have added. If you have a UNIX system of any kind and want to obtain source access, please follow these rules: o Register your system under the Purdue AT&T agreement. Contact Mary Burwell at ECN (317) 494-3516 for more information. o Check with the source-code vendor to determine if an additional vendor license is required. Follow the vendor's restrictions on redistributing the vendor's source code. (PUCC cannot supply you with source code for ULTRIX or DYNIX, for example, because of the restrictions in its licenses with Digital Equipment Corporation and Sequent.) o Source code access for most Sun UNIX systems is provided under agreements between Purdue and the Sun Corporation. The system on which the sources are being used must also be registered with the AT&T agreement. o When in doubt, do not assume you have the right to copy sources from another UNIX system to your own; contact the AT&T license administrator at ECN or the administrator of the system from which you wish to copy the sources before doing so. Waste ----- Don't use Computing Center facilities wastefully. This includes squandering expendable resources, processor cycles or network bandwidth. Use expendable resources such as paper prudently, and recycle them if possible. Use a system whose capacity is appropriate to the size of the computing task.