Department of Physics and Astronomy Acceptable Use Policy
In support of the University's mission of teaching, research, and
public service, the Department of Physics and Astronomy provides computing,
networking, and information resources to UCLA's students, faculty,
and staff.
The Department of Physics and Astronomy provides the UCLA community with access to local, national, and
international sources of information in an atmosphere that encourages
sharing of information, access to a rich collection of services, and open
and free discussion for academic purposes and other University-related
uses.
Unfortunately, the use of computing resources can be used
improperly, sometimes quite unintentionally and, in rare instances,
deliberately. Accordingly, for both your personal benefit and the benefit
of others, you must assume responsibility for making the best possible
use of your privileges and for not abusing them.
All existing laws (federal and state) and University regulations
and policies apply, including not only those laws and regulations that
are specific to computers and networks, but also those that may apply
generally to personal conduct.
The information set forth below further defines your responsibilities,
consequences of possible misuse, and examples of misuse.
Your Responsibilities
Computers and networks can provide access to resources on and
off campus, as well as the ability to communicate with other users
worldwide. Such open access is a privilege, and requires that individuals
act responsibly. Users must respect the rights of other users, respect
the integrity of the systems and related physical resources, and observe
all relevant laws, regulations, and contractual obligations.
You are responsible for ensuring the integrity of your account.
Department of Physics and Astronomy
grants permission to members of the UCLA Physics and Astronomy community to use computing
resources by issuing individual computing accounts. As a condition of
receiving an account, you must observe
the following guidelines:
- Department of Physics and Astronomy accounts may be used for
incidental personal purposes provided
such use does not interfere with University operation of information
technologies or electronic mail services, burden the University with
incremental costs, or interfere with the user's employment or other
obligations to the University.
- Use the facility in accordance with established policies and
procedures. Although Department of Physics and Astronomy IDs are
intended to be used for
academic purposes, these accounts may be used for incidental personal use
but not as a primary connection to the network/internet for individual
or business units.
- Respect the rights of other users, respect the integrity of the
systems and related physical resources, and observe all relevant laws,
regulations, and contractual obligations.
- Make economical and wise use of the facility resources that are
shared with others, thus enabling access to these resources by the
greatest possible number of users. Make judicious use of one of the
scarcest resources - the dial up modems.
- Respect others' rights to the privacy of their programs and data.
- Prevent others from learning your password and change it frequently,
thus reducing the possibility of illegal use of your account by
unauthorized persons.
- Report suspected unauthorized use of facility resources to the
system administrator as
soon as possible.
- You must assume the responsibility for backing up your data and
programs. Protect important data and programs stored on tape or disk
by duplicating them on backup tapes.
Consequences of Misuse
Misuse of computing, networking, or information resources may result
in the loss of computing privileges. Additionally, misuse of a computing
account will require financial restitution to the University for funds
expended and could result in University disciplinary action or civil or
criminal action.
Users may be held accountable for their conduct under any applicable
University or campus policies, procedures, or collective bargaining
agreements. Any actions which deter other users from doing their work
or which would otherwise be deemed malicious by the department will
result in the
loss of access to the system and possible University disciplinary action
or civil or criminal action.
Both unauthorized use of the computer and use for personal gain
constitute theft under California law and will be prosecuted by the
University. Furthermore, entering the computer facility with the intent,
by whatever means, of discovering another's account number for purposes
of stealing computer time constitutes burglary under California law and
will be prosecuted.
Complaints alleging misuse of resources will be directed to those
responsible for taking appropriate disciplinary action.
Definition/Examples of Misuse
The following list, while not exhaustive, characterizes unacceptable
behavior which may be subject to disciplinary action:
- Use of any University facilities in a manner that violates copyrights,
patent protections, or license agreements;
- Use of any University facilities for personal gain or profit, or for
any type of commercial use;
- Attempts to gain unauthorized access to any information facility,
whether successful or not. This includes running programs that attempt
to calculate or guess passwords, or that are designed and crafted to
trick other users into disclosing their passwords. It also includes
electronic eavesdropping on communications facilities;
- Any violation of state law as described in the Penal
Code. As an example, a copy of Section 502 of the California
Penal Code is available separate from this policy statement (see , Perspective
18[4] "Computer Crimes: Excerpt from Section 502 of the California
Penal Code," pp52-54;
- Any action that invades the privacy of individuals or entities that
are the creators, authors, users, or subjects of information resources;
- Using electronic mail, talk or other programs as pranks or in a
threatening or harassing manner;
- Misrepresenting in any manner, your identity, your account or a
computer in an email or other electronic communication;
- Sending chain letters, advertisements, or solicitations of any
type;
- Sending mass mailings to individuals who have not expressly agreed
to be contacted in this manner;
- Posting on electronic bulletin boards materials that violate existing
laws or the University's codes of conduct;
- Knowingly sharing a personal account;
- Staying connected via modem for extended periods;
- Using the campus network to gain unauthorized access to any computer
systems;
- Knowingly performing an act which will interfere with the normal
operation of computers, terminals, peripherals, or networks;
- Knowingly running or installing on any computer system or network, or
giving to another user, a program intended to damage or to place excessive
load on a computer system or network. This includes but is not limited
to programs known as computer viruses, Trojan horses, and worms;
- Attempting to circumvent data protection schemes or uncover security
loop holes;
- Attempting to monitor or tamper with another user's electronic
communications, or reading, copying, changing, or deleting another user's
files or software without the explicit agreement of the owner;
Activities will not be considered misuse when authorized by appropriate
University officials for security or performance testing;
[Acceptable Use Policies]
[Department of Physics and Astronomy HomePage]