Computing Policy

Policies for Use of UCSC SOE Computing Facilities

It is the policy of the University of California to provide computer resources to students, faculty and staff to be used in ways that are consistent with the Universitys mission—instruction, research, and public service—and in activities that support that mission, such as administration. These resources include computers, terminals, networks, modems, and printers.

It is the policy of the University to provide its users with access to local, national, and international sources of information in an atmosphere that encourages sharing of information, access to a rich collection of services, and open and free discussion.

The University expects that its user community will respect the public trust through which these resources have been provided. The work and efforts of the user community should not be subject to unauthorized disclosure, tampering, destruction, theft, harassment, nor should there be a denial of access to resources.

All users of campus computing resources share in the responsibility to protect the rights of the entire community.

All users must guard against abuses of the Universitys information resources and systems.

The University has determined that the following list, while not exhaustive, characterizes unacceptable behavior which may be subject to disciplinary action:

  1. Use of any University facilities in a manner that violates copyrights, patent protections, or license agreements;
  2. Attempts to gain unauthorized access to any information facility, whether successful or not. This includes running programs that attempt to calculate or guess passwords, or that are designed and crafted to trick other users into disclosing their passwords. It also includes electronic eavesdropping on communications facilities;
  3. Any violation of state law as described in the Penal Code. as an example, a copy of Section 502 of the California Penal Code is available separate from this policy statement; Any action that invades the privacy of individuals or entities that are the creators, authors, users, or subjects of information resources;
  4. Any action that disrupts the availability of a system for others, such as running programs that utilize all system resources and prevent others from making productive use of the system;
  5. Any use of University computing facilities for personal gain (including advertising) or political purposes without the prior approval of the University;
  6. Any use of University computing facilities to harass others;
  7. Attempts to alter, damage, delete, destroy or otherwise abuse any computer or network resource.

In addition, the user should be aware of the following policies and expectations:

The University grants permission to members of its community to use computation resources by issuing individual computer accounts. As a condition of receiving such an account, the user must exercise diligence to keep his or her password as a secret and not disclose it to any other person. Users of shared computers or networks which connect to the campus network should not share or transfer their account privileges to any other person.

The University expects that all those who choose to use our off-campus network connections will understand and honor the policies of those regional and national network organizations to which the University is a party. The use policies for these networks are available separately from this policy statement.

Campus units that administer computers may also establish guidelines for the appropriate use of their equipment in addition to these campuswide policies. These guidelines must be consistent with campuswide policies.

When a non-University-owned computer is used on campus, the user must follow all of these campuswide policies. In addition, if the computer is attached to the campus network 1 it must be registered with the owners name and contact information, machine manufacturer and model number, location of machine, and the network address of the machine. This registration can be done through divisional computer/network managers or through UCSC SOE.

This includes computers with one or more unique network addresses as well as computers that obtain network addresses on a dynamic basis.