Computer Science Account Policy:
- Your login is for your personal use! Do not give your password to anyone else. This
includes a fellow student, spouse, relative, friends, or even a university employee.
- By signing this form, you acknowledge that your account and all associated files may be
deleted if the account has not been accessed for a period of six months.
- All student accounts expire automatically at the end of the current semester.
- Valid passwords must be eight or more characters in length and include at least one upper
case and one lower case letter, at least one digit, and one special character. Do not use
words or names since these are easily guessed.
- Your usage of the Internet is primarily for educational and / or research purposes. Your
use of the Internet is limited to software provided by the Computer Science Department. You
are not allowed to install software or add Internet services without the approval
of the system Administrator.
- Do not attempt to access files owned by other users without specific permission.
- No food or beverages are allowed in the labs. Treat the equipment as if you paid for it
(you really did).
- Due to the high cost of printing, we have found it necessary to implement a print quota
system. Each user will be allocated a specific number of pages for the semester. The
allocation will vary based on the number of classes for which you are enrolled. You
may check your "Print Quota" by double clicking the [CS Desktop] folder and then
[Check Print Quota] icon when you are logged into a Windows PC.
- You must not engage in any illegal or legally questionable activities using any
university resources. If in doubt, refer to CS105 computer Ethics or ask a member of the
Systems Support Team.
UAHuntsville General Computer use Policy:
Every Computer User will
- Be accountable for using these facilities in an effective, ethical and lawful manner.
- Use only those facilities for which they have authorization, whether these facilities
are at UAHuntsville or at any other location accessible through a network.
- Take all reasonable steps to protect the integrity and privacy of the UAHuntsville computing
facilities including software and data. In particular, users shall not share with others
the access codes, account numbers, passwords, or other authorization which has been
assigned to them.
- Adhere to the copyright laws regarding software, data, and authored files.
- Adhere to the policies established by the administrators of external networks such as
THENET and NSFNET when using such networks. Users should also adhere to the policies
established by the administrators of local computing facilities at UAHuntsville.
- Respect the privacy of others. This includes, but is not limited to, abstaining for the
unauthorized access to E-mail, files, data, and transmissions.
- Not use the UAHuntsville computing facilities for unauthorized commercial activities.
- Not use the UAHuntsville computing facilities for any illegal purposes. Such acts include
accessing destruction of or alternation of data owned by others, interference with access
to computing facilities or harassment of user of such facilities at UAHuntsville computing
facilities or harassment of users such facilities elsewhere, unauthorized disruption of
UAHuntsville computing facilities, attempts to discover or alter passwords or to subvert security
system in any computing or network facility.
- Properly identify themselves in any electronic correspondence and provide valid,
traceable identification if required by applications or servers within the UAHuntsville computing
facilities or in establishing connections from the Lamar computing facilities.
- Have respect for intellectual labor and creativity. This applies to work of all authors
and publishers in all media. It encompasses respect for the right to acknowledgement,
right to privacy, and right to determine the form, manner, and terms of publication and
distribution. Violation of authorial integrity, including plagiarism, invasion of privacy,
unauthorized access, and trade secret and copyright violations, may be grounds for
sanctions against computing facilities users.
- Have access to the widest of viewpoints, free from institutional orthodoxy and internal
or external coercion. Acquisition and access to information in any form should be subject
only to financial limits and other standard criteria of collection such as the useful life
of the materials, storage capacity, etc.
- Expect network and system administrators to treat the contents of electronic files as
private and confidential. Users should further recognize that, as specified in the
relevant administrative policies at UAHuntsville, authorized UAHuntsville personnel have the obligation to
take reasonable and appropriate steps to ensure the integrity of UAHuntsville computing facilities
and to ensure that these policies are observed. Any intrusion into personal files must be
in compliance with university policies and laws governing such acts.
Any breach of this agreement could result in punitive
action, including (but not limited to) loss of computer privileges, deletion of your
account, departmental action, applicable disciplinary action, and referral to local law
enforcement or police authority.
I understand that my account is not a guaranteed service.
I acknowledge that I am responsible for my own backups and I will not hold UAHuntsville liable for
any damages or losses I may incur through the use or lack of use of this account. My clicking
on the accept button means that I have read, fully understand and agree to all terms
explained in this agreement.