home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Usenet 1994 October
/
usenetsourcesnewsgroupsinfomagicoctober1994disk2.iso
/
unix
/
volume24
/
policy
/
gen
< prev
next >
Wrap
Text File
|
1991-03-05
|
4KB
|
94 lines
gen - general overview $Revision: 1.10 $ $Date: 91/02/06 12:48:51 $
^^^^^^^^^^^^^^^^^^^^^^^^^^
USE OF MTEK COMPUTING FACILITIES
This host is privately owned and operated in support of a business. Business
priorities will thus be served first, if there is a conflict for time of the
administrator. We will be as helpful as conditions allow.
We run alot of usenet software on this host. So if you wonder if a desired
command is in your PATH, type in 'which <command>'.
To find information about other users, use 'finger'. (Do 'man finger', if
you want to read the man page describing the use of 'finger').
Please furnish your office telephone number and extension so that we can enter
it into the password file, available for 'finger' to find you. If you like,
you may also furnish your home number to be included, as well.
Below are presented the main elements of local policy, which apply to all
users:
* * * * * * * * * * * * * * *
* Computer Resources Policy *
* * * * * * * * * * * * * * *
1. General
Computing facilities are provided by MTEK International, Inc. (the "company")
for use by local and remote users. It is expected that all users will make
use of local computing resources in a manner which is ethical, legal, and not
contrary to the interests of others, including the company.
The basic guidelines are that any use must be legal and not such as to
interfere with use by other authorized users, nor compromise the confiden-
tiality of the company's internal business practices or records.
2. Notice
If any policy has provisions with which you do not agree, please notify the
administrator describing your concerns/suggestions. Absent such notice, it is
assumed you have reviewed and understood, and fully agree to conform to, all
prevailing published policies governing the use of this system.
2. Disclaimer
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* *
* The company accepts NO RESPONSIBILITY for any damage to or loss of *
* data arising directly or indirectly from the use of these or other *
* facilities or for any consequential loss or damage. It makes NO *
* WARRANTY, express or implied, regarding the computing services *
* offered, or their fitness for any particular purpose. *
* *
* The company's liability in the event of any loss or damage shall *
* be LIMITED TO THE FEES AND CHARGES, IF ANY, PAID TO THE COMPANY *
* for use of the computing facilities which resulted in said loss *
* or damage. *
* *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
3. Failure to abide by the policies described below and in related docu-
ments may result in denial of access to computing facilities:
A. You may only use those facilities which have been authorized
for your use. If access is protected by a password, you are not
to make this password available to others. You may not use any
account set up for another user, nor may you attempt to find out
the password of another user.
B. You may only use authorized facilities for authorized purposes.
C. You must be aware of the law of copyright as it affects computer
software. Software must not be copied except with the express
permission of the copyright owner (which may be expressed in the
copyright notice contained within the software). Note that a
formal copyright need not be in evidence in order for copyright
protection to be in force.
D. You may not attempt to copy information belonging to other users
without their express permission.
E. You may not attempt to interfere with the operation of computing
facilities.
F. You may not attempt to subvert the security of any of the company's
computing facilities.
G. You may not use the company's computing facilities to send messages
which are obscene or otherwise harassing in their intent.
H. You may disagree with one or more of these policies, publically or
privately, in accordance with your First Amendment rights, but you
may not violate any of these policies for any reason or purpose.