Vyvoj a filos.Internetu & BIG 38 (part 3/3).

Martin Pilc marpi at psu.edu
Wed Nov 9 19:32:45 CET 1994


Questions on an ethical behavior:

- Is it Ethical?
- Are you unsure whether your action is allowed?
- Do you feel a need to hide your actions?
- Is it confidential information?
- Might you feel guilty about the action later?
- Is it dishonest or unfair to anyone?
- Does it violate a license or agreement?
- Is it detrimental to the interests of others?
- Is it unrelated to the purpose of your computer account?
- Does it interfere with anyone's privacy?
- Does your action waste time or other valuable resources?
- Does your action involve offensive, obscene or harassing messages?

If you answered Yes to any of the above questions, stop and think.
Your actions could get you in trouble...


4.  POLICY STATEMENT ON COMPUTER AND SOFTWARE MISUSE (POL12,
July 28, 1994)

Access to and use of computer facilities, electronically
stored data, and software shall comply with federal laws, the
laws of the Commonwealth of Pennsylvania, and the rules and
regulations of the University including those rules and
regulations set forth in Administrative Policies AD-20 and
AD-23 and Administrative Guidelines ADG-1 and ADG-2.*  Misuse
of computers, computer facilities, and software may violate
federal or state criminal laws and may result in criminal
charges against the user.  Members of the University
community may be subject to University sanctions, including
disciplinary charges.

It is a violation of University regulations to:
 1) intentionally and without authorization, access, alter,
    interfere with the operation of, damage or destroy all
    or part of any computer, computer system, computer
    network, computer software, computer program, or
    computer data base.
 2) intentionally or knowingly and without authorization,
    give or publish a password, identifying code, personal
    identification number or other confidential information
    about a computer, computer system, computer network or
    data base.

University regulations apply to all University computers and
computer equipment, computerized data and all data owned or
held through agreement by the University.  These regulations
may also apply to computer equipment and data belonging to or
held by agreement by members of the University community or
others when violations are deemed to have a substantial
adverse effect upon the University community or upon
individual members of the University community.

It is important that members of the University community be
aware of the intellectual rights involved in the unauthorized
use and copying of computer software.

Respect for intellectual labor and creativity is vital to
academic discourse and enterprise.  This principle applies to
the work of all authors and publishers in all media.  It
encompasses respect for the right to acknowledgment, right to
privacy, and the right to determine the form, manner, and
terms of publication and distribution.

Because electronic information is volatile and easily
reproduced, respect for the work and personal expression of
others is especially critical in computer environments.
Violations of authorial integrity, including plagiarism,
invasion of privacy, unauthorized access, and trade secret
and copyright violation, may be grounds for sanctions against
members of the academic community.  (EDUCOM, 1987)


Sincerely

MarPi                        Martin Pilc
                             marpi at psu.edu





More information about the net mailing list