Department Computing Policy

- Conditions for use of Electrical Engineering and Computer Science (ECE) Computing Services & Facilities

All users have the responsibility to use the ECE computing services in an efficient, ethical, and legal manner. Users of the ECE computer facilities are expected to abide by the following policies which are intended to preserve the utility and flexibility of the computer system, protect the work of students, staff, and faculty, and preserve the right to access networks to which the University is connected.

You will be assigned an ECE computer account to access ECE computer facilities. The University reserves the right to access your account and the system at anytime at its sole discretion. Your own password will allow access to your account and you may not allow any other person to use your account. It is your responsibility to protect your account from unauthorized use by changing passwords that are not easily guessed.

Identify yourself clearly and accurately in electronic communications. Concealing or misrepresenting your name or affiliation to mask irresponsible or offensive behavior is a serious abuse. Using identifiers of the individuals as your own constitutes fraud.

You are expected to take proper care of the equipment in ECE facilities. Food, drink, and smoking are not allowed in ECE labs. Report any malfunction to support@ece.uic.edu Do not attempt to move, repair, reconfigure, modify, or attach external devices to the systems. In addition, individual ECE computer laboratories can post additional operational rules and restrictions that are considered part of the ECE computer policy. You are responsible for reading and following these rules.

Accept limitations or restrictions on computing resources, such as storage space, time limits, or amount of resources consumed, when asked to do so by the system administrators. Such restrictions are designed to ensure fair access for all users. You are expected to use computing resources in a responsible and efficient manner consistent with the instructional, research, and administrative goals of the University.

While great effort is made to keep the contents of what you create, store, and send to be seen only by those to whom you intend or give permission, the University cannot and does not guarantee the security of electronic files on its computer systems. These systems can sometimes be breached by someone determined to do so. Additionally, as specified above, the University reserves the right to access its computer systems, including your account, if it is deemed appropriate.

You are expected to refrain from engaging in deliberate wasteful practices such as sending chain letters through electronic mail, printing unnecessary listings, printing multiple copies of files, performing endless unnecessary computations, or unnecessarily holding public terminals, or dial-up phone lines for long periods of time when others are waiting for these resources.

Computer use for course-related assignments take priority over exploratory use. In addition, the department may restrict access to certain programs for security or administrative purposes. Users are responsible for complying with program restrictions which may be amended from time to time. 

Current Lab Restrictions 

  1. Don't run FSP. 
  2. Don't run IRC. 
  3. Don't run xlock. 
  4. Don't run MUDS. 
Unauthorized transferral of copyrighted materials to or from the ECE computer system without express consent of the owner is a violation of federal law. In addition, use of the Internet for commercial gain or profit is not allowed from an educational site.

Use of electronic mail and other network communications facilities to harass, offend, or annoy other users of the network is forbidden. All users need to be aware that obscene, defamatory, or any other material which violates University policy on non-discrimination will not be tolerated on the ECE computer system. The department will take whatever action is needed to prevent, correct, or discipline behavior that violates this policy.

Any attempt to circumvent system security, guess other passwords, or in any way gain unauthorized access to local or network resources is forbidden. Distributing passwords or otherwise attempting to evade, disable, or "crack" passwords or other security provisions threatens the work of many others and is therefore grounds for immediate suspension of your privileges. You may not develop programs or use any mechanisms to alter or avoid accounting for the use of computing services or to employ means by which the facilities and systems are used anonymously or by means of an alias.

Violations of policy will be treated as academic, civil, or criminal misconduct. In disciplining computer services and facilities violations, the department reserves the right to pursue all academic disciplinary remedies available. Disciplinary measures may include warnings, suspension of computer privileges (temporary or permanent), or expulsion from the University. The department also reserves the right to immediately suspend user privileges for potential violations of these guidelines. Such action will be taken to protect the security and integrity of the ECE computer system and will take precedence over its impact on an individual's work.

The department will investigate apparent or alleged violations of these guidelines. When appropriate at the discretion of the department, cases of apparent abuse will be reported to the Vice Chancellor of Student Affairs (student cases) or the Vice Chancellor for Human Resources (faculty and staff cases.) These respective offices are responsible for determining any further disciplinary actions. The University may also pursue civil and/or criminal charges if it deems appropriate.

Issues concerning these guidelines, or allegations of harassment or other irresponsible use of computing resources, should be brought to the attention of the computer committee or individual responsible for such oversight.


Home

webmaster@eecs.uic.edu
Last modified 08/06/03