Case Western Reserve University Computing Ethics Policy The general standards of conduct expected of members of an educational institution also apply to the use of University computing resources. These resources include: Hardware: Physical equipment used for processing or data communications. Software: Programs, programming languages, instructions, or routines which are used to perform work in a computer. Data: Information such as records or textual material stored on or accessible through a computer. Property Rights. University computing and information resources are made available to individuals to assist in the pursuit of educational goals. In order to promote the most effective use of these it is expected that users will cooperate with each other and respect the ownership of work and information even though it is in electronic form rather than printed form. Individuals and organizations will be held no less accountable for their actions in situations involving computers and information resources than they would be dealing with other media. Though some of them are intangible, these computing resources are the property of the University. Rules prohibiting theft or vandalism apply to software and data as well as to physical equipment. Conduct which violates the University's property rights with respect to computing resources is subject to University disciplinary action. This conduct includes: 1. Copying University-owned or licensed software or data to another computer system for personal or external use without prior approval. 2. Attempting to modify University-owned or licensed software or data without prior approval. 3. Attempting to damage or to disrupt operation of computing equipment, data communications equipment, or data communications lines. 4. Using University computing resources for purposes other than those intended by the University body granting access to those resources; especially, using them for personal or financial gain or allowing access to them by unauthorized persons even if they are members of the University community. 5. Using any portion of University computing and information resources to access non-University computing and information resources for the purpose of: a. Copying privately owned or licensed software or data without prior written approval. b. Modifying privately owned or licensed software or data without prior written approval. c. Attempting to damage or to disrupt the operation of computing equipment, data communications equipment or data communications lines. Confidentiality. The University seeks to protect the civil, personal, and property rights of those actually using its computing resources and seeks to protect the confidentiality of University records stored on its computer systems. Conduct which involves use of University computer resources to violate another's rights is subject to University disciplinary action. This conduct includes: 1. Invading the privacy of an individual by using electronic means to ascertain confidential information, even if an individual or department inadvertently allows access to such information. 2. Copying another user's software or data without permission of its owner, even if it is readily accessible by electronic means. 3. Knowingly accepting or using software or data which has been obtained by illegal means. 4. Abusing or harassing another user through electronic means. 5. Using the University's computing facilities in the commission of a crime. 6. Gaining access to non-public information resources. Accessibility/Use: Some of the University's computer systems require that each user have a unique identity, protected by password, to gain access to the system. The computer identity is used to represent a user in various system activities, to provide access to certain software and data based on his credibility and purpose for requiring such access, and to associate his own software and data with his identity. As such, this computer identity is another instrument of identification and its misuse constitutes forgery or misrepresentation. Conduct which involves misuse of computer identities is subject to University disciplinary action. This conduct includes: 1. Allowing another individual to use the computer identity 2. Using another individual's computer identity, even if the individual has neglected to safeguard it. Case Western Reserve University's computing environment is networked on campus and to other universities. Data on networks is considered to be private. Tapping the network for the purpose of examining data other than that destined for the user's system is considered unacceptable conduct and is subject to disciplinary action. Campus Policies. The management of the University computing resources is distributed among many University bodies. Rules and regulations governing specific resources are available through the individual managing bodies. State and National Laws. Conduct in violation of the principles set forth above with respect to the use of University computing resources may be subject to criminal or civil legal action in addition to University disciplinary action. Original Issue: September 1986 Revised: August 1990