EASTERN ILLINOIS UNIVERSITY The computing facilities of Eastern Illinois University are intended solely for use by authorized students, faculty, and staff in connection with instruction, research, and public service activities. Each such person shall not use said facilities for financial gain or any profit-making or commercial activity, for any activity which is illegal under federal or state law (including, but not limited to participation in chain letters or the unauthorized copying of copyrighted and other proprietary software), for any activity that would violate the integrity of the system, or for any activity which is obscence or defamatory. Any person who used the computing facilities of Eastern Illinois University in violation of the foregoing conditions may have his/her use suspended. Each person who used the computing facilities of Eastern Illinois University thereby agrees that his/her continued use of said facilities shall be conditioned upon use of said facilities in accordance with the foregoing policy. CORNELL Policy for the Use of the Research Computing Facility 1. The computing facility is intended to support computer science research and education as directed by members of the faculty and research staff of the Computer Science Department. Use of the facility is permitted only for this purpose. 2. The only people authorized to use the computing facility are those who have been issued accounts. Only the individual who is given an account may use that account. He or she is not authorized to allow anyone else to use his or her account. Accounts are normally given only to Computer Science faculty members, graduate students, staff members, and visiting researchers. 3. Even those who have legitimate accounts should be aware that, except with prior approval, those accounts should only be used for research or, as discussed below, coursework being directed by the faculty or research staff of the Computer Science Department. The writing of research-related books, theses, and reports and the exchange of computer mail are considered acceptable research use. 4. Generally, the only machines that should be used for coursework are those workstations located in student offices or the SUN graduate student laboratory. Machines that were purchased solely for research use, including all the Symbolics and all the VAXes, should not be used for coursework. Faculty should only make assignments for projects that can be done entirely on SUN workstations. 5. The computing facility is shared among many groups and individuals within the department. Although there are no automatic limits on the use of system resources, each user is expected to plan his work so that other users are not adversely affected. 6. The "public" terminal and printer areas are restricted to those who have legitimate business in these areas. Most have combination locks; only those who have legitimate accounts should be told this combination. 7. Confidential material is maintained on the systems. Any attempts by unauthorized individuals to "browse" through private computer files, decrypt encrypted material, or obtain user privileges to which they are not entitled will be regarded as a very serious offense. Any of these actions will result in loss of all computer privileges, and may, for student users, result in expulsion from the graduate program. 8. Various computing resources have special restrictions on their usage. In general, the gvax and svax systems are available for general use, with svax being primarily for student use, and gvax being primarily for faculty and staff use. Workstations in individual offices are typically private. Other workstations will have signs posted on them to identify their status. There are four classes of machines (based on the type of sign): "CSD - General Use" - for either coursework or research "CSD - General Research" - any research use "CSD - " - preference is given to use by the project "Project - " - absolute priority is given to use by the project Most timeshared machines are dedicated to research project use. Students should only use these machines if they are associated with an appropriate project.