The following document outlines guidelines for use of the computing systems and facilities located at or operated by the School of Meteorology (SoM). The definition of SoM Systems and computing facilities will include any computer, server or network provided or supported by the SoM Systems. Use of the computer facilities includes the use of data/programs stored on SoM computing systems, data/programs stored on magnetic tape, floppy disk, CD ROM or other storage media that is owned and maintained by the SoM. The “user” of the system is the person requesting an account (or accounts) in order to perform work in support of the SoM program or a project authorized for the SoM. The purpose of these guidelines is to ensure that all SoM users (scientific users, support personnel and management) use the SoM computing facilities in an effective, efficient, ethical and lawful manner.
SoM accounts are to be used only for the purpose for which they are authorized and are not to be used for non-SoM related activities. Unauthorized use of a SoM account/system is in violation of Section 799, Title 18, U.S. Code, and constitutes theft and is punishable by law. Therefore, unauthorized use of SoM computing systems and facilities may constitute grounds for either civil or criminal prosecution.
In the text below, “users” refers to users of the SoM computing systems and facilities.
- The SoM follows all rules and regulations regarding computer accounts and systems as established by the University of Oklahoma. Mainly Title 16 Section 26 of the STUDENT CODE of Responsibilities and Conduct for the Norman Campus.
- Users are responsible for protecting any information used and/or stored on/in their SoM accounts. Consult the SoM Computing Website for guidelines on protecting your account and information using the standard system protection mechanisms.
- Users are requested to report any weaknesses in SoM computer security, any incidents of possible misuse or violation of this agreement to the proper authorities by contacting SoM User Services or by sending email@example.com an electronic mail.
- Users shall not attempt to access any data or programs contained on SoM systems for which they do not have authorization or explicit consent of the owner of the data/program, or SoM IT.
- Users shall not share their SoM account information with anyone. This includes sharing the password to the account, providing access via a .rhost entry or other means of sharing.
- Users shall not make unauthorized copies of copyrighted software, except as permitted by law or by the owner of the copyright.
- Users shall not make copies of system configuration files (e.g. /etc/passwd) for their own, unauthorized personal use or to provide to other people/users for unauthorized uses. Users shall not purposely engage in activity with the intent to: harass other users; degrade the performance of systems; deprive an authorized SoM user access to a SoM resource; obtain extra resources, beyond those allocated; circumvent SoM computer security measures or gain access to a SoM system for which proper authorization has not been given.
- Electronic communication facilities (such as Email, Twitter, Facebook, etc.) are for authorized academic use only. Fraudulent, harassing or obscene messages and/or materials shall not be sent from, to or stored on SoM systems.
- Users shall not download, install or run security programs or utilities which reveal weaknesses in the security of a system. For example, SoM users shall not run password cracking programs on SoM computing systems.
- Users shall not download, install or run programs that may damage or harm SoM computing equipment.