College of Forestry

Forestry Computing Helpdesk

Living Within the Acceptable Use Policy

See the University Acceptable Use Policy


Purpose

Forestry Computing Resources (FCR) has been charged to provide a secure and stable computing environment within a learning and work setting in which all persons are treated with dignity and respect at all times. When the use of computing resources is in violation of the Acceptable Use Policy such use generally raises security and/or performance issues for all Forestry network users. This policy is intended to help protect our clients and coworkers in the Forestry network community from the negative impacts of inappropriate use of our resources.

 

Explanation

This policy is an extension of the University's Acceptable Use policy. Acceptable Use policies are often broad and general. This policy page identifies some specific violations, though the list is not all inclusive. Nothing contained in this policy shall be construed to limit FCR actions or remedies. As stated in the OSU Acceptable Use Policy, "Individuals who disregard elements of this policy will be subject to appropriate disciplinary and/or legal action by Oregon State University."

 

List of common acceptable use violations

(This is not an exhaustive list; it should be used to help you determine whether the action you wish to perform may violate CoF and/or University Acceptable Use policy. If unsure, ask FCR.)

  • Personal use of computing resources that interferes with the institution's or its employees' ability to carry out institution business and do so in an environment of safety and respect

    Examples:

    1. Files stored in public disk spaces that reasonably would be considered obscene, offensive or threatening by a viewer of the material

    2. Large personal print jobs that interfere with other users' ability to print institutional business jobs

    3. Peer-to-peer file sharing software (such as music sharing)

  • Workstation computers providing "server" services (e.g., FTP or Web)

  • "Broadcasting" of unsolicited mail or sending chain letters

  • Use of the communication system to send material that reasonably would be considered obscene, offensive or threatening by the recipient or another viewer of the material

  • Use of computing facilities for personal or commercial monetary gain

  • Unauthorized viewing or use of another person's computer files, programs or data

  • Use of computer resources in a manner which is intended to abuse or to violate the property rights of others

  • Copyright violations

  • Entry into a system by individuals not specifically authorized

  • Attempts to circumvent security mechanisms of any University system

  • Deliberate attempts to degrade system performance or capability, or attempts to damage systems, software or intellectual property of others

 

Response Policy

Forestry computer access and use must comply with OSU & CoF Acceptable use policies and all applicable laws. Once FCR has responded to the technical ramifications of the violation, responses to violations are really a personnel management issue for supervisors.

  • FCR will respond immediately by whatever means necessary to resolve any technical problems caused by the violation.

  • Violations will be reported by FCR to the user, supervisor (or major professor), and unit leader.

  • Following conversation with the user, the supervisor checks back in with FCR to request the preferred FCR response to subsequent violations should they occur. FCR will work with the supervisor to develop options if the desired response is to limit computer access.

  • All communications regarding such incidents will be logged in the CoF Abuse mailbox folders so we have an accessible database of incidents. The CoF Abuse mailbox will be checked by FCR members before contacting the user, supervisor and/or unit leader. This incident database will also help us review policy in the future.

  • If an incident falls in a gray policy area, FCR will still pass a report on to the unit leader along with any information on policy that might be helpful. These incidents will also be logged in the CoF Abuse mailbox. If the unit leader doesn't want to act, that's fine with FCR. In general, these gray-area incidents are part of personnel management which is ultimately the responsibility of unit leaders, not FCR.

  • Serious or repeat offenders may lose their network privileges.

Excerpt from the University Acceptable Use Policy -- "An individual's access to computer resources may be suspended or terminated immediately upon the discovery of a serious first time violation of this policy or for repeat offenses in appropriate circumstances."