If you are seeing this message then your browser does not support CSS. This site is designed entirely with CSS. We recommend that you upgrade your browser.

Skip Navigation
Krannert Policy on Computing Ethics

Introduction

The Krannert Computing Center provides computing facilities and services for the learning and discovery computing needs of the School of Management.

 

Statement of Policy

Proper computing use follows the same standards of common sense and courtesy that govern use of other public facilities. Improper use violates those standards by preventing others from accessing public facilities or by violating their intellectual property rights.

Because electronic information is volatile and easily reproduced, respect for the work and personal expression of others is especially critical in computer environments. Violations of intellectual property rights, including plagiarism, invasion of privacy, unauthorized access, and trade secret and copyright violations, may be grounds for sanctions against members of the academic community.

Therefore, the basic policy of the Krannert Computing Center (KCC) on proper use is:

Any use of KCC facilities or services that interferes with another's legitimate instructional or research computing is improper.

Any use of KCC facilities or services that violates another's intellectual property rights is improper.

Any use of KCC facilities or services that violates any local, state, or federal law is improper.

The KCC will take steps to prevent improper use of its facilities or services by limiting access to them, and by referring abuses to deans, department heads, the University Police, or other authorities for appropriate action.

 

Definitions

Intellectual Property - Intellectual property is not tangible property, but rather property that is the creation of someone's intellect. Examples include materials such as textbooks and software, as well as items covered by United States and International Patent, Trade Secret, and Copyright Laws. Intellectual property also includes works for which copyright has not been asserted, such as student reports or papers, class assignments, personal computer files, and electronic mail.

Intellectual property rights begin with respect for intellectual labor and creativity. They include the right to acknowledgment of the work, the right to privacy, and the right to determine the form, manner and terms of publication, distribution, and use of the work.

Legitimate Computing - Legitimate instructional computing is work done by a registered student in support of a recognized course of study. Legitimate research computing is work approved by an authorized official of the School of Management.

 

Examples of Policy

The following sections describe some instances of improper use. They do not constitute a complete list. When new occasions of improper use arise, they will be judged and regulated by the basic policy stated above.

Access to File: Do not read or use others' files without their permission. Proper usage standards require everyone to take prudent and reasonable steps to limit access to their files and accounts.

Damage: Do not damage KCC facilities, hardware, software, or data.

Disruptive Conduct: Do not behave at any KCC facility in a way that interferes with another's legitimate use of the facility. This includes noisy and over-exuberant conduct. Treat your fellow students in the labs, KCC staff, and KCC student consultants, as you would have them treat you.

Fraud and Forgery: Do not send any form of electronic communication that bears a fraudulent origin or identification. This includes the forging of another's identity on electronic mail or news postings.

Harassment: Do not use KCC facilities to harass anyone. This includes the use of insulting, obscene or suggestive electronic mail or news, tampering with others' files, and invasive access to others' equipment.

Unauthorized Use of Networks: Do not use local, national, or international networks for things that are not legitimate instructional or research activities of the University. This includes, but is not limited to: articles for commercial gain (including sale offers for personal property) posted on electronic news networks and repeated attempts to access restricted resources.

Unauthorized Use of Accounts: Do not access an account not specifically authorized to you, whether it is on a KCC system or one at another place. Do not use an account for a purpose not authorized when the account was established, including personal and commercial use. Do not engage in computing activities that are designed to invade the security of accounts at the KCC or any other place. Attempts to decipher passwords, to discover unprotected files, or to decode encrypted files are examples. Proper usage standards require everyone to take prudent and reasonable steps to prevent unauthorized access.

Unauthorized Use of Software: Do not make unauthorized copies of licensed or copyrighted software. Do not violate the terms of or restrictions on the use of software defined in agreements between the University and other parties. Do not use software on KCC facilities unless you are certain that such use is not in violation of the software's license agreement.

Waste: Do not use KCC facilities wastefully. This includes squandering expendable resources, processor cycles, and network bandwidth. Use expendable resources such as paper prudently, and recycle them if possible. Use a system whose capacity is appropriate to the size of the computing task whenever possible.