It is important for all Austin Peay State University Digital
OpenVMS users to practice ethical behavior in their computing
activities. Irresponsible actions by any user may disrupt all other
users' work. The APSU Office of Information Technology has the
responsibility of securing its computing system to a reasonable
degree against unauthorized access while making it accessible for
legitimate users. This responsibility includes informing users of
expected standards of conduct and the punitive measures for not
adhering to them.
The list below constitutes the REGULATIONS for the use of the VAX
and/or AlphaServer:
1. Users must use only those accounts which have been authorized for
their use.
2. Users are responsible for the usage of their computer accounts.
No user should divulge the USERNAME or PASSWORD to his account to
another person.
3. Users must use their accounts only for the purposes for which
they were authorized.
4. Approval of the Director of the Office of Information Technology
is required for the use of any Open VMS System for any task which is
not directly related to APSU either through regular class
assignments or research being conducted by students or faculty/staff
of APSU.
5. Users must not misuse, damage or misappropriate in any manner
computing equipment, property, and other facilities and resources.
6. Each user should purge his/her directory of all but the latest
version of each file in his directory at the end of each terminal
session.
7. Each user should be sure that the latest version of each of
his/her files is the version that he/she wishes to retain since a
systemwide purge of all user files is done each night.
8. To minimize the impact of your work or the work of other persons,
you must not attempt to encroach on others' use of the facilities or
deprive them of resources.
9. Do not attempt to modify system facilities.
10. Do not attempt to subvert the restrictions associated with your
computer accounts.
11. Do not access or copy the programs, files, or data belonging to
other persons or to APSU without prior authorization to do so from
the owner. Do not attempt to access files for which you do not have
authorization. Programs, subroutines, and data provided by APSU are
not to be taken to other computer sites without permission from the
Office of Information Technology. You may use software on APSU
computers only if it has been legally obtained and its use does not
violate any license or copyright restriction. Do not use programs at
APSU that were obtained from other computer sites unless they are in
the public domain or authority to use them at APSU has been
obtained.
Disciplinary actions for violating the above regulations shall be
governed by the applicable provision of the Student Code of Conduct
found in the Student
Handbook. In addition to those found in the Student Handbook,
disciplinary sanctions may include, but are not limited to,
restitution for damages and restrictions of computing privileges.
Criminal charges also may be filed.
The Tennessee Computer Crimes Act is a state law which applies to
users of Digital OpenVMS accounts. The following is found in
Tennessee Code Annotated, Sections 39-14-601, et seq.:
(a) Whoever knowingly, directly or indirectly, accesses, causes to
be accessed, or attempts to access any computer software, computer
programs, data, computer, computer system, computer network...for
the purpose of obtaining money, property, or services for
him/herself or another by means of false or fraudulent pretenses,
representations, or promises violates this subsection and is subject
to the penalties of Section 39-14-105.
(b) Whoever intentionally and without authorization, directly or
indirectly: (1) accesses; (2) alters, damages, destroys, or attempts
to damage or destroy, any computer, computer system, computer
network, computer software, program, or data; violates this
subsection.
(c) A violation of subdivision (b)(1) is a class C misdemeanor.
(d) A violation of subdivision (b)(2) is punished as in section
39-14-105.
(e) Whoever receives, conceals, uses, or aids another in receiving,
concealing, or using any proceeds resulting from a violation of
subsection (a) or subdivision (b)(2), knowing the same to be
proceeds of such violations, or whoever receives, conceals, uses or
aids another in receiving, concealing or using books, records,
documents, property, financial instrument, computer software,
program, or other material, property, or objects, knowing the same
to have been used in violating either subsection (a) or subdivision
(b)(2) violates this subsection is subject to the penalties of
Section 39-14-105.
Note: OpenVMS is the operating system name for DEC VAX and Alpha
computer systems.