The MBC information booklet - RMIT University
The MBC information booklet - RMIT University
The MBC information booklet - RMIT University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 14: Frequently asked questions<br />
<strong>The</strong> School holds data and programs in trust for its staff and students and may not provide<br />
copies of any <strong>information</strong>, or access to it, to a third party without written consent of the<br />
owner.<br />
Users are authorised to access only their own files, and certain other system files<br />
required when using the computers.<br />
It is the responsibility of all people using computer systems to keep passwords<br />
confidential. Do not type passwords in view of other people or write them down. Do change<br />
them regularly. It is recommended that you use different passwords for different machines.<br />
In General<br />
All activities performed on the equipment by students must be directly related to program<br />
work. If a user is unsure of this definition, it is advised that they contact the programmers<br />
in the Technical Services Group for clarification. E-mail: helpdesk@cs.rmit.edu.au.<br />
Prohibited activities<br />
In order to provide fair and consistent access to the resources to the users, certain<br />
activities and programs are not permitted. This includes but is NOT limited to the following:<br />
Sharing accounts<br />
Sharing accounts, either by revealing your password or implementing a scheme to bypass<br />
the use of passwords (such as a.rhosts file) with an entry for someone other than yourself,<br />
or using a setuid shell, is prohibited, except with prior arrangement with the School.<br />
Games<br />
Unless it can be demonstrated that a game is part of an approved assignment, they are not<br />
permitted.<br />
Using Mobile Phones in labs<br />
To prevent distracting other students, or disrupting classes mobile phones should be<br />
turned off, or to silent whilst within CSIT labs.<br />
Wasting disk resources<br />
Space is provided for the storage of program related files. Quotas are implemented to<br />
prevent abuse of resources.<br />
Wasting cpu time<br />
Excessive use of cpu time for non program related purposes, especially when the machine<br />
is consistently loaded, is not permitted.<br />
Wasting print resources<br />
Printing is provided as a free service to students of the School for hard copies of program<br />
related material or assignments. Printing of other materials is not permitted.<br />
Wasting terminal access<br />
Any procedure which gives a user exclusive access to an unattended terminal (such as<br />
terminal locking) is a prohibited activity, since it is a selfish activity that prevents another<br />
user from using a terminal whilst you are not.<br />
Harassment<br />
<strong>The</strong> inter-user communication systems on the computers (such as E-mail, Net-News,<br />
`talk', and `write') can be considered as means of interaction within a `virtual society'. Any<br />
form of harassment which is not permitted in normal society is not permitted in the virtual<br />
society.<br />
Disruption of services<br />
Attempts to disrupt the normal operation of the facilities is considered a severe offence and<br />
will be punished accordingly.<br />
Unofficial programs<br />
Any program that is not installed on the system by the TSG that is not directly related to<br />
coursework is not permitted. (Programs that are directly part of an assignment are<br />
permitted.)<br />
Remote services<br />
Use of a (permitted) client to connect to a remote facility that is not under control of the<br />
School to perform activities that contravene these rules is not permitted.<br />
97