22.07.2013 Views

The MBC information booklet - RMIT University

The MBC information booklet - RMIT University

The MBC information booklet - RMIT University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 14: Frequently asked questions<br />

<strong>The</strong> School holds data and programs in trust for its staff and students and may not provide<br />

copies of any <strong>information</strong>, or access to it, to a third party without written consent of the<br />

owner.<br />

Users are authorised to access only their own files, and certain other system files<br />

required when using the computers.<br />

It is the responsibility of all people using computer systems to keep passwords<br />

confidential. Do not type passwords in view of other people or write them down. Do change<br />

them regularly. It is recommended that you use different passwords for different machines.<br />

In General<br />

All activities performed on the equipment by students must be directly related to program<br />

work. If a user is unsure of this definition, it is advised that they contact the programmers<br />

in the Technical Services Group for clarification. E-mail: helpdesk@cs.rmit.edu.au.<br />

Prohibited activities<br />

In order to provide fair and consistent access to the resources to the users, certain<br />

activities and programs are not permitted. This includes but is NOT limited to the following:<br />

Sharing accounts<br />

Sharing accounts, either by revealing your password or implementing a scheme to bypass<br />

the use of passwords (such as a.rhosts file) with an entry for someone other than yourself,<br />

or using a setuid shell, is prohibited, except with prior arrangement with the School.<br />

Games<br />

Unless it can be demonstrated that a game is part of an approved assignment, they are not<br />

permitted.<br />

Using Mobile Phones in labs<br />

To prevent distracting other students, or disrupting classes mobile phones should be<br />

turned off, or to silent whilst within CSIT labs.<br />

Wasting disk resources<br />

Space is provided for the storage of program related files. Quotas are implemented to<br />

prevent abuse of resources.<br />

Wasting cpu time<br />

Excessive use of cpu time for non program related purposes, especially when the machine<br />

is consistently loaded, is not permitted.<br />

Wasting print resources<br />

Printing is provided as a free service to students of the School for hard copies of program<br />

related material or assignments. Printing of other materials is not permitted.<br />

Wasting terminal access<br />

Any procedure which gives a user exclusive access to an unattended terminal (such as<br />

terminal locking) is a prohibited activity, since it is a selfish activity that prevents another<br />

user from using a terminal whilst you are not.<br />

Harassment<br />

<strong>The</strong> inter-user communication systems on the computers (such as E-mail, Net-News,<br />

`talk', and `write') can be considered as means of interaction within a `virtual society'. Any<br />

form of harassment which is not permitted in normal society is not permitted in the virtual<br />

society.<br />

Disruption of services<br />

Attempts to disrupt the normal operation of the facilities is considered a severe offence and<br />

will be punished accordingly.<br />

Unofficial programs<br />

Any program that is not installed on the system by the TSG that is not directly related to<br />

coursework is not permitted. (Programs that are directly part of an assignment are<br />

permitted.)<br />

Remote services<br />

Use of a (permitted) client to connect to a remote facility that is not under control of the<br />

School to perform activities that contravene these rules is not permitted.<br />

97

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!