Policies: NC State
Computer Use Policy
The computer facilities here at NC State are intended primarily for academic and administrative functions. Usage of these facilities is covered under both state and federal laws in addition to University policies and procedures. There are limits on what can be done on the computers here at NC State.
First of all, anything you do must be legal under federal and state laws. You must also not violate NC State policies or overload the NC State data network. You are disallowed from using computers for commercial gain, sending spam, or costing the University money as a result of your usage of the computers at NC State. Each department may have additional usage policies.
Data sent and stored by means of NC State facilities is subject to certain restrictions. One of those being that the University reserves the right to examine any data stored or sent on the NC State data network. Access rights can also be revoked due to violations of the University Computer Usage policies.
Please make note of the following:
- Your account is yours, do not share it or your password with anyone else
- The University reserves the right to monitor your traffic to ensure security and stability among the system
- Personal usage of the computers is allowed provided what is being done is legal under federal and state laws in addition to NC State policies
- Personal webpages may not contain paid advertisments
- All information contained in University systems is considered public record
Copyright Infringement Policy
Copyrights are a touchy issue which seem to show up a lot of places today. Anything created with any bit of creativity is automatically copyrighted upon completion of the work. The copyright protects against copying, distributing, modifying, displaying, and performing material. It is important not to infringe upon the copyrights of others.
Copyright violations are serious matters which typically end up in court with one side losing considerable capital and credibility. Should the University be contacted about a copyright violation, they will inform the alleged violator and there is a series of steps which must be completed in order to finish the matter. The full explaination can be found at NC State's Copyright Procedure page.
Once the University has discovered there is a copyright violation on one of its pages, an attempt to establish the copyright owner will occur. Next, possible legal defenses are considered. After this, the University will try to mediate a solution to the problem. If no agreement can be reached, the material will be removed. Finally, whatever disciplinary action that needs to be taken will occur.
Copyright can be summed up as follows:
- It is a protection of the expression of an idea, but not the idea itself.
- Facts, words, and databases typically do not qualify for copyright.
- Copyright begins immediately after creation of document.
- Ownership of media does not imply ownership of copyright.
- Most e-mails, webpages, and computer files are copyrighted.
Remember, just because something is not stated as copyrighted, does not mean that it is not copyrighted.
FINISH THIS PAGE
As part of ongoing efforts to educate the campus community on issues related to peer-to-peer file sharing, Chancellor Fox, Provost Oblinger and Vice Chancellor Worsley issued an open letter entitled "Liability for illegal file sharing " earlier this month. The letter is intended to alert faculty and staff as well as students "of the personal risk involved with unauthorized file sharing of copyrighted material."
The letter was published in the online official Bulletin and as a full-page ad in Technician on February 13. Harry Nicholos, university agent for Digital Millenium Copyright Act (DMCA) infringement notification, will be giving presentations on the topic to the Staff and Faculty senates in March. For more information about DMCA issues, visit the newly revised Copyright Infringement site: http://www.ncsu.edu/copyright/ For more information about national efforts to curb illegal filesharing on college campuses, see http://www.educause.edu/issues/rfi/pr090203.asp
ITD Rules and Regulations
The Information and Technology Division at NC State helps create and enforce policies, rules, and regulations concerning computer usage, systems, and services. They govern campus-wide academic computing resources. This includes everything from Eos/Unity accounts to education programs to personal webpages. The details of the individual policies are listed below.
- Eos/Unity Accounts
- Use of the account by anyone other than the owner is prohibited.
- Account holders are responsible for all activites on the the account.
- Account holders are responsible for keeping passwords secure.
- Only one RealmID will be issued per student.
- Computing Labs
- Those using University facilites will take proper care of equipment, including making no repairs or configuration changes to systems.
- Recreational use during periods of light usage is permitted, but when resources are needed for academic purposed, gamers should yield the equipment.
- Refrain from noise, sound effects, violent motion, etc. because it may distract others
- Education Programs
- ITD provides free education workshops to faculty, staff, and graduate students on a host of technologies each semester.
- The Avent Ferry Convention Center may be reserved by groups in order to have access to resources.
- There are also three labs located in D H Hill Library for usage of the Education Programs.
Nomad Wireless Usage
Wireless Network users should understand the following:
- Running remote services (web server, ftp server, nfs server, any person-to-person file sharing services, etc) are PROHIBITED. However, users will be able to connect to such services provided elsewhere.
- All users will be automatically logged out if they are network idle for 2 hours or are off of the network for 10 minutes.
- All traffic to and from the Nomad System is logged and associated with the user, as permitted by the NC State Administrative Regulations, section II, G.
- NOMAD Wireless transmissions are not encrypted--wireless network users are responsible for the security of the data transmissions they send over the wireless network. Users are strongly encouraged to use secure application-level protocols when sensitive information traverses the wireless network; otherwise, they should move to the wired network. Example secure application-level protocols are: https, ssh, scp, vpn.