UNT Internet Services - Related Policies


Return to CITC Home Page


University of North Texas Internet Account Policies

Purpose: To summarize policies regulating the use of Internet Accounts
         provided by University of North Texas Academic Computing Services.

All individuals must comply with University computer resource policies and
standards. Academic Computing Services reserves the right to revoke access
to the Internet account of any user who refuses to follow UNT Internet
Account Policies. Additionally, penalties for violation of the UNT
University-wide Computing Policy range from loss of computer resource usage
privileges to dismissal from the University, prosecution, and/or civil
action. It is your responsibility as an Internet Account holder to become
familiar with UNT Computing Policies.

This document covers the following areas:

   * Account Sharing
   * Appropriate Use of Internet Account and Internet Client Software
   * Internet Use
   * Personal Web Publishing
   * Account Expiration
   * Reporting Violations

The policies listed in this document apply to use of UNT Internet Accounts,
and are by no means a complete list of policies governing computer use at
UNT. The following documents, available on-line, contain other policies and
guidelines for use of computers at the  University of North Texas.
1. Account Sharing

University policy prohibits all users from sharing accounts, either by
logging in to an account to allow someone else to use it, or by sharing
passwords. Individuals authorized to use a UNT Internet Account are
responsible for all usage of their account access and must keep their
passwords confidential to protect University computer resources. 

2. Appropriate Use of UNT Internet Account

UNT Internet Accounts shall be used solely for legitimate
University-related purposes. Your account may not be used for commercial
purposes, nor may it be used in any way that would cause excessive network
traffic or interfere with the work of others.

3. Appropriate Use of Internet Information Resources

    A.  Usenet News Posting Procedures

    * Do post articles only to the groups pertaining to the posting.
    * Do not make blanket postings to all or large numbers of newgroups without
      regard to the subject.
    * Do not post chain letters.
    * Do not post commercial messages to groups in which they are forbidden.

    B.  Electronic Mail Procedures

    * Falsifying one's identity in an e-mail message is not allowed and is
      furthermore considered a serious offense.
    * Do not e-mail chain letters
    * Do not send unsolicited mass e-mailings to multiple e-mail addresses.
    * Do not e-mail off-topic messages to an e-mail mailing list.

    C. IRC (Internet Relay Chat) Procedures

    * Use of "bots", "flooding", or any abuse of IRC that generates valid
      harassment or denial of service complaints from other users of IRC is
      prohibited.

    D. General Internet Use

    * All individuals who use wide-area network services (such the Internet)
      provided via University computer resources shall abide by the policies of
      those networks.
    * Any transmissions that constitute or encourage a criminal offense or
      violate any State, national, or international law are not allowed.
    * Any transmission that contains a virus, worm, or other harmful component
      is not allowed.
    * Uploading, posting, reproducing or distributing material protected by
      copyright without permission of the copyright owner is prohibited.

4. Web Publishing Standards

The following standards apply to all individuals who use a UNT Internet
Account to publish a web page on people.unt.edu. 

* Web pages published on people.unt.edu are for personal expression only and should
  not be used for any official business of the University of North Texas, including
  but not limited to:
     Class Notes;
     Class Assignments;
     Departmental or Organizational information.
* Web publishers are responsible for the content of the pages they publish and must
  abide by all applicable UNT policies, and State or Federal law
* Commercial use of web space on people.unt.edu is prohibited by UNT policy and State law
* Web publishers are expected to maintain standards of quality that will
  earn the university respect in all of its communities of interest 
* Academic Computing Services reserves the right to disable web pages that
  occupy excessive space, generate excessive traffic, or which violate Copyright law,
  UNT policies, or State or Federal law

5. Account Expiration

Student accounts expire upon change of status from continuing to non-continuing 
student.  Faculty/Staff accounts expire immediately upon termination of employment. 
The availability of services is explicitly defined in the University of North Texas 
Computer Use Policy in the section labeled "Access to Services."
   
6. Reporting Violations

Violations or suspected violations of UNT Internet Policies must be
reported at once to the UNT Computing Center Helpdesk (helpdesk@unt.edu) in
ISB 119 (565-2324).

Academic Computing Services UNIX Host System Policies

Purpose: To summarize policies regulating the use of the ACS UNIX host systems
         by faculty, students and staff at the University of North Texas.

All individuals must comply with University computer resource policies and
standards. Academic Computing Services reserves the right to revoke access
to an ACS UNIX system account of any user who refuses to follow ACS UNIX
system account policies. Additionally, penalties for violation of the UNT
University-wide Computing Policy range from loss of computer resource usage
privileges to dismissal from the University, prosecution, and/or civil
action. It is your responsibility as an ACS UNIX Host System Account holder to
become familiar with UNT Computing Policies.

This document covers the following areas:

   * Resource Utilization
   * Use of servers
   * Use of .rhosts file
   * Use of Temporary Disk Space
   * Reporting Violations

The policies listed in this document apply to use of the ACS UNIX Host Systems,
and are by no means a complete list of policies governing computer use at
UNT. The following documents, available on-line, contain other policies and
guidelines for use of computers at the  University of North Texas.
1.      Resource Utilization

Programs that require more than 50% of the host system's processor
resources, or that run for a duration of more than ten minutes (sixty
minutes on restricted host systems), are considered "computationally
intensive" processes. A user is allowed to run only one computationally
intensive process for a total duration of 300 processor minutes. Processes
that exceed the limit will be terminated. 

Programs that require more than 10% of real memory (20% on restricted host
systems) are considered "memory intensive" processes. Users are allowed to
run only one memory intensive process at any time. Type the command
/usr/ucb/ps -vx to examine the memory usage of your processes.

If you must run computational or memory intensive processes, please type
help at the shell prompt and read the guidelines for running such
processes.

2.      Use of Servers

A server is a process that may provide resources to other users than
yourself. The other users may include users at UNT or on other computer
systems on the Internet. Servers of any kind, whether they be IRC "bot"
servers, MUD servers, game servers, or any other kind of server, are not
allowed on ACS UNIX Host systems.

3.      Use of .rhosts File

The use of a "+" entry in a .rhosts file is prohibited on ACS UNIX Host
systems. If such a file is found in any account, the file will be removed,
and the account will be disabled. The Account Sharing Policy outlined in
the document University of North Texas Internet Policies, also applies to
the use of .rhosts files.

4.      Use of Temporary Disk Space

Do not save any files to /tmp. Files in /tmp will be deleted without
notice.

The /scratch partition has been provided for temporary disk space. It may
be used to upload/download files to and from the Internet to your ACS UNIX Host
account. /scratch is only for temporary use, and is not meant to be used as
an archive. Files placed on /scratch are deleted after three days. Backups
are not made of any of the files on /scratch; this anything lost or deleted
from this partition cannot be restored. Please read the file
/scratch/SCRATCH.POLICY for a detailed explanation of policies governing
the use of  /scratch.

5.      Reporting Violations

Violations or suspected violations of ACS UNIX Host system policies must be
reported at once to the UNT Computing Center Helpdesk (helpdesk@unt.edu) in
ISB 119 (565-2324).



Top of Page

Last updated on 3/3/2005 by Philip Baczewski