Return to CITC Home Page
University of North Texas Internet Account Policies
Purpose: To summarize policies regulating the use of Internet Accounts provided by University of North Texas Academic Computing Services. All individuals must comply with University computer resource policies and standards. Academic Computing Services reserves the right to revoke access to the Internet account of any user who refuses to follow UNT Internet Account Policies. Additionally, penalties for violation of the UNT University-wide Computing Policy range from loss of computer resource usage privileges to dismissal from the University, prosecution, and/or civil action. It is your responsibility as an Internet Account holder to become familiar with UNT Computing Policies. This document covers the following areas: * Account Sharing * Appropriate Use of Internet Account and Internet Client Software * Internet Use * Personal Web Publishing * Account Expiration * Reporting Violations The policies listed in this document apply to use of UNT Internet Accounts, and are by no means a complete list of policies governing computer use at UNT. The following documents, available on-line, contain other policies and guidelines for use of computers at the University of North Texas.
1. Account Sharing University policy prohibits all users from sharing accounts, either by logging in to an account to allow someone else to use it, or by sharing passwords. Individuals authorized to use a UNT Internet Account are responsible for all usage of their account access and must keep their passwords confidential to protect University computer resources. 2. Appropriate Use of UNT Internet Account UNT Internet Accounts shall be used solely for legitimate University-related purposes. Your account may not be used for commercial purposes, nor may it be used in any way that would cause excessive network traffic or interfere with the work of others. 3. Appropriate Use of Internet Information Resources A. Usenet News Posting Procedures * Do post articles only to the groups pertaining to the posting. * Do not make blanket postings to all or large numbers of newgroups without regard to the subject. * Do not post chain letters. * Do not post commercial messages to groups in which they are forbidden. B. Electronic Mail Procedures * Falsifying one's identity in an e-mail message is not allowed and is furthermore considered a serious offense. * Do not e-mail chain letters * Do not send unsolicited mass e-mailings to multiple e-mail addresses. * Do not e-mail off-topic messages to an e-mail mailing list. C. IRC (Internet Relay Chat) Procedures * Use of "bots", "flooding", or any abuse of IRC that generates valid harassment or denial of service complaints from other users of IRC is prohibited. D. General Internet Use * All individuals who use wide-area network services (such the Internet) provided via University computer resources shall abide by the policies of those networks. * Any transmissions that constitute or encourage a criminal offense or violate any State, national, or international law are not allowed. * Any transmission that contains a virus, worm, or other harmful component is not allowed. * Uploading, posting, reproducing or distributing material protected by copyright without permission of the copyright owner is prohibited. 4. Web Publishing Standards The following standards apply to all individuals who use a UNT Internet Account to publish a web page on people.unt.edu. * Web pages published on people.unt.edu are for personal expression only and should not be used for any official business of the University of North Texas, including but not limited to: Class Notes; Class Assignments; Departmental or Organizational information. * Web publishers are responsible for the content of the pages they publish and must abide by all applicable UNT policies, and State or Federal law * Commercial use of web space on people.unt.edu is prohibited by UNT policy and State law * Web publishers are expected to maintain standards of quality that will earn the university respect in all of its communities of interest * Academic Computing Services reserves the right to disable web pages that occupy excessive space, generate excessive traffic, or which violate Copyright law, UNT policies, or State or Federal law 5. Account Expiration Student accounts expire upon change of status from continuing to non-continuing student. Faculty/Staff accounts expire immediately upon termination of employment. The availability of services is explicitly defined in the University of North Texas Computer Use Policy in the section labeled "Access to Services." 6. Reporting Violations Violations or suspected violations of UNT Internet Policies must be reported at once to the UNT Computing Center Helpdesk (email@example.com) in ISB 119 (565-2324).
Academic Computing Services UNIX Host System Policies
Purpose: To summarize policies regulating the use of the ACS UNIX host systems by faculty, students and staff at the University of North Texas. All individuals must comply with University computer resource policies and standards. Academic Computing Services reserves the right to revoke access to an ACS UNIX system account of any user who refuses to follow ACS UNIX system account policies. Additionally, penalties for violation of the UNT University-wide Computing Policy range from loss of computer resource usage privileges to dismissal from the University, prosecution, and/or civil action. It is your responsibility as an ACS UNIX Host System Account holder to become familiar with UNT Computing Policies. This document covers the following areas: * Resource Utilization * Use of servers * Use of .rhosts file * Use of Temporary Disk Space * Reporting Violations The policies listed in this document apply to use of the ACS UNIX Host Systems, and are by no means a complete list of policies governing computer use at UNT. The following documents, available on-line, contain other policies and guidelines for use of computers at the University of North Texas.
1. Resource Utilization Programs that require more than 50% of the host system's processor resources, or that run for a duration of more than ten minutes (sixty minutes on restricted host systems), are considered "computationally intensive" processes. A user is allowed to run only one computationally intensive process for a total duration of 300 processor minutes. Processes that exceed the limit will be terminated. Programs that require more than 10% of real memory (20% on restricted host systems) are considered "memory intensive" processes. Users are allowed to run only one memory intensive process at any time. Type the command /usr/ucb/ps -vx to examine the memory usage of your processes. If you must run computational or memory intensive processes, please type help at the shell prompt and read the guidelines for running such processes. 2. Use of Servers A server is a process that may provide resources to other users than yourself. The other users may include users at UNT or on other computer systems on the Internet. Servers of any kind, whether they be IRC "bot" servers, MUD servers, game servers, or any other kind of server, are not allowed on ACS UNIX Host systems. 3. Use of .rhosts File The use of a "+" entry in a .rhosts file is prohibited on ACS UNIX Host systems. If such a file is found in any account, the file will be removed, and the account will be disabled. The Account Sharing Policy outlined in the document University of North Texas Internet Policies, also applies to the use of .rhosts files. 4. Use of Temporary Disk Space Do not save any files to /tmp. Files in /tmp will be deleted without notice. The /scratch partition has been provided for temporary disk space. It may be used to upload/download files to and from the Internet to your ACS UNIX Host account. /scratch is only for temporary use, and is not meant to be used as an archive. Files placed on /scratch are deleted after three days. Backups are not made of any of the files on /scratch; this anything lost or deleted from this partition cannot be restored. Please read the file /scratch/SCRATCH.POLICY for a detailed explanation of policies governing the use of /scratch. 5. Reporting Violations Violations or suspected violations of ACS UNIX Host system policies must be reported at once to the UNT Computing Center Helpdesk (firstname.lastname@example.org) in ISB 119 (565-2324).
Top of Page