Page 217 - Personnel Policy and Procedures Manual
P. 217

4.  Do  not  store  the  password  for  one  computer  in  another  computer  unless  your  system
                       administrator has assured you that no security hazard will result. It is easy for a stranger to
                       walk up to your personal computer and retrieve passwords that are stored in it.
                   5.  You  are  responsible  for  choosing  a  secure  password.  Do  not  use  names,  nicknames,
                       telephone numbers, or recognizable words in any language because some people guess
                       passwords by automatically trying every word in a large dictionary. A good way to make
                       up a secure password is to use the initials of a phrase, and include some capital as well as
                       letters. For example, 57ityMwb is a good password, and it's easy to remember because it
                       stands for "57 is the year Michael was born."
                   6.  Your password is secret. System or LAN administrators will not normally ask you for it.
                       The computer will never ask you to type it unless you are logging in or changing your
                       password.  Beware  of  computer  programs  that  ask  you  to  "log  in  again"  or  type  your
                       password at any other time; they are likely to be tricks. (There are rare exceptions on some
                       computers; check with your system Administrator. If anything that you do not understand
                       ever happens after you type your password, then change your password immediately).
                   7.  In some instances, Augusta, Georgia authorizes more than one person to share a single
                       account, but this is seldom the best way to conduct collaborative work. Instead, use file
                       sharing, groups, and related features of the system you are using. Email can be redirected
                       automatically to a secretary, who can then forward it to you using a separate mailbox.
               H.  No  one  shall  misrepresent  his  or  her  identity  or  relationship  to  Augusta,  Georgia  when
                   obtaining or using Augusta, Georgia computer or network privileges.
                   1.  Naturally, you must not claim to be someone else, nor claim to have a different relationship
                       to the Augusta, Georgia than you actually do, when obtaining a computer account or access
                       to a lab.
                   2.  You must not falsify your name, address, email address, or affiliation when sending email
                       or other messages from an Augusta, Georgia computer. Doing so can be illegal (Ga. Code
                       16-9-93.1 and other laws against misrepresentation), as well as being an unacceptable use
                       of the Augusta, Georgia's facilities.
                   3.  On  some  systems,  there  are  ways  to  post  messages  without  revealing  your  name  and
                       address. Anonymous communication is permissible when there is a legitimate business
                       need for additional privacy. It is not a cover for fraudulent or obnoxious behavior, and in
                       cases  of  abuse,  anonymous  messages  may  be  traced  to  their  source.  Deceptive
                       communication, in which you claim to be some other specific person, is never permitted.
                   4.  You can create confusion, and possibly violate trademark law, by using someone else's
                       trademark as your name on the Net. No matter how loyal a Kodak customer you may be,
                       do not call yourself "Kodak." That's their name, not yours.
               I.  No one without specific authorization shall read, alter, or delete any other person's computer
                   files or electronic mail. This rule applies regardless of whether the operating system of the
                   computer permits these acts.
                   1.  Do not even try to guess or steal other people's passwords, or read their files, even if the
                       computer permits this. Doing so would be like rummaging through someone else's desk.
                       Even if you can pick the lock, and even if there is no lock at all, you have no right to intrude.
               J.  No one shall download, copy, install, or use any software or data files in violation of applicable
                   copyrights or license agreements.
                   1.  This rule forbids making unauthorized copies, for use elsewhere, of software residing on
                       Augusta,  Georgia's  computers.  It  also  forbids  installing  or  using  pirated  software  on
                       Augusta, Georgia computers. The price of a piece of software is not just the cost of the disk
                       - it's also one user's share of the cost of developing and supporting it. It is wrong to use
                       software without paying your fair share.
                   2.  As if that were not enough, unauthorized copying is usually a violation of federal copyright
                       law.



               All Rights Reserved – As approved by the Commission on 05-07-2019                   216 | P a g e
   212   213   214   215   216   217   218   219   220   221   222