Page 217 - Personnel Policy and Procedures Manual
P. 217
4. Do not store the password for one computer in another computer unless your system
administrator has assured you that no security hazard will result. It is easy for a stranger to
walk up to your personal computer and retrieve passwords that are stored in it.
5. You are responsible for choosing a secure password. Do not use names, nicknames,
telephone numbers, or recognizable words in any language because some people guess
passwords by automatically trying every word in a large dictionary. A good way to make
up a secure password is to use the initials of a phrase, and include some capital as well as
letters. For example, 57ityMwb is a good password, and it's easy to remember because it
stands for "57 is the year Michael was born."
6. Your password is secret. System or LAN administrators will not normally ask you for it.
The computer will never ask you to type it unless you are logging in or changing your
password. Beware of computer programs that ask you to "log in again" or type your
password at any other time; they are likely to be tricks. (There are rare exceptions on some
computers; check with your system Administrator. If anything that you do not understand
ever happens after you type your password, then change your password immediately).
7. In some instances, Augusta, Georgia authorizes more than one person to share a single
account, but this is seldom the best way to conduct collaborative work. Instead, use file
sharing, groups, and related features of the system you are using. Email can be redirected
automatically to a secretary, who can then forward it to you using a separate mailbox.
H. No one shall misrepresent his or her identity or relationship to Augusta, Georgia when
obtaining or using Augusta, Georgia computer or network privileges.
1. Naturally, you must not claim to be someone else, nor claim to have a different relationship
to the Augusta, Georgia than you actually do, when obtaining a computer account or access
to a lab.
2. You must not falsify your name, address, email address, or affiliation when sending email
or other messages from an Augusta, Georgia computer. Doing so can be illegal (Ga. Code
16-9-93.1 and other laws against misrepresentation), as well as being an unacceptable use
of the Augusta, Georgia's facilities.
3. On some systems, there are ways to post messages without revealing your name and
address. Anonymous communication is permissible when there is a legitimate business
need for additional privacy. It is not a cover for fraudulent or obnoxious behavior, and in
cases of abuse, anonymous messages may be traced to their source. Deceptive
communication, in which you claim to be some other specific person, is never permitted.
4. You can create confusion, and possibly violate trademark law, by using someone else's
trademark as your name on the Net. No matter how loyal a Kodak customer you may be,
do not call yourself "Kodak." That's their name, not yours.
I. No one without specific authorization shall read, alter, or delete any other person's computer
files or electronic mail. This rule applies regardless of whether the operating system of the
computer permits these acts.
1. Do not even try to guess or steal other people's passwords, or read their files, even if the
computer permits this. Doing so would be like rummaging through someone else's desk.
Even if you can pick the lock, and even if there is no lock at all, you have no right to intrude.
J. No one shall download, copy, install, or use any software or data files in violation of applicable
copyrights or license agreements.
1. This rule forbids making unauthorized copies, for use elsewhere, of software residing on
Augusta, Georgia's computers. It also forbids installing or using pirated software on
Augusta, Georgia computers. The price of a piece of software is not just the cost of the disk
- it's also one user's share of the cost of developing and supporting it. It is wrong to use
software without paying your fair share.
2. As if that were not enough, unauthorized copying is usually a violation of federal copyright
law.
All Rights Reserved – As approved by the Commission on 05-07-2019 216 | P a g e