@Device(postscript) @Make(plan) @Modify(MajorHeading, size 11, above 1.3) @Style(BindingMargin=0) @pagefooting(center="December 1, 1988", immediate) @begin(text, below 0.4inches) @title[Principles Of Responsible Use Of Project Athena] @picture(height = .4 inches, ScaleableLaser = owl.ps) @end(text) @begin(text, size 10, spacing 1, spread 0.8) Project Athena is M.I.T@.'s computing facility for education. It consists of a networked system of workstations and services, and includes communication features that offer many opportunities for members of the M.I.T@. community to share information. With that ability to share comes the responsibility to use the system in accordance with M.I.T.'s standards of honesty and personal conduct. Those standards, outlined in the M.I.T. Bulletin under Academic Procedures, call for all members of the community to act in a responsible, ethical, and professional way. This note offers guidelines in applying those standards to use of Project Athena facilities. @Majorheading(Intended Use) The hardware granted to Project Athena, and the software licensed for that hardware, are intended for educational use, broadly construed, by members of the M.I.T@. community. Use of Athena resources by anyone outside M.I.T@. requires approval of the Provost, and the sale of such use is improper. The use of Athena resources for immediate financial gain is similarly improper. Use of Project Athena's facilities for sponsored research activities that normally would make use of other M.I.T@. facilities requires specific authorization of the Director. @Majorheading(Privacy and Security) The operating systems used by Project Athena encourage sharing of information. Security mechanisms for protecting information from unintended access, from within the system or from the outside, are minimal. These mechanisms, by themselves, are not sufficient for a large community in which protection of individual privacy is as important as sharing. Users must supplement the system's security mechanisms by using the system in a manner that preserves the privacy of others. For example, users should not attempt to gain access to the files or directories of another user without clear authorization from the other user (typically that authorization is expressed by setting file access permissions to allow public or group reading). Nor should users attempt to intercept any network communications, such as electronic mail or user-to-user dialog. A shared program should not secretly collect information about its users. Personal information about individuals, which a user would not normally disseminate, should not be stored or communicated on the system. Examples of such personal information are grades or letters of recommendation. @majorheading(System Integrity) Actions taken by users intentionally to interfere with or to alter the integrity of the system are out of bounds. Such actions include unauthorized use of accounts, impersonation of other individuals in communications, attempts to capture or crack passwords or encryption, and destruction or alteration of data or programs belonging to other users. Equally unacceptable are intentional efforts to restrict or deny access by legitimate users to the system. @majorheading(Intellectual Property Rights) Some software and data that reside on the system are owned by users or third parties, and are protected by copyright and other laws, together with licenses and other contractual agreements. Users must abide by these restrictions. Such restrictions may include prohibitions against copying programs or data for use on non-Athena systems or for distribution outside M.I.T@., against the resale of data or programs or the use of them for noneducational purposes or for financial gain, and against public disclosure of information about programs (e.g., source code) without the owner's authorization. It is the responsibility of the owner of protected software or data to make any such restrictions known to the user. @end(text)