For the full policy statement, see the UGA Computer Security and Ethics Committee website.
The University of Georgia is committed to free and open inquiry and discussion, fair allocation of University resources, and the provision of a working environment free of needless disruption. To advance these goals, the University has adopted policies on computer usage that are summarized here and stated in detail elsewhere. Most of these policies follow from pre-existing regulations, agreements, and/or laws. They fulfill a Board of Regents directive requiring adoption of explicit computer security and ethics policies.
Like all University facilities, University computers and computer networks are to be used only by persons authorized by the University, and only for University purposes. University purposes include the educational programs of the University, as well as its research, administrative, and outreach activities. Use of University facilities for other purposes requires prior authorization.
- No one shall knowingly endanger the security of any University computer or network facility, nor willfully interfere with others' authorized computer usage.
- No one shall use the University's communication facilities to attempt unauthorized use, nor to interfere with others' legitimate use, of any computer or network facility anywhere.
- No one shall connect any computer to any of the University's networks unless it meets technical and security standards set by the University administration.
- All users shall share computing resources in accordance with policies set for the computers involved, giving priority to more important work and cooperating fully with the other users of the same equipment.
- No one without specific authorization shall use any University computer or network facility for non-University business.
- No one shall give a computer password to an unauthorized person, nor obtain another person's computer password by any unauthorized means whatsoever. No one except the system administrator in charge of a computer is authorized to issue passwords for that computer. Disclosing a password to an unauthorized person can be a crime under Georgia law.
- No one shall engage in, encourage, or conceal from authorities any "cracking," unauthorized tampering, or other unauthorized use or deliberate disruption of computers.
- No one without specific authorization shall read, alter, or delete any other person's computer files or electronic mail, even if the operating system of the computer permits them to do so.
- No one shall copy or use software or data in violation of copyright laws, license agreements, or the basic requirements of academic honesty.
- No one shall create, install, or knowingly distribute a computer virus, "Trojan horse," or other surreptitiously destructive program on any University computer or network facility, regardless of whether any demonstrable harm results.
- No one without proper authorization shall modify or reconfigure the software or hardware of any University computer or network facility.
- Users shall not place confidential data into computers without protecting it appropriately. The University cannot guarantee the privacy or authenticity of computer files or electronic communications unless special arrangements are made.
- Users shall take full responsibility for messages that they transmit through the University's computers and network facilities and shall obey the policies of discussion forums in which they participate. Laws and rules against fraud, harassment, obscenity, and the like apply to electronic communications no less than other media.
- Those who publish World Wide Web pages or similar information resources on University computers shall take full responsibility for what they publish; shall respect the acceptable-use conditions for the computer on which the material resides; shall obey all applicable laws; and shall not publish commercial advertisements without prior authorization. References and links to commercial sites are permitted, but advertisements, and especially paid advertisements, are not. Users shall not accept payments, discounts, free merchandise or services, or any other remuneration in return for placing anything on their web pages or similar facilities.
- Users shall comply with the regulations and policies of newsgroups, mailing lists, and other public forums through which they disseminate messages.
- Those who administer computers and network facilities shall perform their duties fairly, in accordance with University policies, and shall refer all disciplinary matters to appropriate authorities.
- Electronic mail (e-mail) is intended for communication between individuals and clearly identified groups of interested individuals, not for mass broadcasting. No one without prior authorization shall use the University's facilities to distribute the same or substantially the same e-mail message to more than one person without prior evidence that they wish to receive it, nor to distribute chain letters (messages asking the recipient to distribute copies further).
Violations of these policies incur the same types of disciplinary measures as violations of other University policies or state or federal laws, including criminal prosecution in serious cases.
Guest users must comply with UGA policy on conduct and computer
use, including the following:
Guest users have access to a designated set of computers located
in the 3rd floor east wing of the MLC.
- Guest computers will allow users to access the internet and UGA
Libraries online resources, but no application software (i.e. Microsoft
Word), printing, or the ability to save to any device.
- Passwords are assigned at the Security Information Desk on the second
floor of the MLC.
- Each guest must show a valid, government-issued photo ID (i.e. driver's
license, passport) in order to receive a password. Patrons without
a valid ID who need computer access for research purposes are asked
to contact firstname.lastname@example.org or
visit the Main Library Reference Desk.
- There is a limit of one password per day per guest,
regardless of the amount of time used with each password.
- Once a password is activated, the 120 minute (two hour)
session begins and it ends when either time runs out or the user
logs off. The password is no longer valid afterward.
- Guest computers are available on a first-come, first-serve basis.
- Displaying obscene, lewd, or sexually explicit images or text on
a public computer that can be in view of others is prohibited.
Violation of any of the above policies will
result in the termination of computer access privileges for a time
to be determined by MLC Administration.