[comp.admin.policy] Ohio State University CIS Policies

kadie@eff.org (Carl Kadie) (06/04/91)

[This is the appropriate use, mail (and netnews), disk, and printer
policy for the computers labs of OSU's Computer and Information
Science Department]

ATTENTION: USERS OF CIS LABS

Policy on Appropriate Use

To: All Users of CIS Labs
From: Bruce W. Weide, Chair, CIS Computer Committee
Date: February 1988
Subject: Policy on Appropriate Use of Computers and Computer Files

Your CIS computer lab account is meant to be used by you for
your class work and should be used for other activity only with a generous
dose of common sense and consideration for others. As a general guideline for
deciding what use of computers and computer files is appropriate, the Computer
and Information Science Department (at a faculty meeting on May 14, 1984)
adopted the following policy for uses of computers by faculty, staff, and 
students:

It is recognized that computer files are a new form of property separable from
the media with which they are recorded, and that close analogies can be found 
between the uses of computer files and of various other forms of physical 
property. The Department shall use these analogies in making decisions about 
the appropriate use of computer files and the protection of their privacy,
extending as nearly as possible exactly the same protection to computer files
as is traditionally extended to the analogous physical property.

The spirit of this policy is that the file space provided by the 
University to individuals has exactly the same status as analogous, more 
tangible facilities also provided by the University. Such facilities as 
private library carrels, dormitory rooms, and gym lockers are technically owned
by OSU, and may be entered only for ''administrative'' purposes such as 
building maintenance. Similarly, the computers and computer files of students,
staff, and faculty members, being electronic extensions of their personal work
areas, may not be inspected, copied, changed, or otherwise tampered with 
without the permission of the owner, except for purposes relevant to the 
administration of the computer system. Notice that copying (i.e., stealing or
''pirating'') computer software is also prohibited under this policy.

The statement above is concerned primarily with privacy protection,
but also applies to ''appropriate use'' in a broader context. For example, if 
you want to experiment with software not directly related to your CIS class
work, or occasionally play a computer game provided on the system, feel free 
to do so --- but please be considerate of others and do not occupy a 
workstation with activity unrelated to your CIS class work during peak periods
of lab usage. Also, please think about the monetary costs of your use.}
Even though it literally costs nothing when you consume ''cycles'' on an 
otherwise idle workstation during off-peak hours, you should not print
things unrelated to your class work, because this costs real money.

If you have any questions about this policy or how it might affect 
you, please contact me.

------

ATTENTION: USERS OF CIS LABS

Policy on UNIX Mail Usage

To: All Users of CIS Labs
From: Bruce W. Weide, Chair, CIS Computer Committee
Date: February 1988
Subject: Policy on UNIX Mail Usage

All users of the Computer and Information Science Department labs 
are encouraged to use electronic mail and electronic bulletin boards as a 
source of information and for better communication. This use is subject to the
following policy effective immediately:

All UNIX users are expected to learn to use electronic mail and bulletin 
boards/newsgroups to facilitate internal communication (see short subject
document #42 and #16 on ''Mail'' and ''News'' available in HI 308). All
messages sent anywhere by anyone must be ''appropriate'' (see short subject
document #43 on ''Standards and Customs''). However, unless explicit written
permission has been granted by the CIS Computer Committee, only faculty, staff,
and CIS graduate students are permitted to send electronic mail or post 
electronic bulletin board messages to non-OSU computers.

The objectives of this policy are obvious. First, on-campus 
electronic communication is a very effective way of contacting people who may 
not be immediately available, without playing ''telephone tag'' or wasting a 
lot of time. It is also used by instructors to disseminate information to and
receive feedback from their students in a timely fashion, and it is therefore
crucial that everyone be able to use it. However, off-campus electronic 
communication costs real money and is made available for a more specific 
purpose: to facilitate faculty, staff, and graduate student collaboration on
research work with others outside OSU. Only in special circumstances should
undergraduate students need to use this off-campus service. If you feel you 
are special in this regard please see me.

Second, while we have no desire to try to censor electronic 
messages, we do have a specific obligation to the organizations that operate
our computer networks to make sure the house rules of etiquette are observed
by the people connected to them through our computer systems. Without
exception, these rules prohibit obscene language, personal attacks, attempts
to send anonymous messages, and a variety of other unsociable acts.


If you have any questions about this policy or how it might affect 
you, please contact me.

------
ATTENTION: USERS OF CIS LABS

Policy on UNIX Disk Usage

To: All Users of CIS Labs
From: Bruce W. Weide, Chair, CIS Computer Committee
Date: February 1988
Subject: Policy on UNIX Disk Usage

The Computer and Information Science Department labs, like most
computer systems, face a chronic shortage of disk space. In order to help
avert potential problems in this area, we have adopted the following policy
effective immediately:

Each UNIX user is assigned to one of the following general categories and has
a corresponding personal directory disk quota: guest or undergraduate student
(1.0MB), graduate student (1.5MB), staff (2.5MB), or faculty (2.5MB). A user 
who needs additional space may request an increase in the quota by filling 
out a ''UNIX Disk Space Request'' form available in the document rack in the 
2nd floor hallway in CA. A requested increase of 50% from the default 
personal quota (with reasonable cause and a faculty member's signature) will 
be granted by the operator without further review. Any larger increase must be
approved by the CIS Computer Committee. Special project or group directories 
may be created under the control of a faculty or staff member and may receive 
significantly larger disk allocations with approval of the CIS Computer
Committee.

At present, disk quotas are not ''enforced'' by the system (e.g., in
the sense that you cannot continue to work once you exceed your quota). We 
plan to rely on the reasonableness of the user community until and unless that
proves unwise. However, periodically an automatic audit of disk space usage
will be made and users who are over quota will be notified by electronic mail.
If you receive such a notice you are expected to remove files, archive them to
tape, or move them to an appropriate project directory so your usage falls 
below your quota (see short subject document #41 on ''How to Save Disk Space''
available from the operator in HI 308). If these steps are not effective, you
may request a larger quota as noted above.

If the next audit (which will be conducted about 3 weeks later, or
sooner if disk space shortages are noted) shows you are still over quota, you
will again receive electronic mail. This time, a copy will also go to the 
chair of the CIS Computer Committee and the Manager of CIS Computer Activities,
and you will be contacted to determine why you have not complied with the 
request to keep disk usage in line. Failure to adhere to this policy may result
in loss of your privileges to use the facilities until your failure to comply
is adequately explained.

If you have any questions about this policy or how it might affect 
you, please contact me.

------------------------------
ATTENTION: USERS OF CIS LABS

Policy on UNIX Printer Usage


To: All Users of CIS Labs
From: Bruce W. Weide, Chair, CIS Computer Commitee
Date: February 1988

Subject: Policy on UNIX Printer Usage

Computer and Information Science at this time does not charge lab
fees, but absorbs the cost of consumable (such as printer output) from its
operating budget.

We have therefore adopted the following policy effective immediately:

Each user is permitted to make appropriate use of the printers for
his/her own work. It is recognized that legitimate printing needs will vary
widely among users. However, all users are expected to observe the following
guidelines (see also short subject document #20 on ''Reducing Your Laser
Printer Use'' available in HI 308):


Always display potential printer output on the screen before 
      printing it (e.g., by using ''xmore'').

Always check the length of a file before printing it so you are not
      surprised by the amount of paper used (e.g., by using ''ls -l'').

If the above fails, and you must print a test run of a long file just
      to see what the output will really look like on paper, first print a
      small part of the beginning of the file (e.g., by using ''head'' to strip
      off just the first several lines, perhaps a page or two, and printing
      that part only).

Never print directly form your program; always write the output to
      a file first so you can apply the above options.

Obey the standards of printer etiquette at all times (e.g., do not print
      large jobs during peak hours; make sure you take only your own
      printouts; keep the printer area neat and clean; and so on ).

At present, there are no printer quotas. We plan to rely on the reasonableness
of the user community until and unless that proves unwise. However, 
periodically an automatic audit of printer usage will be made and users who
are among the top 10% of all printer users for the audit period will be 
notified by electronic mail. If you receive such a notice you are expected to
examine your methods of printing and make a serious effort to reduce your 
printing activity.

If the next audit (which will be conducted about 3 weeks later) shows you are
still in the top 10% of all printer users, you will again receive electronic
mail. This time, a copy will also go the chair of the CIS Computer Committee
and the Manager of CIS Computer Activities, and you will be contacted to 
determine why you are printing so much more than a typical user. If your 
usage is deemed unreasonable by the Computer Committee, your printer access 
may be limited.


If you have any questions about this policy or how it might affect you, please
contact me.

-- 
Carl Kadie -- kadie@eff.org or kadie@cs.uiuc.edu -- But I speak for myself.

kadie@eff.org (Carl Kadie) (06/04/91)

(I understand that these polices will revised soon.)

The policies are better than most. The privacy policy is especially
good. In my opinion, the weakest policy covers email and netnews.

It says that undergrads are prohibited from posting or emailing off
campus.  This rule is enforced very selectively. To quote an OSU sys
admin: "it's just something that's usable as a weapon against the
occasional real jerk." (I think such selective enforcement is
despicable.)

The policy justifies email and netnews censorship by referring to "a
specific obligation to the organizations that operate our computer
networks". It does not identify an organization or reference an actual
contract or policy that requires censorship. (I understand the general
policy of OSU prohibits censorship.)

It is vague, prohibiting "other unsociable [email] acts".

The fatal flaw in the policies is the lack of any notion of due
process. It looks like a student or a faculty member could be
suspending or expelled from the computer system at the whim of sys
admin without recourse to a formal hearing.

- Carl
-- 
Carl Kadie -- kadie@eff.org or kadie@cs.uiuc.edu -- But I speak for myself.

morgan@ms.uky.edu (Wes Morgan) (06/04/91)

In article <1991Jun3.173550.13928@eff.org> kadie@eff.org (Carl Kadie) writes:
>
>It says that undergrads are prohibited from posting or emailing off
>campus.  This rule is enforced very selectively. To quote an OSU sys
>admin: "it's just something that's usable as a weapon against the
>occasional real jerk." (I think such selective enforcement is
>despicable.)
>
>The fatal flaw in the policies is the lack of any notion of due
>process. It looks like a student or a faculty member could be
>suspending or expelled from the computer system at the whim of sys
>admin without recourse to a formal hearing.
>

Why, oh why, is *everything* turning into a "formal" or "due
process" situation?  We've never had any problem with a student
that wasn't solved with a face-to-face conversation.  I've 
stopped chain letters, obscene files, and email flood wars with
a simple "please drop by to see me" message.  Sure, users have
been locked out here; this only occurred when the student ignored
several requests to come in for a meeting.  I haven't had to lock
anyone out yet; those few occurances were several years ago.

I realize that "due process" is a student right; however, aren't
we getting just a bit too stringent in its application?  Heck, 
I guess I'll have to schedule a hearing to kill user processes
that are using > 75% of the available system, since it's their
final project and I'm infringing their rights.

Let's step back, take a deep breath, and look at this from a
new perspective, shall we?

Wes

-- 
 morgan@ms.uky.edu    |Wes Morgan, not speaking for|     ....!ukma!ukecc!morgan
 morgan@engr.uky.edu  |the University of Kentucky's|   morgan%engr.uky.edu@UKCC
 morgan@ie.pa.uky.edu |Engineering Computing Center| morgan@wuarchive.wustl.edu
    Curator of the benchmark archives at wuarchive.wustl.edu <128.252.135.4>

kadie@eff.org (Carl Kadie) (06/04/91)

morgan@ms.uky.edu (Wes Morgan) writes:

>Why, oh why, is *everything* turning into a "formal" or "due
>process" situation?  We've never had any problem with a student
>that wasn't solved with a face-to-face conversation.  I've 
>stopped chain letters, obscene files, and email flood wars with
>a simple "please drop by to see me" message.

At most places and in most cases no formal hearing is necessary. As
you point out, an informal face-to-face conversation is usually
sufficent. The *right* to a formal hearing, however, is a necessary
check on the sys admin's power. Consider the situation at Ohio State.
According to a sys admin there, at least three students are being/were
punished because a sys admin thinks they are "real jerk[s]". The
students apparently have no way to appeal this judgement.

>Sure, users have
>been locked out here; this only occurred when the student ignored
>several requests to come in for a meeting.  I haven't had to lock
>anyone out yet; those few occurances were several years ago.

A student at Ohio State student tells me that users there are also
locked out (denied access to their computer account) when they are
wanted for a meeting. The difference is they are given no notice
before the lock out.

- Carl
-- 
Carl Kadie -- kadie@eff.org or kadie@cs.uiuc.edu -- But I speak for myself.

rmz@ifi.uio.no (Bj|rn Remseth) (06/04/91)

> Why, oh why, is *everything* turning into a "formal" or "due
> process" situation?  We've never had any problem with a student
> that wasn't solved with a face-to-face conversation.  

Well, in some cases the system administrators  are not as  sensible as
you.  We have just had a case where two students had  behaved badly on
the IRC (Internet  Relay Chat).  After failing  to get in contact with
the offenders, the system  administrator decided that the  right thing
was to close down the  entire IRC service.   In this case  due process
instead   of total dictatorical powers may   have prevented that.  The
offenders probably got what  they deserved,  they where  excluded, the
problem was that everyone else was to.


--
                                                    (Rmz)

Bj\o rn Remseth      Institutt for Informatikk       Net:      rmz@ifi.uio.no
Phone: +472 453466   Universitetet i Oslo, Norway    NeXTmail: rmz@neste.ifi.uio.no

aej@manyjars.WPI.EDU (Allan E Johannesen) (06/04/91)

>>>>> On 4 Jun 91 00:40:16 GMT, kadie@eff.org (Carl Kadie) said:

kadie> A student at Ohio State student tells me that users there are
kadie> also locked out (denied access to their computer account) when
kadie> they are wanted for a meeting. The difference is they are given
kadie> no notice before the lock out.

Golly.  There could be _no_ genuine reason for this, could there?

Ever heard of hacking?  Do you think the campus computer systems
should be down in deference to the "rights" of your hacker?

In your world, we'd have to leave the campus systems inoperative while
we wandered around looking for a judge...

romig@brachiosaur.cis.ohio-state.edu (Steve Romig) (06/04/91)

Carl says:
>    (I understand that these polices will revised soon.)

Yes.  The email/news policy in particular, since there are freely
available email accounts on campus that don't have such policies
"restricting" email use.

>    The policies are better than most. The privacy policy is especially
>    good. In my opinion, the weakest policy covers email and netnews.

Thanks.  I don't especially like the email/news policy myself, but as
one of the sysadmins, I appreciate the reason for its being there if
nothing else.

>    It says that undergrads are prohibited from posting or emailing off
>    campus.  This rule is enforced very selectively. To quote an OSU sys
>    admin: "it's just something that's usable as a weapon against the
>    occasional real jerk." (I think such selective enforcement is
>    despicable.)

Sigh.  The main point of the policies is that we have some written
down "rules of conduct" to which we can refer when someone starts
"acting like a jerk".  The main cases I've been involved with have
revolved around "appropriate use" sorts of things.  People trying to
crack passwords.  People wasting disk space with a.s.p bitmaps.
Sexual harrassment with aforementioned bitmaps.  And so on.

Far as I know, the email policy has never come into play.  But yes, in
general the policies are enforced selectively, in the sense that we
aren't scanning through the mail logs to see that undergrads aren't
using email, we don't watch through news postings to see that they
aren't posting news, heck, we don't even enforce the quotas in a
consistent basis, unless there's a problem that needs to be dealt
with.  If a file system fills up or gets nearly full, we get more
serious about quotas with the people that are over quota.  If someone
starts displaying xrated bitmaps in a harrassing fashion, we get more
serious about appropriate use with them.  If someone were to get
involved in mailing chain letters across the Internet, for instance,
we'd get more serious about email use with the offender.

Selective enforcement isn't ideal, but its a fact of life.  Speeding
tickets are selective - not all speeders are caught and fined.  Is
that fair?  No.

>    It is vague, prohibiting "other unsociable [email] acts".

Intentionally.  It isn't a law, its a policy.  There's a difference.

>    The fatal flaw in the policies is the lack of any notion of due
>    process. It looks like a student or a faculty member could be
>    suspending or expelled from the computer system at the whim of sys
>    admin without recourse to a formal hearing.

Well, its a policy, not a law - it describes, even vaguely, the proper
and appropriate use of our facilities.  It doesn't describe at all how
violations of that policy are to be handled, which is why it doesn't
go into due process.

As far as enforcement goes, the sysadmins here will deal (hopefully
politely and tactfully) with any policy violations that they come
across, which typically involves pointing out (in person or by email)
to the offender that they're "being a jerk" and would they please cut
it out.  We don't have the authority to suspend or expel users from
the system.  Anything serious enough to warrant anything like that is
handled as an academic misconduct sort of thing, through whatever the
usual channels are (involves faculty, the student, usually the
chairman, and sometimes the Ombudsperson.  The sysadmins usually
aren't involved in cases like that, except to provide technical info
or evidence.  I should point out that far as I know, things have gone
up to the chairman maybe 3 times (2 breakin incidents and the sexual
harrassment case) in the last several years.

--- Steve

russotto@eng.umd.edu (Matthew T. Russotto) (06/04/91)

In article <1991Jun3.232500.24850@ms.uky.edu> morgan@ms.uky.edu (Wes Morgan) writes:
>In article <1991Jun3.173550.13928@eff.org> kadie@eff.org (Carl Kadie) writes:
>>
>>The fatal flaw in the policies is the lack of any notion of due
>>process. It looks like a student or a faculty member could be
>>suspending or expelled from the computer system at the whim of sys
>>admin without recourse to a formal hearing.
>>
>
>Why, oh why, is *everything* turning into a "formal" or "due
>process" situation?  We've never had any problem with a student
>that wasn't solved with a face-to-face conversation.  I've 
>stopped chain letters, obscene files, and email flood wars with
>a simple "please drop by to see me" message.  Sure, users have
>been locked out here; this only occurred when the student ignored
>several requests to come in for a meeting.  I haven't had to lock
>anyone out yet; those few occurances were several years ago.
>
>I realize that "due process" is a student right; however, aren't
>we getting just a bit too stringent in its application?  Heck, 
>I guess I'll have to schedule a hearing to kill user processes
>that are using > 75% of the available system, since it's their
>final project and I'm infringing their rights.
>
>Let's step back, take a deep breath, and look at this from a
>new perspective, shall we?

I was barred from use of the computer systems at the UMCP computer science
center without warning.  The message put up when I attempted to log on told
me to talk to "the System Administrator", whoever the heck that might be. So
I called the guy I knew logged on as 'root'---  he told me that I had been
locked out by a different guy, the "accounts administrator".  I talked to this
'accounts administrator', who told me that he had heard reports that I had
been 'bothering people' (by messing with X-windows), but that to get my account
back, I would have to talk to the 'system administrator'.  I talked to him
again, and was sent back to the 'accounts administrator', who sent me
back to the 'system administrator'.  I got sick of the obvious runaround, and
went and applied for a number of new accounts under phony names.  Eventually,
they brought me to the judicial programs office or having all those accounts,
and I was found responsible for 'theft of services'.

If there had been some sort of due process in the first place, perhaps I
wouldn't have had such trouble.  Informal stuff only works when both sides are
trying for a real solution-- not when the side with more power only wants to
avoid what they percieve as a problem by getting rid of the student involved.
--
Matthew T. Russotto	russotto@eng.umd.edu	russotto@wam.umd.edu
     .sig under construction, like the rest of this campus.

sbrack@bluemoon.uucp (Steven S. Brack) (06/05/91)

romig@brachiosaur.cis.ohio-state.edu (Steve Romig) writes:

> Carl says:
> >    (I understand that these polices will revised soon.)
> 
> Yes.  The email/news policy in particular, since there are freely
> available email accounts on campus that don't have such policies
> "restricting" email use.

        The fact that MAGNUS (OSU's news & mail machine) seems to have
        little policy "in place."  This allows for ad hoc decisions to
        be made, as users don't know what policy is until they violate
        it.

> >    The policies are better than most. The privacy policy is especially
> >    good. In my opinion, the weakest policy covers email and netnews.
> 
> Thanks.  I don't especially like the email/news policy myself, but as
> one of the sysadmins, I appreciate the reason for its being there if
> nothing else.

        OSU's CIS department has a very well-rounded administrative
        policy on academic computing.  But, the quality of system policy
        varies greatly from department to department at Ohio State.  CIS
        is one of the best.

> >    It says that undergrads are prohibited from posting or emailing off
> >    campus.  This rule is enforced very selectively. To quote an OSU sys
> >    admin: "it's just something that's usable as a weapon against the
> >    occasional real jerk." (I think such selective enforcement is
> >    despicable.)
> 
> Sigh.  The main point of the policies is that we have some written
> down "rules of conduct" to which we can refer when someone starts
> "acting like a jerk".  The main cases I've been involved with have
> revolved around "appropriate use" sorts of things.  People trying to
> crack passwords.  People wasting disk space with a.s.p bitmaps.
> Sexual harrassment with aforementioned bitmaps.  And so on.

        All these cases represent inappropriate use of class-related
        accounts.  What standards should be applied to accounts on
        machines not related to classes?

> Far as I know, the email policy has never come into play.  But yes, in
> general the policies are enforced selectively, in the sense that we
> aren't scanning through the mail logs to see that undergrads aren't
> using email, we don't watch through news postings to see that they
> aren't posting news, heck, we don't even enforce the quotas in a
> consistent basis, unless there's a problem that needs to be dealt
> with.  If a file system fills up or gets nearly full, we get more
> serious about quotas with the people that are over quota.  If someone
> starts displaying xrated bitmaps in a harrassing fashion, we get more
> serious about appropriate use with them.  If someone were to get
> involved in mailing chain letters across the Internet, for instance,
> we'd get more serious about email use with the offender.

        I am acquainted with a Math TA who recieved harrassing e-mail
        from (I believe) the user in question.  She later received
        similar e-mail that was sent anonymously.  She was told nothing 
        could be done about the second incident.

> Selective enforcement isn't ideal, but its a fact of life.  Speeding
> tickets are selective - not all speeders are caught and fined.  Is
> that fair?  No.

        But the police try to catch everybody, where the admins in 
        question selectively enforce the policy.

> >    It is vague, prohibiting "other unsociable [email] acts".
> 
> Intentionally.  It isn't a law, its a policy.  There's a difference.

        There are so many different ways of using/abusing e-mail that
        a specific set of activities can't be prohibited without allowing
        some abuses to slip through.

> >    The fatal flaw in the policies is the lack of any notion of due
> >    process. It looks like a student or a faculty member could be
> >    suspending or expelled from the computer system at the whim of sys
> >    admin without recourse to a formal hearing.
> 
> Well, its a policy, not a law - it describes, even vaguely, the proper
> and appropriate use of our facilities.  It doesn't describe at all how
> violations of that policy are to be handled, which is why it doesn't
> go into due process.
> 
> As far as enforcement goes, the sysadmins here will deal (hopefully
> politely and tactfully) with any policy violations that they come
> across, which typically involves pointing out (in person or by email)
> to the offender that they're "being a jerk" and would they please cut
> it out.  We don't have the authority to suspend or expel users from
> the system.  Anything serious enough to warrant anything like that is
> handled as an academic misconduct sort of thing, through whatever the
> usual channels are (involves faculty, the student, usually the
> chairman, and sometimes the Ombudsperson.  The sysadmins usually
> aren't involved in cases like that, except to provide technical info
> or evidence.  I should point out that far as I know, things have gone
> up to the chairman maybe 3 times (2 breakin incidents and the sexual
> harrassment case) in the last several years.

        That's really the simplest way to approach system administration.
        Let the users know what you expect of them, inform them when they
        do not live up to those expectations, & save more severe
        punishments for those users who willfully continue after being
        warned.



===========================================================================
Steven S. Brack     sbrack@bluemoon.uucp        The Ohio State University
sbrack%bluemoon@nstar.rn.com                        sbrack@isis.cs.du.edu
===========================================================================

sbrack@bluemoon.uucp (Steven S. Brack) (06/05/91)

russotto@eng.umd.edu (Matthew T. Russotto) writes:

> In article <1991Jun3.232500.24850@ms.uky.edu> morgan@ms.uky.edu (Wes Morgan) 
> >In article <1991Jun3.173550.13928@eff.org> kadie@eff.org (Carl Kadie) writes
> >>
> >>The fatal flaw in the policies is the lack of any notion of due
> >>process. It looks like a student or a faculty member could be
> >>suspending or expelled from the computer system at the whim of sys
> >>admin without recourse to a formal hearing.
> >>
> >
> >Why, oh why, is *everything* turning into a "formal" or "due
> >process" situation?  We've never had any problem with a student
> >that wasn't solved with a face-to-face conversation.  I've 
> >stopped chain letters, obscene files, and email flood wars with
> >a simple "please drop by to see me" message.  Sure, users have
> >been locked out here; this only occurred when the student ignored
> >several requests to come in for a meeting.  I haven't had to lock
> >anyone out yet; those few occurances were several years ago.
> >
> >I realize that "due process" is a student right; however, aren't
> >we getting just a bit too stringent in its application?  Heck, 
> >I guess I'll have to schedule a hearing to kill user processes
> >that are using > 75% of the available system, since it's their
> >final project and I'm infringing their rights.
> >
> >Let's step back, take a deep breath, and look at this from a
> >new perspective, shall we?
> 
        When I was locked out of my class account early this quarter,
        I made 15 phone calls to 10 different people, not counting
        being transferred all over campus.

        Apparently the policy of our system administration is to keep
        students from solving problems on the local admin level.  My
        account priveleges were restored after I met with the chair
        of the department that owned, but did not manage, the system in
        question.  My telephony took me all the way from my professor
        to the local system manager to the director of Academic Computing
        Services, then to the Dean of the Engineering College.  I finally
        called our University Ombudsperson, who helped me determine who
        I should have been talking to, as none of the people I talked to
        directed me to the right place.



===========================================================================
Steven S. Brack     sbrack@bluemoon.uucp        The Ohio State University
sbrack%bluemoon@nstar.rn.com                        sbrack@isis.cs.du.edu
===========================================================================

gl8f@astsun7.astro.Virginia.EDU (Greg Lindahl) (06/05/91)

In article <1991Jun4.160947.7193@eng.umd.edu> russotto@eng.umd.edu (Matthew T. Russotto) writes:

>If there had been some sort of due process in the first place, perhaps I
>wouldn't have had such trouble.  Informal stuff only works when both sides are
>trying for a real solution-- not when the side with more power only wants to
>avoid what they percieve as a problem by getting rid of the student involved.

Exactly! And due process only works when it isn't grossly painful. I
once had a problem with an undergraduate IRC user at a large US
university. Despite many recorded instances of antisocial behavior
(he'd get drunk and start sending everyone /usr/dict/words...), his
system administrator's attitude was "The process of pulling his
account is so long and nasty that I'm not even going to try. Good
luck."

One would wonder if they would have taken any action if the medium had
been netnews or mail. In any case, a few technical fixes to IRC
sufficed to solve the problem. When due process fails, not much is
left. A fancy document can't guarantee that the process works, either.
It merely helps.

ef1c+@andrew.cmu.edu (Esther Filderman) (06/05/91)

Excerpts from netnews.comp.admin.policy: 4-Jun-91 Re: Ohio State
University C.. Matthew T. Russotto@eng. (2734)

>  I got sick of the obvious runaround, and went and applied for a number
> of new accounts under phony names.  Eventually, they brought me to the
> judicial programs office or having all those accounts, and I was found
> responsible for 'theft of services'.

> If there had been some sort of due process in the first place, perhaps I
> wouldn't have had such trouble.  

You're kidding, right?  You wouldn't have broken the rules if they
hadn't given you so much trouble, is that what you're saying?

> Informal stuff only works when both sides are
> trying for a real solution-- not when the side with more power only wants to
> avoid what they percieve as a problem by getting rid of the student involved.

Did you ever consider finding someone else to help you?  The system
administrator and the accounts administrator each have a boss.  The
words, "I want to speak to your supervisor" can get you places if you
feel that you're being unjustly treated.

Part of gaining maturity is learning that when you seem to be stuck in a
bad position you should look for alternate solutions, not break the
rules.  Yes, you were unjustly treated by having your account turned off
without warning and then given the run around, but you played right into
their hands by then breaking the rules.

----------------------------
Esther C. Filderman     ef1c+@andrew.cmu.edu
System Manager          Library Automation
Mercury Project         Carnegie Mellon University
        They are gardeners and carpenters.
        They are not tomato men.

chip@pender.ee.upenn.edu (Charles H. Buchholtz) (06/05/91)

In article aej@manyjars.WPI.EDU (Allan E Johannesen) writes:
>>>>>> On 4 Jun 91 00:40:16 GMT, kadie@eff.org (Carl Kadie) said:
>
>kadie> A student at Ohio State student tells me that users there are
>kadie> also locked out (denied access to their computer account) when
>kadie> they are wanted for a meeting. The difference is they are given
>kadie> no notice before the lock out.
>
>Golly.  There could be _no_ genuine reason for this, could there?

We do this when we have reason to believe that someone has broken into
an account and is using it without the owner's permission.  We change
the shell on the account so that it simply displays a message asking
the person to come to our office.

When they arrive, we ask them if the activities were authorized by
them or not.  If they say, "yes I did that", then we unlock the
account and deal with whatever they did.  If the action was not in
violation of any other restrictions, we simply apologize for the
inconvenience.  

If they say, that they authorized someone to use their account, then
we give them the lecture on "account sharing" and unlock the account.
If they say that they don't know what we're talking about, then we
unlock the account, make sure that they change the password, scan the
account for back doors or other security holes, and try to determine
how the account was cracked.

We couldn't think of any other reasonable response to take when we
have good reason to believe that an account has been cracked.
Certainly, leaving it open and sending mail is not appropriate under
those circumstances.

      Charles H. Buchholtz            chip@ee.upenn.edu
      Systems Programmer              Engineering & Applied Science
		     University of Pennsylvania.

dpassage@tornado.Berkeley.EDU (David G. Paschich) (06/05/91)

In article <44147@netnews.upenn.edu> chip@pender.ee.upenn.edu (Charles H. Buchholtz) writes:
>In article aej@manyjars.WPI.EDU (Allan E Johannesen) writes:
>>>>>>> On 4 Jun 91 00:40:16 GMT, kadie@eff.org (Carl Kadie) said:
>>
>>kadie> A student at Ohio State student tells me that users there are
>>kadie> also locked out (denied access to their computer account) when
>>kadie> they are wanted for a meeting. The difference is they are given
>>kadie> no notice before the lock out.
>>
>>Golly.  There could be _no_ genuine reason for this, could there?
>
>We do this when we have reason to believe that someone has broken into
>an account and is using it without the owner's permission.  We change
>the shell on the account so that it simply displays a message asking
>the person to come to our office.
[stuff about talking to account owner deleted]
>We couldn't think of any other reasonable response to take when we
>have good reason to believe that an account has been cracked.
>Certainly, leaving it open and sending mail is not appropriate under
>those circumstances.

On the system I administrate (which, incidentally, is a student-run Unix
workstation cluster I'd be happy to talk about if folks are interested),
sometimes we'll give the user a phone call and ask them if they know what's
going on.  We have people put their home phone numbers on the account
application form so we can get in touch of them if there are any problems
with creating their account.

Remember, the phone system is still the biggest network in the world.  :)

David G. Paschich    Open Computing Facility    UC Berkeley
dpassage@ocf.berkeley.edu    
"Everybody wants prosthetic foreheads on their real heads."
					--They Might Be Giants

marchany@vtserf.cc.vt.edu (Randy Marchany) (06/05/91)

In article <Z9c2316w164w@bluemoon.uucp> sbrack@bluemoon.uucp (Steven S. Brack) writes:
>        I made 15 phone calls to 10 different people, not counting
>        being transferred all over campus.
>        Apparently the policy of our system administration is to keep
>        students from solving problems on the local admin level.  My
>        account priveleges were restored after I met with the chair
>        of the department that owned, but did not manage, the system in
>        question.  My telephony took me all the way from my professor
>        to the local system manager to the director of Academic Computing
>        Services, then to the Dean of the Engineering College.  I finally
>        called our University Ombudsperson, who helped me determine who
>        I should have been talking to, as none of the people I talked to
>        directed me to the right place.
>
Geez, this run-around is really inexcusable. What we have here is
a failure to communicate not with the user but with the administrators.

I think we need to split the issue into separate parts. One purpose of
a "policy" statement is to clearly spell out the points of contact for
various issues. A single page containing phone numbers or "account
mgrs", "user consulants", "technical support", "sysadmins", "the owner"
handed out when a user gets an account on a machine or an online version
of this list available to the entire computing community of that
system(s) or network would reduce the frustration level of the users
tremendously. Look at it from the user's point of view, who do you
contact if you think someone is messing with your account/data? Having
such a simple document would avoid tension between the users and the
sysadmins.

The second purpose of a policy statement is to CLEARLY delineate the
responsibilities of the various personnel mentioned in such a "hit
list". Again, this document should be available to the user community 
(preferably an online version). I stress that individual names are not 
important, the "job title" is what should be defined.

The third purpose of a policy statement is do DEFINE the computing
environment for a particular site. Whether you set up a wide open
environment or a restrictive one must be defined in this section.
The users agree to abide by the "site rules" by implicit means ("by
logging on this system, you agree to operate in this environment") or
explicitly, i.e., the user signs a form which states he agrees to "play
by the rules".

A lot of these issues used to be "taken for granted". Of course, the
problem is that what one person "takes for granted", another might not.
The problem of NOT defining a site's particular policy has been around
for years and has caused the usual amount of friction between users and
system managers. 

Clearly, one document that discusses the three points above may not pass
through the local political process. However, a series of documents,
each covering a separate aspect of the OVERALL scheme has a better
chance. Once the statement(s) are put together, they need to be
made available to the users. By not doing this, sysadmins and their 
bosses fail in their responsibility to the user community. Quite
frankly, sysadmins are like cruise ship captains, You run passengers 
thru the lifeboat drills, give them the "house rules" and let them go to
have fun or act like jerks. The key issue is that you (sysadmins/owner
etc.) spell out what you expect, what to do in emergencies and who to
contact.

	-Randy Marchany
	VA Tech Computing Center
	Blacksburg, VA

"my opinions are my own."

wlsmith@valve.heart.rri.uwo.ca (Wayne L. Smith) (06/05/91)

Why don't we rename this group to comp.sys.Ohio.cis.policies ?

russotto@eng.umd.edu (Matthew T. Russotto) (06/05/91)

In article <ccGyKxm00WCGQ_g5k7@andrew.cmu.edu> ef1c+@andrew.cmu.edu (Esther Filderman) writes:
>Excerpts from netnews.comp.admin.policy: 4-Jun-91 Re: Ohio State
>University C.. Matthew T. Russotto@eng. (2734)
>
>>  I got sick of the obvious runaround, and went and applied for a number
>> of new accounts under phony names.  Eventually, they brought me to the
>> judicial programs office or having all those accounts, and I was found
>> responsible for 'theft of services'.
>
>> If there had been some sort of due process in the first place, perhaps I
>> wouldn't have had such trouble.  
>
>You're kidding, right?  You wouldn't have broken the rules if they
>hadn't given you so much trouble, is that what you're saying?

Had there been a way I could have gotten my own account back, the one I am
entitled to as an undergraduate at this school, I would not have applied for
any phony accounts.  That is what I am saying.

>> Informal stuff only works when both sides are
>> trying for a real solution-- not when the side with more power only wants to
>> avoid what they percieve as a problem by getting rid of the student involved.
>Did you ever consider finding someone else to help you?  The system
>administrator and the accounts administrator each have a boss.  The
>words, "I want to speak to your supervisor" can get you places if you
>feel that you're being unjustly treated.

Maybe.  Probably not.  I tried that sort of tack in a similiar situation at
a different office which was giving me trouble, and found myself in a nice
little loop-- a bigger runaround.  Only thing that worked was writing a letter
to the director of the office-- with copies to everyone from the governor of
the state on down.  It also took quite a bit of time, something that I didn't 
have in the other situation (try doing CS classwork without an account).

>Part of gaining maturity is learning that when you seem to be stuck in a
>bad position you should look for alternate solutions, not break the
>rules.  Yes, you were unjustly treated by having your account turned off
>without warning and then given the run around, but you played right into
>their hands by then breaking the rules.

I see no need to be constrained by any rules when the other side is not.  From
a practical point of view, attempting to play their game their way may have
saved me some trouble with the judicial programs office-- but it also would
have caused me to fail my class.

It's all fine and good for you, when you make the rules but don't necessarily
have to write them down or follow them yourself, to claim that informal
procedures are enough, or that students when wronged by you should follow the
rules you set up.  It's a different matter for a student with his account cut
off, projects due, confronted with sysadmins working against him, who are
apparently responsible to no one and need to follow no rules.
--
Matthew T. Russotto	russotto@eng.umd.edu	russotto@wam.umd.edu
     .sig under construction, like the rest of this campus.

russotto@eng.umd.edu (Matthew T. Russotto) (06/05/91)

In article <Z9c2316w164w@bluemoon.uucp> sbrack@bluemoon.uucp (Steven S. Brack) writes:
>> 
>        When I was locked out of my class account early this quarter,
>        I made 15 phone calls to 10 different people, not counting
>        being transferred all over campus.
>
>        Apparently the policy of our system administration is to keep
>        students from solving problems on the local admin level.  My
>        account priveleges were restored after I met with the chair
>        of the department that owned, but did not manage, the system in
>        question.  My telephony took me all the way from my professor
>        to the local system manager to the director of Academic Computing
>        Services, then to the Dean of the Engineering College.  I finally
>        called our University Ombudsperson, who helped me determine who
>        I should have been talking to, as none of the people I talked to
>        directed me to the right place.

Absolutely.  This is apparentely quite common-- every problem I've had with
this University, in various departments, has resulted in this sort of
runaround.  Seems to be standard operating procedure-- which is why a formal,
known, due process is needed.  The university has a process that staff and
faculty can use against students-- why shouldn't students have a process
to use against staff and faculty?
--
Matthew T. Russotto	russotto@eng.umd.edu	russotto@wam.umd.edu
     .sig under construction, like the rest of this campus.

jgreely@morganucodon.cis.ohio-state.edu (J Greely) (06/06/91)

In article <1991Jun4.004016.20415@eff.org> kadie@eff.org (Carl Kadie) writes:
>At most places and in most cases no formal hearing is necessary. As
>you point out, an informal face-to-face conversation is usually
>sufficent. The *right* to a formal hearing, however, is a necessary
>check on the sys admin's power.

Nothing in those policies overrides university rules.  The student's
rights are spelled out quite clearly elsewhere, and there's no reason
to double the size of every policy document by repeating them.  If the
policies were in the form of a contract that each user had to sign
before getting an account, *then* I'd agree that everything needs to
be spelled out.  Our posted policies are no different, really, than a
"shoes required" sign outside the volleyball court.

>Consider the situation at Ohio State.  According to a sys admin
>there, at least three students are being/were punished because a sys
>admin thinks they are "real jerk[s]".

I don't know who you're referring to, but for most of us, a user
becomes categorized as a "real jerk" when he (or she, but almost
always he...) manages to do stupid or abusive things often enough or
serious enough to catch our attention.  There are about 1200
undergraduate students on our system; you've *really* got to work at
it to stand out.  I recently found several megabytes of publicly-
readable X-rated gifs in an account with a one meg quota.  Do I think
he's a jerk?  You betcha.

  His punishment?  I changed the perms on them and forwarded his name
to the operator who takes care of over-quota users.  Next time he
comes to my attention, will I assume he's guilty of deliberate abuse?
Probably not.  This was pretty mild, and I wouldn't even have been
annoyed if they hadn't been world-readable.

>The students apparently have no way to appeal this judgement.

This judgement is usually a one-time thing.  If they don't make a
habit of doing stupid or abusive things on the system, we'll never
notice them again (2000 other users make excellent camouflage).

>A student at Ohio State student tells me that users there are also
>locked out (denied access to their computer account) when they are
>wanted for a meeting. The difference is they are given no notice
>before the lock out.

Our department (I don't know about the many other groups who create
student accounts) doesn't usually lock users out without notice unless
we suspect someone's using an account to break into our system.  Of
course, a student who only logs in once every two weeks may miss an
e-mail warning.
--
J Greely (jgreely@cis.ohio-state.edu; osu-cis!jgreely)

weide@elephant.cis.ohio-state.edu (Bruce Weide) (06/06/91)

Today someone pointed me to this newsgroup because I was chair of the
Ohio State University CIS Department Computer Committee in 1984, when
the usage policies that were recently posted to this newsgroup were
adopted.  After having read the follow-ups to the original posting, I
thought I should make a few remarks.  To summarize:

(1) Only one person affiliated with OSU (one of our system staff in
message #61) seems to have contributed to the discussion.  Apparently
no one else -- including the poster of the original message -- is in
any way associated with OSU, has any first-hand knowledge of how the
policies are administered, or knows whether they have been workable.

(2) Most of the discussion actually has had little to do with OSU
policies.  There has been considerable dialogue about a problem a
student had at Maryland -- all under the heading "Ohio State
University CIS Policies."

----

(1) In article <1991Jun4.004016.20415@eff.org> kadie@eff.org (Carl
Kadie) writes:
>
>At most places and in most cases no formal hearing is necessary. As
>you point out, an informal face-to-face conversation is usually
>sufficent. The *right* to a formal hearing, however, is a necessary
>check on the sys admin's power. Consider the situation at Ohio State.
>According to a sys admin there, at least three students are being/were
>punished because a sys admin thinks they are "real jerk[s]". The
>students apparently have no way to appeal this judgement.
>...
>A student at Ohio State student tells me that users there are also
>locked out (denied access to their computer account) when they are
>wanted for a meeting. The difference is they are given no notice
>before the lock out.

As J. Greely pointed out in #61, OSU has an elaborate policy on
academic misconduct that is used as the basis for pursuing serious
alleged violations of the computer usage policies.  The procedures are
spelled out elsewhere, not in the posted policies.  Indeed the
policies HAVE BEEN used as the basis for academic misconduct actions.
In urgent situations (e.g., break-in in progress), the staff takes
immediate action to control damage, but "due process" is not therefore
inherently violated, as several people have been quick to point out.

As for the business of being locked out of an account "when they were
wanted for a meeting," this statement is a mystery to me.  First, I
have no idea what it means.  Furthermore, if a student felt cheated by
the policy, the obvious recourse would be to talk to the current chair
of the Computer Committee or the OSU CIS Department chair, not to
someone at Illinois.  While I was chair of the committee no one raised
such a question, and I doubt the current chair has heard it either.

----

(2) Much of the discussion has centered on the experiences of a
student at the University of Maryland, but the articles were still
under the heading of "Ohio State University CIS Policies."  A casual
reader may have missed this, thinking that the problems arose at OSU
from (or at least under) the posted policies.

----

A final remark: The policies are about 7 years old now, and some of
them need to be changed to reflect different accounting methods, etc.
For example, in 1984, CIS paid for OSU's access to national and
international networks.  Undergraduates were discouraged at the time
from sending mail outside OSU because each message cost us real money
(of which we had none to spare, and still don't).  Now the situation
is entirely different, with the University picking up the essentially
fixed cost of Internet connection.  The written policies are currently
under revision to reflect these kinds of changes; the de facto policy
for some time has been that anyone is free to send mail, etc.  There
was never any intention of "censoring" mail, just making the network
connection affordable on a limited budget.

Overall, I think people here would agree that having written policies
to cover computer usage has served us well.  I would advise
institutions that have no such policies in place to consider adopting
ones that make sense for the particular computing environment in
question.

Cheers,
	-Bruce

------

Prof. Bruce W. Weide
Dept. of Computer and Information Science
The Ohio State University
2036 Neil Ave. Mall
Columbus, Ohio  43210-1277
USA

Phone:   614-292-1517
E-mail:  weide@cis.ohio-state.edu

ted@nmsu.edu (Ted Dunning) (06/06/91)

In article <1991Jun5.143833.21547@eng.umd.edu> russotto@eng.umd.edu (Matthew T. Russotto) writes:

	...
   The university has a process that staff and faculty can use against
   students-- why shouldn't students have a process to use against
   staff and faculty?

the use of the word `against' is symptomatic of very deep structural
problems in the organization.  once it gets to the point where system
administrators consider users to be trouble to be avoided, and users
consider system administrators to be obstacles to be bypassed, then
there is essentially no hope for constructive action.

i know of no way to get out of this sort of situation.


i do know from personal experience, both on the user and the
administration side that it isn't that hard to avoid getting into this
sort of situation in the first place.

my own checklist of things to do includes the following axioms for
administration include:

1) the systems are there for users to use

2) i am here to make the systems work as well as possible

3) the only purpose for user restrictions is to enhance the user
environment


strict application of these rules from the beginning tends to make the
environment much less confrontational.
--

		When in doubt, take the trick.

				Hoyle & Hoyle (quoting Hoyle)

fetrow@bones.stat.washington.edu (David Fetrow) (06/06/91)

In article <1991Jun4.160947.7193@eng.umd.edu> russotto@eng.umd.edu (Matthew T. Russotto) writes:
>
>I was barred from use of the computer systems at the UMCP computer science
>center without warning.  The message put up when I attempted to log on told
>me to talk to "the System Administrator", whoever the heck that might be. So
>I called the guy I knew logged on as 'root'---  he told me that I had been
>locked out by a different guy, the "accounts administrator".  I talked to this
>'accounts administrator', who told me that he had heard reports that I had
>been 'bothering people' (by messing with X-windows), but that to get my account
>back, I would have to talk to the 'system administrator'.  I talked to him
>again, and was sent back to the 'accounts administrator', who sent me
>back to the 'system administrator'.  I got sick of the obvious runaround, and
>went and applied for a number of new accounts under phony names.  Eventually,
>they brought me to the judicial programs office or having all those accounts,
>and I was found responsible for 'theft of services'.
>
>If there had been some sort of due process in the first place, perhaps I
>wouldn't have had such trouble.  Informal stuff only works when both sides are
>trying for a real solution-- not when the side with more power only wants to
>avoid what they percieve as a problem by getting rid of the student involved.
>--
>Matthew T. Russotto	russotto@eng.umd.edu	russotto@wam.umd.edu
>     .sig under construction, like the rest of this campus.

 I have a slightly different perspective on this. "Due Process" should always
be around, at least as a backup to informal procedures (e.g. a student
ombudsman) but it doesn't (in my experience) speed things up to invoke them.
It doesn't fix a place with bad communication and bad attitudes (at least not
by itself).

 Of course I'm writing from the luxurious vantage point of someone who knows
virtually all the users of our system with an office right off the main terminal
room. It gives the place more of a "team" feel than the "us and them" often
(but not always) seen in larger installations and helps keep the communications
channels flowing (it helps a lot to be able to see how customers interact with
the machines).

 -dave fetrow-                        fetrow@biostat.washington.edu  (internet)
 
Actually, unix is a very user-friendly system.  Its just that it is
particular about which users it chooses to be friendly with. -The Oracle

abraham@iesd.auc.dk (Per Abrahamsen) (06/07/91)

>>>>> On 5 Jun 91 18:12:37 GMT,
>>>>> jgreely@morganucodon.cis.ohio-state.edu (J Greely) said:

jgreely> This was pretty mild, and I wouldn't even have been
jgreely> annoyed if they hadn't been world-readable.

Would you please explain why making them world *readable* would annoy
you? My reaction would be the exact opposite.  If other people can't
read them, they might get their own private copies, thereby wasting
more disc space.

At this site, people are encouraged to place pictures they want to
keep (regardless of the "rating", this is not an arts department) at a
central place.  Currently about 35 MB is used for such pictures, about
0.1% of the total amount of disc space.  Games (also keept central)
use a similar amount of disc space.  I think more disc space would be
wasted, if the users had their own private copies instead.

jgreely@morganucodon.cis.ohio-state.edu (J Greely) (06/08/91)

In article <ABRAHAM.91Jun6210025@thiele.iesd.auc.dk> abraham@iesd.auc.dk
 (Per Abrahamsen) writes:
>jgreely> This was pretty mild, and I wouldn't even have been
>jgreely> annoyed if they hadn't been world-readable.

>Would you please explain why making them world *readable* would annoy
>you?

A combination of university rules and state law.  I don't care if a
user has a picture showing why a dog is a girl's best friend (although
that collie did *not* look happy), but if it's world-readable in a
directory named "look", it can cause legal problems for the
department.

>My reaction would be the exact opposite.  If other people can't
>read them, they might get their own private copies, thereby wasting
>more disc space.

They do.  Of the 60+ meg of images I found on student file servers,
I'd say at least half of them were duplicates, and many of them were
already installed in our public "tame" raster directory.  If we could
set up a group-readable area for images of questionable taste (group
"quest", perhaps? :-)), we could perhaps cut down on the amount of
duplication.  I have a feeling that the department chairman's response
to this idea would not be favorable (he's already come very close to
ordering us to forcibly remove all questionable images from the
system).


			This material has been reviewed by independent
			experts who found, based on their professional
			experience and training, that the material:
			    * has scientific value
			    * does not appeal to the prurient
			      interests of the average adult American.
			Material is intended for viewing/reading by
			adults only, for use in the privacy of the
			customer's home.  Not for public use.
--
J Greely (jgreely@cis.ohio-state.edu; osu-cis!jgreely)

kadie@eff.org (Carl M. Kadie) (06/08/91)

>In article <ABRAHAM.91Jun6210025@thiele.iesd.auc.dk> abraham@iesd.auc.dk
> (Per Abrahamsen) writes:

>>Would you please explain why making them world *readable* would annoy
>>you?

In <JGREELY.91Jun7130139@morganucodon.cis.ohio-state.edu> jgreely@morganucodon.cis.ohio-state.edu (J Greely) writes:

>A combination of university rules and state law.

Can you be more specific? What rules? What law?

It sounds like you selectively enforce your disk quotas based on
how much the content might embarrass the department chairman.

- Carl
-- 
Carl Kadie -- kadie@eff.org or kadie@cs.uiuc.edu -- But I speak for myself.

otto@fsu1.cc.fsu.edu (John Otto) (06/08/91)

In article <AEJ.91Jun4090410@manyjars.WPI.EDU>, aej@manyjars.WPI.EDU (Allan E Johannesen) writes...
>>>>>> On 4 Jun 91 00:40:16 GMT, kadie@eff.org (Carl Kadie) said:

>kadie> A student at Ohio State student tells me that users there are
>kadie> also locked out (denied access to their computer account) when
>kadie> they are wanted for a meeting. The difference is they are given
>kadie> no notice before the lock out.

>Golly.  There could be _no_ genuine reason for this, could there?

I agree.  There could be no genuine reason for this.

otto@fsu1.cc.fsu.edu (John Otto) (06/08/91)

In article <1991Jun4.160947.7193@eng.umd.edu>, russotto@eng.umd.edu (Matthew T. Russotto) writes...
>In article <1991Jun3.232500.24850@ms.uky.edu> morgan@ms.uky.edu (Wes Morgan) writes:
>>In article <1991Jun3.173550.13928@eff.org> kadie@eff.org (Carl Kadie) writes:

>>>The fatal flaw in the policies is the lack of any notion of due
>>>process. It looks like a student or a faculty member could be
>>>suspending or expelled from the computer system at the whim of sys
>>>admin without recourse to a formal hearing.

>>Why, oh why, is *everything* turning into a "formal" or "due
>>process" situation?  We've never had any problem with a student...

>I was barred from use of the computer systems at the UMCP computer science
>center without warning.  The message put up when I attempted to log on told
..
>back to the 'system administrator'.  I got sick of the obvious runaround, and
>went and applied for a number of new accounts under phony names.  Eventually,
>they brought me to the judicial programs office or having all those accounts,
>and I was found responsible for 'theft of services'.

>If there had been some sort of due process in the first place, perhaps I
>wouldn't have had such trouble.  Informal stuff only works when both sides are
>trying for a real solution-- not when the side with more power only wants to
>avoid what they percieve as a problem by getting rid of the student involved.

My favorites are when it's the administration that's violating one's 
rights (both when recognized by law and not).  If you or your daddy's not a 
lawyer or politico, you can petition for redress of grievance all you want 
and the bozos get away with it.

Current policies requiring abuse of socialist insecurity numbers come to 
mind.

otto@fsu1.cc.fsu.edu (John Otto) (06/08/91)

In article <ccGyKxm00WCGQ_g5k7@andrew.cmu.edu>, ef1c+@andrew.cmu.edu (Esther Filderman) writes...
>Excerpts from netnews.comp.admin.policy: 4-Jun-91 Re: Ohio State
>University C.. Matthew T. Russotto@eng. (2734)

>> Informal stuff only works when both sides are
>> trying for a real solution-- not when the side with more power only wants to
>> avoid what they percieve as a problem by getting rid of the student involved.
> 
>Did you ever consider finding someone else to help you?  The system
>administrator and the accounts administrator each have a boss.  The
>words, "I want to speak to your supervisor" can get you places if you
>feel that you're being unjustly treated.

Yes.  I've gone that route, too.  (Miss Manners [tm] suggests it in one of 
her books.B-)  The trouble is that they usually just route you back down so 
now you've got a 2-D bounce pattern.

Thomas Jefferson twice said that a little rebellion now and then is a good 
thing.

otto@fsu1.cc.fsu.edu (John Otto) (06/08/91)

In article <1991Jun5.143833.21547@eng.umd.edu>, russotto@eng.umd.edu (Matthew T. Russotto) writes...
>In article <Z9c2316w164w@bluemoon.uucp> sbrack@bluemoon.uucp (Steven S. Brack) writes:

>>        When I was locked out of my class account early this quarter,
>>        I made 15 phone calls to 10 different people, not counting
>>        being transferred all over campus.

>>        Apparently the policy of our system administration is to keep
>>        students from solving problems on the local admin level.  My
>>        account priveleges were restored after I met with the chair
>>        of the department that owned, but did not manage, the system in
>>        question.  My telephony took me all the way from my professor
>>        to the local system manager to the director of Academic Computing
>>        Services, then to the Dean of the Engineering College.  I finally
>>        called our University Ombudsperson, who helped me determine who
>>        I should have been talking to, as none of the people I talked to
>>        directed me to the right place.

>Absolutely.  This is apparentely quite common-- every problem I've had with
>this University, in various departments, has resulted in this sort of
>runaround.  Seems to be standard operating procedure-- which is why a formal,
>known, due process is needed.  The university has a process that staff and
>faculty can use against students-- why shouldn't students have a process
>to use against staff and faculty?

As lead hot-line person I usually try to short out the run-around by taking 
the person's statement, name and means of contact and running down the 
appropriate person to set things right.  It hasn't outright failed, yet, 
but it occasionally gets co-workers ticked off at me.