Computing

Individuals with access to the BAMSI network have the following obligations and responsibilities

  • To respect other people and the Institute’s intellectual environment. Use of the network may not violate local law, including the laws of defamation, forgery, and harassment.
  • To not engage in copyright/trademark infringement: The copying of copyrighted materials such as music, movies, and other multi-media via Internet peer-to-peer file sharing software or other means is strictly forbidden.
  • To protect each individual’s accounts from unauthorized use by others. Every account is provided for the use of a specific individual and may not be shared with nor loaned to others. Additionally, office computers are generally assigned to specific individuals for BAMSI-related work. All members of the community must obtain permission before using a computer not assigned to them.
  • To respect the integrity of other users’ accounts. Individuals must not attempt to decode passwords or access information illegitimately. For example, sending electronic mail under another person’s name/forged email is a violation.
  • To avoid engaging in any activity that may reasonably be expected to be harmful to the systems operated by the BAMSI, including, but not limited to, attempting to disrupt, gain unauthorized access to, or damage computing and network systems (hardware and software) belonging to the Institute, or to use the Institute’s computing resources to disrupt, infiltrate, or damage systems belonging to others on campus or around the world. When a system vulnerability is discovered, users are expected to report it to Information Technology Services (ITS).
  • To avoid excessive use of shared resources, whether through monopolizing systems, overloading networks, misusing printers or other resources, or sending spam or unsolicited mass electronic mail. Violations of these guidelines that come to the attention of ITS will be referred as appropriate to administration. Where appropriate, ITS may temporarily withhold services from students, faculty, or staff while referring the case in a timely manner to the appropriate BAMSI office. Sanctions can include termination of all computing services to the individual(s).