Most universities provide services to assist students and faculty with
computing and networking on campus. Academic computing services are relatively
similar in purpose, policy, and services across university campuses. Mission of OAC In its catalogue, the University of California, Irvine (UCI) offers an
explanation of the role the Office of Academic Computing plays on the university
campus: The Office of Academic Computing (OAC) provides telephone, network,
and computing services in support of research and education at UCI.
OAC provides central computing services, computer laboratories, departmental
and research-group support services, and campus-wide technical coordination.
The campus network infrastructure maintained by OAC provides for Ethernet
and higher speed connectivity on campus and to the world-wide Internet.1 The OACs Mission Statement provides more specific goals: The mission of the Office of Academic Computing (OAC) is to assist
the campus in the creation and maintenance of a computing and electronic
communication environment that meets the needs of UCI programs in research
and instruction. OACs strategy is one of leveraging campus-wide
computing and communication by providing: Campus Network UCI utilizes UNIX-based systems in which students are assigned an account
(an "ID") and password at a central location for accessing email
and the Internet on campus. Specific email programs vary depending on what
the student signs up forsuch as Eudora, PINE, Netscape, or Outlookbut
underneath any program is a series of UNIX computers, using passwords and
logins that are maintained in a centralized file system. Students can access the network from many on-campus public computing labs.
These machine are usually personal computers that do not require login for
individual use. Login is required, however, to take advantage of network
services such as Internet access and electronic mail. As an additional security
measure, and to protect against theft and vandalism, many of the public
labs have constant video surveillance. The network is maintained by full time personnel of the OAC with the significant
assistance of paid student help. Computer and Network Policy In addition to providing computers, software, and support to academic users
within a college community, a subsidiary goal of campus academic computing
services is to enforce computer usage policy. The Office of Academic Computing
(OAC) at the University of California, Irvine (UCI) had implemented a Computer
and Network Policy that all users were required to read before being given
an account. Each user signed a document indicating they had read this policy.
The policy encourages using university email services to share information,
to improve communication, and to exchange ideas. The OAC provides a brief
description of the aim of the policy that is helpful: The purpose of [the] policy is to assure that: Access to email is a privilege, not a right. Compliance to the policy is
expected for all users, and failure to meet this responsibility can result
in dismissal or revocation of this privilege. Response to policy violations The Office of Academic Computing (OAC) at the University of California,
Irvine (UCI) has a Computer and Network Policy that all users are required
to read before being given an account. Each user signs a document indicating
they have read this policy. In the words of the policy, the purpose of the
policy is to assure that: Access to email is considered to be a privilege, not a right. Compliance
with the policy is expected for all users, and failure to comply can result
in dismissal or revocation of this privilege. The Computer and Network Policy defined at UCI specifically states an example
of misuse to be "using computers or electronic mail to act abusively
toward others or to provoke a violent reaction, such as stalking, acts
of bigotry, threats of violence, or other hostile or intimidating fighting
words. Such words include those terms widely recognized to victimize
or stigmatize individuals on the basis of race, ethnicity, religion, sex,
sexual orientation, disability, and other protected characteristics."5
Masking or falsifying ones identity in an email is also used as
an example, and is prohibited. The OAC lists among possible consequences
the "temporary or permanent loss of computing and/or network privileges
and/or Federal or State legal prosecution." Although the OAC did not have a specific procedure to follow for each case
of computer misuse that might arise, it did have an informal agreement worked
out with the Dean of Students. In general, the Dean of Students stance
was that, once students had been admitted to the college, they have access
like any other student to the various privileges on campus. If rules regarding
those privileges are violated, privileges can be revoked. The OAC deals
directly with any such cases, without contacting the Dean until it is an
issue that is out of the scope of the computer use policy. In most cases,
once a problem is identified, the OAC contacts the person, gets their attention
by locking their access to their email account, and holds an internal hearing
for the student with a few faculty and staff. |
|||
|