Found at: 0x1bi.net:70/textfiles/file?hacking/POLICIES/umich-1

community to local, national and international sources of information
and to provide an atmosphere that encourages access to knowledge and
used by members of its community with respect for the public trust
through which they have been provided and in accordance with policy
and regulations established from time to time by the University and
ts operating units.
an intellectual environment in which students, staff, and faculty may
feel free to create and to collaborate with colleagues both at the
University of Michigan and at other institutions, without fear that
the products of their intellectual efforts will be violated, violated
by misrepresentation, tampering, destruction and/or theft.
Access to the information resource infrastructure both within the
University and beyond the campus, sharing of information, and security
of the intellectual products of the community, all require that each
and every user accept responsibility to protect the rights of the
community. Any member of the University community who, without
authorization, accesses, uses, destroys, alters, dismantles or
facilities, including those owned by third parties, thereby threatens
the atmosphere of increased access and sharing of information,
threatens the security within which members of the community may
create intellectual products and maintain records, and in light of the
University's policy in this area, has engaged in unethical and
unacceptable conduct. Access to the networks and to the information
technology environment at the University of Michigan is a privilege
and must be treated as such by all users of these systems.
To ensure the existence of this information resource environment,
members of the University community will take actions, in concert with
State and Federal agencies and other interested parties, to identify
and to set up technical and procedural mechanisms to make the
nformation technology environment at the University of Michigan and
ts internal and external networks resistant to disruption.
the responsibility of its users who must all guard against abuses
at the University of Michigan and those beyond the University. The
University requires that members of its community act in accordance
contractual obligations, and the highest standard of ethics.
Though not exhaustive, the following material defines the University's
The University characterizes as unethical and unacceptable, and just
cause for taking disciplinary action up to and including
non-reappointment, discharge, dismissal, and/or legal action, any
activity through which an individual:
(a) violates such matters as University or third party copyright or
and other contracts,
(b) interferes with the intended use of the information resources,
(c) seeks to gain or gains unauthorized access to information
(d) without authorization, destroys, alters, dismantles, disfigures,
of computer-based information and/or information resources,
(e) without authorization invades the privacy of individuals or
entities that are creators, authors, users, or subjects of the
nformation resources,
This policy is applicable to any member of the University community,
networked. Individual units within the University may define
"conditions of use" for facilities under their control. These
additional detail, guidelines and/or restrictions. Where such
"conditions of use" exist, enforcement mechanisms defined therein
mechanism defined in the ITD Conditions of Use Policy shall prevail.
Disciplinary action, if any, for faculty and staff shall be consistent
Regents of the University. Where use of external networks is involved,
* Information resources in this document are meant to include any
nformation in electronic or audio-visual format or any hardware or
As example, included in this definition are electronic mail, local
as the content of MIRLYN.