Massachusetts Bay Transportation Authority v. Anderson et al

Filing 20

EXHIBITS one thru eight re 2 MOTION for Temporary Restraining Order by Massachusetts Bay Transportation Authority. (Attachments: # 1 Exhibit Two, # 2 Exhibit Three, # 3 Exhibit Four, # 4 Exhibit Five, # 5 Exhibit Six, # 6 Exhibit Seven, # 7 Exhibit Eight)(Edge, Eugenia)

Download PDF
EXHIBIT 8 Athena Rules of Use (including MITnet) Page 1 of 10 Athena Rules of Use (including MITnet) MITnet, MIT's campus-wide computer network, connects thousands of computers on and off campus, including the Athena workstations, printers, and servers, many student machines in the dorms, and the campus dialup servers. Network connectivity has many advantages which you will discover as you explore Athena, MITnet, and the Internet beyond. But connectivity also requires that users of the network understand their responsibilities in order to protect the integrity of the system and the privacy of other users. Similarly, the Athena-specific end-user facilities (clusters, workstations, printers, etc.) are provided as an Institute resource, and certain guidelines are necessary to help maintain this resource. This section summarizes: the the rules that apply to all users of MITnet (this includes all Athena users) rules regarding the appropriate use of Athena-specific facilities We expect you to follow these rules, and we hope you will help others follow them as well. If you need assistance in dealing with someone willfully violating the rules, send email to stopit@mit.edu. We appreciate your cooperation. Summary The listing below provides only summaries of the rules. For the full text of each rule, please see the following pages. MITnet Rules of Use Comply with Intended Use of the System 1. Don't violate the intended use of MITnet. Assure Ethical Use of the System 2. Don't let anyone know your password(s). 3. Don't violate the privacy of other users. 4. Don't copy or misuse copyrighted material (including software). 5. Don't use MITnet to harass anyone in any way. Assure Proper Use of System Resources 6. Don't overload the communication servers; in particular, don't abuse your electronic mail (email) or Zephyr privileges. http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 2 of 10 Additional Rules for Athena Facilities Comply with Intended Use of the System A1. Don't violate the intended use of the Athena system. Protect Athena Equipment A2. Don't eat, drink, or bring food or liquids into the Athena clusters. A3. Don't turn the power off on Athena equipment. A4. Don't reconfigure the cluster, either hardware or software. Assure Fair Access to Workstations in Athena Clusters A5. Don't violate the official priorities for the use of workstations; in particular, don't play games or engage in other non-academic activity if the cluster is busy, and don't log on to more than one workstation at a time. A6. Don't leave your workstation unattended for more than 20 minutes. A7. Don't make a lot of noise in the Athena clusters. Assure Fair Access to Athena Printers A8. Don't violate the official priorities for the use of printers; in particular, don't be a printer hog or use the Athena printers as copy machines. MITnet Rules of Use MITnet and other computing resources at MIT are shared among community members. The MITnet Rules of Use are intended to help members of the MIT community use MIT's computing and network facilities responsibly, safely, and efficiently, thereby maximizing the availability of these facilities to community members. Complying with them will help maximize access to these facilities, and assure that all use of them is responsibile, legal, and respectful of privacy. If you have questions or wish further information about any of the MITnet policies outlined below, send e-mail to itpolicy AT mit.edu. All network users are expected to follow these rules. Violations of the rules can subject the offender to Institute disciplinary proceedings and, in some cases, to state or federal prosecution. PLEASE NOTE: Laws that apply in "the real world" also apply in the "virtual" networked computer world (including MITnet). Laws about libel, harassment, privacy, copyright, stealing, threats, etc. are not suspended for computer users, but apply to all members of society whatever medium they happen to be using: face-toface, phone, or computer. Furthermore, law-enforcement officials are more computer-savvy than ever, and violations of the law in "Cyberspace" are vigorously prosecuted. Similarly, Institute policies (as described in MIT's Policies and Procedures, for example) also apply to MITnet users. Other rules may also apply to users of particular facilities connected to MITnet: users of MIT's http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 3 of 10 academic computing resources are subject to the Additional Rules for Athena Facilities; providers of information to MIT's Campus-Wide Information System (via TechInfo, the World Wide Web, etc.) have specific guidelines (see http://web.mit.edu/cwis/www/faq/guidelines.html); other facilities may have their own constraints (check with your local system manager); and external networks to which MITnet provides access may have their own rules to which MITnet users may be subject. Complying with the Intended Use of the System It is important that you understand the purpose of MITnet so that your use of the system is in compliance with that purpose. 1. Don't violate the intended use of MITnet. The purpose of MITnet is to support research, education, and MIT administrative activities, by providing access to computing resources and the opportunity for collaborative work. All use of the MIT network must be consistent with this purpose. For example: try to interfere with or alter the integrity of the system at large, by doing any of the following: permitting another individual to use your account impersonating other individuals in communication (particularly via forged email or Zephyrgrams) attempting to capture or crack passwords or encryption destroying or altering data or programs belonging to other users Don't try to restrict or deny access to the system by legitimate users. Don't use MITnet for private financial gain. For example, users are not permitted to run a private business on MITnet. (Commercial activity is permitted, but only for business done on behalf of MIT or its organizations. Cf. Section 13.2.3 of MIT's Policies and Procedures: "MIT's computing and telecommunications facilities and services are to be used for Institute purposes only and not for the benefit of private individuals or other organizations without authorization.") Don't transmit threatening or harassing materials. (Cf. Rule 5.) Don't Assuring Ethical Use of the System Along with the many opportunities that Athena provides for members of the MIT community to share information comes the responsibility to use the system in accordance with MIT standards of honesty and personal conduct. Those standards, outlined in Section 13.2 of MIT's Policies and Procedures, call for all members of the community to act in a responsible, professional way. Appropriate use of MITnet resources includes maintaining the security of the system, protecting privacy, and conforming to applicable laws, particularly copyright and harassment laws. 2. Don't let anyone know your password(s). While you should feel free to let others know your username (this is the name by which you are known to the whole Internet user community), you should never let anyone know your account passwords. This includes even trusted friends, and computer system administrators (e.g., IS&T staff). Giving someone else your password is like giving them a signed blank check, or your charge card. You should never do this, even to "lend" your account to them temporarily. Anyone who has your password can use your account, and whatever they do that affects the system will be traced back to your username -- if your username or account is used in an abusive or otherwise inappropriate manner, you can be held responsible. http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 4 of 10 In fact, there is never any reason to tell anyone your password: every MIT student, faculty member, or oncampus staff person who wants an account of his or her own can have one. And if your goal is permitting other users to read or write some of your files, there are always ways of doing this without giving away your password. For information about how to manage the security of your account, including advice on how to choose a good password, how to change passwords, and how to share information on Athena without giving away your password, see the document Managing Your Athena Account. 3. Don't violate the privacy of other users. The Electronic Communications Privacy Act (18 USC 2510 et seq., as amended) and other federal laws protect the privacy of users of wire and electronic communications. The facilities of MITnet, and the operating systems used by Athena and other MITnet systems, encourage sharing of information. Security mechanisms for protecting information from unintended access, from within the system or from the outside, are minimal. These mechanisms, by themselves, are not sufficient for a large community in which protection of individual privacy is as important as sharing (see, for example, sections 11.2, 11.3, and 13.2 of MIT's Policies and Procedures). Users must therefore supplement the system's security mechanisms by using the system in a manner that preserves the privacy of themselves and others. As Section 11.1 of MIT's Policies and Procedures notes, "Invasions of privacy can take many forms, often inadvertent or well-intended." All users of MITnet should make sure that their actions don't violate the privacy of other users, if even unintentionally. Some specific areas to watch for include the following: try to access the files or directories of another user without clear authorization from that user. Typically, this authorization is signaled by the other user's setting file-access permissions to allow public or group reading of the files. If you are in doubt, ask the user. Don't try to intercept or otherwise monitor any network communications not explicitly intended for you. These include logins, e-mail, user-to-user dialog, and any other network traffic not explicitly intended for you. Unless you understand how to protect private information on a computer system, don't use the system to store personal information about individuals which they would not normally disseminate freely about themselves (e.g., grades, address information, etc.) Don't make any personal information about individuals publicly available without their permission. This includes both text and number data about the person (biographical information, phone numbers, etc.), as well as representations of the person (graphical images, video segments, sound bites, etc.) For instance, it is not appropriate to include a picture of someone on a World Wide Web page without that person's permission. (Depending on the source of the information or image, there may also be copyright issues involved; cf. Rule 4). Don't create any shared programs that secretly collect information about their users. Software on MITnet is subject to the same guidelines for protecting privacy as any other information-gathering project at the Institute. (This means, for example, that you may not collect information about individual users without their consent.) Don't remotely log into (or otherwise use) any workstation or computer not designated explicitly for public logins over the network -- even if the configuration of the computer permits remote access -unless you have explicit permission from the owner and the current user of that computer to log into that machine. Don't 4. Don't copy or misuse copyrighted material (including software). http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 5 of 10 Many computer programs, and related materials such as documentation, are owned by individual users or third parties, and are protected by copyright and other laws, together with licenses and other contractual agreements. You must abide by these legal and contractual restrictions, because to do otherwise may subject you to civil or criminal prosecution. Copyright-related restrictions may include (but are not necessarily limited to) prohibitions against: programs or data programs or data redistributing or providing facilities for redistributing programs or data using programs or data for non-educational purposes using programs or data for financial gain using programs or data without being among the individuals or groups licensed to do so publicly disclosing information about programs (e.g., source code) without the owner's authorization copying reselling For more information about the legal issues surrounding duplication of software, see the pamphlet "Is it okay to copy my colleague's software?" (To request a copy, send e-mail to sendpubs@mit.edu or call x3-5150.) Some software on Athena is subject to special licensing restrictions; see the document Summary of Available Athena Software. For all other software licensing questions, send email to contracts@mit.edu. The above prohibitions focus on computer software, but copyright laws apply to all material on MITnet. For example, it is inappropriate to copy any material owned by others from any source (e.g., cartoons, photographs, articles, poems, graphics scanned from a magazine, etc.) without permission of the owner. You should assume that all materials are copyrighted unless a disclaimer or waiver is explicitly provided. (This is particularly true on the World Wide Web; to include information from some other source on a Web page, link to it, don't copy it. In some cases, even this action may violate copyright or licensing agreements by enabling illegal redistribution of programs or data. If you're unsure, ask the owner.) 5. Don't use MITnet to harass anyone in any way. "Harassment," according to MIT's Policies and Procedures (Section 9.5), is defined as: any conduct, verbal or physical, on or off campus, which has the intent or effect of unreasonably interfering with an individual or group's educational or work performance at MIT or that creates an intimidating, hostile or offensive educational, work or living environment.... Harassment on the basis of race, color, gender, disability, religion, national origin, sexual orientation or age includes harassment of an individual in terms of a stereotyped group characteristic, or because of that person's identification with a particular group. The Institute's harassment policy extends to the networked world. For example, sending email or other electronic messages which unreasonably interfere with anyone's education or work at MIT may constitute harassment and is in violation of the intended use of the system. Any member of the MIT community who feels harassed is encouraged to seek assistance and resolution of the complaint. To report incidents of on-line harassment, send email to stopit@mit.edu. (If you believe you are in danger, call the Campus Police immediately at x3-1212.) Assuring Proper Use of the System MITnet's resources, as well as the resources MITnet gives you access to (e.g., Athena, postal servers, bulletin boards, etc.), are powerful tools that can be easily misused. Your use of the system should be consistent with the intended uses of these resources. In particular, you should not overload the system or otherwise abuse the http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 6 of 10 network. 6. Don't overload the communication servers; in particular, don't abuse your electronic mail (email) or Zephyr privileges. Electronic mail is a fast, convenient form of communication. It is easy to send electronic mail to multiple recipients, and you can even send a message to many recipients simply by specifying a single list name (i.e., by using a mailing list). But this ability to send messages to many people also makes it easy to misuse the system. The general rule is: use email to communicate with other specific users, not to broadcast announcements to the user community at large. For example, while it is appropriate to use email to have an interactive discussion with a set of people (even 20 or more users) or to use email to send a single copy of an announcement to some "bulletin board" facility with a wide readership (e.g., Network News, or a Discuss meeting), it is not appropriate to use email as a way to broadcast information directly to a very large number of people (e.g., an entire MIT class). This is true whether you include the recipient usernames individually or by using a mailing list: under no circumstance should you use the email system to get a general announcement out to some large subset of the MIT community. These guidelines are not based on etiquette alone: the mail system simply does not have the capacity to process a very large number of email messages at once. When a user sends out an announcement to a huge list of recipients, the mail servers get overloaded, disks fill up, and staff intervention is required. The overall result is a degradation of service for all users. These considerations apply to the Zephyr service as well. Zephyr is a central service involving thousands of transactions daily. Using Zephyr to transmit messages to a very large group of people degrades the system performance and is inappropriate. Finally, the proliferation of electronic chain letters is especially abusive of the mail system and the network. Chain letters waste valuable computing resources, and may be considered harassing. Creating or forwarding chain letters may subject you to Institute disciplinary proceedings. Additional Rules for Athena Facilities These Rules of Use for Athena Facilities are intended to help members of the MIT community protect the Athena equipment to assure all authorized users effective access to it. These rules supplement the MITnet Rules of Use, which all Athena users are also expected to follow. These rules apply to all users of Athena facilities, including students, faculty, authorized guests, and even IS&T/Athena staff. (In certain private Athena clusters, some of these rules may be relaxed, or additional rules may be in effect; check with your cluster's system manager). If you need assistance in dealing with someone willfully violating the Athena rules, feel free to contact the Athena Hardware Hotline (phone: x3-1410, email: hotline@mit.edu), or send email to stopit@mit.edu. (If you believe you are in danger, call the Campus Police immediately at x3-1212.) Complying with the Intended Use of the System While MITnet is a general-purpose Institute resource in support of all kinds of computing on campus, Athena is more specifically focused on academic computing -- the use of computers in fulfilling the Institute's http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 7 of 10 educational goals. This special focus is echoed in a more specific intended use of the system. A1. Don't violate the intended use of the Athena system. Athena is an Institute resource for authorized MIT community members to use to fulfill educational goals. You should not take any action that violates that purpose. In particular: use Athena resources for non-educational purposes in any way that interferes with their use for educational purposes. This is especially true at peak times of the year, when demand for Athena workstations and services exceeds supply and any use of Athena for non-educational purposes can potentially take resources away from education-oriented users. (Cf. Rule A5.) Don't use any software available on Athena for any non-educational purpose if the license for that software does not permit such use. In many cases, software available on Athena is licensed for educational use only. Users who would like to make non-educational use of Athena software (e.g., members of sponsored research projects who might like to use Athena's third-party software) must first check the licensing terms for the specific software they are interested in using (these terms are usually included in the locker for the software). If non-educational use is prohibited by the software license, the users must make their own arrangements to obtain licenses for the software that are compatible with their requirements. (Cf. MITnet Rule 4.) Don't use Athena for private financial gain, as by sale of the use of Athena resources (especially to anyone outside MIT), or by use of the system in support of any profit-making scheme not explicitly intended to serve Institute purposes. (Cf. MITnet Rule 1.) Access to Athena computing facilities is restricted to authorized members of the MIT community. Trespassing is prohibited and violators will be subject to removal and/or prosecution. Authorized Athena users typically login to workstations using their Athena usernames. Individuals who login as "root" from the initial xlogin screen or otherwise use workstations without identifying themselves as authorized Athena users may be asked for proof of identification by Athena staff members responsible for the maintenance of Athena computing facilities. Don't Protecting Athena Equipment Much of Athena's computer equipment is accessible to a large number of people and is consequently vulnerable to overuse and damage. The following guidelines are designed to help protect this equipment. In the event of any damage to the equipment, regardless of cause, please contact the Athena Hardware Hotline (at x3-1410) immediately. A2. Don't eat, drink, or bring food or liquids into the Athena clusters. Food crumbs and spilled drinks are the primary cause of equipment damage in the Athena clusters. This damage is produced not only in obvious ways (a spilled cup of coffee), but also in subtle ways (even the cumulative effect of sticky fingers or crumbs can ruin equipment -- keyboards have been damaged at the rate of one per day from food crumbs alone, and mice are equally vulnerable). A3. Don't turn the power off on Athena equipment. Turning the power off on Athena equipment (e.g., workstations, monitors, or printers) can permanently damage the hardware. However, if the equipment smells or looks like it is burning, do turn it off and contact the Athena Hardware Hotline. A4. Don't reconfigure the cluster, either hardware or software. Moving equipment will often cause damage, or may cause it to be reported as stolen. Permanent damage may http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 8 of 10 result from even unplugging a keyboard. Similarly, altering a workstation's filesystem in any way may render the machine unusable, or threaten its usability in other ways. For example, you should not reconfigure any workstation in an Athena cluster to allow remote connections unless you are actually sitting at that workstation. Even an apparently "harmless" change such as this (i.e., changing the access configuration of a workstation) may create major system security problems, and may actually jeopardize MIT's ability to license software for users in the future. Also, do not remove Athena equipment -- or furniture! -- from any Athena facility. Doing so constitutes theft and will be dealt with accordingly. If you believe the configuration of a cluster needs to be changed, you can contact the Athena Hardware Hotline. Assuring Fair Access to Workstations in Athena Clusters Athena clusters are facilities provided for members of the MIT community to achieve their academic goals. As such, they are subject to principles of use that support those goals -- the chief considerations being fair access to the facilities for the widest possible set of users, and the maintenance of a comfortable working environment. The rules below reflect these considerations as they affect users of the Athena clusters. These rules are easily summarized: please show consideration to other users. A5. Don't violate the official priorities for the use of workstations; in particular, don't play games or engage in other non-academic activity if the cluster is busy, and don't log on to more than one workstation at a time. In conformance with Athena's stated purpose, the priorities for use of the workstations in crowded Athena clusters are as follows (cf. Rule A1): Priority: course-related work (including theses) Priority: personal productivity work (including non-course-related text processing, sending mail, exploring the Athena system) Lowest Priority: recreational computing (including game-playing and general Web-surfing) Highest Middle Note that games are the lowest priority software on the system -- you should not play games if there are only a few workstations free, or if people are waiting for workstations. If a user needs a workstation for higher priority work while you are playing games, that user can ask you to give up your workstation. (Low priority activities may actually be disallowed entirely during certain times of the year to assure that the use of the clusters is consistent with the academic purpose of Athena. At these times, you are expected to refrain completely from low-priority activities as defined above.) Similarly, some clusters have workstations which are reserved for specific course use, or which have special features. If you are using such a workstation for other than its special purpose, and someone who needs its unique feature asks you to surrender it, please do so gracefully. A6. Don't leave your workstation unattended for more than 20 minutes. If you are using a workstation in one of the Athena clusters and intend to keep using it but must leave it briefly unattended, you must limit your absence to 20 minutes or less and signal your situation to other users by taking one of the following actions: http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 9 of 10 a note on the workstation indicating the time you left the machine and your intention to return, or the screen saver from the Panel, or run another screensaver program which correctly displays the elapsed time. leave run (If you choose to use a screen-based timer, note that it is a violation of the rules to tamper with the system such that your display never shows that more than 20 minutes have elapsed.) If you are gone longer than twenty minutes or leave a workstation without a note or a valid countdown screensaver running, another user who needs a workstation is entitled to log you out or reboot the machine to make that machine available. At certain times of the year, this rule may be adjusted downwards (e.g., the allowable "time away" may be reduced, possibly to 0) to assure that the clusters are being used effectively and that users will not be without a workstation while machines sit idle. A7. Don't make a lot of noise in the Athena clusters. Athena clusters are similar to the MIT Libraries in that students who use these facilities have to be able to concentrate to do their work. Please don't play music, shout, or engage in loud conversation in the clusters. Also, if you use a workstation that has sound capabilities, you are expected to use earphones rather than have the workstation audible to other users in the cluster. Assuring Fair Access to Athena Printers Printing is a shared resource; restraint must still be exercised when using Athena printers to ensure fair access for everyone to this important service. This holds especially true when the clusters are busy. Violation of these rules can result in loss of printing privileges. A8. Don't violate the official priorities for the use of printers; in particular, don't be a printer hog or use the Athena printers as copy machines. The following rules apply to all Athena Cluster printers including those located in the Copytech Centers (Thesis and color printers). use printers as copy machines. Print only one copy of a document. Use a copy machine to make multiple copies. The only exception is for printing one's completed thesis to the thesis printer. You are allowed to print two copies maximum of your thesis on archival paper. If additional copies are required, consult your departmental secretary. Don't not overload the printer queue with multiple jobs that will take longer than 20 minutes total to print. Send the jobs in small groups over time and send them when the printer is not busy. Check the default printer queues by typing lpq at the athena% prompt. For jobs at printers other than the default, the printing commands (lpr, lpq and lprm) accept the -Pprintername option. Do Break large or huge jobs that take longer than 10 minutes total to print into smaller sections and send them to the printer individually. are responsible for retrieving any jobs you queue to print. If you no longer want a job or will be unable to retrieve it, please remove it from the queue. Type lprm - at the athena% prompt. You not remove unused paper from the cluster printers. That paper is provided solely for the use of that particular printer. If a cluster runs out of paper, please notify hotline@mit.edu. Do http://web.mit.edu/olh/Rules/ 8/8/2008 Athena Rules of Use (including MITnet) Page 10 of 10 printing is a limited resource; use it sparingly. Color copying services are available in the Copytech centers to make additional copies. Color all, be courteous in your use of the Athena printers. While these rules do not enumerate every possible violation of appropriate use of the printers, they do address the most common questions and concerns. Above Comments and feedback to olh-suggest@mit.edu. Last modified: 15 January 2004 http://web.mit.edu/olh/Rules/ 8/8/2008

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?