Summary of Ethical Computing Policy

This document is intended to remind you of the key points covered in the document Ethical Use of Computing Resources which you read in order to get an account. If you have any questions about the information in this document, you can reread the ethics document by typing man ethics on an ICS host, by visting Ethical Use of Computing Resources, you can send mail to the address helpdesk@ics.uci.edu, or you can visit CS 346 and speak with one of the support team member.


Ethical Behavior
The 2 most important points in the ethics document are that:

Unethical behavior includes, but is not limited to the following:
  • Introducing viruses, worms, trojan horses, password cracking, or login/e-mail spoofing programs to any University computer.
  • Gaining unauthorized access to equipment or accounts.
  • Wasting resources.
  • Destroyinn computer based information belonging to others.
  • Spying on others.
  • Making commercial or political use of computing resources.
  • Misuse of licensed software.
  • Sending mass mailings of messages to random people.
  • Sending chain letters through e-mail.