Policies for the Use of Gatorlink
Table of Contents
- GatorLink Services
- Your rights and responsibilities
- GatorLink Management rights and responsibilities
- Proper use of computing services
GatorLink offers a suite of free baseline services to students, faculty and staff at the University of Florida. Additional, fee-based GatorLink services are also available. These services are intended to be used for university-related purposes. Use of GatorLink services carries with it certain rights and responsibilities. By using any GatorLink service, you agree to abide by the Policy on Acceptable Use of University Computing Resources that can be found in its entirety at /policies/acceptable-use/. This handout highlights some specifics of the policy in the context of using GatorLink services. The GatorLink specifics together with the entire policy document are referred to as acceptable use policies in the rest of this document.
Access to GatorLink services is generally available to all students, faculty and staff at the University, but there may be specific restrictions or requirements for a particular service. You can apply for a GatorLink ID online at www.gatorlink.ufl.edu, or in room E214 or E520 CSE. If you are not sure which service you need, call 392-HELP or talk to the consultant at one of the above sites.
All GatorLink services are administered by the GatorLink Management Team, composed of representatives from NERDC (Northeast Regional Data Center) and CIRCA (Center for Instructional and Research Computing Activities). Users should contact the UF Computing Help Desk (392-HELP, email@example.com) or their GatorLink Customer Service support for account and service questions.
Your rights and responsibilities
Your GatorLink account is for your use only. You must not let anyone else use your account. You are responsible for all activities that originate from your computer account.
You are responsible for the security of your password. You should choose passwords that cannot be easily guessed. Passwords should not be written down, stored in a file, or shared with others.
You are responsible for understanding, following, and keeping up to date with Gatorlink service policies.
You have a right to use GatorLink services without being harassed by other users. Report all incidents to firstname.lastname@example.org.
You have a right to expect that your files and electronic messages are reasonably private, however you must be aware that computer systems in an education environment are not always secure and your files and electronic mail may be seen by others.
You must comply with all local, state, and federal laws, and university policies. You must comply with all rules and regulations posted in public computer areas. You must also follow all rules established for remote networks you access.
You must use your correct name to identify your account, either when you apply for an account or first use an account given to you by an instructor. All other personal information must be supplied when requested and must be correct and current.
You must use your correct name and computer account in all electronic mail and messages.
You are responsible for protecting your files from reading or writing.
You must report any violation of University policies, or suspected violations of policies, to email@example.com or to the UF Computing Help Desk (392-HELP, firstname.lastname@example.org) immediately.
GatorLink Management rights and responsibilities
Within the limits of the capability of the computer system, GatorLink Management will attempt to maintain the privacy of your files and electronic mail. However, GatorLink Management has the right to examine any file, backup archive, electronic mail, or printer listing as part of normal system administration or when there is a reasonable reason to believe a user is violating these acceptable use policies.
GatorLink Management will make every effort to maintain backup copies of your files, and restore them when they are lost or damaged. However, GatorLink Management cannot guarantee that there is a backup copy of any file, or that a file can be restored immediately.
Within the limits of the capability of the computer system, GatorLink Management will maintain the privacy of your personal information, except for your name. Your name is not private and may be seen by other computer users.
GatorLink Management has the right to monitor all activity on a computer system including individual sessions.
GatorLink Management has the right to terminate any computer session or print job that is consuming excessive resources, including idle sessions.
GatorLink Management has the right to revoke any account that has been used in violation of these acceptable use policies.
GatorLink Management has the right to delete an inactive account.
GatorLink Management has the right to refuse access to any person who has violated these acceptable use policies.
GatorLink Management has the right to require you to change your password regularly, refuse to let you use some passwords, or require you to use a random password.
GatorLink Management has the right to limit your disk space and other available computer resources.
Proper use of computing services
You must use these services in an ethical and lawful manner. Legitimate use of a computer, computer system or network does not extend to whatever is technically possible. You must not engage in any activity that violates state or federal laws or university policy.
You must not speak on behalf of the university or use official university trademarks or logos without permission.
You must not deliberately degrade the performance of a computer or network, or consume large amounts of system resources, including disk space, computer time, paper, or dialup ports.
You must respect any disk quotas applied to your account and use as little disk space as possible. You must not use temporary areas or other areas to store large amounts of data for long periods.
You must not play computer games, including multi-user network games.
You must not interfere with the use of CIRCA public workstations, terminals, or computing equipment. You must not lock, disable, or otherwise prevent other users from using equipment.
You must not develop, store, distribute, or use, programs or methods that:
- harass or interfere with other users of the computer
- “crash” or otherwise disable a computer or network
- attempt to bypass computer security facilities
- attempt to discover passwords
- attempt to consume all available system resources, including, but not limited to, cpu cycles, memory, or disk space
- are self-replicating “worm” or “virus” programs that attach to other programs
- attempt to evade software licensing restrictions
You must respect the privacy and property of all files on the computer system. You must not assume that the ability to read a file implies permission to read the file. You must not alter or erase a file belonging to another user without explicit permission to do so. The ability to alter a file does not imply permission to do so.
Files in some system directories are intended for general use and may be viewed and used if the protection on that file permits. However, files in system directories are nearly always copyrighted or licensed and must not be copied.
GatorLink computers are connected to world-wide computer networks. You must at all times comply with the conventions and rules for use of any computer network. GatorLink Management policy requires that you must:
- not use electronic mail or messaging programs to harass or interfere with other computer users, send or post obscene or defamatory material, send excessive mail and chain letters.
- not use any CIRCA or UF lab to make unauthorized connections or break into, or affect the performance of any other computer system on the network, whether it is on the UF campus or anywhere else in the world
- not deliberately obscure your identity when sending electronic mail or messages
- not conduct any commercial activity
The minimum action for violation of these policies may be an oral or written warning from a GatorLink Management staff member. Additional actions can include reporting the activity to the user’s instructor or department, or to the Office of Student Affairs, or the appropriate law-enforcement agency.
Any infraction could result in the loss of access to computer services and facilities.
Last revision: March 10, 1999