THE NET

USER GUIDELINES AND NETIQUETTE


By: Arlene H. Rinaldi
Computer User Services
Florida Atlantic University
September 3, 1992

PREFACE

The formulation of this guide was motivated by a need to develop guidelines for all Internet protocols, to ensure that users at Florida Atlantic University realize the Internet capabilities as a resource available, with the provision that they are responsible in how they access or transmit information through the Internet (THE NET).

It is assumed that the reader has some familiarization with the terms and protocols that are referenced in this document.
Permission to duplicate or distribute this document is granted with the provision that the document remains intact.

For additions, comments, suggestions and requests for revisions, please send E-mail to RINALDI@AAA.FAU.EDU.


ACKNOWLEDGEMENTS

Much of this guide was developed from comments and suggestions from NETTRAIN@UBVM (formally NET-TRAIN) LISTSERV subscribers and from several sources available on The Net:

A special acknowledgment to Wes Morgan, University of Kentucky Engineering Computing Center, for his advice and recommendations.

Pete Hoyle,William & Mary; Timothy A. Torres, San Jose State University; Paul Brians, Washington State University ; Paul F. Lambert, Bentley College; Philip M. Howard, Saint Mary's University; Gordon Swan, Florida Atlantic University; Pauline Kartrude, Florida Atlantic University; Beth Taney, Penn State; Debbie Shaffer, Penn State and USDA-CIT; Henry DeVries, Cornell; Jim Milles, SLU Law Library; Martin Raish, State University of New York at Binghamton; Steve Cisler, Apple Corporation; Tom Zillner, Wisconsin Interlibrary Services; Tom Goodrich, Stanford University; Jim Gerland, State University of NY at Buffalo; Ros Leibensperger, Cornell; Paul White, Northern Michigan University; Marilyn S. Webb, Penn State, Judith Hopkins, State University of NY at Buffalo, Ros McCarthy.


INTRODUCTION

It is essential for each user on the network to recognize his/her responsibility in having access to vast services, sites, systems and people. The user is ultimately responsible for his/her actions in accessing network services.

The "Internet"or "The Net" is not a single network; rather, it is a group of thousands of individual networks which have chosen to allow traffic to pass among them. The traffic sent out to the Internet may actually traverse several different networks before it reaches its destination. Therefore, users involved in this internetworking must be aware of the load placed on other participating networks.

As a user of the network, you may be allowed to access other networks (and/or the computer systems attached to those networks). Each network or system has its own set of policies and procedures. Actions which are routinely allowed on one network/system may be controlled, or even forbidden, on other networks. It is the users responsibility to abide by the policies and procedures of these other networks/systems. Remember, the fact that a user *can* perform a particular action does not imply that they *should* take that action.

The use of the network is a privilege, not a right, which may revoked at any time for abusive conduct. Such conduct would include:  the placing of unlawful information on a system the use of abusive or otherwise objectionable language in either public or private messages the sending of messages that are likely to result in the loss of recipients' work or systems the sending of "Chain letters",or "broadcast" messages to lists or individuals, and any other types of use which would cause congestion of the networks or otherwise interfere with the work of others.

Permanent revocations can result from disciplinary actions taken by a panel judiciary board calles upon to investigate network abuses.


ELECTRONIC MAIL AND FILES USER RESPONSIBILITY

The content and maintenance of a user's electronic mailbox is the users responsibility: The content and maintenance of a user's disk storage area is the users responsibility:

TELNET PROTOCOL


ANONYMOUS FTP - FILE TRANSFER PROTOCOL


ELECTRONIC COMMUNICATIONS

(E-mail, LISTSERV groups, Mailing lists, and Usenet)

LISTSERV AND MAILING LIST DISCUSSION GROUPS

Some mailing lists have low rates of traffic, others can flood your mailbox with several hundred mail messages per day. Numerous incoming messages from various listservers or mailing lists by multiple users, requires extensive system processing which can tie up valuable resources. Subscription to Interest Groups or Discussion Lists should be kept to a minimum and should not exceed what your disk quota can handle, or you for that matter. For either Mailing Lists or LISTSERV groups, to subscribe or unsubscribe, in the body of the message include:
        SUBSCRIBE listname yourfirstname yourlastname
        (To be added to the subscription)
or
        UNSUBSCRIBE listname
        (To be removed from the subscription)

THE TEN COMMANDMENTS FOR COMPUTER ETHICS 
from the Computer Ethics Institute

  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not use or copy software for which you have not paid.
  7. Thou shalt not use other people's computer resources without authorization.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you write.
  10. Thou shalt use a computer in ways that show consideration and respect.

BIBLIOGRAPHY

Kehoe, Brendan P. "A BeginnerÕs Guide to the Internet: Zen and the Art of the Internet", First Edition, January 1992

Shapiro, Norman, et al. "Towards an Ethics and Etiquette for Electronic Mail"., Santa Monica, CA: Rand Corporation (publication R-3283-NSF/RC), 1985.

Von Rospach, Chuq. "A Primer on How to Work With the USENET Community"

Horton, Mark, Spafford, Gene. "Rules of conduct on Usenet" "A Guide to Electronic Communication & Network Etiquette", revised and submitted by Joan Gargano, edited by Ivars Balkits, Computing services University of California Davis.

"Heartland Free-Net Registered User Guidelines", Bradley University, Peoria, Il.

"Terms and Conditions of Membership and Affiliation", CREN Information Center, October 25, 1990

"Electronic Mail and Networks: New Tools for Institutional Research and Planning." by Dan Updegrove, John Muffo and Jack Dunn, University of Pennsylvania.

"Exploring Internet Training Series, Module 1- Exploring Internet: Using your Computer to Communicate", by Deborah Shaffer, ES-USDA, CIT and Pennsylvania State University, Henry DeVries; Extension Electronic Technology Group, Cornell University; Gregory Parham, ES_USDA, CIT.

"Exploring Internet Training Series, Module 2- Mail-based Information Delivery: Almanac and Listservs". by Deborah Shaffer, ES-USDA, CIT and Pennsylvania State University; Henry DeVries, Extension Electronic Technology Group, Cornell University; Gregory Parham, ES_USDA, CIT.