THE NET
USER GUIDELINES AND NETIQUETTE
By: Arlene H. Rinaldi
Computer User Services
Florida Atlantic University
September 3, 1992
PREFACE
The formulation of this guide was motivated by a need to develop guidelines
for all Internet protocols, to ensure that users at Florida Atlantic University
realize the Internet capabilities as a resource available, with the provision
that they are responsible in how they access or transmit information through
the Internet (THE NET).
It is assumed that the reader has some familiarization with the terms
and protocols that are referenced in this document.
Permission to duplicate or distribute this document is granted with
the provision that the document remains intact.
For additions, comments, suggestions and requests for revisions, please
send E-mail to RINALDI@AAA.FAU.EDU.
ACKNOWLEDGEMENTS
Much of this guide was developed from comments and suggestions from NETTRAIN@UBVM
(formally NET-TRAIN) LISTSERV subscribers and from several sources available
on The Net:
A special acknowledgment to Wes Morgan, University of Kentucky Engineering
Computing Center, for his advice and recommendations.
Pete Hoyle,William & Mary; Timothy A. Torres, San Jose State University;
Paul Brians, Washington State University ; Paul F. Lambert, Bentley College;
Philip M. Howard, Saint Mary's University; Gordon Swan, Florida Atlantic
University; Pauline Kartrude, Florida Atlantic University; Beth Taney,
Penn State; Debbie Shaffer, Penn State and USDA-CIT; Henry DeVries, Cornell;
Jim Milles, SLU Law Library; Martin Raish, State University of New York
at Binghamton; Steve Cisler, Apple Corporation; Tom Zillner, Wisconsin
Interlibrary Services; Tom Goodrich, Stanford University; Jim Gerland,
State University of NY at Buffalo; Ros Leibensperger, Cornell; Paul White,
Northern Michigan University; Marilyn S. Webb, Penn State, Judith Hopkins,
State University of NY at Buffalo, Ros McCarthy.
INTRODUCTION
It is essential for each user on the network to recognize his/her responsibility
in having access to vast services, sites, systems and people. The user
is ultimately responsible for his/her actions in accessing network services.
The "Internet"or "The Net" is not a single network; rather, it is a
group of thousands of individual networks which have chosen to allow traffic
to pass among them. The traffic sent out to the Internet may actually traverse
several different networks before it reaches its destination. Therefore,
users involved in this internetworking must be aware of the load placed
on other participating networks.
As a user of the network, you may be allowed to access other networks
(and/or the computer systems attached to those networks). Each network
or system has its own set of policies and procedures. Actions which are
routinely allowed on one network/system may be controlled, or even forbidden,
on other networks. It is the users responsibility to abide by the policies
and procedures of these other networks/systems. Remember, the fact that
a user *can* perform a particular action does not imply that they
*should* take that action.
The use of the network is a privilege, not a right, which may revoked
at any time for abusive conduct. Such conduct would include: the
placing of unlawful information on a system the use of abusive or otherwise
objectionable language in either public or private messages the sending
of messages that are likely to result in the loss of recipients' work or
systems the sending of "Chain letters",or "broadcast" messages to lists
or individuals, and any other types of use which would cause congestion
of the networks or otherwise interfere with the work of others.
Permanent revocations can result from disciplinary actions taken by
a panel judiciary board calles upon to investigate network abuses.
ELECTRONIC MAIL AND FILES USER RESPONSIBILITY
The content and maintenance of a user's electronic mailbox is the users
responsibility:
-
Check E-mail daily and remain within your limited disk quota.
-
Delete unwanted messages immediately since they take up disk storage.
-
Keep messages remaining in your electronic mailbox to a minimum.
-
Mail messages can be downloaded or extracted to files then to disks for
future reference.
-
Never assume that your E-mail can be read by no one except yourself; others
may be able to read or access your mail. Never send or keep anything that
you would not mind seeing in the evening news.
The content and maintenance of a user's disk storage area is the users
responsibility:
-
Keep files to a minimum. Files should be downloaded to your personal computer's
hard drive or to disks.
-
Routinely and frequently virus scan your system, especially when receiving
or downloading files from other systems to prevent the spread of a virus.
-
Your files may be accessible by persons with system privileges, so do not
maintain anything private in your disk storage area.
TELNET PROTOCOL
-
Many telnetable services have documentation files available online (or
via FTP). Download and review instructions locally as opposed to tying
up ports trying to figure out the system.
-
Be courteous to other users wishing to seek information or the institution
might revoke Telnet access; remain only on the system long enough to get
your information, then exit off of the system.
-
Screen captured data or information should be downloaded to your personal
computer's hard disk or to disks.
ANONYMOUS FTP - FILE TRANSFER PROTOCOL
-
Users should respond to the PASSWORD prompt with their E-mail address,
so if that site chooses, it can track the level of FTP usage. If your E-mail
address causes an error, enter GUEST for the next PASSWORD prompt.
-
When possible limit downloads, especially large downloads (1 Meg+), for
after normal business hours locally and for the remote FTP host; preferably
late in the evening.
-
Adhere to time restrictions as requested by archive sites. Think in terms
of the current time at the site that's being visited, not of local time.
-
Copy downloaded files to your personal computer hard drive or disks to
remain within disk quota.
-
When possible, inquiries to Archie should be in mail form.
-
It's the user's responsibility when downloading programs, to check for
copyright or licensing agreements. If the program is beneficial to your
use, pay any authors registration fee. there have been many occasions on which copyrighted software
has found its way into FTP archives. Support for any downloaded programs
should be requested from the originator of the application. Remove unwanted
programs from your systems.
ELECTRONIC COMMUNICATIONS
(E-mail, LISTSERV groups, Mailing lists, and Usenet)
-
Keep paragraphs and messages short and to the point.
-
Focus on one subject per message.
-
Be professional and careful what you say about others. E-mail is easily
forwarded.
-
Cite all quotes, references and sources.
-
Limit line length and avoid control characters.
-
Follow chain of command procedures for corresponding with superiors. For
example, don't send a complaint via E-mail dircetly to the "top" just because
you can.
-
Don't use the academic network for commercial or proprietary work.
-
Include your signature at the bottom of E-mail messages. Your signature
footer should include your name, position, affiliation and Internet and/or
BITNET addresses and should not exceed more than 4 lines. Optional information
could include your address and phone number.
-
Capitalize words only to highlight an important point or to distinguish
a title or heading. *Asterisks* surrounding a word also can be used to
make a stronger point.
-
Use discretion when forwarding mail to group addresses or distribution
lists. It's preferable to reference the source of a document and provide
instructions on how to obtain a copy.
-
It is considered extremely rude to forward personal email to mailing lists
or Usenet without the original author's permission.
-
Be careful when using sarcasm and humor. Without face to face communications
your joke may be viewed as criticism.
-
Respect copyright and license agreements.
-
When quoting another person, edit out whatever isn't directly applicable
to your reply. Including the entire article will annoy those reading it.
-
Abbreviate when possible:
-
Examples:
-
IMHO = in my humble/honest opinion
-
FYI = for your information
-
BTW = by the way
-
Flame = antagonistic criticism
-
:-) = happy face for humor
LISTSERV AND MAILING LIST DISCUSSION GROUPS
Some mailing lists have low rates of traffic, others can flood your mailbox
with several hundred mail messages per day. Numerous incoming messages
from various listservers or mailing lists by multiple users, requires extensive
system processing which can tie up valuable resources. Subscription to
Interest Groups or Discussion Lists should be kept to a minimum and should
not exceed what your disk quota can handle, or you for that matter.
-
Keep your questions and comments relevant to the focus of the discussion
group.
-
Resist the temptation to "flame" others on the list. Remember that these
discussions are "public" and meant for constructive exchanges. Treat the
others on the list as you would want them to treat you.
-
When posting a question to the discussion group, request that responses
be directed to you personally. Post a summary or answer to your question
to the group.
-
When replying to a message posted to a discussion group, check the address
to be certain itÕs going to the intended location (person or group).
-
When signing up for a group, save your subscription confirmation letter
for reference.
-
When going away for more than a week, unsubscribe or suspend mail from
any mailing lists or LISTSERV services.
-
If you can respond to someone else's question, do so through email. Twenty
people answering the same question on a large list can fill your mailbox
(and those of everyone else on the list) quickly.
-
Use your own personal E-mail account, don't subscribe using a shared office
account.
-
Occasionally subscribers to the list who are not familiar with proper netiquette
will submit requests to SUBSCRIBE or UNSUBSCRIBE directly to the list itself.
Be tolerant of this activity, and possibly provide some useful advice as
opposed to being critical.
-
Other people on the list are not interested in your desire to be added
or deleted. Any requests regarding administrative tasks such as being added
or removed from a list should be made to the appropriate area, not the
list itself. Mail for these types of requests should be sent to the following
respectively:
| LISTSERV GROUPS |
- |
LISTSERV@host |
| MAILING LISTS |
- |
listname-REQUEST@host
or
listname-OWNER@host |
For either Mailing Lists or LISTSERV groups, to subscribe or unsubscribe,
in the body of the message include:
-
SUBSCRIBE listname yourfirstname
yourlastname
-
(To be added to the subscription)
-
or
-
UNSUBSCRIBE listname
-
(To be removed from the subscription)
THE TEN COMMANDMENTS FOR COMPUTER ETHICS
from the Computer Ethics Institute
-
Thou shalt not use a computer to harm other people.
-
Thou shalt not interfere with other people's computer work.
-
Thou shalt not snoop around in other people's files.
-
Thou shalt not use a computer to steal.
-
Thou shalt not use a computer to bear false witness.
-
Thou shalt not use or copy software for which you have not paid.
-
Thou shalt not use other people's computer resources without authorization.
-
Thou shalt not appropriate other people's intellectual output.
-
Thou shalt think about the social consequences of the program you write.
-
Thou shalt use a computer in ways that show consideration and respect.
BIBLIOGRAPHY
Kehoe, Brendan P. "A BeginnerÕs Guide to the Internet: Zen and the
Art of the Internet", First Edition, January 1992
Shapiro, Norman, et al. "Towards an Ethics and Etiquette for Electronic
Mail"., Santa Monica, CA: Rand Corporation (publication R-3283-NSF/RC),
1985.
Von Rospach, Chuq. "A Primer on How to Work With the USENET Community"
Horton, Mark, Spafford, Gene. "Rules of conduct on Usenet" "A Guide
to Electronic Communication & Network Etiquette", revised and submitted
by Joan Gargano, edited by Ivars Balkits, Computing services University
of California Davis.
"Heartland Free-Net Registered User Guidelines", Bradley University,
Peoria, Il.
"Terms and Conditions of Membership and Affiliation", CREN Information
Center, October 25, 1990
"Electronic Mail and Networks: New Tools for Institutional Research
and Planning." by Dan Updegrove, John Muffo and Jack Dunn, University of
Pennsylvania.
"Exploring Internet Training Series, Module 1- Exploring Internet: Using
your Computer to Communicate", by Deborah Shaffer, ES-USDA, CIT and Pennsylvania
State University, Henry DeVries; Extension Electronic Technology Group,
Cornell University; Gregory Parham, ES_USDA, CIT.
"Exploring Internet Training Series, Module 2- Mail-based Information
Delivery: Almanac and Listservs". by Deborah Shaffer, ES-USDA, CIT and
Pennsylvania State University; Henry DeVries, Extension Electronic Technology
Group, Cornell University; Gregory Parham, ES_USDA, CIT.