Previous by Date | Next by Date | Date Index
Previous by Thread | Next by Thread
| Thread Index
| LM_NET
Archive
| |
thank you to Ellen Ashcraft for a good bit of this information. Michele #1 14-APR-1994 14:09:35.09 internet access From: IN%"PHE_ACA_BH@NWOCA.OECN.OHIO.GOV" To: IN%"MISSNERM@vaxa.cis.uwosh.edu" CC: Subj: RE: school internet access We are on internet for student use for the first time this year, although the administrative offices have had the option for some time through the Ohio Educational Computing Network, where the system was used almost exclusively for reporting purposes. The breakthrough came with the development of the NWOCA (Northwest Ohio Computer Association) gopher system. The "A" site, which serves the four counties of extreme Northwest Ohio and 28 school districts, does the installation and hook-up of VAX teminals, establishes teacher accounts, and establishes "restricted" accounts for libraries and/or classes that request them. The restricted accounts allow access to the most pertainent gopher options and local files; students do not have access to e-mail unless through a teacher's account or by request of a teacher to establish an account. The key here has been to have an active consortium that listens and provides the services you need and, of course, the hardware options such as dedicated lines so that long-distance tolls don't become a problem. Bob Hall Patrick Henry Local Schools Internet policy Ellen Ashcraft ---------- Forwarded message ---------- Date: Tue, 29 Mar 1994 08:06:15 PST From: Eileen Andersen <eandersen@nikita.bham.wednet.edu> To: Ashcraft@memex.lib.indiana.edu Subject: Internet policy for students Hi, Ellen. I thought I'd write my first response to an LM NET message to let you know what our student Internet Policy is in the Bellingham, WAshington school district. We recently set up a node at our district office, connected to WEDNET. Our computer services manager manages the node. Students have dial-in access from schools and home at this point, though we're hoping for a direct network connection next year, with our new networks in each building. Students under 18 must have a parent permission slip signed before their account can be activated. They may sign up in advance, but the account will not be active until the parent rm is signed. Students are limited to one-hour a day on the Internet, primarily because of only four receiving modems. It was often impossible to dial in after school hours. With the time limit, it seems there is a little better access. I have some pamphlet information if you are interested (3 handouts we give students). I'd be glad to send them, or answer any additional questions. Eileen Andersen, Sehome High School Library 2700 Bill McDonald Parkway, Bellingham, WA 98225 (206) 647-1689 or (206) 676-6481 x46 Date: Fri, 18 Mar 1994 19:23 -0700 (MST) From: "WILLIAM R. HANSON, WILLIAM ABERHART HIGH SCHOOL" <BHANSON@cbe.ab.ca> To: ashcraft@memex.lib.indiana.edu Subject: Ellen, this is our agreement. Also check AskEric for others...bill WILLIAM ABERHART HIGH SCHOOL NETWORK NAVIGATORS STUDENT NETWORK USER GUIDELINES AND NETIQUETTE DECLARATION OF UNDERSTANDING AND ADHERANCE I have read the, "Student Network User Guidelines and Netiquette" document, understand it, and agree to adhere to the principles and procedures detailed within. Should I breach the guidelines suggested, I understand that I may lose all network privileges on the William Aberhart VAX network and/or the University of Calgary systems. _________________________________ STUDENT _________________________________ TEACHER ADVISOR internet access The formulation of this guide was motivated by a need to develop guidelines for all Internet protocols, to ensure that users of the Aberhart VAX network and/or guest accounts at the University of Calgary, realize the Internet capabilities as a resource available, with the provision that they are responsible in how they access or transmit information through the Internet. It is assumed that the reader has some familiarization with the terms and protocols that are referenced in this document. For additions, comments, suggestions and requests for revisions, please send E-mail to BHanson@CBE.AB.CA ACKNOWLEDGEMENT This document is based on the electronic document, "The Net, User Guidelines and Netiquette," by Arlene M. Rinaldi, Florida Atlantic University, September 3, 1992. INTRODUCTION It is essential for each user on the network to recognize his/her responsibility in having access to vast services, sites, systems and people. The user is ultimately responsible for his/her actions in accessing network services. The Internet is not a single network; rather, it is a group of thousands of individual networks which have chosen to allow traffic to pass among them. The traffic sent out to the Internet may actually traverse several different networks before it reaches its destination. Therefore, users involved in this internetworking must be aware of the load placed on other participating networks. Students have a responsibility to other users of the networks to be as knowledgable as possible and to have researched a subject before asking questions. Use of the networks is not to be internet access considered a substitute for doing one's own research but can be a valuable addition to one's research base. As a user of the network, you may be allowed to access other networks (and/or the computer systems attached to those networks). Each network or system has its own set of policies and procedures. Actions which are routinely allowed on one network/system may be controlled, or even forbidden, on other networks. It is the users responsibility to abide by the policies and procedures of these other networks/systems. Remember, the fact that a user *can* perform a particular action does not imply that they *should* take that action. The use of the network is a privilege, not a right, which may revoked at any time for abusive conduct. Such conduct would include: -the placing of unlawful information on a system 3 -the use of abusive or otherwise objectionable language in either public or private messages -the sending of messages that are likely to result in the loss of recipients' work or systems -the sending of "Chain letters," or "broadcast" messages to lists or individuals, and any other types of use which would cause congestion of the networks or otherwise interfere with the work of others. ELECTRONIC MAIL AND FILES USER RESPONSIBILITY The content and maintenance of a user's electronic mailbox is the users responsibility: -Check E-mail daily and remain within your limited disk quota. -Delete unwanted messages immediately since they take up disk storage. -Keep messages remaining in your electronic mailbox to a minimum. -Mail messages can be downloaded or extracted to files then to disks for future reference. -Never assume that your E-mail can be read by no one except yourself; others may be able to read or access your mail. Never send or keep anything that you would not mind seeing in the daily newspaper. The content and maintenance of a user's disk storage area is the users responsibility: -Keep files to a minimum. Files should be downloaded to your personal computer's hard drive or to disks. -Routinely and frequently virus scan your system, especially when receiving or downloading files from other systems to prevent the spread of a virus. -Your files may be accessible by persons with system privileges, so do not maintain anything private in your disk storage area. TELNET PROTOCOL -Many telnetable services have documentation files available online (or via ftp). Download and review instructions locally as opposed to tying up ports trying to figure out the system. -Be courteous to other users wishing to seek information or the institution might revoke Telnet access; remain only on the system long enough to get your information, then exit off of the system. -Screen captured data or information should be downloaded to your personal computer's hard disk or to disks. ANONYMOUS FTP - FILE TRANSFER PROTOCOL -Users should respond to the PASSWORD prompt with their E- mail address, so if that site chooses, it can track the level of FTP usage. If your E-mail address causes an error, enter GUEST for the next PASSWORD prompt. -When possible limit downloads, especially large downloads (1 Meg+), for after normal business hours locally and for the remote ftp host; preferably late in the evening. -Adhere to time restrictions as requested by archive sites. Think in terms of the current time at the site that's being visited, not of local time. -Copy downloaded files to your personal computer hard drive or disks to remain within disk quota. -When possible, inquiries to Archie should be in mail form. -It's the user's responsibility when downloading programs, to check for copyright or licensing agreements. If the program is beneficial to your use, pay any authors registration fee. If there is any doubt, don't copy it; there have been many occasions on which copyrighted software has found its way into ftp archives. Support for any downloaded programs should be requested from the originator of the application. Remove unwanted programs from your systems. ELECTRONIC COMMUNICATIONS (E-mail, LISTSERV groups, Mailing lists, and Usenet) -Keep paragraphs and messages short and to the point. -Focus on one subject per message. -Be professional and careful what you say about others. E- mail is easily forwarded. -Cite all quotes, references and sources. -Limit line length and avoid control characters. -Include your signature at the bottom of E-mail messages. Your signature footer should include your name, position, affiliation and Internet and/or BITNET addresses and should not exceed more than 4 lines. Optional information could include your address and phone number. -Capitalize words only to highlight an important point or to distinguish a title or heading. *Asterisks* surrounding a word also can be used to make a stronger point. -Use discretion when forwarding mail to group addresses or distribution lists. It's preferable to reference the source of a document and provide instructions on how to obtain a copy. -It is considered extremely rude to forward personal email to mailing lists or Usenet without the original author's permission. # -Be careful when using sarcasm and humor. Without face to face communications your joke may be viewed as criticism. -Respect copyright and license agreements. -When quoting another person, edit out whatever isn't directly applicable to your reply. Including the entire article will annoy those reading it. -Abbreviate when possible: Examples: - IMHO = in my humble/honest opinion - FYI = for your information - BTW = by the way - Flame = antagonistic criticism - :-) = happy face for humor LISTSERV AND MAILING LIST DISCUSSION GROUPS Some mailing lists have low rates of traffic, others can flood your mailbox with several hundred mail messages per day. Numerous incoming messages from various listservers or mailing lists by multiple users, requires extensive system processing which can tie up valuable resources. Subscription to Interest Groups or Discussion Lists should be kept to a minimum and should not exceed what your disk quota can handle, or you for that matter. -If you log on to a Listserver, absorb the culture of that List for several postings before you 'contribute' to the conversation. Each List has its own culture and it takes time to guage how you can align with the culture. -Keep your questions and comments relevant to the focus of the discussion group. -Resist the temptation to "flame" others on the list. Remember that these discussions are "public" and meant for constructive exchanges. Treat the others on the list as you would want them to treat you. -When posting a question to the discussion group, request that responses be directed to you personally. Post a summary or answer to your question to the group. -When replying to a message posted to a discussion group, check the address to be certain it's going to the intended location (person or group). -When signing up for a group, save your subscription confirmation letter for reference. -When going away for more than a week, unsubscribe or suspend mail from any mailing lists or LISTSERV services. -If you can respond to someone else's question, do so through email. Twenty people answering the same question on a large list can fill your mailbox (and those of everyone else on the list) quickly. -Use your own personal E-mail account, don't subscribe using a shared office account. -Occassionaly subscribers to the list who are not familiar with proper netiquette will submit requests to SUBSCRIBE or UNSUBSCRIBE directly to the list itself. Be tolerant of this activity, and possibly provide some useful advice as opposed to being critical. -Other people on the list are not interested in your desire to be added or deleted. Any requests regarding administrative tasks such as being added or removed from a list should be made to the appropriate area, not the list itself. Mail for these types of requests should be sent to the following respectively: LISTSERV GROUPS -LISTSERV@host MAILING LISTS -listname-REQUEST@host or listname-OWNER@host For either Mailing Lists or LISTSERV groups, to subscribe or unsubscribe, in the body of the message include: SUBSCRIBE listname yourfirstname yourlastname (To be added to the subscription) or UNSUBSCRIBE listname (To be removed from the subscription) THE TEN COMMANDMENTS FOR COMPUTER ETHICS from the Computer Ethics Institute 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7.Thou shalt not use other people's computer resources without authorization. 8.Thou shalt not appropriate other people's intellectual output. 9.Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect. BIBLIOGRAPHY Kehoe, Brendan P. "A Beginner's Guide to the Internet: Zen and the Art of the Internet", First Edition, January 1992. Shapiro, Norman, et al. "Towards an Ethics and Etiquette for Electronic Mail"., Santa Monica, CA: Rand Corporation (publication R-3283-NSF/RC), 1985. Von Rospach, Chuq. "A Primer on How to Work With the USENET Community" Horton, Mark, Spafford, Gene. "Rules of conduct on Usenet" "A Guide to Electronic Communication & Network Etiquette", revised and submitted by Joan Gargano, edited by Ivars Balkits, Computing services University of California Davis. "Heartland Free-Net Registered User Guidelines", Bradley University, Peoria, Il. "Terms and Conditions of Membership and Affiliation", CREN Information Center, October 25, 1990 "Electronic Mail and Networks: New Tools for Institutional Research and Planning." by Dan Updegrove, John Muffo and Jack Dunn, University of Pennsylvania. "Exploring Internet Training Series, Module 1- Exploring Internet: Using your Computer to Communicate", by Deborah Shaffer, ES-USDA, CIT and Pennsylvania State University, Henry DeVries; Extension Electronic Technology Group, Cornell University; Gregory Parham, ES_USDA, CIT. "Exploring Internet Training Series, Module 2- Mail-based Information Delivery: Alamanac and Listservs". by Deborah Shaffer, ES-USDA, CIT and Pennsylavia State University; Henry DeVries, Extension Electronic Technology Group, Cornell University; Gregory Parham, ES_USDA, CIT. "The Net, User Guidelines and Netiquette," by Arlene M. Rinaldi, Florida Atlantic University, September 3, 1992. Texas/ Armadillo/ More about Armadillo and other gophers/ Acceptable and Unacceptable Uses of Net Resources (K-12) To: MEMO-Net@VAX1.Mankato.MSUS.EDU >The Minnesota Coalition Against Censorship is developing a K-12 Internet >Access Policy. No, we are not developing an "Acceptable Use Policy" with >all the censorship that name implies. I am posting this here for as much >reaction as possible. Thank you for reading and reacting. > >Fran McDonald, President >Minnesota Coalition Against Censorship >fmcdonald@vax1.mankato.msus.edu > >Policy follows: > >_________ > >Second Draft April 22, 1994 DRAFT FOR DISCUSSION AND REACTION > >DRAFT DRAFT DRAFT DRAFT > >April 21, 1994 >From: Fran McDonald > >RE: Internet policy > > >Minnesota K-12 Internet Policy > >The Internet, the electronic information highway, is a network of networks >used by educators, business, the government, the military, and >organizations for: information, access to library catalogs and other >databases, sharing teaching and learning strategies, research, and >communicating with other individuals. In schools and libraries, the >Internet is an information source similar to books, video, and other >audiovisual resources. It also provides access points for identification >of information resources located throughout the United States and the >world, similar to printed, electronic, and other indexes. The Internet has >been described as a "vast digital library." > >Because the Internet is a fluid environment, the information that will be >available to students is constantly changing. It is impossible to predict >with certainty what information students might locate. Therefore, material >available on the Internet might not have been selected to be included in >the school media collection or available for use in the classroom. In this >way, the Internet is different from a library collection selected for a >specific school. The networking environment requires that school officials >define guidelines for student exploration and use of electronic information >resources. Such guidelines must have as their underlying value the >preservation of student rights to examine all information formats. These >guidelines may not be used to place restrictions on student use of the >Internet. School officials should add the Internet as another resource to >their school board adopted Selection Policies and Reevaluation Procedures. > > Just as school officials do not endorse the content of all the materials P>provided in the school library, they do not endorse electronic information >by having made access to that information available to students. The same >conditions that apply to use of the resouces in a school library media >center or other library should apply to student use of the Internet. If >standards or restrictions are to be placed on student access to Internet >resources, it is parents and only parents who may place restrictions on >their children, and only their own children . Parents may not tell the >school to impose restrictions on their children. > >Students use the Internet to locate information, communicate with other >students and individuals, participate in distance learning activities, and >locate material to meet their personal information needs. School library >media specialists and teachers should work together to provide students the >intellectual skills needed to discriminate among information sources and to >identify information appropriate to their chronological and developmental >levels. > >Various schemes have been proposed to prevent student access to information >that some have identified as controversial or of potential harm to >students. Such schemes include: using coded account identifiers for >students, restricting certain databases and sources of information >available to accounts identified as educational, restricting signon >privileges and accounts to teachers, having owners and operators of >information services screen access and communication, or having students >voluntarily impose restrictions on themselves in exchange for the privilege >of having an Internet account. Any of these strategies restrict student >access to information or ability to communicate and should not be used by >school officials. > >Any attempt to remove or restrict access to e-text files, specific >databases, or other sources of Internet information must follow the same >school board adopted procedures used for removal or restriction of other >resources. School officials and school employees must not make individual, >arbitrary, unreviewed decisions about Internet information sources. Nor >may school officials impose restrictions, exercise prior restraint, or >otherwise interfere with student communication with other individuals on >the Internet. >School officials may adopt policies related to student behavior on the >Internet. Such policies may address issues of privacy, ethical use of >information with respect to intellectual property, using the networks for >illegal activities, or knowingly spreading embedded messages or other >computer programs that have the potential of damaging or destroying >programs or data. Students should be held responsible for their own >Internet accounts. >_______ >End April 22, 1994 DRAFT policy >Please send reaction to me. > >Fran McDonald, President >Minnesota Coalition Against Censorship >fmcdonald@vax1.mankato.msus.edu %"MISSNERM@vaxa.cis.uwosh.edu" CC: Subj: RE: school internet access RWe are on internet for student use for the first time this year, although the administrative offices have had the option for some time through the Ohio Educational Computing Network, where the system was used almost exclusively for reporting purposes. The breakthrough came with the development of the NWOCA (Northwest Ohio Computer Association) gopher system. The "A" site, which serves the four counties of extreme Northwest Ohio and 28 school districts, does the installation and hook-up of VAX teminals, establishes teacher accoun tricted accounts allow access to the most pertainent gopher options and local files; students do not have access to e-mail unless through a teacher's account or by request of a teacher to establish an account. The key here has been to have an active consortium that listens and provides the services you need and, of course, the hardware options such as dedicated lines so that long-distance tolls don't become a problem.