LM_NET: Library Media Networking

Previous by DateNext by Date Date Index
Previous by ThreadNext by Thread Thread Index
LM_NET Archive



thank you to Ellen Ashcraft for a good bit of this information.  Michele
    #1          14-APR-1994 14:09:35.09                          internet access
From:   IN%"PHE_ACA_BH@NWOCA.OECN.OHIO.GOV"
To:     IN%"MISSNERM@vaxa.cis.uwosh.edu"
CC:
Subj:   RE: school internet access

We are on internet for student use for the first time this year, although the
administrative offices have had the option for some time through the Ohio
Educational Computing Network, where the system was used almost exclusively for
reporting purposes.  The breakthrough came with the development of the NWOCA
(Northwest Ohio Computer Association) gopher system.  The "A" site, which
serves the four counties of extreme Northwest Ohio and 28 school districts,
does the installation and hook-up of VAX teminals, establishes teacher
accounts, and establishes "restricted" accounts for libraries and/or classes
that request them.  The restricted accounts allow access to the most pertainent
gopher options and local files; students do not have access to e-mail unless
through a teacher's account or by request of a teacher to establish an account.
The key here has been to have an active consortium that listens and provides
the services you need and, of course, the hardware options such as dedicated
lines so that long-distance tolls don't become a problem.

Bob Hall
Patrick Henry Local Schools
Internet policy

Ellen Ashcraft

---------- Forwarded message ----------
Date: Tue, 29 Mar 1994 08:06:15 PST
From: Eileen Andersen <eandersen@nikita.bham.wednet.edu>
To: Ashcraft@memex.lib.indiana.edu
Subject: Internet policy for students

Hi, Ellen.  I thought I'd write my first response to an LM NET message
to let you know what our student Internet Policy is in the Bellingham,
WAshington school district.  We recently set up a node at our district
office, connected to WEDNET.  Our computer services manager manages the
node.  Students have dial-in access from schools and home at this point,
though we're hoping for a direct network connection next year, with our
new networks in each building.  Students under 18 must have a parent
permission slip signed before their account can be activated.  They may
sign up in advance, but the account will not be active until the parent
rm is signed.  Students are limited to one-hour a day on the Internet,
primarily because of only four receiving modems.  It was often impossible
to dial in after school hours.  With the time limit, it seems there is
a little better access.  I have some pamphlet information if you are
interested (3 handouts we give students).  I'd be glad to send them,
or answer any additional questions.

Eileen Andersen, Sehome High School Library
2700 Bill McDonald Parkway, Bellingham, WA 98225
(206) 647-1689 or (206) 676-6481 x46
Date: Fri, 18 Mar 1994 19:23 -0700 (MST)
From: "WILLIAM R. HANSON, WILLIAM ABERHART HIGH SCHOOL" <BHANSON@cbe.ab.ca>
To: ashcraft@memex.lib.indiana.edu
Subject: Ellen, this is our agreement. Also check AskEric for others...bill


WILLIAM ABERHART HIGH SCHOOL NETWORK NAVIGATORS

STUDENT NETWORK USER GUIDELINES AND NETIQUETTE

DECLARATION OF UNDERSTANDING AND ADHERANCE

I have read the, "Student Network User Guidelines and Netiquette"
document, understand it, and agree to adhere to the principles
and procedures detailed within.

Should I breach the guidelines suggested, I understand that I may
lose all network privileges on the William Aberhart VAX network
and/or the University of Calgary systems.




_________________________________
STUDENT



_________________________________
TEACHER ADVISOR

   internet access
The formulation of this guide was motivated by a need to develop
guidelines for all Internet protocols, to ensure that users of
the Aberhart VAX network and/or guest accounts at the University
of Calgary, realize the Internet capabilities as a resource
available, with the provision that they are responsible in how
they access or transmit information through the Internet.

It is assumed that the reader has some familiarization with the
terms and protocols that are referenced in this document. For
additions, comments, suggestions and requests for revisions,
please send E-mail to BHanson@CBE.AB.CA


ACKNOWLEDGEMENT

This document is based on the electronic document, "The Net, User
Guidelines and Netiquette," by Arlene M. Rinaldi, Florida
Atlantic University, September 3, 1992.
INTRODUCTION

It is essential for each user on the network to recognize his/her
responsibility in having access to vast services, sites, systems
and people.  The user is ultimately responsible for his/her
actions in accessing network services.

The Internet is not a single network; rather, it is a group of
thousands of individual networks which have chosen to allow
traffic to pass among them.  The traffic sent out to the Internet
may actually traverse several different networks before it
reaches its destination.  Therefore, users involved in this
internetworking must be aware of the load placed on other
participating networks.

Students have a  responsibility to other users of the networks to
be as knowledgable as possible and to have researched a subject
before asking questions.  Use of the networks is not to be
                    internet access
considered a substitute for doing one's own  research but can be
a valuable addition to one's research base.

As a user of the network, you may be allowed to access other
networks (and/or the computer systems attached to those
networks).  Each network or system has its own set of policies
and procedures.  Actions which are routinely allowed on one
network/system may be controlled, or even forbidden, on other
networks.  It is the users responsibility to abide by the
policies and procedures of these other networks/systems.
Remember, the fact that a user *can* perform a particular action
does not imply that they *should* take that action.

The use of the network is a privilege, not a right, which may
revoked at any time for abusive conduct.  Such conduct would
include:

     -the placing of unlawful information on a system
3
     -the use of abusive or otherwise objectionable language in
     either public or private messages

     -the sending of messages that are likely to result in the
     loss of recipients' work or systems

     -the sending of "Chain letters," or "broadcast" messages to
     lists or individuals, and any other types of use which would
     cause congestion of the networks or otherwise interfere with
     the work of others.


                       ELECTRONIC MAIL AND FILES
                          USER RESPONSIBILITY

The content and maintenance of a user's electronic mailbox is the
users responsibility:

     -Check E-mail daily and remain within your limited disk
   quota.

     -Delete unwanted messages immediately since they take up
     disk  storage.

     -Keep messages remaining in your electronic mailbox to a
     minimum.

     -Mail messages can be downloaded or extracted to files then
     to disks for future reference.

     -Never assume that your E-mail can be read by no one except
     yourself; others may be able to read or access your mail.
     Never send or keep anything that you would not mind seeing
     in the daily newspaper.


The content and maintenance of a user's disk storage area is the
users responsibility:
     -Keep files to a minimum.  Files should be downloaded to
     your personal computer's hard drive or to disks.

     -Routinely and frequently virus scan your system, especially
     when receiving or downloading files from other systems to
     prevent the spread of a virus.

     -Your files may be accessible by persons with system
     privileges, so do not maintain anything private in your disk
     storage area.


                            TELNET PROTOCOL

     -Many telnetable services have documentation files available
     online (or via ftp).  Download and review instructions
     locally as opposed to tying up ports trying to figure out
     the system.
     -Be courteous to other users wishing to seek information or
     the institution might revoke Telnet access; remain only on
     the system long enough to get your information, then exit
     off of the system.

     -Screen captured data or information should be downloaded to
     your personal computer's hard disk or to disks.


             ANONYMOUS FTP - FILE TRANSFER PROTOCOL


     -Users should respond to the PASSWORD prompt with their E-
     mail  address, so if that site chooses, it can track the
     level of FTP usage.   If your E-mail address causes an
     error, enter GUEST for the next PASSWORD prompt.

     -When possible limit downloads, especially large downloads
     (1 Meg+), for after normal business hours locally and for
     the remote ftp host; preferably late in the evening.

     -Adhere to time restrictions as requested by archive sites.
     Think in terms of the current time at the site that's being
     visited, not of local time.

     -Copy downloaded files to your personal computer hard drive
     or disks to remain within disk quota.

     -When possible, inquiries to Archie should be in mail form.

     -It's the user's responsibility when downloading programs,
     to check for copyright or licensing agreements.  If the
     program is beneficial to your use, pay any authors
     registration fee.  If there is any doubt, don't copy it;
     there have been many occasions on which copyrighted software
     has found its way into ftp archives. Support for any
     downloaded programs should be requested from the originator
     of the application. Remove unwanted programs from your
     systems.


                        ELECTRONIC COMMUNICATIONS
          (E-mail, LISTSERV groups, Mailing lists, and Usenet)


     -Keep paragraphs and messages short and to the point.

     -Focus on one subject per message.

     -Be professional and careful what you say about others.  E-
     mail is easily forwarded.

     -Cite all quotes, references and sources.

     -Limit line length and avoid control characters.
     -Include your signature at the bottom of E-mail messages.
     Your signature footer should include your name, position,
     affiliation and Internet and/or BITNET addresses and should
     not exceed more than 4 lines.  Optional information could
     include your address and phone number.

     -Capitalize words only to highlight an important point or to
          distinguish a title or heading.   *Asterisks*
          surrounding a word also can be used to make a stronger
          point.

     -Use discretion when forwarding mail to group addresses or
     distribution lists.  It's preferable to reference the source
     of a document and provide instructions on how to obtain a
     copy.

     -It is considered extremely rude to forward personal email
     to mailing lists or Usenet without the original author's
     permission.
    #
     -Be careful when using sarcasm and humor. Without face to
     face communications your joke may be viewed as criticism.

     -Respect copyright and license agreements.

     -When quoting another person, edit out whatever isn't
     directly  applicable to your reply.  Including the entire
     article will annoy those reading it.

     -Abbreviate when possible:

      Examples:
      - IMHO      =     in my humble/honest opinion
      - FYI       =     for your information
      - BTW       =     by the way
      - Flame     =     antagonistic criticism
      - :-)       =     happy face for humor

            LISTSERV AND MAILING LIST DISCUSSION GROUPS

Some mailing lists have low rates of traffic, others can flood
your mailbox with several hundred mail messages per day.
Numerous incoming messages from various listservers or mailing
lists by multiple users, requires extensive system processing
which can tie up valuable resources. Subscription to Interest
Groups or Discussion Lists should be kept to a minimum and should
not exceed what your disk quota can handle, or you for that
matter.

     -If you log on to a Listserver, absorb the culture of that
     List for several postings before you 'contribute' to the
     conversation.  Each List has its own culture and it takes
     time to guage how you can align with the culture.

     -Keep your questions and comments relevant to the focus of
     the discussion group.

     -Resist the temptation to "flame" others on the list.
     Remember that these discussions are "public" and meant for
     constructive exchanges.  Treat the others on the list as you
     would want them to treat you.

     -When posting a question to the discussion group, request
     that responses be directed to you personally.  Post a
     summary or answer to your question to the group.

     -When replying to a message posted to a discussion group,
     check the address to be certain it's going to the intended
     location (person or group).

     -When signing up for a group, save your subscription
     confirmation letter for reference.

     -When going away for more than a week, unsubscribe or
     suspend mail from any mailing lists or LISTSERV services.

     -If you can respond to someone else's question, do so
     through email. Twenty people answering the same question on
     a large list can fill your mailbox (and those of everyone
     else on the list) quickly.

     -Use your own personal E-mail account, don't subscribe using
     a shared office account.

     -Occassionaly subscribers to the list who are not familiar
     with proper netiquette will submit requests to SUBSCRIBE or
     UNSUBSCRIBE directly to the list itself.   Be tolerant of
     this activity, and possibly provide some useful advice as
     opposed to being critical.

     -Other people on the list are not interested in your desire
     to be added or deleted.  Any requests regarding
     administrative tasks such as being added or removed from a
     list should be made to the appropriate area, not the list
     itself.  Mail for these types of requests should be sent to
     the following respectively:

     LISTSERV GROUPS          -LISTSERV@host


     MAILING LISTS            -listname-REQUEST@host
                                          or
                               listname-OWNER@host

For either Mailing Lists or LISTSERV groups, to subscribe or
unsubscribe, in the body of the message include:

     SUBSCRIBE listname yourfirstname yourlastname
     (To be added to the subscription)
     or
     UNSUBSCRIBE   listname
     (To be removed from the subscription)
            THE TEN COMMANDMENTS FOR COMPUTER ETHICS
               from the Computer Ethics Institute



     1. Thou shalt not use a computer to harm other people.

     2. Thou shalt not interfere with other people's computer
     work.

     3. Thou shalt not snoop around in other people's files.

     4. Thou shalt not use a computer to steal.

     5. Thou shalt not use a computer to bear false witness.

     6. Thou shalt not use or copy software for which you have
     not paid.
     7.Thou shalt not use other people's computer resources
     without authorization.

     8.Thou shalt not appropriate other people's intellectual
     output.

     9.Thou shalt think about the social consequences of the
     program you write.

     10. Thou shalt use a computer in ways that show
     consideration and respect.



                              BIBLIOGRAPHY

      Kehoe, Brendan P. "A Beginner's Guide to the Internet: Zen
and the Art of the Internet", First Edition, January 1992.

      Shapiro, Norman, et al. "Towards an Ethics and Etiquette
for Electronic  Mail"., Santa Monica, CA: Rand Corporation
(publication R-3283-NSF/RC), 1985.

     Von Rospach, Chuq.  "A Primer on How to Work With the USENET
Community"

     Horton, Mark, Spafford, Gene. "Rules of conduct on Usenet"
"A Guide to Electronic Communication & Network Etiquette",
revised and submitted by Joan Gargano, edited by Ivars Balkits,
Computing services University of California Davis.

      "Heartland Free-Net Registered User Guidelines", Bradley
University, Peoria, Il.

      "Terms and Conditions of Membership and Affiliation", CREN
Information Center, October 25, 1990
      "Electronic Mail and Networks: New Tools for Institutional
Research and Planning."  by Dan Updegrove, John Muffo and Jack
Dunn, University of Pennsylvania.

      "Exploring Internet Training Series, Module 1- Exploring
Internet: Using your Computer to Communicate", by Deborah
Shaffer, ES-USDA, CIT and Pennsylvania State University, Henry
DeVries; Extension Electronic Technology Group, Cornell
University; Gregory Parham, ES_USDA, CIT.

      "Exploring Internet Training Series, Module 2- Mail-based
Information Delivery: Alamanac and Listservs". by Deborah
Shaffer, ES-USDA, CIT and Pennsylavia State University; Henry
DeVries, Extension Electronic Technology Group, Cornell
University; Gregory Parham, ES_USDA, CIT.

     "The Net, User Guidelines and Netiquette," by Arlene M.
Rinaldi, Florida Atlantic University, September 3, 1992.

Texas/ Armadillo/ More about Armadillo and other gophers/ Acceptable and
Unacceptable Uses of Net Resources (K-12)
To: MEMO-Net@VAX1.Mankato.MSUS.EDU
>The Minnesota Coalition Against Censorship is developing a K-12 Internet
>Access Policy.  No, we are not developing an "Acceptable Use Policy" with
>all the censorship that name implies.  I am posting this here for as much
>reaction as possible.  Thank you for reading and reacting.
>
>Fran McDonald, President
>Minnesota Coalition Against Censorship
>fmcdonald@vax1.mankato.msus.edu
>
>Policy follows:
>
>_________
>
>Second Draft April 22, 1994  DRAFT FOR DISCUSSION AND REACTION
>
>DRAFT   DRAFT   DRAFT   DRAFT
>
>April 21, 1994

>From:   Fran McDonald
>
>RE:     Internet policy
>
>
>Minnesota K-12 Internet Policy
>
>The Internet, the electronic information highway, is a network of networks
>used by educators, business, the government, the military, and
>organizations for:  information, access to library catalogs and other
>databases, sharing teaching and learning strategies, research, and
>communicating with other individuals.  In schools and libraries, the
>Internet is an information source similar to books, video, and other
>audiovisual resources.  It also provides access points for identification
>of information resources located throughout the United States and the
>world, similar to printed, electronic, and other indexes.  The Internet has
>been described as a "vast digital library."
>
>Because the Internet is a fluid environment, the information that will be
>available to students is constantly changing.  It is impossible to predict
>with certainty what information students might locate.  Therefore, material
>available on the Internet might not have been selected to be included in
>the school media collection or available for use in the classroom.  In this
>way, the Internet is different from a library collection selected for a
>specific school.  The networking environment requires that school officials
>define guidelines for student exploration and use of electronic information
>resources.  Such guidelines must have as their underlying value the
>preservation of student rights to examine all information formats.  These
>guidelines may not be used to place restrictions on student use of the
>Internet.  School officials should add the Internet as another resource to
>their school board adopted Selection Policies and Reevaluation Procedures.
>
> Just as school officials do not endorse the content of all the materials

P>provided in the school library, they do not endorse electronic information
>by having made access to that information available to students.  The same
>conditions that apply to use of the resouces in a school library media
>center or other library should apply to student use of the Internet.   If
>standards or restrictions are to be placed on student access to Internet
>resources, it is parents and only parents who may place restrictions on
>their children, and only their own children .  Parents may not tell the
>school to impose restrictions on their children.
>
>Students use the Internet to locate information, communicate with other
>students and individuals, participate in distance learning activities, and
>locate material to meet their personal information needs.   School library
>media specialists and teachers should work together to provide students the
>intellectual skills needed to discriminate among information sources and to
>identify information appropriate to their chronological and developmental
>levels.
>
>Various schemes have been proposed to prevent student access to information
>that some have identified as controversial or of potential harm to
>students.  Such schemes include: using coded account identifiers for
>students, restricting certain databases and sources of information
>available to accounts identified as educational, restricting signon
>privileges and accounts to teachers, having owners and operators of
>information services screen access and communication, or having students
>voluntarily impose restrictions on themselves in exchange for the privilege
>of having an Internet account.  Any of these strategies restrict student
>access to information or ability to communicate and should not be used by
>school officials.
>
>Any attempt to remove or restrict access to e-text files, specific
>databases, or other sources of Internet information must follow the same
>school board adopted procedures used for removal or restriction of other
>resources.  School officials and school employees must not make individual,
>arbitrary, unreviewed decisions about Internet information sources.  Nor
>may school officials impose restrictions, exercise prior restraint, or
>otherwise interfere with student communication with other individuals on
>the Internet.
>School officials may adopt policies related to student behavior on the
>Internet.  Such policies may address issues of privacy, ethical use of
>information with respect to intellectual property, using the networks for
>illegal activities, or knowingly spreading embedded messages or other
>computer programs that have the potential of damaging or destroying
>programs or data.  Students should be held responsible for their own
>Internet accounts.
>_______
>End April 22, 1994 DRAFT policy
>Please send reaction to me.
>
>Fran McDonald, President
>Minnesota Coalition Against Censorship
>fmcdonald@vax1.mankato.msus.edu
%"MISSNERM@vaxa.cis.uwosh.edu"
CC:
Subj:   RE: school internet access

RWe are on internet for student use for the first time this year, although the
administrative offices have had the option for some time through the Ohio
Educational Computing Network, where the system was used almost exclusively for
reporting purposes.  The breakthrough came with the development of the NWOCA
(Northwest Ohio Computer Association) gopher system.  The "A" site, which
serves the four counties of extreme Northwest Ohio and 28 school districts,
does the installation and hook-up of VAX teminals, establishes teacher
accoun
tricted accounts allow access to the most pertainent
gopher options and local files; students do not have access to e-mail unless
through a teacher's account or by request of a teacher to establish an account.
The key here has been to have an active consortium that listens and provides
the services you need and, of course, the hardware options such as dedicated
lines so that long-distance tolls don't become a problem.


LM_NET Archive Home