Computing Facilities Rules of Use
The cooperation of users is essential to the continued security
and smooth operation of the department Computing Facilities. The
follow are designed to help keep these facilities operating safely for
all users. Those who violate these rules may have their computer
access removed at the discretion of the IT Manager,
be referred to the appropriate University entity for
investigation/discipline, or have their case investigated by law
- A computer account issued to you is for your own use only. You
are the only person allowed to use the account. This means
your spouse can't use it, your siblings can't use it, your mother
can't use it, your friends can't use it. No one but you
can use it.
- Do not reveal your password to anyone, for any reason. If you suspect that
someone knows your password, then change it immediately. Contact
EECS IT if you need help.
- Do not attempt to guess or otherwise obtain someone else's password or to
access accounts and machines to which you're not authorized.
- Do not attempt to exploit any security vulnerabilites on any computers
or devices. Not even to test them. Do not attempt to elevate your
account privileges. Any of these can result in your expulsion from the
University and/or criminal prosecution.
- Choose a password that is difficult to guess. Here are some poor
choices for a password: any part of your name,
your student ID number, the name of anyone close to you, your
- Do not copy, delete, or modify any file you do not own without the
owner's permission. Even if permissions on the file are lax.
- Do not use anyone else's
account. Exception: you may logoff an account that has been left
logged on (if you do this, send that user an email from your account
informing him or her of what was done).
- Make sure you log out of your account before you leave public locations, such
as the labs.
- Do not do anything which will intentionally inhibit or interfere with
- Do not use the facilities to attempt to gain illegal or unauthorized
access to other computers. Do not scan computers and devices for vulnerabilites.
- Do not run multiple copies of licensed software (such as Mentor), since
this unfairly deprives others of their opportunity to "check out" a
license and use the software.
- Do not move, relocate, reboot, or turn off any computer equipment. If
you need assistance, contact a qualified member of the staff or
faculty. Do not damage the equipment in any way.
- DO report problems by sending mail to the
EECS IT Staff.
Rules of Use
The lab rules listed below apply in addition
to the general EECS IT policies stated above.
- Do not eat food or drink from an unsealed container at the computer desks. Eating and drinking is
allowed in other locations.
- The lab doors must remain closed and locked, except when someone is
entering or leaving. This is for your own protection and for the
protection of the equipment in the room. Do not prop open the doors.
- Do not abuse or damage the equipment or furniture in any way.
- Clean up after yourself. Please respect the labs and fellow students by keeping the
room, desks, and floors pristine and free from garbage such as paper scraps, discarded
newspaper, empty cups, etc.
- Do not move, relocate, reboot, or turn off any computer equipment.
If you need assistance, contact the
- Do not lock any of the workstation displays (using xlock or the like).
If you need to leave the room for more than a couple of minutes, log out.
- The printers may be used only for printing EECS classwork-related jobs. They may not be used
for another department's classes. You may print small personal documents intermittently as well.
2145 Sheridan Road . Evanston / IL . 60208
Phone: 847-491-8140 . FAX: 847-491-4455
Copyright © 2013
§ All rights reserved § Fri May 17 10:58:37 CDT 2013