Olin Business School at Washington University in St. Louis | Groups


Official University Policies

All Activities using Olin Resources Must Conform to all Washington University Computing Policies (including but not limited to the Washington University Computer Use Policy), the Washington University Policy on Sexual Harassment, and all other appropriate policies, laws, and regulations.

Guidelines apply to all users.

These policies apply to faculty, staff, and students equally, unless otherwise noted.

Users are responsible for all activities initiated from their accounts

Never share your password with anyone. Change your password regularly. Choose a password that is difficult to guess and includes a mix of letters and numbers.

Users are responsible to stay informed

IS makes every effort to keep the user community informed of system and policy changes through a variety of means including email and this web site. It is the users' responsibility to read on-line system messages and electronic mail messages as such information may seriously impact their computing plans.

Users are not entitled to unlimited resources

A user must not tie up more than a single station or modem; operate excessive numbers of sessions; initiate multiple intensive jobs on shared computers; etc.. Large, CPU-intensive jobs should be restricted to late evening and early morning. IS reserves the right to terminate any unattended computing activity on a workstation or any computing job tying up excessive quantities of shared resources. IS may impose a nominal charge for the use of resources beyond defined limits.

Students: Student accounts are limited to 50 MB of on-line disk storage. If necessary, requests to increase quota limits can be sent to the Help Desk for review by the Director of IS. Modifications to quotas will be made only for legitimate academic purposes. Students will be asked to remove non-academic files before any additional storage will be provided.

Staff & Faculty: Although there are no specific quotas in place for faculty and staff accounts, users are expected to use their best judgment in making efficient use of available storage. Users may be asked to remove certain files if necessary to ensure resource availability.

Users are not entitled to execute arbitrary programs

Program development on IS computers is restricted to software that is needed for business education. The execution of software not provided by the IS is permitted only when the execution of the resulting code is not detrimental or disruptive to system uptime or normal system activities. Users may not provide access to software which can be used to violate IS rules. Permanent installation of software (including games) on IS machines without authorization is prohibited.

Students: Users may not install or attempt to install any software to systems in the computer labs, lounges, or other public places. Software may not be installed on the user's on-line disk storage space, unless the program was developed as part of an Olin class. IS will remove any programs found in a user's on-line disk storage space.

Staff & Faculty: Users may install software on their personal workstations as long as all licensing and legal requirements are met and the presence of the software does not interfere with normal system operations. IS may ask for verification that software may be legally installed if found on a machine and may remove it if verification cannot be provided.

Users may not access other users' data without authorization

Standard permissions on accounts restrict access to on-line disk storage to the owner of the data. By controlling the access permissions on stored data, account holders can make some data available for access to other users. Additionally, IS can set up groups to allow users to share information in a more convenient fashion.

Tampering with hardware or software is prohibited

Users shall not tamper with, open, or remove hardware without prior authorization from the Director of IS or the Manager of Networking & and Operations. In addition, users shall not tamper with system software including unauthorized access of system accounts and modification of system software. Finally, users shall not use Olin equipment or software to tamper with or break into other computer systems on the network.

Software piracy is prohibited

Users shall not copy software for use on any non-Olin machine without written permission from the Director of IS. This includes a user's personal computers, other non-Olin computers located at Washington University, or computers located off-campus. Users shall not download/install/use pirated software using Olin computers or personal computers connected to the Olin network. Violators will have their accounts revoked and may be subject to School, civil, and/or criminal penalties. See EDUCOM's Using Software: A Guide To The Ethical and Legal Use of Software.

Account Auditing & Monitoring

System auditing tools may be used to determine resource usage (including file sizes and types), trace data-integrity anomalies, and identify system abuse. Under normal situations, all accounts are subject to the same level of auditing. Monitoring of any subset of the user community at an elevated level shall be authorized by the Director of the IS.

User Privacy

Users should be aware that user files, email messages, and computer activities are not completely private. In addition to user files and email messages that are stored in a user's home directory, user files, user email messages, and system activity logs are backed up and stored on tape for a period of up to one year. Therefore, deleting user files and email may not delete all copies. Olin reserves its right, as owner of the network and the computers in question, to examine, log, capture, archive, and otherwise preserve or inspect any message transmitted over the network and any data files stored on University-owned computers. In addition, depending on the source or destination, copies of your email may sit on uncontrolled machines and your internet activities may be logged on non-university machines. If a user is suspected of violations of University policies or guidelines regarding computer and email use, that user's privacy is superseded by the University's requirement to maintain the network's integrity and the rights of all network users. In the event of criminal or legal investigations, Olin may also be required to provide copies of email messages to the appropriate authorities.

The Director of IS has the right to limit any activity

The Director of IS has the right to limit any activity that he or she deems detrimental to the efficient operation of Olin systems. This includes revoking user access to Olin resources. Users may appeal any decision to the Dean of the School of Business.


Reporting Complaints

Complaints by any user receiving electronic transmissions, or complaints concerning any other violation of these policies, may be submitted to the Manager for Networking & Operations.

Minor Infractions

Minor infractions of these policies, when accidental are generally resolved informally. Administration may contact the party or parties involved through electronic mail informing them of the infraction, or may schedule in person discussion and education sessions to resolve the infraction. Every attempt will be made to resolve the infraction at this level and to prevent further infractions.

Repeated Infractions and Serious Misconduct

Repeated minor infractions or serious misconduct may result in the temporary loss of computer access privileges or the modification of those privileges to prevent the party or parties from further violations pending appropriate action. Offenders will be referred to their sponsoring advisor, department, employer, or other appropriate University office for further action. If the individual is a student, the matter may be referred to the Office of Student Affairs for disciplinary action. Temporary or permanent loss of computer access privileges may result, as determined by the appropriate disciplinary overseers. (More serious violations include, but are not limited to unauthorized use of computer resources, attempts to steal passwords or data, unauthorized use or copying of licensed software, repeated harassment, or threatening behavior.)

Any offense which violates local, state, or federal laws may result in the immediate loss of all University computing privileges and the offence will be referred to appropriate University offices and/or law enforcement authorities. If necessary, such instances may result in the suspension of computing service until the matter is resolved. Users are advised that anyone who tampers with computer equipment, computer software, or computer data may be subject to civil and/or criminal penalties.

Users may appeal any decision to the Dean of the School of Business.