HAW Rules of Use for PC Pools and Network


All users are expected to follow these rules. Violations of the rules can subject the offender to Institute disciplinary proceedings and, in some cases, to state or federal prosecution.


PLEASE NOTE: Laws that apply in "the real world" also apply in the "virtual" networked computer world (including HAWnet). Laws about libel, harassment, privacy, copyright, stealing, threats, etc. are not suspended for computer users, but apply to all members of society whatever medium they happen to be using: face-to-face, phone, or computer. So violations of the law will be vigorously prosecuted.


Complying with the Intended Use of the System


It is important that you understand the purpose of HAWnet so that your use of the system is in compliance with that purpose.


Do not violate the intended use of HAWnet.

The purpose of HAWnet is to support research, education, and HAW administrative activities, by providing access to computing resources. All use of the HAW network must be consistent with this purpose. For example:


       Do not try to interfere with or alter the integrity of the system, by doing any of the following:

o      Permitting another individual to use your account.

o      Attempting to capture or crack passwords or encryption.

o      Destroying or altering data or programs belonging to other users.

o      Do not transmit threatening or harassing materials.

       Assuring Ethical Use of the System.

Along with the many opportunities that are provided for members of the HAW community to share information comes the responsibility to use the system in accordance with standards of honesty and personal conduct. Those standards, call for all members of the community to act in a responsible and professional way.

Appropriate use of HAWnet resources includes maintaining the security of the system, protecting privacy, and conforming to all applicable laws.

       Do not let anyone know your password(s).

While you should feel free to let others know your username (this is the name by which you are logging into HAWnet), you should never let anyone know your account passwords. This includes even trusted friends, and computer system administrators.

Giving someone else your password is like giving them a signed blank check. You should never do this, even to "lend" your account to them temporarily. Anyone who has your password can use your account, and whatever they do that affects the system will be traced back to your username; - if your username or account is used in an abusive or otherwise inappropriate manner, you will be held responsible. Keep in mind that depending on the circumstances you might even risk loosing your account once and for all.

In fact, there is never any reason to tell anyone your password.

       Do not copy or misuse copyrighted material including software.

Many computer programs, and related materials such as documentation, are owned by individual users or third parties, and are protected by copyright and other laws, together with licenses and other contractual agreements. Do not violate these legal and contractual restrictions, or you may find yourself being subject to civil or criminal prosecution.

Protecting HAWnet Equipment


Much of HAW's computer equipment is accessible to a large number of people and is consequently vulnerable to overuse and damage. The following guidelines are designed to help protect this equipment. In the event of any damage to the equipment, regardless of cause, please contact the system administrators immediately.


  • Do not eat, drink, or bring food or liquids into the PC Pools.

    Food crumbs and spilled drinks are the primary cause of equipment damage. This damage is produced not only in obvious ways as you might expect from a spilled cup of coffee, but also in subtle ways. Even the cumulative effect of sticky fingers or crumbs can ruin equipment − keyboards and mice are equally vulnerable.

  • Do not reconfigure neither hardware nor software.

    Moving equipment will often cause damage, or may cause it to be reported as stolen. Permanent damage may result from even unplugging a keyboard.

    Also, do not remove HAW equipment -- or furniture -- from any HAW facility! Doing so constitutes theft and will be dealt with accordingly.

    If you believe that the configuration needs to be changed, you can contact the system administrators.

  • Priorities for use of the workstations in crowded times are as follows:

    • Highest Priority: course-related work
    • Middle Priority: personal productivity work including
      non-course-related text processing, sending e-mail,
      exploring the HAW system
    • Lowest Priority: recreational computing including general

      If a user needs a workstation for higher priority work while you are surfing the web, that user can ask you to give up your workstation.
      If you are asked to surrender it, do so gracefully please.

  • Deactivation Due to Improper Use.

    In addition to being subject to deactivation without notice after eligibility has expired, a HAW account may also be immediately frozen or otherwise deactivated if the account appears to be misused in any of the following ways:

    • violation of the HAW Rules of Use
    • violation of applicable laws
    • violation of the specific purpose for which the account was granted
    • use in ways that threatens the systems integrity, security, or availability

An account deactivated for misuse may remain deactivated pending disciplinary or other administrative review, and will in no case be reactivated until HAW administrators are satisfied that the improper use will not recur.


HAW Hamburg − PC Pools and Network

Last Modified 2003-03-11 SPA