ACRL News Issue (B) of College & Research Libraries J u n e 1 9 9 3 /3 3 1 Computer ethics statement Prepared by the library staff at Southern Methodist University D efining acceptable uses o f com puter networks A t the request of a number of library em­ ployees at Southern Methodist Univer­ sity (SMU), a draft statement on com puter eth­ ics to guide and direct library personnel in ap­ p ro p ria te an d ac ce p ta b le use o f p erso n a l computers connected to the campus networks and mainframe (with interconnectivity to the Internet and other local, regional, national, and international networks) was developed. The major focus was to encourage library personnel to learn and b e active participants in online networking and access to electronic in­ formation resources, for position-related respon­ sibilities, for professional networking, and even for personal interest. A second focus w as to en su re that professional responsibility was em ployed in such interactive telecom m uni­ cations through the Internet (including elec­ tronic mail, activity in special interest group forums, and other similar netw ork com m uni­ cation). The draft w as circulated to all library per­ sonnel for suggestions and revisions. The re­ sults w ere positive and constructive and the final copy was approved by the Executive Com­ mittee of Central University Libraries (key ad­ ministrators) and the Council of Library Direc­ tors [Central University Libraries, Bridw ell (theology) Library, and U nderw ood Law Li­ brary], The statement of com puter ethics has led to effective, acceptable, and appropriate interactive online communications on the part of all library personnel. It was at their request that this document was submitted to C&RL News for publication as a possible model for other libraries, and for further suggestions in devel­ opm ent o f the “Computer Ethics Statement.” Etiquette As a common courtesy, always identify oneself beyond the e-mail address header, with a name and location at the end of the message. Recognize that the nature of the lists is pro­ fessional and academic, so keep discussion on appropriate topics and avoid flaming, or over­ reacting. Recognize that the lists and messages reach a broad area, often nationally and internation­ ally, so maintain accuracy and relevance in your com puter use and communication. You are not representing SMU officially, but your actions and words reflect on the university. Avoid capitalization of w ords or lines, as it is hard on the eyes and gives the appearance of “shouting” in print. Ethics Always use a com puter in ways that show con­ sideration and respect for your fellow humans. This means: • Focus on using electronic communica­ tion to make w ork easier and o f a higher qual­ ity, rather than to harm people. • Pay for copying or using proprietary soft­ ware. Neglecting to do so is stealing as data, programming, and intellectual output are com­ modities similar to merchandise, and the au­ thor or ow ner deserves compensation. • Obtain permission an d /o r give proper compensation for the use of other people’s com­ puter resources. • Respect other people’s privacy and re­ frain from accessing their com puter files with­ out permission. • Think about the social consequences of the program you are writing or the system you are designing. (The above guidelines have been adapted from the Ten Com m andm ents o f Computer Eth­ ics, a voluntary code of conduct for users of A ll SMU library staffparticipated in writing this d o c um ent b ut special thanks is owed to Kristin Jacobsen, reference librarian, DeGolyer Library, who d id the f i n a l editing 3 3 2 /C&RL News com puter technology by the Computer Ethics Institute in Washington.) SMU Libraries and the university will regard misuse o f com puting as serious offenses. First­ time abusers will be warned. Any subsequent abuse may m ean loss of e-mail access and fur­ ther disciplinary action, if necessary. SMU Libraries encourages department/divi- sion heads to assign responsibility w ithin each departm ent of a library to monitor special in­ terest group forums, electronic journals, and other similar listserv information and to forward information to others as deem ed appropriate to position duties an d responsibilities. SMU library staff are encouraged to moni- tor/resp o n d to personal interest forums prior to o r following w ork hours, during breaks, or lunch hours, or otherwise outside the official w ork day. SMU library staff are encouraged not to re­ veal passw ords over the telephone or in per­ son to others w ithout explicit know ledge and approval of how the other person may use these passwords. This is to discourage misuse of pass­ w ords to gain access to confidential informa­ tion or to change or tam per with data files. The Bradfield Computing Center staff should only be asked to print w ork-related informa­ tion, not information from the “personal” lists. Such personal-interest information should be printed from printers attached to terminals for screen d u m p printing an d during n onw ork hours. References There are many user guidelines an d electronic mail etiquette (“netiquette”) docum ents avail­ able. Citations to a few o f these are: Feinberg, Andrew. “Netiquette.” Lotus 6, no. 9 (1990): 66-69. FTP.SURA.NET Filename is: NETIQUETTE. TXT. Goode, Joanne, and Maggie Johnson. “Put­ ting Out the Flames: The Etiquette and Law of E-Mail.” ONLINE 61 (November 1991): 61—65. Public Law 99-508. Approved O ctober 21, 1986. [5, sec 27031 Shapiro, Norman Z., and Robert H. Ander­ son. Toward a n Ethics a n d Etiquette f o r Elec­ tronic Mail. Santa Monica, Calif.: Rand Corpora­ tion, 1985. Available as Rand Document R-3283- NSF/RC and ERIC Document ED 169 003. T urner, Ju d ith . “E-Mail T ech n o lo g y Has Boomed, but Manners of Its Uses Fall Short of Perfection.” Chronicle o f H igher E ducation 34, no. 31 (April 13, 1988): A l, A16. ■ ftp://FTP.SURA.NET