College of Computer and Information Science UNIX Account Request Form (version 2.1) In order to obtain a computer account at the College of Computer and Information Science you must do the following steps: 1. Run the account program: 1a. On any UNIX computer in the college, type account at both the login: and Password: prompts. Most of these computers can be found in room 102 West Village H. 1b. From outside CCIS, connect via SSH to login.ccs.neu.edu and log in as "account" with password "account". Alternatively, you can connect to http://login.ccs.neu.edu/ with a Java-capable browser if you don't have an SSH client. 2. You will be asked for your real name, requested account name, password, and other information. Answer all the questions correctly. NOTE: If you do not run the account program, we can not create your account. 2. Complete the following information: Last Name: ___________________ First Name: _____________________ Account Login Name (8 Characters max.) : ___________ Date: _____ NU Id Number: ________________ Phone Number: ___________________ Other (non-CCIS) email address: __________________________________ (optional -- for us to contact you) Type of Account (please check only one): ___Student in a CS or IS Class but not a CCIS Major Course: _______________________ Section: ____________ ___Computer and Information Science Undergraduate Major ___Computer and Information Science Graduate Student ___Computer and Information Science Alumni ___Computer and Information Science Staff ___Computer and Information Science Faculty ___Computer and Information Science Faculty Research Associate Sponsor's Name: _____________________________________ (In order to apply for a research associate account, you must be sponsored by either a CCIS faculty or a CCIS staff member.) Did you run the account program? ________________________________ (NOTE: Your account will not be created if you didn't run the account program) 3. Read the policy sheet on the back and sign it in pen. 4. Turn in this form. Either return this form to the slot outside 312 West Village H, return it to your professor, or fax it (both sides) to the attention of The Systems Group at (617) 373-5121. If validated, your account will be created within two business days of the time you turn in this form and run the account program. We will contact you at the above phone number if there are any problems. If you did not run the account program, your account will not be created. Appropriate Use of the Computer Systems in the College of Computer and Information Science at Northeastern University Access to the computer systems and networks owned or operated by the College of Computer and Information Science imposes certain responsibilities and obligations, and is granted subject to University policies as well as local, state, and federal laws. Appropriate use of these resources is always ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, system security, and indi- viduals' rights to privacy and to freedom from intimidation and harassment. Making appropriate use of the resources means: o using resources only for authorized purposes. o protecting your computer account from unauthorized use. You are respon- sible and will be held accountable for all activities in your account. o accessing only files, data, and network resources that are your own, that are explicitly publicly available, or to which you have been given authorized access. o using only legal versions of copyrighted software. o being considerate in your use of shared resources, including but not limited to disk space, cpu cycles, network bandwidth, and printer paper. In making appropriate use of the resources, you must not: o use another person's account. o attempt to decode passwords or exploit possible security holes. o engage in any activity that might be harmful to the systems or the data stored on them, or other computers that are connected to them, such as propagating viruses, removing systems files, or disrupting services. o use the College's systems for personal material gain. o do anything that violates the above guidelines. The College considers any violation of appropriate use principles or guidelines to be a serious offense and reserves the right to copy and examine any files or information resident on College systems. Violators are subject to having their account disabled and/or disciplinary action as prescribed in the honor codes and the student and employee handbooks. Further, violations of some of the rules is a violation of state or federal law, and may be punished according to those laws. Remember that the College provides these resources solely for coursework and research, and makes no guarantees about their availability. Using them is a privilege, not a right. I, the undersigned, agree to follow the above Appropriate Use guidelines. Signed _____________________________________________________________ Printed ____________________________________________________________ Account Login Name _________________________________________________