diff options
Diffstat (limited to 'doc/rfc/rfc1746.txt')
-rw-r--r-- | doc/rfc/rfc1746.txt | 1011 |
1 files changed, 1011 insertions, 0 deletions
diff --git a/doc/rfc/rfc1746.txt b/doc/rfc/rfc1746.txt new file mode 100644 index 0000000..917b2ee --- /dev/null +++ b/doc/rfc/rfc1746.txt @@ -0,0 +1,1011 @@ + + + + + + +Network Working Group B. Manning +Request for Comments: 1746 ISI +Category: Informational D. Perkins + Houston ISD + December 1994 + + + Ways to Define User Expectations + +Status of this Memo + + This memo provides information for the Internet community. This memo + does not specify an Internet standard of any kind. Distribution of + this memo is unlimited. + +Abstract + + This paper covers basic fundamentals that must be understood when one + defines, interprets, or implements methods to control user + expectations on or over the Internet. + +1. Background + + User agreements are a form of acceptable use policy (AUP) are an + implicit part of internetworking since they place parameters on user + expectation. They define the desired and expected behaviour of those + who participate. Everyone has one, whether published or not. This + applies to networks that provide transit paths for other networks as + well as end sites and the individual users that use systems. A + better understanding of an AUP, and how to formulate one seems to be + increasingly important as the global net encompases new environments + as varied as K12 schools and real-time systems. AUP's are used to + determine pricing, customer base, type and quality of service + metrics, and a host of other provider services. + +2. Components of an Agreement + + In defining your particular agreement there are three areas that must + be addressed. They are where you get service from, who your peers + are, and whom you provide service to. A good understanding of these + concepts will make or break the policies you formulate. + +2.1 Where you get service from + + Each entity gets its service from one or more other providers, + either a level three service, such as IP transit, or a level two + service, such as circuits. The provider of such services usually has + an policy in the form of an agreement or contract specifying terms + + + +Manning & Perkins [Page 1] + +RFC 1746 Ways to Define User Expectations December 1994 + + + and conditions of use. This forms the basis for the type of service + offerings that you as an entity can provide. If you get service from + several providers, all of them need to be considered in the + formation of policy. + +2.2 Who your peers are + + Are your policies consistent with those offered by your peers? In + many cases, the formation of policy will define who your peers are. + It is important to clearly identify which areas you intend to reach + and the community you wish to be a contributing, productive part of. + Once this is clear, formulate polices along those lines. + +2.3 Who you provide service to + + It is required that you inform those who use your services just what + your policies are. Without this information, it will be almost + impossible for them to distinguish what to expect from your service + offering. Without a clear policy it is possible that litigation may + ensue. It is important to reflect community standards in the creation + of policy. + +3. Some Issues to consider + + IP provided services can be complex. They comprise both information + and communication. In the formulation of policy it is critical that + the policy provide for security and access to information and + communication while ensuring that the resource use does not + overburden the system's capabilities. These conflicting demands must + be analyzed and a synthesis arrived at. This hints a fourth + component of an AUP, that it has a method to extract compliance. + This is so site specific that further analysis will not be attempted + here. + + Some items that should be considered in the formation of policy are: + + - privacy - morals & ethics + - freedom of expression - legal constraints + - safety - harassment + - plagiarism - resource utilization + - indemnification - targeted areas of interest + - expected behaviours - remedies and recourse + + This should not be considered as an exhaustive list but as pointers + for those types of things to be considered when policy is formed. + + + + + + +Manning & Perkins [Page 2] + +RFC 1746 Ways to Define User Expectations December 1994 + + +4. Security Considerations + + Security and Liability issues are not discussed in this memo. + +5. Summary + + User Agreements are here to stay. As the Interconnected mesh of + networks grows, the choices presented to end-users mandate that + provider/user expectations are clearly presented. Use of these + guidelines will help create a clearer, better defined environment for + everyone. + +Authors' Addresses + + Bill Manning + USC/Information Sciences Institute + 4676 Admiralty Way + Marina del Rey, CA 90292 + + Phone: 822-1511 + EMail: bmanning@isi.edu + + + Don Perkins + Instructional Media Services + Houston Independent School District + 3830 Richmond + Houston, TX 77027 + + EMail: dperkins@tenet.edu + + + + + + + + + + + + + + + + + + + + + +Manning & Perkins [Page 3] + +RFC 1746 Ways to Define User Expectations December 1994 + + +Example + + For further reference on some acceptable use policies, see the + following materials archived in Armadillo--The Texas Studies Gopher: + + Name=Acceptable and Unacceptable Use of Net Resources (K12) + Type=1 + Host=chico.rice.edu + Port=1170 + Path=1/More/Acceptable + + or: + + http://chico.rice.edu/armadillo + + If these resources are not available to you, you may want to review + the attached policy and justification that is in use by an NSF + sponsored project on K12 networking. It provides a view on the + thinking process and actual Agreement that was worked out for this + project. + +The Internetworked School: A Policy for the Future* + +Barry J. Fishman and Roy D. Pea School of Education and Social Policy +Northwestern University + +Note: + + The CoVis Network Use Policy itself appears as an appendix to this + article. + +Introduction + + The next five years will radically change the ways that schools + relate to the world around them as global computer networks--long the + exclusive domain of higher education and private industry--link up to + primary and secondary schools. The Internet, a network made up of + many smaller contributing networks, represents a powerful educational + resource unlike anything that precedes it. Its potential for + education grows with the establishment of each new connection. + + For the first time, schoolchildren have the means for simple, direct + contact with millions of adults in a forum that masks their physical + youth and presents them as virtual equals. However, just as the new + kid in school has to learn new social codes and rituals to fit in, + schools must learn some of the practices and etiquette of the + Internet. Of course, the established denizens of the Internet will + soon have some adjusting to do as well, with thousands (or millions) + + + +Manning & Perkins [Page 4] + +RFC 1746 Ways to Define User Expectations December 1994 + + + of new kids knocking electronically at their doors. Since the + Internet was not designed with children in mind, many potentially + difficult issues must be discussed by both the education and the + Internet communities. + + This article presents a framework for thinking about some of the + issues that are essential to making the initial encounter between + schools and the Internet successful. It also presents an excerpt of a + policy that embodies our approach to resolving those issues. + +Expanding Access, Expanding Horizons + + For roughly the past decade, schools increasingly have participated + in specialized computer networks such as the NGS/TERC Kidsnetwork, + the Intercultural Learning Network, and FidoNet, as well as for- + profit services such as CompuServe, America Online, and Prodigy. The + majority of these projects were conducted on networks, where + teachers' or students' messages could not be read by anyone beyond a + predetermined audience composed of other students and teachers. These + projects made it possible for students and teachers to communicate + with their peers in faraway places and pioneered some pedagogical + uses of networks for computer-mediated communication and + collaborative project work that will carry over to the Internet. + + Internetworking, however, goes beyond proprietary systems by joining + a vast number of distinct networks into one large network, the + Internet. As individual schools and bulletin boards are connected to + the Internet, the number of people and services within easy reach + increases exponentially. By one estimate, there are currently 19 + million users of the Internet, with an annual growth rate approaching + 80 percent. Furthermore, some of the Internet's most powerful + communication tools are specifically designed so that any of these + millions of people could join any conversation. The network's true + power comes from the synergy of many dispersed minds working together + to solve problems and discuss issues, and there is little in the way + of hierarchy or control of the discourse. + + The schools' shift to internetworking systems involves critical + technological, as well as pedagogical, issues. It requires a change + in the school computing paradigm from centralized computing to + distributed client-server systems, thus bringing about an + administrative change in the nature of school computing. Many schools + that currently have some kind of network access provide accounts only + to teachers or administrators. Internetworking is fundamentally + different--giving accounts, access, and therefore control directly to + students. + + + + + +Manning & Perkins [Page 5] + +RFC 1746 Ways to Define User Expectations December 1994 + + + There are numerous arguments for the pedagogical benefits of school + internetworking. But what of the risks? What safety, liability, and, + above all, educational concerns must be addressed before schools are + ready to tap into the Internet? This policy is not intended as a + document that sets limitations or restrictions. Rather, it is + designed to facilitate and set guidelines for exploring and using the + Internet as a tool for learning. The policy was written with the + purpose and goals of the Internet as a background: support for open + research and education in and among research and instructional + institutions. The context for the policy was provided by the specific + needs of a growing community of learners composed of students, + teachers, scientists, and researchers. The networked environment must + support collaboration and cooperation. Proper frameworks to support + network navigation and information searching must be established. And + because networks will continue to be a scarce educational resource + for the foreseeable future, the policy also provides guidelines for + maximizing the educational cost-benefit ratio for teachers and + students. + +Testbed for Change--The CoVis Project + + Our framework for considering internetworking issues is a project + currently being conducted at the School of Education and Social + Policy at Northwestern University. The Learning Through Collaborative + Visualization Project, CoVis, is designed to reconceptualize and + reconfigure high school science education. CoVis is a networking + testbed funded by the National Science Foundation (NSF). Its goal is + to enable project-based approaches to science by using low- and + medium-bandwidth networks to put students in direct contact with + practicing scientists and scientific tools. In CoVis, we are working + with the types of network connections we believe will be common in + schools in the near future. + + In the first phase of our project we are working with two Chicago- + area schools, Evanston Township High School in Evanston and New Trier + High School in Winnetka. CoVis is deployed in 12 classes at the two + high schools, involving three teachers at each school. Approximately + 300 students are involved in the project: 100 freshmen, 100 + sophomores and juniors, and 100 seniors, all enrolled in either earth + science or environmental science classes. Each classroom contains six + Macintosh Quadra computers with audio/video conferencing units linked + to an internal ethernet, which is linked to Northwestern's ethernet + by a primary-rate Integrated Services Digital Network bridge for + telecommunications using the public-switched network. Additional + computers are available for Internet use in computer labs at each + school. + + + + + +Manning & Perkins [Page 6] + +RFC 1746 Ways to Define User Expectations December 1994 + + + The CoVis Network Community consists of students and teachers in + CoVis classes, scientists who wish to collaborate on CoVis student + projects, the researchers conducting the CoVis project, and other + interested parties who are granted special accounts. In the CoVis + classroom, each student is given an account that makes him or her a + "full" member of the Internet community. This means two things: Each + student has access to all Internet services with minimal mediation by + teachers or other adults, and anybody with an Internet account can + contact the students directly, again without mediation. + + In addition to the standard Internet resources, which include + electronic mail, listservs, Usenet news discussion groups, Telnet, + gopher, and file transfer, CoVis makes it possible for students to + communicate with peers and scientists via video and audio conference + tools and remote screen-sharing technology for synchronous + collaborative work. Therefore, the CoVis Network Use Policy goes + beyond the needs of the typical low-bandwidth internetworked school. + + As an NSF testbed, CoVis has the job of developing new frameworks for + the use of internetworking. In seeking to understand problematic + issues of networking, we turn both to other projects--Bolt Beranek + and Newman's work with the Ralph Bunche computer-minischool in New + York; AT&T's Learning Circles; and TERC's LabNet project--and to + analogous situations extant in schools. Our attention thus is placed + on the development of a policy to establish ground rules for the + students who will be introduced to the Internet. + +The Need for a Proactive Policy + + Exciting or revolutionary educational programs too often are + derailed. In the 1970s, Jerome Bruner's curriculum Man: A Course of + Study (MACOS) was at the center of a political and ideological + firestorm that prevented its implementation in many schools. The + experience of the MACOS developers taught us that it makes sense to + spend time in the initial stages of a project trying to determine + what challenges might arise to an educational innovation in order to + avoid, preempt, or co-opt them. + + In March 1993, the Communications Policy Forum, a nonpartisan group + of telecommunications stakeholders convened by the Electronic + Frontier Foundation, met on the issues of Internet services for the + K-12 educational community. The forum concluded that services should + be provided only to schools that would indemnify the service + providers. It also recommended that a warning statement be developed + to advise schools of the presence of materials on the Internet that + may be deemed inappropriate for minors. + + + + + +Manning & Perkins [Page 7] + +RFC 1746 Ways to Define User Expectations December 1994 + + + We believe that it is not enough to devise a policy designed to + protect schools and service providers, although our policy also + speaks to those roles. In this policy designed to guide students + through some of the social complexity presented by the Internet, we + created guidelines to alert novice users of established expectations + and practices. Because the Internet is somewhat anarchic in its daily + commerce, it is necessary to define a safe local space, or identity, + for a school network where students can feel like members of a + supportive community. The goal of establishing the boundaries of our + own community forms the framework of our policy. + +Issues and Analogies + + The kinds of issues posed by internetworking are not new. Similar + issues have been debated by schools many times before, from creation + science to dress codes. These concerns resurface in the availability + of networked material that some parents, teachers, or students might + find objectionable, pornographic, or otherwise inappropriate. + Although the actual percentage of materials in this category is + small, their mere presence draws plenty of media attention. Consider + this lead-in to a story about graphic material that can be retrieved + through the Internet, published in the Houston Chronicle in 1990: + + "Westbury High School student Jeff Noxon's homework was rudely + interrupted recently when he stumbled across the world's most + sophisticated pornography ring....It was supported by taxes and + brought into town by the brightest lights of higher education." + + While some are shocked, an alternative interpretation might point out + that in using a valuable resource provided by the local university, a + high school student chose to view material that many (including + regular Internet users) find objectionable. Educators must understand + that, as a byproduct of introducing internetworking, schools likely + will have to justify student use of network resources to a public + that does not understand the medium or its utility to education. By + seeking out analogous situations and applying them to the development + of our network use policy, we believe it is possible to establish + frameworks for responding to these challenges. We found several + significant analogies. + + * American Library Association (ALA). In considering information + access issues, the most striking and informative analogy is to a + remarkable set of documents built around the ALA's Library Bill of + Rights of 1980. It is not farfetched to consider the Internet, at + least in part, as a vast digital library. After all, the electronic + database and information search tools it employs are rapidly becoming + part of new school media centers, and many public and school + libraries are beginning to offer some type of network access to their + + + +Manning & Perkins [Page 8] + +RFC 1746 Ways to Define User Expectations December 1994 + + + patrons. + + The ALA documents state, "Attempts to restrict access to library + materials violate the basic tenets of the Library Bill of Rights." + However, they add, what goes into the library collection should be + chosen thoughtfully and with an eye toward instructional goals. + School librarians are bound to devise collections that "are + consistent with the philosophy, goals, and objectives of the school + district," and they must "resist efforts by individuals to define + what is appropriate for all students or teachers to read, view, or + hear." Similarly, tools used to access the network must be designed + to direct access to materials that support curricular concerns. Thus, + the interface to the network embodies the notion of a library + collection. In a school network policy, the "intent of the + collection" should be clearly reflected in a statement of purpose for + the network. + + Directly addressing the information access needs of children, the ALA + opposes attempts to limit access based on the age of a library user. + "Librarians and governing bodies should maintain that parents--and + only parents--have the right and the responsibility to restrict the + access of their children--and only their children--to library + resources," it states. + + While we in the CoVis Project have some ability technologically to + restrict what is in our Internet "collection," it is virtually + impossible to prevent students from accessing materials whose + presence we never anticipated while preserving the students' status + as full members of the Internet community. In this way, the Internet + is fundamentally different from a relatively static library + collection. Following the lead of the ALA, however, we believe that + the precise limits placed upon students' access cannot be formalized + by the school policy. Instead, it is the students' responsibility to + adhere to the standards set by their parents. + + * American Society for Information Science (ASIS). The code of ethics + of ASIS provides another informative analogy, this one speaking to + issues of professionals' responsibilities to both individuals and + society. Where individuals are concerned, information professionals- + -a designation we believe should be applied to teachers--must strive + both to "protect each information user's and provider's right to + privacy and confidentiality" and "respect an information provider's + proprietary rights." With respect to society, information + professionals should "serve the legitimate information needs of a + large and complex society while at the same time being mindful of + [the] individual's rights." They also should "resist efforts to + censor publications." + + + + +Manning & Perkins [Page 9] + +RFC 1746 Ways to Define User Expectations December 1994 + + + The ASIS code speaks directly to issues of electronic mail privacy. + We believe that students and teachers must feel certain that their + communications are private. In many electronic mail systems currently + used in schools, the teacher must act as an intermediary between the + school and the outside world. When students are "full" members of the + Internet, mail is sent directly to the outside world with no human + mediation. As a rule, such communications should be private, and the + network policy must make explicit any reasons for teachers or + researchers to have access to message content. Users must be made + aware of times and circumstances under which private mail may be + monitored. + + * Prodigy. Privacy in electronic mail communications seems like a + straightforward issue--it is analogous to the U.S. mail. But what + about network bulletin boards or Internet newsgroups? Posting a + message in one of these public information exchanges may raise + questions of freedom of expression among students and other network + users, but no more than in any other public forum. + + One approach to dealing with this issue was described in the Wall + Street Journal's technology supplement of November 15, 1993. Prodigy, + a dial-up bulletin-board service jointly owned by IBM and Sears, has + a strict editorial policy for both its public forums and its members' + private email exchanges. Prodigy employs editors who screen every + message before it is posted, sometimes delaying posting by up to 40 + hours. It also uses special software to screen messages for what it + deems objectionable language. The result is a lowest-common- + denominator approach to what is acceptable or unacceptable material. + + This approach undervalues the maturity of Prodigy's users. In the + CoVis classroom, we want to strive to develop students' maturity, and + in order to learn these lessons, they must feel that their message + content is under their own control. To let students know what level + of behavior is expected of them, we are very clear about the use of + offensive, obscene, or inflammatory language on the network. These + guidelines are not unfamiliar to the students in CoVis, as their + local school codes of conduct include the same admonitions. Offensive + messages posted by students are not ejected from the network. + However, students can lose their privileges on the network if they + post such messages (a significant disincentive for CoVis students), + and they are encouraged to post a retraction or apology once they + understand why their message was problematic. These interventions are + only initiated upon the complaint of another user, not as part of an + explicit editorial policy. + + * School Conduct Codes. Every school has a code of conduct for its + students that details appropriate school behavior, outlines rights, + and sets expectations for students. Because the CoVis Network is used + + + +Manning & Perkins [Page 10] + +RFC 1746 Ways to Define User Expectations December 1994 + + + as part of a school activity, the school's code of conduct applies to + network activities. Thus, we believe the network use policy should be + an extension of the school's policies. An important part of the + development of the CoVis Network use policy was a close reading of + the participating high schools' codes of conduct. For example, at one + of our high schools, special rules against vandalism of computer + equipment and unauthorized access to information exist. These rules + cover such important concepts as computer piracy, hacking, and other + tampering with hardware or software. Both CoVis schools have codes + warning students that use of harassing or abusive language is + unacceptable, as is obscenity. At the same time, both high schools + place a high value on students' right to freedom of expression and + outline the dimensions of that right in some detail. + + * Field Trips. All of the rules that apply to student conduct in + school also apply when the students are off campus on field trips. + The Internet offers many opportunities for virtual field trips to + distant locations, and CoVis adds a new twist to this genre with the + addition of full audio and video connections to remote locations. + Students in the CoVis community will be able to "visit" the + Exploratorium in San Francisco, directing a remote camera around the + exhibit floor and engaging in conversations with guides and other + museum visitors. It is important that students realize they act as + ambassadors for their school in such encounters, and our policy + states this explicitly. Currently, parental permission slips are + required before students may take field trips. At one of our + participating high schools, such slips are required even for "trips" + within the school building. Is there a precedent for extending the + concept of permission slips to the virtual field trip? We do not + believe so, but we do recognize the importance of written information + alerting parents to interesting or innovative school activities. + +Beyond the Barriers + + Barriers to internetworking in schools are being lowered every day, + and soon electronic bulletin boards may be as familiar to the + American classroom as blackboards. Educators are encouraged by + continuing developments that make the Internet accessible to schools. + This is accomplished in part through commercial networks such as + America Online and Delphi and by the decreasing costs of modems and + communications software. With the cooperation of nearby universities, + dial-up Internet connections can now be obtained for an investment of + under $100 per existing computer. + + Schools will find tremendous new opportunities for enhancing, + extending, and rethinking the learning process with the advent of + internetworking. But will they be ready to face the challenges? To + date, schools have had little experience with advanced + + + +Manning & Perkins [Page 11] + +RFC 1746 Ways to Define User Expectations December 1994 + + + telecommunications technologies. Many classrooms still lack even such + basic tools as telephones. Given the general lack of communication + even between classrooms in the same school, it will not be easy for + schools to join in the fast-paced discourse of the Internet. The + CoVis Project has taken a proactive stance toward the issues that + internetworking raises for schools with the development of a + network-use policy based upon the best lessons available. We invite + feedback on our policy and offer it as a contribution to this + exciting and rapidly developing area of educational technology. + + Barry J. Fishman is a Ph.D. student in the Learning Sciences program + of the Northwestern University School of Education and Social Policy. + Roy D. Pea is Dean of the School and John Evans Professor of the + Learning Sciences at Northwestern. They acknowledge the assistance of + Laura D'Amico, Larry Friedman, Paul Reese, and Dick Ruopp in the + preparation of this article. Their research is supported in part by + National Science Foundation Grant MDR-9253462. + + Margin Notes: Electronic versions of the original texts of American + Library Association, American Society for Information Science, and + Houston Chronicle documents can be found at FTP (file transfer + protocol) address ftp.eff.org, in the pub/academic/library/directory. + + The Communications Policy Forum meeting is reported on by Andrew Blau + in the EFFector 5(4), also available from ftp.eff.org in the + /pub/EFF/newsletters directory. Statistics about the Internet are + available from ftp.nisc.sri.com, in the /pub/zone directory. Both of + these FTP sites can also be reached via gopher. + +For further reading: + + Roy Pea, "Distributed Multimedia Learning Environments: The + Collaborative Visualization Project," Communications of the ACM (May + 1993). + + Denis Newman, Susan Bernstein, and Paul A. Reese, "Local + Infrastructures for School Networking: Current Models and Prospects," + Bolt Beranek and Newman Tech Report No. 7726 (1992). + + Richard Ruopp, Shahaf Gal, Brian Drayton, and Meghan Pfister, LabNet: + Toward a Community of Practice (Hillsdale, NJ: Erlbaum, 1993). + + + + + + + + + + +Manning & Perkins [Page 12] + +RFC 1746 Ways to Define User Expectations December 1994 + + +APPENDIX: THE COVIS NETWORK USE POLICY + +A. Mission Statement + + The Learning Through Collaborative Visualization Project (CoVis) was + established to explore project-enhanced science learning supported by + advanced computing applications in a secondary school environment. + As such, the computer network environment supported by the project + (the CoVis Network) is designed to enhance the learning and teaching + activities of the participating science classrooms at New Trier and + Evanston Township High Schools. The term "network" in this document + refers to a number of computers and other electronic tools that are + connected to each other for the purpose of communication and data + sharing. CoVis is a National Science Foundation (NSF) funded + research project, and use of the network is therefore provided to + allow the study of its impact on learning and teaching. + + 1. Purpose of the Internet + + The Internet (a global network made up of many smaller + contributing networks) and its services are intended to support + open research and education in and among US research and + instructional institutions, plus research arms of for-profit firms + when engaged in open scholarly communication and research. Use + for other purposes, e.g., for-profit activity or extensive + personal business, is not acceptable. + + 2. Purpose of the CoVis Network + + The purpose of the CoVis Network is to facilitate communications + and collaboration between members of the CoVis community. Network + use is primarily intended for the support of project work + conducted for participating CoVis classes, and far less + significantly for other purposes that students and teachers + determine to be of educational value. The CoVis Network has + limited resources, and CoVis classrooms have limited time + available for network- supported teaching and learning activities. + Any use of the network which adversely affects its operation in + pursuit of teaching and learning or jeopardizes its use or + performance for other community members is prohibited, and may + result in the loss of network privileges. + +B. Services Available on the CoVis Network + + The CoVis Network consists of a variety of computing equipment, + software, and network connections. This section describes the + primary tools and services approved for use in the CoVis Network. + Other tools may be used, but may not be supported by the system + + + +Manning & Perkins [Page 13] + +RFC 1746 Ways to Define User Expectations December 1994 + + + administrators: + + 1. Cruiser Videoconferencing. Cruiser is a tool designed to + allow video and audio connections between two people, each of whom + must have a Cruiser station and access to the CoVis network. + Cruiser conversations are private; + + 2. Timbuktu Screen-Sharing. Timbuktu is a commercial software + product that allows a Macintosh user to view or control another + Macintosh computer remotely (with the remote user's permission). + This is designed to allow two or more people to work together over + the CoVis Network. Timbuktu sessions are private; + + 3. Collaborative Notebook. The Notebook is a personal or group + workspace designed to support project work in CoVis classrooms. + Work done using the notebook may be either private or public, as + designated by the user. Users should be careful to note whether + they are working in a private or a public portion of the notebook. + + 4. General-Use Internet Tools. These include, but are not + limited to, the following: + + a) Electronic Mail, or email. Email is just like regular mail, + except instead of paper, you use the computer. Email + correspondence is considered private. The CoVis Project uses a + program called "Eudora" for sending and receiving mail. + + b) Listservs. A listserv is a means to broadcast an email + message to many users for the purpose of maintaining a + discussion list. Although listserv messages are transmitted + via email, correspondence is public, so extra care should be + used when participating. The program called "Eudora" would be + used for participating in a listserv. + + c) Network News. Netnews is a communications tool for large + group discussion. Netnews is essentially similar to a + listserv, except that it does not use email as the means of + communication. Instead, you use software called a "news + reader" to read and post messages to the appropriate groups. + Newsgroups are very public, and should be used thoughtfully. + The CoVis project employs a program called "NewsWatcher" for + reading and posting news. + + d) File Transfer Protocol, or FTP. File Transfer Protocol is a + means of moving files between computers on the Internet. The + CoVis project employs a program called "Fetch" for doing this. + + + + + +Manning & Perkins [Page 14] + +RFC 1746 Ways to Define User Expectations December 1994 + + + e) Telnet. Telnet allows you to connect to other computers on + the Internet, provided you know the machine's Internet address + and appropriate password. All provisions of this document + apply to members of the CoVis community while using remote + computers via Telnet. The CoVis Project uses a program called + "NCSA Telnet" for telnetting operations. + + f) Gopher. Gopher is a means of navigating the Internet via a + menu-driven or point-and-click interface to the computer. + Gopher is a very convenient way to retrieve files and + information from sources all around the globe. For most + purposes, it may be considered an easier form of FTP and can be + used to initiate Telnet sessions. The CoVis Project uses a + program called "TurboGopher" for gopher searching. + +C. Who is a member of the CoVis community? + + All account holders on the CoVis Network will be granted access to + all services the network offers. The following people may hold + accounts on the CoVis Network: + + 1. Students. Students who are currently enrolled in a CoVis + class will automatically be granted a network account upon + agreement to the terms stated in this policy; + + 2. Teachers. Teachers of CoVis classes may hold accounts on the + CoVis Network. Other teachers may apply for accounts; + + 3. Scientists. Scientists who wish to collaborate on student + projects will be granted CoVis Network accounts. The exact nature + of the account (i.e., which services are available) will depend on + individual circumstances; + + 4. Researchers. The researchers conducting the CoVis project + will hold accounts on the CoVis network; + + 5. Others. Anyone may request a special account on the CoVis + network. These requests will be granted on a case-by-case basis, + depending on need and resource availability. + + Note: Except in special cases listed above, people from the larger + Internet community are not part of the local CoVis community, and + will probably be unaware of the existence of this policy. + However, you should always treat people you "meet" on the network + with respect, as if they were a part of your community. + + + + + + +Manning & Perkins [Page 15] + +RFC 1746 Ways to Define User Expectations December 1994 + + +D. Privileges and Rights of CoVis Network Community Members + + Members of the CoVis community have certain network privileges and + rights. These include: + + 1. Privacy. All members of the CoVis community have the right to + privacy in their email, Cruiser, Timbuktu, and notebook + communications when so designated by the user. However, if a user + is believed to be in violation of the guidelines stated in this + policy, a system administrator or teacher may need to gain access + to private correspondence or files. An attempt will be made to + notify the user of such inspections whenever possible. As CoVis + is primarily a research project, researchers may periodically make + requests to study or view correspondence and files, but + confidentiality is ensured in such circumstances. Also, it is + important that users recognize the fundamental differences between + public (e.g., news) and private (e.g., email) forms of + communication, and shape their content accordingly; + + 2. Equal Access. All members of the CoVis community will be + granted free and equal access to as many network services as their + technology allows. Exploration of the Internet is encouraged + relative to the purposes of the CoVis Network; + + 3. Safety. To the greatest extent possible, members of the CoVis + community will be protected from harassment or unwanted or + unsolicited contact. Any community member who receives + threatening or unwelcome communications should bring them to the + attention of a system administrator or teacher. Users must, + however, be aware that there are many services available on the + Internet that could potentially be offensive to certain groups of + users. The designers of the CoVis Network cannot eliminate access + to all such services, nor could they even begin to identify them. + Thus individual users must take responsibility for their own + actions in navigating the network; + + 4. Intellectual Freedom. The CoVis Network must be a free and + open forum for expression, including viewpoints that are strange, + unorthodox, or unpopular. The network administrators will place + no official sanctions upon the expression of personal opinion on + the network. However, the poster of an opinion should be aware + that other community members may be openly critical of such + opinions. Occasionally, a message that you post may be met from + outside the CoVis community with especially harsh criticism (a + practice known as "flaming"). It is best not to respond to such + attacks, unless you believe you are capable of a measured, + rational reply. Personal attacks are not an acceptable use of the + CoVis Network at any time. The CoVis Project does not officially + + + +Manning & Perkins [Page 16] + +RFC 1746 Ways to Define User Expectations December 1994 + + + endorse any opinions stated on the network. Any statement of + personal belief is implicitly understood to be representative of + the author's individual point of view, and not that of the CoVis + Network, its administrators, or the participating high schools. + +E. Responsibilities of CoVis Network Community Members + + With the rights and privileges of membership in the CoVis Network + community come certain responsibilities. Users need to familiarize + themselves with these responsibilities. Failure to follow them may + result in the loss of network privileges. These responsibilities + include: + + 1. Using appropriate language. Profanity or obscenity will not + be tolerated on the CoVis Network. All community members should + use language appropriate for school situations as indicated by + school codes of conduct; + + 2. Avoiding offensive or inflammatory speech. Community members + must respect the rights of others both in the local community and + in the Internet at large. Personal attacks are an unacceptable + use of the network. If you are the victim of a "flame," take time + to respond rationally, and bring the incident to the attention of + a teacher or system administrator; + + 3. Adhering to the rules of copyright. CoVis community members + must respect all copyright issues regarding software, information, + and attributions of authorship. The unauthorized copying or + transfer of copyrighted materials may result in the loss of + network privileges; + + 4. Re-posting personal communications without the original + author's prior consent is prohibited. To do this is a violation + of the author's privacy. However, all messages posted in a public + forum such as newsgroups or listservs may be copied in subsequent + communications, so long as proper attribution is given; + + 5. Use of the network for any illegal activities is prohibited. + Illegal activities include tampering with computer hardware or + software, unauthorized entry into computers, or knowledgeable + vandalism or destruction of computer files. Such activity is + considered a crime under state and federal law; + + 6. Avoid the knowing or inadvertent spread of computer viruses. + "Computer viruses" are programs that have been developed as + pranks, and can destroy valuable programs and data. To reduce the + risk of spreading a computer virus, do not import files from + unknown or disreputable sources. If you do obtain software or + + + +Manning & Perkins [Page 17] + +RFC 1746 Ways to Define User Expectations December 1994 + + + files from remote sources, follow proper procedures to check for + viruses before use. Deliberate attempts to degrade or disrupt + system performance of the CoVis Network or any other computer + system or network on the Internet by spreading computer viruses is + considered criminal activity under state and federal law; + + 7. You have full responsibility for the use of your account. All + violations of this policy that can be traced to an individual + account name will be treated as the sole responsibility of the + owner of that account. Under no conditions should you give your + password to another user; + + 8. Impersonation is not permitted. Real names must be used, + pseudonyms are not allowed; + + 9. Anonymity is not allowed on the CoVis Network. As an + educational network, we believe that individuals must take + responsibility for their actions and words; + + 10. Exemplary behavior is expected on 'virtual' field trips. When + 'visiting' locations on the Internet or using the Cruiser or + Timbuktu communication tools, CoVis community members must conduct + themselves as representatives of both their respective schools and + the CoVis community as a whole. Conduct that is in conflict with + the responsibilities outlined in this document will be subject to + loss of network privileges. + +Note: + + This article is reprinted with the express permission of TECHNOS: + Quarterly for Education and Technology. + + It originally appeared as: Fishman, B., and Pea, R.D. (1994). The + internetworked school: A policy for the future. Technos: Quarterly of + Education and Technology 3 (1), 22-26. + + + + + + + + + + + + + + + + +Manning & Perkins [Page 18] + |