[11479] in Commercialization & Privatization of the Internet

home help back first fref pref prev next nref lref last post

Re: The whole CIX concept is flawed

daemon@ATHENA.MIT.EDU (William Manning)
Mon Apr 4 03:43:08 1994

From: bmanning@is.rice.edu (William Manning)
To: gwh@crl.com (George Herbert)
Date: Sun, 3 Apr 1994 21:48:43 -0500 (CDT)
Cc: com-priv@psi.com
In-Reply-To: <199404031811.AA03477@crl.crl.com> from "George Herbert" at Apr 3, 94 11:11:05 am

> You can go through a regional or Sprintlink and resell,
> but that puts you in the routing-not-guaranteed class
> if I'm reading things right. 
> 

Well, -NO-ONE- can ensure routing, not even the CIX :)
In the five cases I know of, routing is done with the
same promptness for everyone.... as long as they meet
the dreaded AUP :)

Just for grins, this draft was approved at the IETF last
week.   Kind of puts AUP-free into perspective.
	------------------------------------------------------

			Acceptable Use Policy Definition

Status of this Memo
 
This document is an Internet Draft.  Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its Areas,
and its Working Groups.  Note that other groups may also distribute
working documents as Internet Drafts.
 
Internet Drafts are draft documents valid for a maximum of six months.
Internet Drafts may be updated, replaced, or obsoleted by other
documents at any time.  It is not appropriate to use Internet Drafts
as reference material or to cite them other than as a "working draft"
or "work in progress."

Please check the 1id-abstracts.txt listing contained in the
internet-drafts Shadow Directories on nic.ddn.mil, ds.internic.net,
venera.isi.edu, nic.nordu.net, or munnari.oz.au to learn the current
status of any Internet Draft.

0. Abstract

This paper covers basic fundamentals that must be understood when
one defines, interprets, or implements acceptable use policies over 
the Internet. 

1. Background

Acceptable Use Policies (AUP) are an implicit part of internetworking. 
Everyone has one, whether published or not.  This applies to networks 
that provide transit paths for other networks as well as end sites and 
the individual users that use systems.  A better understanding of an 
AUP, and how to formulate one seems to be increasingly important as the 
global net encompases new  environments as varied as K12 schools and 
real-time systems.  AUP's are used to determine pricing, customer base, 
type and quality of service metrics, and a host of other provider services. 

2. AUP components

In defining your particular AUP there are three areas that must be addressed.
They are where you get service from, who your peers are, and whom you 
provide service to.  A good understanding of these concepts will make or 
break the AUP you formulate.

2.1  Where you get service from

Each entity gets its service from one or more other providers,  either 
a level three service, such as IP transit, or a level two service, such  
as circuits.  The provider of such services usually has an AUP in the 
form of an agreement or contract specifying terms and conditions of use. 
This forms the basis for the type of service offerings that you as an 
entity can provide.  If you get service from several providers,  all of 
them need to be considered in the formation of policy.

2.2 Who your peers are

Are your policies consistent with those offered by your peers?  In many 
cases, the formation of policy will define who your peers are.  It is 
important to clearly identify which areas you intend to reach and the 
community you wish to be a contributing, productive part of.  Once this 
is clear, formulate polices along those lines.

2.3 Who you provide  service to

It is required that you inform those who use your services just what 
your policies are.  Without this information, it will be almost impossible 
for them to distinguish what to expect from your service offering.  
Without a clear policy it is possible that litigation may ensue. It 
is important to reflect community standards in the creation of policy.

3.  AUP issues

IP provided services can be complex  They comprise both information 
and communication.  In the formulation of policy it is critical that 
the policy provide for security _and_ access to information and 
communication while ensuring that the resource use does not overburden 
the system's capabilities. These conflicting demands must be analyzed 
and a synthesis arrived at.  This hints a fourth component of an AUP, 
that it has a method to extract compliance.  This is so site specific 
that further analysis will not be attempted here.

Some items that should be considered in the formation of policy are:
	- privacy			- morals & ethics
	- freedom of expression		- legal constraints
	- safety			- harassment
	- plagiarism			- resource utilization
	- indemnification		- targeted areas of interest
	- expected behaviours		- remedies and recourse

This should not be considered as an exhaustive list but as pointers for 
those types of things to be considered when policy is formed. 

4. Security

Security and Liability are not covered in this memo.

5. Summary

Acceptable Use is here to stay. As the Interconnected mesh of networks 
grows, the choices presented to end-users mandate that provider 
expectations are clearly presented. Use of these guidelines will help 
create a clearer, better defined environment for everyone.


Don Perkins   - HISD
Bill Manning  - Rice University



For further reference, see the following materials:

Name=Acceptable and Unacceptable Use of Net Resources (K12)
Type=1
Host=riceinfo.rice.edu
Port=1170
Path=1/More/Acceptable

____________________________________________________________________
APPENDIX: THE COVIS NETWORK USE POLICY

A.  Mission Statement
The Learning Through Collaborative Visualization Project 
(CoVis) was established to explore project-enhanced science 
learning supported by advanced computing applications in a 
secondary school environment.  As such, the computer network 
environment supported by the project (the CoVis Network) is 
designed to enhance the learning and teaching activities of the 
participating science classrooms at New Trier and Evanston 
Township High Schools.  The term "network" in this document 
refers to a number of computers and other electronic tools that 
are connected to each other for the purpose of communication 
and data sharing.  CoVis is a National Science Foundation 
(NSF) funded research project, and use of the network is 
therefore provided to allow the study of its impact on learning 
and teaching.

1.  Purpose of the Internet
The Internet (a global network made up of many smaller 
contributing networks) and its services are intended to 
support open research and education in and among US 
research and instructional institutions, plus research arms of 
for-profit firms when engaged in open scholarly 
communication and research.  Use for other purposes, e.g. 
for-profit activity or extensive personal business, is not 
acceptable.

2.  Purpose of the CoVis Network
The purpose of the CoVis Network is to facilitate 
communications and collaboration between members of the 
CoVis community.  Network use is primarily intended for 
the support of project work conducted for participating 
CoVis classes, and far less significantly for other purposes 
that students and teachers determine to be of educational 
value.  The CoVis Network has limited resources, and 
CoVis classrooms have limited time available for network-
supported teaching and learning activities.  Any use of the 
network which adversely affects its operation in pursuit of 
teaching and learning or jeopardizes its use or performance 
for other community members is prohibited, and may result 
in the loss of network privileges.

B.  Services Available on the CoVis Network
The CoVis Network consists of a variety of computing 
equipment, software, and network connections.  This section 
describes the primary tools and services approved for use in the 
CoVis Network.  Other tools may be used, but may not be 
supported by the system administrators:

1.  Cruiser Videoconferencing.  Cruiser is a tool designed to 
allow video and audio connections between two people, 
each of whom must have a Cruiser station and access to the 
CoVis network.  Cruiser conversations are private;

2.  Timbuktu Screen-Sharing.  Timbuktu is a commercial 
software product that allows a Macintosh user to view or 
control another Macintosh computer remotely (with the 
remote user's permission).  This is designed to allow two or 
more people to work together over the CoVis Network.  
Timbuktu sessions are private;

3.  Collaborative Notebook.  The Notebook is a personal or 
group workspace designed to support project work in CoVis 
classrooms.  Work done using the notebook may be either 
private or public, as designated by the user.  Users should be 
careful to note whether they are working in a private or a 
public portion of the notebook.

4.  General-Use Internet Tools.  These include, but are not 
limited to, the following:

a) Electronic Mail, or e-mail.  E-mail is just like regular 
mail, except instead of paper, you use the computer.  E-
mail correspondence is considered private.  The CoVis 
Project uses a program called "Eudora" for sending and 
receiving mail.

b) Listservs.  A listserv is a means to broadcast an e-mail 
message to many users for the purpose of maintaining a 
discussion list.  Although listserv messages are 
transmitted via e-mail, correspondence is public, so extra 
care should be used when participating.  The program 
called "Eudora" would be used for participating in a 
listserv.

c) Network News.  Netnews is a communications tool for 
large group discussion.  Netnews is essentially similar to 
a listserv, except that it does not use e-mail as the means 
of communication.  Instead, you use software called a 
"news reader" to read and post messages to the 
appropriate groups.  Newsgroups are very public, and 
should be used thoughtfully.  The CoVis project employs 
a program called "NewsWatcher" for reading and posting 
news.

d) File Transfer Protocol, or FTP.  File Transfer Protocol is a 
means of moving files between computers on the Internet.  
The CoVis project employs a program called "Fetch" for 
doing this.

e) Telnet.  Telnet allows you to connect to other computers 
on the Internet, provided you know the machine's Internet 
address and appropriate password.  All provisions of this 
document apply to members of the CoVis community 
while using remote computers via Telnet.  The CoVis 
Project uses a program called "NCSA Telnet" for 
telnetting operations.

f) Gopher.  Gopher is a means of navigating the Internet via 
a menu-driven or point-and-click interface to the 
computer.  Gopher is a very convenient way to retrieve 
files and information from sources all around the globe.  
For most purposes, it may be considered an easier form of 
FTP and can be used to initiate Telnet sessions.  The 
CoVis Project uses a program called "TurboGopher" for 
gopher searching.

C.  Who is a member of the CoVis community?
All account holders on the CoVis Network will be granted 
access to all services the network offers.  The following people 
may hold accounts on the CoVis Network:

1.  Students.  Students who are currently enrolled in a CoVis 
class will automatically be granted a network account upon 
agreement to the terms stated in this policy;  

2.  Teachers.  Teachers of CoVis classes may hold accounts on 
the CoVis Network.  Other teachers may apply for accounts;

3.  Scientists.  Scientists who wish to collaborate on student 
projects will be granted CoVis Network accounts.  The exact 
nature of the account (i.e., which services are available) will 
depend on individual circumstances;

4.  Researchers.  The researchers conducting the CoVis project 
will hold accounts on the CoVis network;  

5.  Others.  Anyone may request a special account on the CoVis 
network.  These requests will be granted on a case-by-case 
basis, depending on need and resource availability.

Note: Except in special cases listed above, people from the 
larger Internet community are not part of the local CoVis 
community, and will probably be unaware of the existence 
of this policy.  However, you should always treat people you 
"meet" on the network with respect, as if they were a part of 
your community. 

D.  Privileges and Rights of CoVis Network Community Members
Members of the CoVis community have certain network 
privileges and rights.  These include:

1.  Privacy.  All members of the CoVis community have the 
right to privacy in their email, Cruiser, Timbuktu, and 
notebook communications when so designated by the user.  
However, if a user is believed to be in violation of the 
guidelines stated in this policy, a system administrator or 
teacher may need to gain access to private correspondence 
or files.  An attempt will be made to notify the user of such 
inspections whenever possible.  As CoVis is primarily a 
research project, researchers may periodically make requests 
to study or view correspondence and files, but 
confidentiality is ensured in such circumstances.  Also, it is 
important that users recognize the fundamental differences 
between public (e.g. news) and private (e.g. email) forms of 
communication, and shape their content accordingly;

2.  Equal Access.  All members of the CoVis community will 
be granted free and equal access to as many network 
services as their technology allows.  Exploration of the 
Internet is encouraged relative to the purposes of the CoVis 
Network;

3.  Safety.  To the greatest extent possible, members of the 
CoVis community will be protected from harassment or 
unwanted or unsolicited contact.  Any community member 
who receives threatening or unwelcome communications 
should bring them to the attention of a system administrator 
or teacher.  Users must, however, be aware that there are 
many services available on the Internet that could potentially 
be offensive to certain groups of users.  The designers of the 
CoVis Network cannot eliminate access to all such services, 
nor could they even begin to identify them.  Thus individual 
users must take responsibility for their own actions in 
navigating the network; 

4.  Intellectual Freedom.  The CoVis Network must be a free 
and open forum for expression, including viewpoints that are 
strange, unorthodox, or unpopular.  The network 
administrators will place no official sanctions upon the 
expression of personal opinion on the network.  However, 
the poster of an opinion should be aware that other 
community members may be openly critical of such 
opinions.   Occasionally, a message that you post may be 
met from outside the CoVis community with especially 
harsh criticism (a practice known as "flaming").  It is best 
not to respond to such attacks, unless you believe you are 
capable of a measured, rational reply.  Personal attacks are 
not an acceptable use of the CoVis Network at any time.  
The CoVis Project does not officially endorse any opinions 
stated on the network.  Any statement of personal belief is 
implicitly understood to be representative of the author's 
individual point of view, and not that of the CoVis Network, 
its administrators, or the participating high schools.

E.  Responsibilities of CoVis Network Community Members
With the rights and privileges of membership in the CoVis 
Network community come certain responsibilities.  Users need 
to familiarize themselves with these responsibilities.  Failure to 
follow them may result in the loss of network privileges.  These 
responsibilities include:

1.  Using appropriate language.  Profanity or obscenity will not 
be tolerated on the CoVis Network.  All community 
members should use language appropriate for school 
situations as indicated by school codes of conduct;

2.  Avoiding offensive or inflammatory speech.  Community 
members must respect the rights of others both in the local 
community and in the Internet at large.  Personal attacks are 
an unacceptable use of the network.  If you are the victim of 
a "flame," take time to respond rationally, and bring the 
incident to the attention of a teacher or system administrator;

3.  Adhering to the rules of copyright.  CoVis community 
members must respect all copyright issues regarding 
software, information, and attributions of authorship.  The 
unauthorized copying or transfer of copyrighted materials 
may result in the loss of network privileges;

4.  Re-posting personal communications without the original 
author's prior consent is prohibited.  To do this is a violation 
of the author's privacy.  However, all messages posted in a 
public forum such as newsgroups or listservs may be copied 
in subsequent communications, so long as proper attribution 
is given;

5.  Use of the network for any illegal activities is prohibited.   
Illegal activities include tampering with computer hardware 
or software, unauthorized entry into computers, or 
knowledgeable vandalism or destruction of computer files.  
Such activity is considered a crime under state and federal 
law;

6.  Avoid the knowing or inadvertent spread of computer 
viruses.  "Computer viruses" are programs that have been 
developed as pranks, and can destroy valuable programs and 
data.  To reduce the risk of spreading a computer virus, do 
not import files from unknown or disreputable sources.  If 
you do obtain software or files from remote sources, follow 
proper procedures to check for viruses before use.  
Deliberate attempts to degrade or disrupt system 
performance of the CoVis Network or any other computer 
system or network on the Internet by spreading computer 
viruses is considered criminal activity under state and 
federal law;

7.  You have full responsibility for the use of your account.  All 
violations of this policy that can be traced to an individual 
account name will be treated as the sole responsibility of the 
owner of that account.  Under no conditions should you give 
your password to another user;

8.  Impersonation is not permitted.  Real names must be used, 
pseudonyms are not allowed;

9.  Anonymity is not allowed on the CoVis Network.  As an 
educational network, we believe that individuals must take 
responsibility for their actions and words;

10.  Exemplary behavior is expected on 'virtual' field trips.  
When 'visiting' locations on the Internet or using the Cruiser 
or Timbuktu communication tools, CoVis community 
members must conduct themselves as representatives of both 
their respective schools and the CoVis community as a 
whole.  Conduct that is in conflict with the responsibilities 
outlined in this document will be subject to loss of network 
privileges.

____________________________________________________________________

This article is reprinted with the express permission of Barry Fishman. 



-- 
Regards,
Bill Manning 

home help back first fref pref prev next nref lref last post