9.1 Policy Governing the Use of Information Technology
|Approved By: ||Senate|
|Original Approval Date: ||December 6, 1990|
|Date of Most Recent Review/Revision: ||January 17, 2005|
|Office of Accountability: ||Vice-President: Academic|
|Administrative Responsibility: ||Office of Information Technology|
This policy is presented to provide guidance and assistance to all members of the University community who provide and use information technology in the conduct of study, research, teaching and administration. It is based on the premise that all members of the WLU community act in a responsible and professional way.
University information technology facilities include computing devices and associated peripherals, portable computers, communications infrastructure and related equipment, facsimile machines, scanners, copiers, telephones, video and other multimedia devices and all forms of software. Such resources and tools are made available to faculty and staff in support of their teaching, research, and administrative activities and to students in support of their respective academic objectives and requirements. Their use is circumscribed by this Policy, the Student Code of Conduct and Discipline, the Harassment/Discrimination Policy, the Ontario Human Rights Code, the Copyright Act of Canada, the Criminal Code of Canada, and other applicable legislation.
A. The hardware and licensed software available at WLU are intended for use by the WLU community. Use of these resources by anyone outside WLU requires approval from the Office of the Director of Information Technology Services. Users shall not disclose confidential passwords, access codes, account numbers or other authorization assigned to them.
B. Users of information technology are expected to use the systems in a manner that preserves the privacy of others. Users shall not attempt to gain access to the files or directories of another user without clear authorization from the other user. Users shall not attempt to intercept any network communications, such as electronic mail or user-to-user dialogue.
Users must not attempt unauthorized access or otherwise interfere with computing and communication installations external to Wilfrid Laurier University using Wilfrid Laurier University computing or communication facilities.
C. Activities engaged in by users with the intention of interfering with or altering the integrity of computing or communication systems at WLU are unacceptable. Such activities include unauthorized use of accounts, impersonating other individuals in communications, attempts to capture or decode passwords or encryption, and destruction or alteration of data or programs belonging to other users. The willful introduction of computer viruses into the WLU computing environment or other environments via the WLU network is unacceptable. The intention to restrict or deny access by legitimate users to the system is unacceptable.
D. Damage, destruction or theft of hardware, software, data or related equipment is unacceptable.
E. Users must not attempt to access or copy the programs and information belonging to or licensed to Wilfrid Laurier University or to other users unless they have proper authorization to do so. Programs and data may not be moved from one computing system to another without permission. Users are reminded that this applies equally to both microcomputer and mainframe software. The terms and conditions in software licenses vary considerably. The onus is on users/owners to familiarize themselves with their responsibilities and abide by limitations under each agreement.
F. Users must use computing and communication facilities and services only for the purposes for which they were authorized. Specifically, instructional, research, and administrative accounts must not be used for private consulting or sold to other individuals; use of any part of the computing facility for direct personal financial gain (except for appropriate contract and external accounts) or to provide free resources for unauthorized purposes is not allowed.
When outside professional activities of users would involve the use of the University's computing and communication facilities, approval shall be obtained from the Office of the Director of Information Technology Services and charges shall be at the prevailing rate (unless the Office of the Director of Information Technology Services agrees to waive all or part of the charges).
G. Users must be sensitive to the public nature of shared facilities and must not print or display on screens in such locations images, sounds or messages which are likely to create an atmosphere of discomfort or harassment for others.
H. Users must not use computing and communication facilities to send, print or display obscene or harassing messages. Every user bears the primary responsibility for the material he or she chooses to access, send, or display. The facilities may not be used in any manner to create, send or display material which contravenes relevant policies or statutes.
Users are directed to the provisions of the Ontario Human Rights Code and the Criminal Code of Canada for assistance in determining whether any images, sounds or messages may be considered harassing or obscene. Further assistance in this regard may be obtained from Laurier's Harassment/Discrimination Co-ordinator or the Ontario Human Rights Commission.
I. Users of e-mail and other electronic communications tools are required to use these resources in a responsible manner consistent with other business communications such as written correspondence and the phone.
Responsible use of e-mail includes:1. not ‘rebroadcasting', i.e. forwarding e-mail that is deemed confidential by the sender to third partiesJ. Users who violate these principles will be subject to disciplinary action as outlined in the Disciplinary Procedures. Users unsure of whether their intended use of the University's information technology violates these principles should consult with the Office of the Director of Information Technology Services.
2. not posting materials that contain virus hoaxes or spam
3. not sending e-mail in such a way that disrupts normal e-mail service
4. not sending materials that are fraudulent, defamatory, harassing or of a threatening nature
5. not unlawfully soliciting or exchanging copies of copy-righted material by e-mail
Users should clearly identify themselves through an e-mail signature that specifies their name, position, and contact information; this can also include an affiliation with another institution or agency connected with their official work, if any.
Any actions that defraud another or misrepresent or fail to accurately identify the sender is considered to be an inappropriate use of e-mail.
III. Procedures for Dealing with Infractions to the Policy Governing the Use of Information Technology
A. Introduction1. It is the responsibility of managers to make sure their employees are aware of the Policy Governing the Use of Information Technology.B. Procedures:
2. Managers are responsible for implementing this Policy in their areas. Information Technology Services will provide expertise and advice as required.
3. Information Technology Services is responsible for initiating disciplinary procedures for policy violations with respect to the University's network and central systems.1. When it appears that a user is not fully aware of the policy, it is recommended that the appropriate section of the policy should be brought to their attention by either their manager or Information Technology Services.Potential Discipline
2. In the process of investigating possible violations, Information Technology Services may temporarily suspend access to facilities.
3. In extreme cases of abuse or if major damage has occurred, the disciplinary process will be accelerated.
4. Offenses which are alleged violations of criminal and/or civil law or the Student Code of Conduct and Discipline may result in immediate loss of all privileges and will be reported to the appropriate University and law enforcement agencies with the potential of legal or disciplinary procedures to initiate under said processes.
Violations can result in any or all of the following disciplinary consequences:1. a warning to cease the behaviour
2. restriction in access to the facilities or a complete suspension of access to the computing facilities, particularly in continued violation cases
3. any or all discipline delineated under the WLU Student Code of Conduct and Discipline
4. liability under civil law
5. conviction under criminal law
IV. Electronic Agreement ProcessUse of information technology at WLU is governed by the WLU Policy, found in the printed 2005-2006 University Calendar, entitled "Principles in the Use of Information Technology". The Policy is set out above.By clicking on the "Agree" icon below the Policy, you are agreeing to be contractually bound by the Policy in the use of WLU computer facilities and services. If you click "Agree" without reading the Policy, you are still agreeing to be bound by all of the principles without limitation.
If you click on "Disagree", your connection will terminate. You have the option to communicate your concerns and comments to the Director, Information Technology Services.