<York Calendars<Undergraduate
Calendar 2001-2002<University Policies
and Regulations
Policy on Computing and Information Technology
Facilities
In
order to promote the ethical and responsible use of computing and
other information technology facilities, general guidelines have
been established for all students by the Senate Committee on Academic
Computing in consultation with an administrative task force on computing
at York. York's Budget and Policy Committee has also approved the
principles and guidelines set out below.
1.
York University's computing and information technology facilities
are made available to students in support of their academic objectives
and requirements; to faculty in support of their teaching, research
and administrative activities; to staff in support of their assigned
responsibilities; and to other authorized users. Such facilities
may include computers and associated peripherals, the communication
infrastructure and related equipment, facsimile machines, scanners,
copiers, telephone, video and other multimedia devices and forms
of software.
2.
Computing and information technology facilities may be used only
in a manner which does not contravene York University's relevant
policies, codes, agreements, network protocols and provincial and
federal laws.
3.
Access to computing and information technology facilities is a privilege.
Users who contravene the relevant policies and laws may be subject
to immediate withdrawal of the privilege and/or disciplinary procedures.
Illegal acts involving computing and information technology facilities
may also be subject to criminal prosecution or other legal action.
Guidelines
Users
shall
1.
Be responsible for using these facilities in an effective, ethical
and lawful manner.
2.
Respect the rights and interests of others.
3.
Respect the property of others, including intellectual property.
4.
Respect the copyrights of the owners of all software and data they
use.
5.
Respect the licensing agreements entered into by the University.
6.
Respect privacy and confidentiality.
7.
Use only those facilities for which they have authorization, whether
these facilities are at York University or at any other location.
8.
Use facilities and services only for their intended purposes.
9.
Take all reasonable steps to protect the integrity and security
of the facilities including software and data.
10.
Properly identify themselves in any electronic correspondence and
provide valid, traceable identification if required by applications
or servers within the University's facilities or in establishing
connections with the facilities.
Users
shall not
1.
Access systems or data without authorization.
2.
Alter systems, software and/or data without authorization.
3.
Copy software and/or data without authorization.
4.
Destroy or remove software and/or data without authorization.
5.
Disclose data without authorization.
6.
Interfere with the processing of a system, such as deliberately
overextending the resources of a system.
7.
Misrepresent themselves as another user.
8.
Disclose confidential passwords, access codes, account numbers or
other authorization assigned to them.
9.
Change another person's password without authorization.
10.
Use the University facilities and resources for unauthorized purposes,
including unauthorized commercial purposes.
|