<University Policies and Regulations
Policy on Computing and Information Technology Facilities |
|
In order to promote the ethical and responsible use of computing and other information technology facilities, general guidelines have been established for all students by the Senate Committee on Academic Computing in consultation with an administrative task force on computing at York. York's Budget and Policy Committee has also approved the principles and guidelines set out below.
1. York University's computing and information technology facilities are made available to students in support of their academic objectives and requirements; to faculty in support of their teaching, research and administrative activities; to staff in support of their assigned responsibilities; and to other authorized users. Such facilities may include computers and associated peripherals, the communication infrastructure and related equipment, facsimile machines, scanners, copiers, telephone, video and other multimedia devices and forms of software.
2. Computing and information technology facilities may be used only in a manner which does not contravene York University's relevant policies, codes, agreements, network protocols and provincial and federal laws.
3. Access to computing and information technology facilities is a privilege. Users who contravene the relevant policies and laws may be subject to immediate withdrawal of the privilege and/or disciplinary procedures. Illegal acts involving computing and information technology facilities may also be subject to criminal prosecution or other legal action.
Guidelines
Users shall
-
Be responsible for using these facilities in an effective, ethical and lawful manner.
-
Respect the rights and interests of others.
-
Respect the property of others, including intellectual property.
-
Respect the copyrights of the owners of all software and data they use.
-
Respect the licensing agreements entered into by the University.
-
Respect privacy and confidentiality.
-
Use only those facilities for which they have authorization, whether these facilities are at York University or at any other location.
-
Use facilities and services only for their intended purposes.
-
Take all reasonable steps to protect the integrity and security of the facilities including software and data.
-
Properly identify themselves in any electronic correspondence and provide valid, traceable identification if required by applications or servers within the University's facilities or in establishing connections with the facilities.
Users shall not
-
Access systems or data without authorization.
-
Alter systems, software and/or data without authorization.
-
Copy software and/or data without authorization.
-
Destroy or remove software and/or data without authorization.
-
Disclose data without authorization.
-
Interfere with the processing of a system, such as deliberately overextending the resources of a system.
-
Misrepresent themselves as another user.
-
Disclose confidential passwords, access codes, account numbers or other authorization assigned to them.
-
Change another person's password without authorization.
-
Use the University facilities and resources for unauthorized purposes, including unauthorized commercial purposes.
|