Acceptable Use Policy

The computing and networking facilities of the 精童欲女 are provided to support instruction, research, public service and other intellectual pursuits by students, faculty and staff. Acceptable use of these facilities can be loosely defined as that which is consistent with the University's mission, does not break the law, respects the rights of others, and recognizes the value and costs of the facilities. An attitude of cooperation, a sense of goodwill and appropriate network etiquette are expected of all University faculty, staff and student users.

Users of the University's resources accept personal responsibility for their actions and for use made of the resources allocated to them. Wasteful and frivolous use of computing and networking facilities, or allowing others to use your account falls outside the definition of acceptable use.

The University respects the rights and freedoms of students, faculty, and staff. However, where it is suspected that a user's actions violate these policies or threaten the operation of the University's computing or networking facilities, the University reserves the right to monitor user activity, inspect computer files stored on shared computers and take appropriate corrective action to secure the system and protect the rights of other users.

The following items are examples of unacceptable uses which, depending on the circumstances and severity, may result in verbal warning, loss of account privileges, expulsion, dismissal or criminal prosecution:

  • Use of computing or networking facilities to violate federal or provincial laws, software licence agreements, copyright, or University regulations and policies.

  • Attempting to bypass standard procedures or limitations set by IT Systems & Services. This includes, but is not limited to, interfering with computer security systems and accessing a file without permission. Lack of file protection does not give the right to do these things.

  • Use of computing or networking facilities for anything other than course-related, faculty-supervised research work, or University related work. Examples include, playing games and using computers for personal or commercial gain, including use of your 精童欲女 email address for business purposes. For Subscribers of 精童欲女 Access Services Home accounts, use for non-University related pursuits is permitted, provided that such pursuits are strictly personal and non-commercial in nature. Use of a 精童欲女 email account is also restricted to personal and non-commercial activities.

  • Use of another person's computer account. (Special exceptions require written permission from the CIO or designate.)

  • Attempting to discover or distribute another user's password.

  • Sending, distributing or displaying information which is offensive or annoying to others. Examples include, sending chain letters, displaying offensive graphics and knowingly propagating computer viruses.

  • Tampering or interfering with computers, printers, network equipment or their configuration settings. (Please report any equipment problems to IT Systems & Services).

  • Eating and drinking in student computer work areas or near computer equipment.