|Topic:||Financial and Operations|
|Approval Authority:||President and Senate|
- York University's computing and information technology facilities are made available to students in support of their academic objectives and requirements; to faculty in support of their teaching, research and administrative activities; to staff in support of their assigned responsibilities; and to other authorized users. Such facilities may include computers and associated peripherals, the communication infrastructure and related equipment, facsimile machines, scanners, copiers, telephone, video and other multimedia devices and forms of software.
- Computing and information technology facilities may be used only in a manner which does not contravene York University's relevant policies, codes, agreements, and network protocols, and provincial and federal laws.
- Access to computing and information technology facilities is a privilege. Users who contravene the relevant policies and laws may be subject to immediate withdrawal of the privilege and/or disciplinary procedures. Illegal acts involving computing and information technology facilities may also be subject to criminal prosecution or other legal action.
Guidelines for Users of Computing and Information Technology Facilities
- Be responsible for using these facilities in an effective, ethical and lawful manner.
- Respect the rights and interests of others.
- Respect the property of others, including intellectual property.
- Respect the copyrights of the owners of all software and data they use.
- Respect the licensing agreements entered into by the University.
- Respect privacy and confidentiality.
- Use only those facilities for which they have authorization, whether these facilities are at York University or at any other location.
- Use facilities and services only for their intended purposes.
- Take all reasonable steps to protect the integrity and security of the facilities including software and data.
- Properly identify themselves in any electronic correspondence and provide valid, traceable identification if required by applications or servers within the University's facilities or in establishing connections with the facilities.
Users shall not
- Access systems or data without authorization.
- Alter systems, software and/or data without authorization.
- Copy software and/or data without authorization.
- Destroy or remove software and/or data without authorization.
- Disclose data without authorization.
- Interfere with the processing of a system, such as deliberately overextending the resources of a system.
- Misrepresent themselves as another user.
- Disclose confidential passwords, access codes, account numbers or other authorization assigned to them.
- Change another person's password without authorization.
- Use the University facilities and resources for unauthorized purposes, including unauthorized commercial purposes.
Procedures for Dealing with Student Misconduct in the Use of York's Computing and Information Technology Facilities
Students using York University computing and information technology facilities or services are expected to abide by the above Guidelines for Users of Computing and Information Technology Facilities. Students failing to act in accordance with these Guidelines or who engage in disruptive or abusive behaviour in their use of York University computing facilities, labs or services may be required to leave the facility or be temporarily disconnected from the service.
Allegations of misconduct by students in the use of York's computing and information technology facilities or services which breach the Guidelines for Users of Computing and Information Technology Facilities shall be reported to the Office of the Dean of the student's home Faculty and/or the Office of Student Conduct. The complaint will be addressed in accordance with the procedures of The Student Code of Conduct, the Senate Academic Honesty Policy, the Senate Policy on Misconduct in Academic Research or the Senate Policy on Disruptive and/or Harassing Behaviour by Students in Academic Situations and may be subject to other codes and laws, such as relevant laws of Ontario or Canada.
Guidelines and Procedures for Account Management
Guidelines and Procedures for Use of Electronic Mail (E-mail)
Network Security and Management Guidelines and Procedures
|Legislative History:||Approved by Senate and Delegated to SCAC: 1994/12/08; Approved by SCAC: 1995/02/16; Policy Statement and Guidelines Approved by UEC: 1995/02/06; Policy Statement and Guidelines Approved by BPC: 1995/02/07; SCAC's Report to Senate on Policy, Guidelines & Procedures: 1995/04/27; Procedures for Students Implemented Under the Authority of AVP (Technological Services & Registrar) Date Effective: 1995/04/27; Amended by Senate 2007/04/26|