Governing Documents: University Community
POLICY:
USE OF COMPUTER FACILITIES
Effective Date:
January 25 , 2005
Revised Date:
 
Review Date:
January 25 , 2015
Approving Body:
Board of Governors
Authority:
 
Implementation:
President delegated to the Vice-President (Administration)
Contact:
Vice-President (Administration) or Executive Director, Information Services Technology (IST)
Applies to:
See List Below

This policy applies to:

(a) Board of Governors members
(b) Senate members
(c) Faculty/School Coucils
(d) Students
(e) External Parties Sponsored users
(f) All Employee groups


1.0 Reason for Policy

1.1 Access to University networks and computing facilities is necessary for academic staff, support staff and students to do their work and accordingly this policy is necessary to ensure the integrity and availability of these resources.

1.2 This policy defines responsibilities and obligations for all users of all computer systems and networks owned and operated by the University of Manitoba.


2.0 Policy Statement

The use of University computer systems and networks imposes certain responsibilities and obligations on users of the facilities. Such use is granted by the University of Manitoba subject to compliance with University policies and procedures as well as with local, provincial and federal laws.

2.1 Responsibilities

2.1.1 Information Services and Technology (IST) Responsibilities: To provide assurance of consistent equitable service, IST is responsible for:

(a) The safety, integrity and security of University owned and operated systems and networks;

(b) Coordinating the investigation of alleged unauthorized use of University computer systems and network under the authority of the Vice President (Administration);

(c) Providing current security information and anti-virus updates to the University community and where possible installing these updates on machines connected to the campus network automatically via the network; and

(d) Periodically informing and reminding the University community of current procedures to be followed to ensure the integrity of University computing and networking facilities.

2.1.2 Users Responsibilities To provide equitable access and employment of University owned and operated systems and networks, users have a responsibility to:

(a) Use resources only for authorized purposes as defined by the University;

(b) Protect their userid (is the access word assigned to each user of the University systems by IST) password and system from unauthorized use. Users are responsible for all activities on their userid that originate from their system with their knowledge.

(c) Access only information that is their own, that is publicly available or to which they have been explicitly granted access by the owner of the information;

(d) Comply with local, provincial and federal laws;

(e) Comply with system security mechanisms;

(f) Use only legally licensed versions of copyrighted software or copies of documents and media in compliance with terms and conditions of any vendor licensing agreement, copyright or sale terms and conditions;

(g) Comply with all University policies regarding intellectual property;

(h) Ensure that systems under their control have current security updates and anti-virus software installed regardless of ownership of the equipment;

(i) Engage in ethical workplace behaviors reflecting:

(i) academic honesty;

(ii) acceptable language of discourse;

(iii) restraint in the consumption of shared resources by refraining from monopolizing systems and/or overloading networks with excessive data or activity, degrading services, or wasting any other related resource;

(iv) respect for intellectual property and ownership of data; and

(v) respect for individual rights to privacy and freedom from harassment in such forms as intimidating, disrespectful or obscene messages, jokes or images.


3.0 Accountability

3.1 University Secretary for initiating a formal review of this Policy and Secondary Documents.

3.2 Responsibility for investigating alleged unauthorized use of University computer systems and network lies with IST under the authority of the Vice President (Administration).


4.0 Secondary Documents

4.1 The Vice-President (Administration), in consultation with the President, may approve Procedures which are secondary to and comply with this Policy.

5.0 Review

5.1 Formal Policy reviews will be conducted every ten (10) years. The next scheduled review date for this Policy is January 25, 2015.

5.2 In the interim, this Policy may be revised or rescinded if:

(a) the Approving Body deems necessary; or
(b) the relevant Bylaw, Regulations or Policy is revised or rescinded.
5.3 If this Policy is revised or rescinded, all Secondary Documents will be reviewed as soon as reasonably possible in order to ensure that they:
(a) comply with the revised Policy; or
(b) are in turn rescinded.

6.0 Effect on Previous Statements

6.1 This Policy supersedes the following:
(a) all previous Board/Senate Policies, Procedures, and resolutions on the subject matter herein;
(b) all previous Administration Policies, Procedures, and directives on the subject matter contained herein; and
(c) Policy 238: Use of Computer Facilities.

7.0 Cross References

Patents and Copyright

FIPPA and PHIA

Cessation of Staff Employment/Appointment - Exit Procedures

Procedures:Use of Computer Facilities