|
PROCEDURES: |
USE OF COMPUTER FACILITIES |
|
Effective Date: |
January 25, 2005 |
|
Revised Date: |
|
|
Review Date: |
January 25, 2015 |
|
Approving Body: |
President |
|
Authority: |
Policy: Use of Computer Facilities |
|
Implementation: |
Vice-President (Adminstration) |
|
Contact: |
Executive Director of Information Services Technology (IST) |
|
Applies to: |
Students, External Parties [Sponsored Users], and Employees [All Employee Groups] |
2.0 Procedures
2.1 Authorized use
2.1.1 Authorized use includes University purposes associated with:
(a) Teaching and learning support
(b) University approved research including graduate theses
(c) Community services in furtherance of or related to the above
(d) Administration of the University
(e) Outside professional activity in accordance with University policy
2.1.2 Users may use their computers and network accounts for non-University matters except where such use would be prohibited by this or other University policy or where such use unreasonably interferes with academic uses, job performance, or system performance/operations.
2.2 Unauthorized use
2.2.1 Unauthorized use of University owned computer systems and networks includes:
(a) Use of or access to another person's system, userid, password, files, email or other data without that person's permission unless authorized by the Vice-President (Administration);
(b) Attempting to circumvent security facilities on any system or network or failing to keep security on University owned equipment current;
(c) Engaging in any activity that might be purposefully harmful to systems or to any data stored thereon;
(d) Placing any destructive or nuisance programs such as viruses or worms into a system or network;
(e) Sending fraudulent, harassing, threatening or obscene messages;
(f) Transmitting commercial advertisements, solicitations or promotions for any other commercial purpose not authorized by the University administration;
(g) Intentionally accessing or collecting pornography or other material inappropriate to a public workplace except when such collection is necessary for a research project approved by the University Ethics Committee;
(h) Sending unauthorized bulk email (spam);
(i) Using the system to excess in non-University related activities;
(j) Using the systems or networks for personal financial gain, excluding outside professional activity as defined above;
(k) Unauthorized use of the "University" name; and
(l) Engaging in any other activity that does not comply with the above policy.
2.3 Consequence of unauthorized use
2.3.1 Persons found to have used University owned and operated computer systems and networks for unauthorized purposes are subject to University discipline up to and including dismissal/expulsion and/or any other action in accordance with applicable University governing documents and collective agreements.
2.3.2 In cases of financial loss to the University, restitution may be sought.
2.3.3 IST may disconnect any machine connected to a University operated network, including faculty owned computing and networking equipment which does not have current security facilities installed and which could jeopardize the integrity and operation of the University network.
2.3.4 Ignorance of the Policy: Use of Computer Facilities or these Procedures is not an excuse for non-compliance.
2.3.5 To ensure consistency of application, investigation of unauthorized use is the sole responsibility of IST to coordinate under the authority of the Vice President (Administration). When unauthorized use is suspected, you should contact either:
(a) Computer Security Coordinator, IST;
(b) abuse@umanitoba.ca; and
(c) Security Services, Director.
3.0 Accountability
3.1 The University Secretary is responsible for notifying the contact person for this Procedure when a formal review is required.
3.2 The Executive Director of Information Services and Technology is responsible for the communication, administration and interpretation of this procedure.
4.0 Review
4.1 Formal Procedure reviews will be conducted every ten (10) years. The next scheduled review date for these Procedures is January 25, 2015.
4.2 In the interim, this/these Procedure(s) may be revised or rescinded if:
(a) the Approving Body deems necessary; or
(b) the relevant Bylaw, Regulation(s) or Policy is revised or rescinded.
5.0 Effect on Previous Statements
(a) all previous Board/Senate Procedures, and resolutions on the subject matter contained herein;
(b) all previous Administration Procedures, and resolutions on the subject matter contained herein; and
(c) Policy 238: Use of Computer Facilities.
6.0 Cross References
Policy: Use of Computer Facilities
Use of Computer Facilities: Policy