All eligible individuals who wish to use their U of M computer accounts must accept the usage agreement below. This agreement defines responsibilities and obligations for all users of all computer systems and networks owned and operated by the University of Manitoba.
Usage Agreement
USE OF YOUR USERID: Your computer account is for your use only, and not to be shared with anyone, including friends or family members. You are responsible for all actions performed with the use of your accounts.
Computer use, other than for your University-related work, is a privilege which can be revoked by the University at any time for administrative or other reasons, or for misuse.
By accepting a userid you also agree to use it responsibly. You also agree to comply with the University of Manitoba Policy on Use of Computer Facilities as approved by the Board of Governors. This policy is available on the University website.
EMAIL: You are responsible for reading your University account email as it will receive account invoices and other official University announcements.
EMPLOYEES: Confirmation of University of Manitoba computer accounts may require the use of personal information from the Human Resources Information System to verify your identity and employment status.
MISUSE OF COMPUTING PRIVILEGES: Persons found to have used University owned and operated computer systems and networks for unauthorized purposes are subject to University discipline up to and including dismissal/expulsion and/or any other action in accordance with applicable University policies and collective agreements. In cases of financial loss to the University, restitution may be sought.
IST may disconnect any machine connected to a University operated network, including faculty owned computing and networking equipment which does not have current security facilities installed and which could jeopardize the integrity and operation of the University network.
The University reserves the right to charge $25 to reactivate accounts that have been suspended for misuse of computer privileges.
SOME EXAMPLES OF MISUSE ARE:
- Use of or access to another person's system, userid, password, files, email or other data without that person's permission unless authorized by the Vice President (Administration).
- Attempting to circumvent security facilities on any system or network or failing to keep security on University owned equipment current.
- Engaging in any activity that might be purposefully harmful to systems or to any data stored thereon.
- Placing any destructive or nuisance programs such as viruses or worms into a system or network.
- Sending fraudulent, harassing, threatening or obscene messages.
- Transmitting commercial advertisements, solicitations or promotions for any other commercial purpose not authorized by the University administration.
- Intentionally accessing or collecting pornography or other material inappropriate to a public workplace except when such collection is necessary for a research project approved by the University Ethics Committee.
- Sending unauthorized bulk email (spam).
- Using the system to excess in non-University related activities.
- Using the systems or networks for personal financial gain, excluding outside professional activity in accordance with University policy.
- Unauthorized use of the "University" name.
- Engaging in any other activity that does not comply with the referenced policy.
Board of Governors
University Governance documents on the Use of Computer Facilities:
University Policy
Related Procedures
Useful links
Computer Accounts Information
U of M Identity Management System - Iridium
Want to stay current with the ongoings of IST? Follow us on: