Acceptable Use of Computer Resources

Home / About / Publications, policies and procedures  / Policies and procedures / Acceptable Use of Computer Resources
Policy Number: ITS 101 Policy Title: Acceptable Use of Computer Resources 
Supersedes Existing Policy?Policy Sponsor: Senior Vice-President, Corporate Services & CFO 
Associated Procedure:Policy Owner: Director, Information and Technology 
Related Documents and Links
1. Introduction and Purpose

The computing systems and resources of Loyalist College serve to support and enhance the academic mission of the College and its community. As well, access to the computing systems and resources at Loyalist College is a privilege to be used in effective, ethical and lawful ways that support the values of the College. The College will endeavour to maintain an atmosphere which balances respect for individual users with respect for College facilities and for College and community standards.

2. Application

This operating policy is applicable to the entire Loyalist College community using any device connected to the College data network from any access point, internal or remote. This policy includes all privately owned computers connected to the Loyalist College network. In this context, the College community includes: all registered students, both full time and part time; all paid employees, full time, part time and casual; and all others associated with the College including board members, retirees, volunteers, or contractors and such visitors as are granted periodic user status by the College.

3. Principles
  • Computing resources are provided primarily to support and further the College mission.
  • College community users are expected to comply with provincial and federal laws and Loyalist College policies and procedures.
  • Members of the College community are responsible and accountable for their actions and statements in the electronic working and learning environment, according to the disciplinary policy of their respective jurisdiction.
  • Members are expected to use reasonable restraint in the consumption of these valuable shared resources, and to use them in ways that do not interfere with the study, work or working environment of other users.
  • Generally, with respect to computing user accounts established for students, faculty and staff, there is a presumption of privacy. However, if an infraction is suspected, the traffic and files will be investigated in accordance with the appropriate College processes.
  • Computer users accessing external networks are bound by their policies, and the more restrictive policy of either Loyalist or the external network will apply
4. Acceptable Use

It is acceptable to use Loyalist College computing resources:

  • For purposes related directly to the learning process.
  • In the case of employees and contractors, for the performance of necessary job-related tasks.
  • For limited amounts of personal use of e-mail and Internet access providing such activity does not interfere with the person’s work schedule or responsibilities, or the mission of the College.
5. Unacceptable Use

The following sections outline computer user responsibilities and restrictions, together with procedures for policy violation and disciplinary measures. The College’s Student Manual and Guide, and the employee collective agreements or terms and conditions of employment may guide the application of sanctions and disciplinary actions. Federal and provincial statutes are strictly enforced and Loyalist College offers its full support and cooperation in the investigation, apprehension and prosecution of any person utilizing College computing resources in the commission of a crime or suspected illegal activity.

This “Acceptable Use Policy for Computing Resources” will be posted prominently within College computing facilities and will be available in various publications distributed to students.

6. User Responsibility
  • 6.1 Users are responsible for any and all use of their User Accounts. As such:
    • Users should maintain secure passwords for any and all accounts assigned to them.
    • Users should ensure and safeguard against others obtaining unauthorized access to their accounts.
    • Users should not share passwords or any other access control information for their accounts.
  • 6.2 Users are responsible for ensuring the confidentiality of any restricted data or information they have been granted access to. As such:
    • Users should ensure that confidential information is not observed by others while working at a computer.
    • Users should not leave their computers unattended while logged on to their accounts.
    • Users should exercise discretion when printing confidential information which may be viewed or observed by unauthorized persons.
    • Users may not copy, send, duplicate or transmit by any means, confidential data from College systems for any purpose other than performance of College related business.
  • 6.3 Users must comply with all copyright and license conditions associated with College computing systems. As such:
    • Users must not move, copy or transfer programs, files or other forms of software from one computing system to another without proper authorization to do so.
    • Users must not distribute, sell or make available software to any person where prohibited by copyright or license.
    • Users must not access and use software belonging to or owned by Loyalist College without proper authorization and license rights.
7. User Restrictions

Users must use computing resources only for the purposes for which they were authorized. As such:

  • 7.1 Users must not use College computing resources for private business use or for any form of direct personal financial gain. Sale of personal items, automobiles, etc., can be posted on the Staff Bulletin Board of the Wiki.
  • 7.2 Users must not use College computing resources to build support for personal or political causes. This is not intended to discourage non-political, non-partisan involvement.
  • 7.3 Users must not use College computing resources for the creation, transmission, storage, access or viewing of materials which in any way contribute, support or promote actions which are prohibited on the basis of harassment and/or discrimination including but not limited to the categories of:
    • Harassment
    • Sexual Harassment
    • Racial/Ethnic/Cultural Harassment
    • Discrimination
    • Poisoned Environment
    • Hate Literature
    • Systemic Harassment/Discrimination
    • Reprisal
      • This restriction is not intended to interfere with legitimate and appropriate uses for teaching purposes.
  • 7.4 Users must not use College computing resources for the creation, transmission, storage, access, or viewing of materials prohibited by federal and/or provincial law, or which, in the sole opinion of the College, are offensive by community standards and values. These restrictions include, but are not limited to the following:
    • Any form of material supporting or contributing to the harassment or discrimination as categorized in restriction # 3;
    • Any form of pornographic, obscene or sexually explicit material; or
    • Any form of illegal trade, negotiation or conspiracy to conduct illegal acts.
  • 7.5 Users must not use College computing resources for the creation, transmission, storage, access or viewing of materials which are deemed by the College to serve no useful academic or administrative purpose. These restrictions include, but are not limited to the following:
    • On-line gaming such as multi-player internet or local area network games.
    • Downloading, copying or transmittal of personal use software or any other form of electronic information and materials.
    • E-mail communications which denigrate the objectives of the College. If the proposed communication is questionable, it should first be referred to the Vice-President, Corporate Services. Appeals may be made to the President.
  • 7.6 Users must not attempt to interfere with the normal operation of College computing systems, facilities or resources. As such users must not:
    • Attempt to encroach on others’ use of computing facilities.
    • Attempt to subvert the restrictions associated with their computer accounts.
    • Attempt to gain access to systems both inside and outside of Loyalist College for which they have no authorization.
  • 7.7 Users must not utilize any College computing facilities for the purpose of creation, development, storage, replication or transmittal of any program, code, subroutine or other means intended to disrupt, interfere, destroy or corrupt the normal operation of systems or data. (e.g., viruses, worms, hack utilities, net snooping utilities).
8. Procedure for Policy Violation

The following guidelines outline the procedures and disciplinary measures which may be invoked in instances of policy violation. Progressive disciplinary measures are instituted in instances of minor violations. More serious offenses including but not limited to issues of harassment, discrimination, threats to personal safety, substantial risk to a College member (staff, students or visitors) or major damage to College systems will result in immediate disciplinary measures aimed at safeguarding or protecting individuals or College resources.

The process for addressing alleged violations of the Acceptable Use Policy for Computing is as follows:

  • 8.1 A first violation (minor) will result in a warning to cease the alleged violation. Warnings may be issued by any College employee witnessing or suspecting a violation of this policy by any student or visitor of the College. Warnings may be issued by any College Manager/Official witnessing or suspecting a violation of this policy by any staff member.
    • A meeting may be set up to review the alleged violation, allow the individual an opportunity to respond, and to discuss the warning. In the case of a student, such meeting shall be attended by the staff member witnessing or suspecting the violation, the coordinator of the program in which the student is enrolled or the responsible Dean.
  • 8.2 A second violation (minor) will result in a written warning from the appropriate Director, Dean, or Vice President Corporate Services. At that point the alleged violation is considered to have become a disciplinary matter and will be referred to the appropriate disciplinary body or process.
    • In issues of student violation, the Dean of the appropriate School, in conjunction with the program coordinator shall determine the course of disciplinary action. Matters of harassment or discrimination are governed by the College’s Policy on Harassment.
  • 8.3 Third and subsequent violations (minor) may, in the sole judgment of the College, result in restriction or complete suspension of access to computing facilities. Such sanctions will remain in effect until the investigation of the alleged violation is complete. Opportunities for review and discussion of the alleged violation will be subject to the “Academic Appeal Procedure” or in the case of staff, the provisions of the College’s employee groups’ collective agreements or terms and conditions of employment.
  • 8.4 The Vice President Corporate Services may, in his sole judgment, deem conduct to be a major violation of this policy, rather than a violation (minor). The Vice President Corporate Services may impose whatever measures are reasonably necessary to balance academic freedom against the prevention of a major violation or a reoccurrence of a major violation, including but not limited to immediate restriction or suspension of access by any person or persons to computing resources and services, whether before, during or after investigation of the matter has been completed. Opportunities for review and discussion of the alleged violation will be subject to the “Academic Appeal Procedure” or in the case of staff, the provisions of the College’s employee groups’ collective agreements or terms and conditions of employment.
9. User Rules for Computer Labs

In addition to the Responsibilities and Restrictions as described in the Acceptable Use Policy for Computing the following User Rules Apply to all Academic or Public Access Computing Labs within Loyalist College.

  • 9.1 Academic computing labs (teaching or general access) serve to support the teaching and learning endeavors of the College community. Users of these facilities are expected to behave in an appropriate manner so as not to disrupt in any way users of these facilities.
  • 9.2 In accordance with section B.3 of the Acceptable Use Policy for Computing, users of these facilities shall in no way participate in actions which are prohibited on the grounds of harassment, discrimination or by way of illegal act. Examples include the access, transmittal, storage or viewing of materials reasonably determined to be:
    • sexually explicit, pornographic, obscene, harassing or discriminatory (on the basis of race, ethnicity, culture, gender or sexual orientation), supporting or contributing to hatred of any group or in any way threatening, as perceived by any individual or group.
  • 9.3 In order to ensure the proper functioning of these labs, users must not in any way tamper, change, or disrupt the normal function of the hardware and software contained within these facilities. Examples include such things as changing operating system configurations, desktop attributes or software functions.
  • 9.4 Lab users shall not download, store or install any software or other electronic file which does not support an approved academic purpose, which is for personal use or for which they do not have the explicit consent to do so by an authorized College official.
  • 9.5 Lab users must not access, store or transmit any program, code, subroutine or other electronic file which is known or ought to have been known by them to contain destructive or interfering capabilities such as viruses.
  • 9.6 Lab users shall not use the computer systems or services of Loyalist College for personal or business use, for any form of direct personal financial gain or the support or promotion of a political or personal cause.
  • 9.7 Lab users shall not participate in any form of personal group messaging such as “chat lines”, IRC, ICQ or other forms of synchronous or asynchronous group messaging unless specifically permitted as a program requirement.
  • 9.8 Lab users must not use the printing services contained within these labs for any non- academic, personal use e.g., flyers, internet documents, manuals etc.
  • 9.9 Multi-copy printing is strictly prohibited. Photocopy services are located throughout the College campuses for such use.
  • Lab users must in no way misrepresent their identity through impersonation, alias or anonymity so as to conduct or transmit any communication, data or other file.
  • 9.11 Plagiarism, theft, cheating on tests, assignments or reports, misrepresentation of identity, or the falsification of data in any way constitutes “Academic Dishonesty”. Academic Dishonesty, as described in the “Student Manual and Guide” is a serious offense and extends to the users of computing lab facilities.
  • 9.12 Upon request, lab users must present, upon request College identification in the form of a current Student or Staff ID card.
10. Student Lab Acceptable Use Policy

Except where noted here, all other Loyalist College Operating Policy elements apply to the use of the Student Access Lab. It is the users’ responsibility to read and clearly understand all elements of this policy. Any breach of this policy will be dealt with under the guidelines set forth in ‘Section C’ of this document.

The Student Access Lab is funded by the technology fee paid by full-time and part-time post- secondary day students at the time of registration. These fees allow privileges within the Student Access Lab beyond what is allowed in other labs around Loyalist College. With these added privileges come responsibilities:

  • 10.1 Food and beverages are not allowed in the Student Access Lab.
  • 10.2 During times when the Student Access Lab is busy, equipment is to be used for course related work exclusively. Anyone using equipment for personal or non-course related work during such times shall, upon request, relinquish their computer to allow others to work on course related material.
  • 10.3 Personal use of equipment, within reason, will be allowed in the Student Access Lab during off peak hours. This includes personal e-mail and chat.
  • 10.4 Games and file sharing (i.e. Kazaa, Napster, BearShare, etc.) will not be allowed at any time.
  • 10.5 Adult websites are offensive to others and are not acceptable anywhere in our educational environment. As a result, anyone visiting a website containing “adult” material will be asked to leave the Student Access Lab immediately.
  • 10.6 The Student Access Lab is considered a study area and as such, noise must be kept at an acceptable level. Quiet discussions will be tolerated, but anyone making an excessive amount of noise shall upon request by a lab assistant, leave the lab.
  • 10.7 Lab assistants will be available in the Student Access Lab during hours of operation to assist with basic computer problems (i.e. saving files, printing, etc.). Assistants will not assist with course related material. Course related questions should be directed to the appropriate instructor. Lab assistants also have a responsibility to enforce computer use policies and may eject from the Student Access Lab anyone who does not respect these policies.