- Policy #:
- Responsible Authority:
- Director, Information, Institutional Research and Technology Services (IIRTS)
- Approval Authority:
- President's Executive Committee
- Executive Sponsor:
- Vice President, Business Development
- Approval Date:
- Last Reviewed:
- Mandatory Revision Date:
- Downloadable Version:
- Acceptable Use Of Computer Networks and Accounts
To establish standards for the use of College networks and computer accounts.
All College employees and students
A computer facility or lab operated by the College or by a department which provides computing resources or network access to students and employees
Identifying credentials that allow a user to access a computing resource. Generally a user ID is associated with a password which makes up a user credential
A set of principles and guidelines that govern the use of a network or computing system resource
A user who, through his/her user credentials, has been authorized to use a computing resource
A valid user ID and password, combined within an authentication system or method that grants the user access to a system or resource.
A system or method that matches an expected password to a provided password and grants or denies access to a resource through user credentials
- The users of the College network are responsible for respecting and adhering to local, provincial, federal and international laws, as well as the policies of the College. Computers and networks can provide access to resources on and off campus, as well as the ability to communicate with other users worldwide. Such open access is a privilege, and requires that individual users act responsibly. Users must respect the rights of other users, respect the integrity of the systems and related physical resources.
- Authorized users of College network facilities shall be issued a unique User ID. Prior to being issued a unique User ID, users shall agree in writing to uphold the User Agreement appended to this policy (Appendix 1). The User Agreement may be amended from time to time as deemed appropriate by the College. Authorized users are responsible for maintaining the confidentiality of their passwords and the security of their accounts. Authorized users are solely responsible for all actions, including electronic messaging, taken while the User ID is in use.
- Any attempt to violate the provisions of this policy, regardless of the success or failure of the attempt, will result in disciplinary action. Disciplinary action may range from reprimand to loss of account privileges to maximum penalties afforded under College policies, which could include expulsion of a student from the College or the termination of employment for employees.
- Any attempt to circumvent local, provincial, federal, or international laws through the use of College-owned facilities may result in litigation against the offender by the appropriate authorities. If such an event should occur, the College will fully comply with authorities to provide any information necessary for the litigation process.
- Violation of Computer and Internet use could result in a criminal offence. Such violations would include:
- Unauthorized use of a Computer (Criminal Code section 342.1);
- Mischief (Criminal Code section 430.(1.1);
- Corrupting Morals (Criminal Code section 163);
- Making, Distributing, Selling, or Possession of Child Pornography (Criminal Code section 163.1).
- The terms “of use” cover any device connected to the College network, including personal devices that use the User ID and password to connect that device to the network or in situations where network access is granted without a User ID and password such as connecting to a network jack. The user of the device is solely responsible for adhering to this policy and related policies and laws for any device they connect to or cause to be connected to the College networks in any fashion directly or indirectly.
- Each user of the College network is responsible for ensuring the security of his/her passwords and access to network connection. The sharing of access, through peer-to-peer technology, network access hosting, proxy hosting or other technologies including Bluetooth networking is not to take place on the College network except where it supports academic learning. Similarly, the accessing of another user’s account and network privileges where the other party is unaware of the access is strictly prohibited.
8.1 The College respects the privacy of users and under normal circumstances will not access users’ accounts. However, the College reserves the right to examine the contents of users’ accounts should the need arise. Such circumstances might include suspected misuse of the facilities or protection of the integrity of the system.
- PROVISION OF INFORMATION
9.1 Information created, stored and consumed on or by College facilities is subject to a number of Provincial and College policies including but not limited to:
- Freedom of Information,
- Confidentiality of Records, and
- College Corporate Image
9.2 Information providers must use official College data provided by the department that is normally responsible for maintaining that data. For example, the Registrar is responsible for program and course information. Information providers, therefore, must use the Registrar’s data sources rather than create their own. Use of the College word-mark must comply with the College Graphic Image policy. Information provided must not consist of illegal or offensive material.
9.3 Storage media remains the property of the College and the College retains the right to examine those contents at any time.
- ACCESS CENTRES
10.1 The College provides computer Access Centres and labs throughout its campuses. All students in good standing who are entitled to use the Access Centres are responsible for complying with the posted regulations for that Access Centre. Present standards are included in IT01: Appendix 2 and IT01: Appendix 3.
Requesting, Changing or Suspending Access Credentials for Staff
Enter changes in employment status of employee into HR/PAY. The changes are picked up automatically in the nightly batch cycle and appropriate account credentials will be created or suspended depending on status.
Instruct the user to immediately change his/her password on receiving an email from Information Technology Services advising of the creation of a new account or the resumption of a suspended account. .
Immediately change his/her password to a strong password known only to him/her.
Requesting, Changing or Suspending Access Credentials for Students
Enter changes in student’s enrolment status into GeneSIS. Any change in enrolment status entered into GeneSIS will be picked up automatically in the nightly batch cycle and appropriate account credentials will be created or suspended depending on status. A letter will be generated for new student accounts and mailed to the student.
Access his/her account via the ACSIS web portal by providing personal data known only to him/her.
Immediately update his/her password to a strong password known only to him/her.
Appendix 1 Algonquin College User Agreement
Appendix 2 Access Centre Rules and Regulations
Appendix 3 Access Centre Control Procedures
SA 07 Student Conduct
AD 02 Freedom of Information
AA 34 Copyright
AA 35 Confidentiality of Student Records
AA 29 Protection of Student Information
AD 09 College Corporate Image
Unauthorized use of a Computer (Criminal Code section 342.1)
Mischief (Criminal Code section 430.(1.1)
Corrupting Morals (Criminal Code section 163)
Making, Distributing, Selling, or Possession of Child Pornography (Criminal Code section 163.1)
IT 01: APPENDIX 1
ALGONQUIN COLLEGE USER AGREEMENT
On being issued an Algonquin College Internet Account User ID, I agree that:
I am the sole person authorized to use this User ID.
I am solely responsible for all actions taken under my User ID while my User ID is valid.
I will not allow others to use my User ID.
I will not sell, lease or rent my account to another.
I will not apply for a User ID under false pretenses.
I will not use the facilities and/or services for commercial purposes.
I will not delete, examine, copy or modify files and/or data belonging to other users without their prior consent.
I will not evade or change resource quotas.
I will not deliberately impede other users through mass consumption of system resources.
I will not take any unauthorized, deliberate action which damages or disrupts a computing system, alters its normal performance, or causes it to malfunction, regardless of system location or time duration.
ELECTRONIC MESSAGING SYSTEMS:
I am responsible for all electronic mail originating from my User ID.
I will not forge, or attempt to forge, electronic mail messages.
I will not attempt to read, delete, copy, or modify the electronic mail directed to other users without prior consent.
I will not send, or attempt to send harassing, obscene and/or other threatening e-mail to another user.
I will not send unsolicited “for-profit” messages or chain letters.
I will not send unauthorized network broadcast messages.
I will not attempt to use College Systems or Networks in an attempt to gain unauthorized access to remote systems.
I will not use College networks to connect to other systems in evasion of the physical limitations of the remote system.
I will not decrypt system or user passwords.
I will not copy system files.
I will not intentionally attempt to “crash” Network systems or programs.
I will not attempt to secure a higher level of privilege on Network systems than authorized.
I will not willfully introduce computer “viruses” or other disruptive/destructive programs into the College network or into external networks.
I have read and understood this User Agreement and I agree to use my account(s) in accordance with this document.
I accept full legal responsibility for all of the actions that I commit using the College’s network according to any and all applicable laws.
I understand that from time to time the College network and attached equipment may fail unexpectedly while I am using them, and I will not hold the College responsible for lost time or data.
IT 01: Appendix 2
ACCESS CENTRE RULES AND REGULATIONS
- The College provides computer Access Centres mainly is for educational and academic purposes.
- Computers are not to be used for recreational purposes when Access Centre workstations are at full capacity. Game playing and the use of chat lines are not allowed between 7:00 a.m. and 7:00 p.m., Monday to Friday.
- No pornographic, discriminatory, or offensive material is to be displayed, transmitted, or downloaded in the Centres.
- All users must log out before leaving the Centres.
- Only software provided by the College is to be used in the Centres.
- Centres are not to be used for commercial purposes.
- Students are not to change the configuration of the machines. Problems regarding configurations should be referred to the Lab Monitors.
- No food or drink is to be taken into the Centres.
- No amplification devices are to be plugged into computers.
- No loud talking or any other disturbance is permitted in the Centres.
IT 01: Appendix 3
ACCESS CENTRE CONTROL PROCEDURES
- Users who have complaints about Access Centre operations or about other users, should address them to Lab Monitors or to Security Services staff.
- Lab Monitors may be required to draw users’ attention to the provisions of this policy. If a user fails to comply with the Lab Monitor’s request, the Monitor will report the incident to College Security Services.
- College Security Services, which includes the Security and Police Liaison functions for the College, are authorized to enforce this policy in the event of non-compliance. Access Centre users must comply with directions of Lab Monitors, staff and Security Services. Account holders should review the Penalties section of this policy for the possible consequences of non-compliance.
- Users who wish to complain may refer to the Ombudsman, the Students’ Association, the Director, Information, Institutional Research and Technology Services or the Vice President, Business Development.
- The Access Centres may be closed from time to time, in whole or in part, for maintenance. As much notice as possible will be given to users.