||Information Technology Acceptable Use
This Policy outlines the underlying principles and rules that govern the use of Seneca Information Technology (IT) Resources.
"It is the Policy of Seneca College that all members of the Seneca Community are responsible for obeying provincial and federal laws and regulations and College Policy in using the College’s IT Resources. The College’s IT Resources are the sole property of Seneca College. Seneca College grants students, clients and employees the privilege to use its IT Resources to further learning, teaching and working.
In general, any use of Seneca’s IT Resources for personal benefit or political causes or for personal commercial gain is considered to be a conflict of interest and in violation of this Policy and Seneca’s Conflict of Interest Policy, unless the employee/student making such use has filed a disclosure of conflict statement to the College as per the procedure listed in Seneca’s Conflict of Interest Policy and received formal approval from the College to engage in such use.
The use of Seneca’s IT Resources to engage in activities that violate the Copyright Act and the College’s Copyright Policy is strictly prohibited. Further, any use of Seneca’s IT Resources which may violate a person’s right to work and study in an environment free from discrimination/ harassment is strictly prohibited. However, Seneca College recognizes academic freedom. As such, it is not considered an offense to seek out information that may be considered offensive or sexually explicit, provided it is done for specific academic purposes and is a legitimate exercise of academic freedom, freedom of thought and inquiry, and expression in teaching and research.
As a user of Seneca’s IT Resources, you are responsible for abiding by the Information Technology Acceptable Use Policy (ITAUP) and the Protocol for Dealing with Information Technology Abuse."
This policy governs the use of “IT Resources”, which include IT services, facilities and equipment the College owns or operates for the use of employees, students and others. All information stored in any form on IT Resources (e.g., in documents, video streams, audio recordings, etc.) and all communications transmitted in any manner using IT Resources (e.g., via e-mail, text-message and voice mail) are governed by this Policy.
This Policy also governs the use of social networking sites by employees and students whether or not such use relies upon IT Resources.
The content controller of this Policy will conduct a review of this Policy at least once per year or when significant business process changes occur, to ensure the information contained herein is current and applicable.
This document is classified Seneca Public, and is made freely available for public viewing. There are no special requirements on how the document shall be disposed of.
Anyone using Seneca IT Resources must comply with all applicable federal and provincial laws, the specific rules set out in this Policy and all other College policies as they apply. Please refer to Appendix A for a non-exhaustive list of applicable laws and College policies that may govern the use of IT Resources.
Use of IT Resources is primarily for academic learning, teaching or working purposes. The College permits limited personal use of IT Resources on the conditions listed below in the “Acceptable” section. Please note that personal use is subject to the College right of access that is described in section 2.5 below. Individuals who wish to engage in personal use with an expectation of privacy should not use the College’s IT Resources.
All E-mails created or transmitted on IT Resources must comply with the rules for use of College IT Resources set out above.
Social networking sites
Social networking sites are any forms of online presences or publications including, but not limited to, Facebook, Twitter, blogs, wikis, etc. that provide a platform for individuals to engage in networking activities, or publish information on the Internet. As an academic institution, the College fully endorses academic freedom of speech on social networking sites. However, the use of IT Resources to engage in social networking and publish information on the internet is subject to all the rules set out above. In addition, the College prohibits the following activities whether or not it is facilitated by the use of College IT Resources:
Note that publishing information on a social networking site that can only be accessed by a limited number of people is still “publishing” under this Policy.
Personal Computing Devices
Students, employees and others may connect personal computing devices (e.g., laptops, handheld devices, tablet computers or similar devices) to the College network. However, use of personal computing devices on the College network is subject to all the rules for use of College IT Resources set out above and is subject to the College right of access that is described in section 2.5 below. Individuals who wish to send private communications and data to and from their personal computing devices should not use the College’s IT Resources. The College may, when necessary to an ongoing investigation, ask to examine a personal device and make copies of relevant information. Individuals who deny the College access may face consequences (section 2.5) for failing to cooperate.
Furthermore, individuals must ensure that every mobile device connected to the College network satisfies the following security requirements:
Enforcement, Privacy and Consequences of Policy Violations
Employees, students and clients are responsible for reporting all suspected infractions of this Policy to the IT Security Officer at email@example.com or the Student Conduct Office at firstname.lastname@example.org.
The College may access and use all information and data stored on and communicated through its IT Resources for its legitimate purposes, including to facilitate work in an employee’s absence, to conduct routine technical administration, to routinely audit system use, to investigate suspicions of improper system use and to comply with legal obligations. Individuals who engage in personal use of College IT Resources are deemed to accept that the College has this right of access and may raise no expectation of privacy that prevents the College from accessing and using information and data for its legitimate purposes.
When it suspects a Policy violation, the College may restrict access to IT Resources pending completion of an investigation. When it finds a Policy violation, the College will exercise its rights to take appropriate disciplinary action including, but not limited to,
In addition to internal College sanctions that can impact on a student’s academic performance or employee’s employment, the College may report suspected violations of the law to law enforcement and will cooperate with all local, national and international law enforcement agencies. The College is not responsible for sanctions taken by these agencies for violations of this Policy that are against local and international laws and/or criminal codes.
||Information Technology Acceptable Use
Federal/Provincial Laws and College Policies Governing Use of IT resources
Legislation and College policy which affects the use of IT resources include, but are not limited to:
FOR FURTHER INFORMATION CONTACT the IT Security Officer at email@example.com or the Student Conduct Office at firstname.lastname@example.org