Technology Acceptable Use Policy
It is the Policy of Seneca College that all members of the Seneca Community are responsible for obeying Provincial and Federal laws/regulations and College Policy concerning the use of information technology services, facilities and equipment.
Further, any materials which may violate a person's right to work and study in an environment free from discrimination/ harassment are not to be stored, displayed, transmitted or otherwise linked to Seneca College information technology services, facilities and equipment.
However, Seneca College recognizes the individual right to access information. As a user of the College information technology services, facilities and equipment, you are responsible for abiding by the Information Technology Acceptable Use Policy and the Protocol for Dealing With Information Technology Abuse.
Employees, students and clients are responsible for reporting all, believed to be, or perceived infractions of the Information Technology Acceptable Use Policy to the Information Technology Security Officer (CSO). The CSO can be reached electronically at firstname.lastname@example.org. Documented and substantiated complaints shall be handled through the Protocol For Dealing With Information Technology Abuse.
Overall, the Information Technology Acceptable Use Policy asks that you obey the law and be considerate of others' needs.
Seneca College grants students, clients and employees the privilege to use its information technology services, facilities and equipment to further learning, teaching and working. The College expects a standard of conduct while using these resources. This standard stipulates that you may use these to meet your learning, teaching or working needs.
However, it is a violation of College Policy to:
ALLEGED VIOLATIONS OF THE ABOVE POLICY ARE HANDLED BY THE CENTRE FOR EQUITY AND HUMAN RIGHTS, IN CONJUNCTION WITH INFORMATION TECHNOLOGY AND COMMUNICATION SERVICES.
FOR FURTHER INFORMATION CONTACT THE CSO (email@example.com).
Revised May 1998
|Protocol For Dealing
With Information Technology Abuse
All employees, students and clients are expected to abide by the Information Technology Acceptable Use Policy and accompanying Protocols.
Seneca College has developed standards of behaviour when using information technology services, facilities and equipment. All members of the Seneca Community are responsible for obeying the law and College policy with regards to the use of information technology services, facilities and equipment. Legislation and College policy which affects the use of information technology services, facilities and equipment include, but are not limited to:
Seneca College has a process in place for filing individual complaints of Discrimination/ Harassment. In addition, where the College does not receive an individual complaint but is aware of activity which violates the law or College policy and impairs the objectives of the College, a College complaint will be initiated. In these instances, the College is obliged to take action.
All other alleged violations of the Information Technology Acceptable Use Policy will be processed using the following procedure.
A. Reporting of Alleged Violations
1) Employees, students and clients are responsible for reporting all believed to be or perceived infractions of the Information Technology Acceptable Use Policy to the Computing Security Officer (CSO). The CSO can be reached electronically at firstname.lastname@example.org.
2) Reports can be made to a local technician or administrator who is then responsible to report to the CSO.
B. Local Technician/Administrator Responsibilities - Immediate Response
1) The Local Technician/Administrator is responsible for ensuring that login logs, login failures and usage logs are preserved wherever possible.
All non-required services and daemons should be turned off (i.e., mail turned off on servers where it is not required for learning or teaching purposes).
2) Warnings may be issued for minor infractions of the Information Technology Acceptable Use Policy or Local policies. Discretion must be used when issuing a warning. A sample wording has been developed and should be used. All warnings will be copied to the Centre for Equity and Human Rights (CEHR) and the CSO for central record keeping.
3) No actions will be taken regarding severe discipline for an infraction without a proper investigation and the involvement of the Centre for Equity and Human Rights.
C. Security Officer - Technical Investigation
1) Upon receipt of a report, the CSO or College designate will conduct a preliminary investigation to collect information about the report and determine if the incident could possibly be a breach of any applicable College policy, provincial code or federal law.
2) Where the CSO and/or College designate has sufficient information that the incident could be a breach, he/she will report it immediately to the Centre for Equity and Human Rights (CEHR). The College may also assign the responsibility of collecting pre- investigation material to a local technician.
3) If the material in question resides on College computer equipment, facilities or networks (for example a web page on Seneca's server), the material may be removed pending an investigation. If the incident involves abuse of e-mail or other information technology activities, account privileges for the alleged offender may be suspended pending an investigation. This decision will be made by either the CSO or CEHR, depending upon circumstances.
D. Centre for Equity and Human Rights Responsibilities - Formal Investigation and Resolution
1) Upon receipt of the CSO's report, CEHR will conduct an investigation which will include, but is not limited to, the following: review of the CSO's report, inspection of any materials or evidence presented, and interviews with any parties who were involved or may have knowledge of the incident.
2) Where the incident breaches the Colleges Policy on Discrimination/Harassment or the Ontario Human Rights Code, CEHR will initiate proceedings under the Colleges Procedures on Discrimination/Harassment.
3) Where the incident breaches the Criminal Code of Canada or Provincial laws/regulations, the CEHR will notify the appropriate Police Force.
4) Where the incident breaches the Information Technology Acceptable Use Policy, CEHR will discuss the investigative findings with the CSO and appropriate disciplinary action will be initiated.
Where incidents are found to be in violation of College policy, the College will exercise its rights to take appropriate disciplinary action, including but not limited to verbal/written warnings, rescinding of e-mail or internet accounts, removal of materials from College computer equipment facilities and network, disciplinary directives, behavioural contracts, suspension and/or expulsion/dismissal from the College.