[index (frame version)]       [index (text version)]

COMPUTING AND NETWORKING: ACCEPTABLE USE POLICY

Introduction:
The intent of this acceptable use policy is to provide rational guidelines for the appropriate use of the University of Windsor's computing and networking facilities, including both hardware and software.  The policy recognizes that deliberate, malicious use of these facilities has been, and will likely continue to be, rare.  The policy further assumes an attitude of cooperation, goodwill, and appropriate network "etiquette" on the part of university faculty, staff and students using our central facilities.  The approach is therefore one of broad guidance rather than restrictive control.

The dynamic growth of networking, both on campus and around the world, raises some specific concerns regarding the nature of interpersonal and inter-institutional communication over the network.  Issues of copyright, censorship, legal liability, and others, have not been resolved to the point where a universal approach to any one issue has been adopted.  As debate over those issues continues, common sense is the most pragmatic approach to defining acceptable use of our own networking services.

General Principles:

1.  The computing and networking facilities of the University of Windsor support instructional, research, public service, and other intellectual pursuits by students, faculty and staff that are consistent with the    university's mission.

2.  Since campus network services enable open scholarly communication on a world-wide basis, they are subject to the acceptable use guidelines established by regional and national networks (e.g. Onet and the Internet).  Individuals who make use of these external networks should familiarize themselves with the applicable guidelines, copies of which are available from Computing Services.

3.  Anyone using an external network, or an administrative system, requires a unique ID and password.

4.  The holder of a computer ID and password is responsible for protecting campus computing facilities from unauthorized access by keeping the password confidential and by changing it regularly.

Acceptable Use:

Generally, any computing or network communication activities which fall within these general principles are considered acceptable use of campus computing and networking facilities.

Unacceptable Use:

Confirmed incidents of unacceptable use will result in sanctions ranging from verbal warnings, to revocation of computing privileges, to expulsion, and criminal prosecution.  Unacceptable uses include:

1.  Uses that violate federal or provincial laws, or university bylaws and policies such as those concerning information confidentiality.

2.  Any uses that unduly interfere with the work of others or with the work of host systems.  This includes, but is not limited to: unauthorized use of a computer ID or password; seeking information about or attempting to modify the University's computer security system; and knowingly propagating computer viruses or electronic chain letters.

3.  Unauthorized copying of proprietary software, publications or files.

4.  Uses of commercial software that in any way violate the applicable licensing agreement.

5.  Uses related to commercial activities including, but not limited to, distribution of advertising material, offering network information or services for sale or personal gain, and private enterprises.

6.  Computer information that portrays either men or women or their body parts in a pornographic or derogatory manner.

Revised: October, 1992
 

[index (frame version)]       [index (text version)]