To promote the responsible and ethical use of Mount Saint Vincent University computing resources, all Mount computer users will be expected to adhere to the computer use regulations described here.
In addition to these norms, users may also be subject to additional regulations set by those responsible for a particular computing facility. Such regulations must be publicized. With due regard for the right of privacy of users and the confidentiality of their data, authorized university staff will routinely monitor computing activity in order to safeguard the security and smooth operation of Mount computing resources.
Individuals must respect the rights of other authorized users. The following activities are prohibited:
- using the computer access privileges of others or sharing one’s username and password; interfering with the security or confidentiality of other users’ files or maliciously destroying any computer stored material including that in primary storage;
- impeding others or interfering with their legitimate use of computing facilities (this includes but is not limited to sending obscene, threatening, or repeated unnecessary messages or downloading pornographic material);
- illegally copying programs or data that are the property of the University or other users or putting unauthorized or forbidden software, data files, or other such computer-related material on university computers;
- interfering with the normal operation of computing systems or attempting to subvert the restrictions associated with such facilities;
- using computing resources for purposes not in accordance with educational and/or research activity;
- failing to follow specific rules set out by the faculty member or department in charge of the course for classes, tests, or exams held in a computer lab;
- using the Internet and other computing resources for purposes deemed to be “recreational” to the detriment of curriculum-related uses.
Violations of the rules or procedures as published may result in withdrawal of computer access for the individual concerned and in all Mount Saint Vincent University usernames/user-IDs owned by that individual being disabled.
Procedures for Dealing with Student Violations
The specific procedures to be followed when a student allegedly violates the Computer Use Regulations will depend upon the nature and severity of the violation. Infractions may also be dealt with under the provision of the Student Judicial Code, Harassment and Discrimination Policy, Sexual Harassment Policy, or departmental or other academic policies. Violations may also lead to referral to law enforcement authorities.
▸ Level One
The faculty or staff member and/or her/his chairperson or supervisor, will speak to the student who has been accused of violating the Computer Usage Agreement. A mutual resolution will be sought, followed by a short memo to the Director of Information Technology and Services (IT&S), and a copy to the student. The memo should simply outline the name of the student, indicating that she/he was spoken to about a computer usage issue and that a satisfactory resolution has been found. This will allow repeat offences of seemingly one time or innocent violations to be monitored, in case the same issue has come up with another faculty member.
▸ Level Two
Level two offences will be defined as repeat offences of level one. The Director of IT&S will forward the information to the Associate Vice President of Student Experience for appropriate action based on the nature of the offences. This could include the involvement of the Student Judicial Committee, the Registrar, or the Sexual Harassment Advisor. Procedures of the specific policy or code will be followed.
▸ Level Three
Level three offences are those offences that are more serious in nature and which pose an immediate threat to the campus network. In such cases, faculty should contact the Director of IT&S immediately to identify the issue. In these cases IT&S network staff may be the first party to identify the issue. The Director of IT&S, in consultation with the University President or her designate, will immediately terminate the student’s access to the Mount’s computing facilities. The process will then continue in accordance with the guidelines noted for level two offences.