Guidelines for the Use of Information Technology University information technology facilities include computing devices and associated peripherals, communications infrastructure and related equipment, facsimile machines, scanners, copiers, telephones, video and other multimedia devices and all forms of software. Appropriate use of information technology includes, for example: respect for the rights of others respect for the property of others consideration of other persons using shared systems, equipment and facilities confidentiality in use of passwords respect for the privacy of others use of tools for the purpose for which they are intended adherence to the rules governing use of accounts, equipment, networks, or other facilities, whether the rules are established by Trent University or by the organizations providing these tools to the University, and adherence to etiquette and culture as defined in systems that you use Inappropriate use of information technology includes, for example: unauthorized access, alteration , destruction, removal and/or disclosure of data, information, equipment, software, or systems deliberate over-extension of the resources of a system or interference with the processing of a system attempts to access confidential information, passwords uses which violate copyright law disclosure of confidential passwords and/or access devices or information for accounts, equipment, and telephone voice mail (as available) use of University facilities and resources for the purposes of personal financial gain issuance of junk mail propagation of hate literature harassment, including sexual harassment theft of resources malicious or unethical use, and use that violates University policy and regulations or provincial or federal laws Resources and tools are made available to employees in support of their teaching, research, and administrative activities and to students in support of their respective academic objectives and requirements. Where devices, such as computers, are the property of the user, the appropriate use expectations still apply when such devices are used to access University information technology facilities. Use is circumscribed by relevant codes and university policies such as the Computer User Code of Ethics, the Ontario Human Rights Code, the University's Policy on Harassment and Discrimination and the Criminal Code of Canada in concert with various rules and guidelines adopted in specific academic and administrative units. The nature, severity and possible consequences arising from infractions of the use of University information technology resources cover a wide spectrum. The speed, nature and escalation of action will be commensurate with the severity of the infraction. Notes on Use of Trent's Information Technology Resources Respecting the Rights of Others Trent University is committed to ensuring a working and learning environment in which all persons treat others with humanity and respect. While every user bears the primary responsibility for the material he or she chooses to access, send, or display, the University's facilities may not be used in any manner to create, send or display material which contravenes the relevant policies or statutes. Censorship Trent University does not censor information available on our campus network but will investigate properly identified allegations arising from the University community and will comply with applicable federal and provincial laws to the extent that this is possible with University resources in order to comply with both the spirit and the substance of the law. Resource Management There are many practical reasons including network and storage resource constraints that would cause IT to limit the numbers, types and storage retention periods of various kinds of information, either temporarily or permanently. Similar decisions which might further restrict the information available on facilities not managed by CTS are made by local units, consistent with the intended usage of available information and the capacity of local facilities. Potentially Offensive Material No one should be involuntarily presented with information which the person transmitting it should reasonably know would be viewed by the recipient as offensive or insulting. Where a member of our community is presented, through the network, with offensive information without consent having been either sought or granted, CTS will investigate the incident and take appropriate action. Such action may include, for example, referring any information about the incident to the appropriate department or Officer of the University, or assisting the complainant in bringing action under the appropriate University policies. Relevant policies include the Computer Code of Ethics and the Harassment and Discrimination Policy, among others. Complaints about offensive and/or potentially illegal information being produced locally and distributed on the Internet will be investigated as a violation of the Computer User Code of Ethics, and the University may initiate criminal charges. Personal Privacy and Confidentiality The property of the University includes the facilities related to computing accounts and files and other aspects of the information technology network in a similar manner to the telephones, filing cabinets, desks, etc., which an employee uses in carrying out the duties of her or his job. Generally, with respect to computing accounts there is a presumption of privacy. While University employees may access computing facilities in the performance of their day-to-day duties, the University does not review nor monitor user accounts on a routine basis. Users should exercise care in the disclosure of personal information to all third parties when using Internet-based services outside the University. Integrity of E-mail It is essential that all users of information technology facilities and services at Trent recognize that the security and integrity of the Internet and the campus network are consistent with information delivery mechanisms being used within the university. It is possible, for example, to send and/or receive incorrectly addressed mail in a manner which makes it appear the message originated from a particular user. It is suggested, therefore, that users not send highly sensitive or confidential documents by electronic mail if they would not normally use oncampus surface mail or FAX to transmit them. These Guidelines are an adaptation of similar Guidelines governing appropriate use of Information Technology at other Universities in Ontario; they are not a replacement for the Trent University Computer Code of Ethics.