The College works to create an intellectual environment in which students and staff are encouraged to use the computing facilities and information resources to pursue educational and administrative matters respecting the public trust through which these facilities have been provided and in accordance with policy and regulation established from time to time by the College and its operating units. This Code of Ethics is for the protection of all Information Technology clients (clients are defined as students and employees of Lakeland College.)
Clients are urged and expected to use the computer facilities in a responsible and efficient manner consistent with the goals of the project for which the account was authorized.
In the following, “account” means an Information Technology Username Identification Code and associated files provided by Lakeland College; “signing authority” or "client" means the person who is responsible for the account and work performed under the account.
Licensed software is software that has been purchased by and licensed to Lakeland College.
Download the complete Code of Ethics (pdf) document, or you can read the sections individually in the drop downs below.
Note: Every network computer advises users that by signing on they agree to the terms and conditions (see graphic at right).
|Terms and Conditions|
1. As a condition of access to computers and information resources, a client agrees:
3. Clients should be aware that unauthorized changes of electronic records, unauthorized use of another client’s account, files, or tapes, or tampering with other client’s files without permission is unethical. Information Technology is obliged and empowered to take actions necessary to combat and prevent such abuse. In addition, such abuse may be an offence under the Criminal Code and may be dealt with as such by Lakeland College and the local law enforcement.
4. A signing authority is held responsible for all actions performed with the use of that account. Passwords for accounts are issued only to the owner of that account. The owner is responsible for maintaining the secrecy of their passwords as well as changing it on a regular basis or when they suspect someone else has knowledge of their password. Failure to change their password by the owner is not an acceptable excuse as to why someone else has obtained access to his or her account. The Subsequent use of the account is totally under the control of the owner/signing authority. Misuse of an account may result in not only suspension of that account and withdrawal of services, but suspension of other accounts controlled by the signing authority and suspension of services pending appropriate investigation and corrective action.
5. Clients of Information Technology should be aware that although Information Technology provides and preserves security of files, account numbers, passwords, and programs, it is possible that security can be breached through actions or causes beyond Information Technology’s’ reasonable control. Clients are therefore urged to safeguard data, to take full advantage of file security mechanisms built into the system, and to change account passwords frequently. It is also recommended that you do not store any personal information on the computers.
6. In connection with investigation of possible abuses, Information Technology reserves the right to examine files, programs, passwords, accounting information, printouts, tapes, or any other material used by a client at Information Technology facilities. Refusal to divulge upon request information regarding use of Information Technology facilities may be grounds for suspension of access privileges.
|Policy On The Use Of Information Resources|
|Use of the computer and information resources at the College will be restricted to registered students and staff of the Lakeland College, including those who may be contracted to use these facilities from time to time, for the purposes for which they are intended, and users shall be held accountable for any misuse.|
Scope: These guidelines and procedures shall apply to all members of the Lakeland College community who have been authorized to use any of the computer and information resources of the College, including students (full-time, part-time, continuing education), staff (full-time, part-time, contract and wages) and members of the general public.
1. All clients are required to:
a) use the facilities provided for the purposes for which they are intended, staying within the limits of their personal authorization for use;
b) accept responsibility and accountability for use of the facilities provided including accepting that Accounts are provided for the use of the account owner only and that it shall be considered a violation of these guidelines to provide personal passwords or account access to third parties;
c) respect and maintain the confidentiality of personal information;
d) recognize the public nature of shared facilities or services and take care not to display in such facilities or services images, sounds or messages which could create an atmosphere of discomfort or harassment of others;
e) respect and protect the integrity of data and programs to which access is provided, copying only from pre-authorized sources, never deleting or changing information without the consent and permission of its holder and taking all reasonable and practicable precautions to protect passwords and data files to which access is provided.
2. All clients are specifically prohibited from:
a) engaging in such activities as software piracy, including copying of copyrighted software, and use of College facilities for unauthorized profit-making activities;
b) attempting to subvert the protective/security mechanisms of any College system or service;
c) attempting to gain access to others’ personal accounts, files or information;
d) attempting deliberately to degrade performance or capability of a workstation or the network;
e) attempting to modify the workstation setup. The workstation setup is determined by the academic needs. Since the college is running a large variety of software on their workstations, the setup is very complicated. If unauthorized changes to the setup or a unauthorized software installed, the workstation may cease to function properly. The workstation is not your personal computer; hence, no personalization of the desktop is permitted.
f) attempting to use e-mail as a vehicle to harass/abuse others. Electronic mail privileges shall be used in a manner reflecting the same high ethical standards of mutual respect and civility as any other communication medium. Users shall not harass others by sending annoying, threatening, libelous, sexually, racially or religiously offensive messages. Users of e-mail are reminded that messages saved on the computer are not a secure medium;
g) attempting to break/hack into the network;
h) attempting to install or create software that is considered to be a virus on College workstations or the network;
i) attempting to damage services, software or intellectual property of others, and
j) using unlicensed or otherwise unauthorized software or services on College facilities or equipment or services.
3. Lakeland College will treat client data and programs as private and confidential and will examine said data only with just cause (see guideline 4) and will not disclose that information to a third party unless it is for use in a disciplinary, criminal or civil proceeding.
4. Lakeland College reserves the right to:
a) deny or withdraw service privileges at any time in the best interest of the College;
b) monitor and record the use of any facility, service or system if abuse of the facility, service or system has been reported and to use any information thus gained in disciplinary or criminal or civil proceedings;
c) inspect, copy, remove, or otherwise alter data files, system resources, or client files in the regular conduct of its duty to maintain efficient and effective service operations or in the conduct of an investigation of suspected misuse, and
d) institute disciplinary, criminal or civil proceedings, as appropriate, in the event of an apparent violation of these guidelines.
5. Where a client has access to information resources which permit the user to add to or modify data or information in the system, including access to electronic mail services, he or she shall be required to sign a client agreement reflecting the conditions stated in these guidelines to obtain and to continue such access.
6. In addition to all of the above provisions, the user shall be bound by the terms of any additional special network access agreement accepted by the College. These terms will be summarized in a supplemental client agreement, which the client will be required to sign and follow.
7. Clients should be aware that electronic records (including e-mail) are considered legal documents.
|Penalties For Violations|
Depending upon the severity of the offense, any of the following penalties may be invoked:
|Infraction Assessment Committee|
|The purpose of this committee is to investigate the possible infraction(s) and assess the appropriate penalty. The membership of this committee is the Director of Information Technology, Manager of Student Retention, Chairperson of the Program Area and the Coordinator of Student Residence.|
|Reporting Of Client Code Of Ethics Violations|
|Clients should report any and all apparent violations of the Client Code of Ethics to one of the members of the Infraction Assessment Committee by making an appointment with, sending a letter/memo to, or sending an e-mail to one of the members.|
|Public Access of Network Computers|
Members of the public who wish to use a Lakeland College network computer may do so in a campus library. Please see a librarian for access.