Lakeland College, computer use, code of ethics, information technology, regulations, policies

Campus Life

Computer Access

Use of Computer Facilities and Information Resources

The purpose of the following regulations is to promote responsible, ethical, and secure use of the College’s computing facilities and information resources.

The College works to create an intellectual environment in which students and staff are encouraged to use the computing facilities and information resources to pursue educational and administrative matters respecting the public trust through which these facilities have been provided and in accordance with policy and regulation established from time to time by the College and its operating units. This Code of Ethics is for the protection of all Information Technology clients (clients are defined as students and employees of Lakeland College.)

Clients are urged and expected to use the computer facilities in a responsible and efficient manner consistent with the goals of the project for which the account was authorized.

In the following, “account” means an Information Technology Username Identification Code and associated files provided by Lakeland College; “signing authority” or "client" means the person who is responsible for the account and work performed under the account.

Licensed software is software that has been purchased by and licensed to Lakeland College.

Download the complete Code of Ethics (pdf) document, or you can read the sections individually in the drop downs below.

Note: Every network computer advises users that by signing on they agree to the terms and conditions (see graphic at right).
Terms and Conditions
1. As a condition of access to computers and information resources, a client agrees:
  • not to use any other client’s account;
  • not to seek, by any means, information regarding account passwords, files, or programs of another client unless explicitly authorized to do so by the client;
  • not to obtain, by any means, copies of other client’s files, magnetic tapes, or programs, or to examine such files, tapes or programs, unless authorized to do so by the client
  • not to seek information about any mechanism or to use any mechanism to falsely alter electronic records;
  • not to develop or use programs which adversely impact computer services to other clients, or harass other clients of Information Technology;
  • not to abuse account privileges with obscene language and/or messages;
  • not to access pornographic/sexually explicit sites/material or distribute such material through the email system;
  • to report to Information Technology an instance in which he/she has obtained information as described above, or has knowledge of other persons who have obtained such information.
2. Failure to observe the above conditions of access will result in withdrawal of access privileges and other computing services pending disciplinary or legal action by Lakeland College.
3. Clients should be aware that unauthorized changes of electronic records, unauthorized use of another client’s account, files, or tapes, or tampering with other client’s files without permission is unethical. Information Technology is obliged and empowered to take actions necessary to combat and prevent such abuse. In addition, such abuse may be an offence under the Criminal Code and may be dealt with as such by Lakeland College and the local law enforcement.
4. A signing authority is held responsible for all actions performed with the use of that account. Passwords for accounts are issued only to the owner of that account. The owner is responsible for maintaining the secrecy of their passwords as well as changing it on a regular basis or when they suspect someone else has knowledge of their password. Failure to change their password by the owner is not an acceptable excuse as to why someone else has obtained access to his or her account. The Subsequent use of the account is totally under the control of the owner/signing authority. Misuse of an account may result in not only suspension of that account and withdrawal of services, but suspension of other accounts controlled by the signing authority and suspension of services pending appropriate investigation and corrective action.
5. Clients of Information Technology should be aware that although Information Technology provides and preserves security of files, account numbers, passwords, and programs, it is possible that security can be breached through actions or causes beyond Information Technology’s’ reasonable control. Clients are therefore urged to safeguard data, to take full advantage of file security mechanisms built into the system, and to change account passwords frequently. It is also recommended that you do not store any personal information on the computers.
6. In connection with investigation of possible abuses, Information Technology reserves the right to examine files, programs, passwords, accounting information, printouts, tapes, or any other material used by a client at Information Technology facilities. Refusal to divulge upon request information regarding use of Information Technology facilities may be grounds for suspension of access privileges.
              Policy On The Use Of Information Resources
              Use of the computer and information resources at the College will be restricted to registered students and staff of the Lakeland College, including those who may be contracted to use these facilities from time to time, for the purposes for which they are intended, and users shall be held accountable for any misuse.
              Scope: These guidelines and procedures shall apply to all members of the Lakeland College community who have been authorized to use any of the computer and information resources of the College, including students (full-time, part-time, continuing education), staff (full-time, part-time, contract and wages) and members of the general public.

              1. All clients are required to:
              a) use the facilities provided for the purposes for which they are intended, staying within the limits of their personal authorization for use;
              b) accept responsibility and accountability for use of the facilities provided including accepting that Accounts are provided for the use of the account owner only and that it shall be considered a violation of these guidelines to provide personal passwords or account access to third parties;
              c) respect and maintain the confidentiality of personal information;
              d) recognize the public nature of shared facilities or services and take care not to display in such facilities or services images, sounds or messages which could create an atmosphere of discomfort or harassment of others;
              e) respect and protect the integrity of data and programs to which access is provided, copying only from pre-authorized sources, never deleting or changing information without the consent and permission of its holder and taking all reasonable and practicable precautions to protect passwords and data files to which access is provided.

              2. All clients are specifically prohibited from:
              a) engaging in such activities as software piracy, including copying of copyrighted software, and use of College facilities for unauthorized profit-making activities;
              b) attempting to subvert the protective/security mechanisms of any College system or service;
              c) attempting to gain access to others’ personal accounts, files or information;
              d) attempting deliberately to degrade performance or capability of a workstation or the network;
              e) attempting to modify the workstation setup. The workstation setup is determined by the academic needs. Since the college is running a large variety of software on their workstations, the setup is very complicated. If unauthorized changes to the setup or a unauthorized software installed, the workstation may cease to function properly. The workstation is not your personal computer; hence, no personalization of the desktop is permitted.
              f) attempting to use e-mail as a vehicle to harass/abuse others. Electronic mail privileges shall be used in a manner reflecting the same high ethical standards of mutual respect and civility as any other communication medium. Users shall not harass others by sending annoying, threatening, libelous, sexually, racially or religiously offensive messages. Users of e-mail are reminded that messages saved on the computer are not a secure medium;
              g) attempting to break/hack into the network;
              h) attempting to install or create software that is considered to be a virus on College workstations or the network;
              i) attempting to damage services, software or intellectual property of others, and
              j) using unlicensed or otherwise unauthorized software or services on College facilities or equipment or services.

              3. Lakeland College will treat client data and programs as private and confidential and will examine said data only with just cause (see guideline 4) and will not disclose that information to a third party unless it is for use in a disciplinary, criminal or civil proceeding.

              4. Lakeland College reserves the right to:
              a) deny or withdraw service privileges at any time in the best interest of the College;
              b) monitor and record the use of any facility, service or system if abuse of the facility, service or system has been reported and to use any information thus gained in disciplinary or criminal or civil proceedings;
              c) inspect, copy, remove, or otherwise alter data files, system resources, or client files in the regular conduct of its duty to maintain efficient and effective service operations or in the conduct of an investigation of suspected misuse, and
              d) institute disciplinary, criminal or civil proceedings, as appropriate, in the event of an apparent violation of these guidelines.

              5. Where a client has access to information resources which permit the user to add to or modify data or information in the system, including access to electronic mail services, he or she shall be required to sign a client agreement reflecting the conditions stated in these guidelines to obtain and to continue such access.

              6. In addition to all of the above provisions, the user shall be bound by the terms of any additional special network access agreement accepted by the College. These terms will be summarized in a supplemental client agreement, which the client will be required to sign and follow.

              7. Clients should be aware that electronic records (including e-mail) are considered legal documents.
              Penalties For Violations
              Depending upon the severity of the offense, any of the following penalties may be invoked:
              1. Verbal or written warning/reprimand: This would be for minor first-time infractions of the foregoing guidelines as warranted, and usually the complaint will not proceed beyond this point. College personal could issue the warning/reprimand or a committee convened to investigate the infraction and assess the appropriate penalty.
              2. Suspension of user’s network and account privileges: This may be invoked for infractions ranging from minor to more serious and would likely occur for repeated infractions where previous warnings had been issued, or where some specific impropriety is suspected such as (but not exclusively limited to) the use of unauthorized software, suspected hacking, abusive transmissions, etc., pending further investigation or gathering of additional evidence.
              3. Ejection from the classroom with possible suspension from the program. This will be invoked for more serious offenses such as vandalism, harassment, annoyance or threats to other users, or refusal to surrender computer, or identification card upon request.
              4. Fines maybe invoked for repeat infractions. The maximum fine would not exceed $300. The amount of the fine would be determined by the seriousness of the infraction(s).
              5. Assessment for expenses incurred maybe billed to the user when significant time is required by college personal to correct the computer and information resources affected.
              6. Suspension or expulsion from the program or college: This would be for very serious offenses such as attempting to break into the network, repeated offenses and criminal offenses.
              Students may appeal an assessed penalty through the appropriate appeal procedure outlined in the student handbook
              Infraction Assessment Committee
              The purpose of this committee is to investigate the possible infraction(s) and assess the appropriate penalty. The membership of this committee is the Director of Information Technology, Manager of Student Retention, Chairperson of the Program Area and the Coordinator of Student Residence.
              Reporting Of Client Code Of Ethics Violations
              Clients should report any and all apparent violations of the Client Code of Ethics to one of the members of the Infraction Assessment Committee by making an appointment with, sending a letter/memo to, or sending an e-mail to one of the members.
              Public Access of Network Computers
              Members of the public who wish to use a Lakeland College network computer may do so in a campus library. Please see a librarian for access.

              Bookmark and Share

              Last updated on