Please enable javascript to view this page in its intended format.

Queen's University - Utility Bar

Queen's University
 

Queen's University Computer User Code of Ethics

Approved by Senate April 22, 2004
Amended April 28, 2005

The computing and network systems at Queen’s University are intended to support teaching, research and administrative purposes and to enhance the broader learning environment. All Queen’s computer users should be aware that they have access to valuable and sensitive resources, and that their computing and network practices can adversely affect others. Users should also understand that the Computer User Code of Ethics applies fully to the use of all personal computers and other devices while they are connected to the Queen’s network.

Terminology

Term used Meaning or is meant to include
“computing and network facility” Any personal computer, computing or network system, or communications facility owned wholly or partly by Queen’s University
“account” Any account number, access code, userid or authorization code for a computing or network system or facility, together with its associated passwords and files
“user” Any person using Queen’s computing and network facilities
“system administrator” A person who has the authority to grant authorization to use a computing or network system or facility
“authorized use” Any use of Queen’s computing and network resources that is consistent with and required for the user’s role within the University
“unauthorized use” Any use that is expressly prohibited by University policy or the law, or that interferes with the ability of others to use Queen’s computing and network resources

 

Section A of this document constitutes a Computer User Code of Ethics for Queen’s University, and should be read in conjunction with other information technology policies.

Section B, Procedures for Cases of Computer Abuse, outlines how alleged violations will be dealt with, and Section C, Procedures for Lodging a Complaint of Computer Abuse, is intended to be a guide for individuals or groups who feel that there has been a violation of the Code.

Violations of the Queen's Computer User Code of Ethics shall also be governed by all other applicable University policies, and proceedings under this Code do not preclude actions under other policies.

Back to Top

A. Computer User Code of Ethics

  1. Users are ultimately responsible for any and all use of their computing and network accounts. Consequently:

    1. Users should maintain secure passwords for all accounts assigned to them.
    2. Users should take precautions against others obtaining unauthorized access to their computing and network resources. This obligation applies particularly to users who are responsible for or who have access to confidential information.
    3. Users should not divulge passwords and other access control information for their personal accounts to any other person.

  2. Users must not use or attempt to use computing or network facilities or accounts to which they have not been granted explicit access by an appropriate system administrator. Users must use only those computing and network facilities and accounts for which they have proper authorization.

  3. Users must use computing and network facilities and services only for the purposes for which they were authorized. Specifically, University computing and network accounts must not be:

    1. Used for private consulting or for any form of direct or indirect personal financial gain (except where previously authorized).
    2. Sold to any other person.
    3. Provided as resources to other persons or organizations for unauthorized purposes.
  4. Users must respect all software copyrights and license agreements associated with university computing and network facilities. Terms and conditions in software licenses can vary considerably. The onus is on the person using the software to familiarize themselves with their responsibilities and limitations under each software license agreement. Users must not attempt to:

    1. Access and use software belonging to or licensed to other users or to Queen’s University without proper authorization to do so.
    2. Move or copy programs, subroutines and any other forms of software from one computing system to another without proper authorization. This includes personal computer, microcomputer and personal workstation software.
    3. Distribute, sell or otherwise make available software when such activity is prohibited by the license agreement for that software.
  5. Users must respect the copyright and intellectual property rights associated with information resources available to them, including documents, databases, and digital audio and digital video materials.

  6. Users must not access data or information stored on personal or University-owned computing systems without the permission of the owner or custodian of that information.

    Back to Top

  7. Users must not attempt to interfere with the normal operation of computing and network systems or resources that are shared by other users.

  8. Users must not attempt to encroach on others’ use of computing or network facilities or to deprive others of resources.

  9. Users must not attempt to subvert the restrictions associated with their computing and network accounts.

  10. Users must not use University computing or network facilities to do anything that is a violation of the rights of others. For example, users should not use University facilities to display, distribute or otherwise make available obscene, vulgar or harassing messages or material.

  11. Users must not attempt unauthorized access to computing or network installations outside of Queen’s using Queen’s computers or communications facilities. More generally, users must adhere to all conditions associated with agreements between Queen’s and external network providers. (For example, see “ORION Authorized Use”).

  12. Users must not use University computing and network resources for any activity that violates federal or provincial laws.

Although system administrators may attempt to provide and preserve security of files, account numbers, passwords and programs, it is possible that security can be breached through action or causes beyond reasonable control. Users are therefore urged to safeguard data and to take full advantage of file security mechanisms built into systems (for example by changing passwords as often as necessary). System administrators of shared facilities have a responsibility to inform users of their obligations in the use of these systems.

 

B. Procedures for Cases of Computer Abuse

This document describes the procedures for when individuals (students, faculty, staff or others using computing and network facilities at Queen’s) are named in a complaint of alleged computer abuse, or are found to be in violation of the Queen’s University Computer User Code of Ethics.

In the process of investigating serious cases of alleged violations, the Director of Information Technology Services retains the ability to invoke certain emergency powers, which may include a restriction in or a complete suspension of access to computing and network facilities and services until such time that an investigation has been completed and the appropriate disciplinary body has reviewed the case. Serious cases include, but are not limited to, the following examples:

  • Major damage to University property has occurred or is likely to occur.
  • A threat to the integrity of the campus network or computing infrastructure.
  • A threat to an individual’s personal safety.
  • Substantial risk to the University or a member of the Queen’s community.

The process for dealing with an alleged violation of the Computer User Code of Ethics is as follows:

  1. Except in serious cases as illustrated above, a first violation will result in an electronic warning to cease the alleged violation, issued by the system administrator. A meeting may be held to allow the individual an opportunity to respond to the warning, to review the alleged violation, and to discuss the matter.
  2. A second or subsequent violation will result in a written warning from the Director of Information Technology or the appropriate unit head, and possible restriction or complete suspension of access to computing and network facilities. At that point, the situation will be dealt with as a disciplinary matter through whichever discipline forum has jurisdiction.

Copies of all correspondence will be included with the case as it is referred.

Back to Top

C. Procedures for Lodging a Complaint of Computer Abuse

The following describes the procedure to be followed when individuals (internal or external to Queen’s) believe that students, faculty, staff or others using computing and network facilities at Queen’s have violated the Queen’s University Computer User Code of Ethics.

The person lodging the complaint should forward to the appropriate system administrator, in writing, details of the violation, including user information, date(s), description of the violation, etc.

The system administrator will respond to the person lodging the complaint, in writing, within 10 working days, as to the state of the complaint.

The system administrator will keep the University's Coordinator of Dispute Resolution Mechanisms informed of all complaints and actions taken.

 

D. Related Policies and Documents

Queen's University Network Security Policy

Queen's University Information Systems Security Policy

The Queen's University Code of Conduct (PDF*, 225 KB)

The Queen’s University Harassment / Discrimination Complaint Policy and Procedure

Information on STOPIT!, Queen's University's initiative to stop e-mail harassment

Ontario Research and Innovation Optical Network (ORION) - Acceptable Use Policy (PDF*, 164 KB)

 

*PDF files can be viewed using Adobe Reader.

Back to Top

Kingston, Ontario, Canada. K7L 3N6. 613.533.2000