1. |
Computers in labs may be used only with authorization. |
2. |
User codes for networked facilities are available to the Brock community and must be protected and not shared. Users are expected to keep their password secret and secure. |
3. |
Use of any facilities for business or financial gain is specifically prohibited, unless prior written approval is obtained from the Vice-President, Administration. |
4. |
As Brock's network facilities are connected to the Internet, usage of the network is governed by the acceptable use policies of connected nets and the laws of other countries. Users are urged to be sensitive and aware of other cultures and nations in their postings to the Internet. |
5. |
It should not be assumed that E-mail and other data is private as it traverses Brock's internal network or the Internet. Users are urged to act accordingly. |
6. |
Due to inevitable system upgrades or malfunctions, Brock's system administrators may need to inspect user directories. If any data are required to remain private at all times, then the user must use encryption or removable storage media. |
7. |
Any deliberate attempt to discover or alter other users' passwords is expressly prohibited, as are any attempts to subvert system security or operation of any of Brock's computers or other networked computers. |
8. |
Brock's facilities may not be used for illegal purposes and it is expressly noted that copying copyrighted software and the execution of illegally copied software on Brock's facilities is prohibited. |
9. |
Harassment in any form is not allowed. Brock has specific policies regarding harassment which will be enforced. |
10. |
Any attempt to hide the identity of the sender/originator of a message will be treated as a serious infraction. |
11. |
Any violation or attempted violations of these guidelines should be reported quickly to the lab supervisor or the appropriate system administrator for further action. |