24 November 1986 GUIDE TO RESPONSIBLE COMPUTING AT DALHOUSIE ------------------------------------------- In recognition of the contribution that computers can make to furthering the educational and other objectives of the University, this Guide is intended to promote the responsible and ethical use of University computing resources. It is in the best interests of the community as a whole that these resources be used in accordance with certain practices which ensure that the rights of all users are protected and the goals of the University are achieved. This Guide applies to all computer and computer communication facilities owned leased, operated, or contracted by the University. This includes word processing equipment, micros, mainframes, minicomputers, and associated peripherals and software, regardless of whether used for administration, research, teaching, or other purposes. It should be noted that system administrators of various campus computing facilities and those responsible for the computer access privileges of others may promulgate regulations to control use of the facilities they regulate. System administrators are responsible for publicizing both the regulations they establish and their policies concerning the authorized and appropriate use of the publicly available equipment for which they are responsible. Basic Principles ---------------- Individuals should use only those University computing facilities they have been authorized to use. They should use these facilities: a. with respect to the terms under which they were granted access to them; b. in a way that respects the rights of other authorized users; c. so as not to interfere with or violate the normal, appropriate use of these facilities; d. so as not to impose unauthorized costs on the University without compensation to it. Elaboration ----------- 1). Individuals should use only those University computing facilities they have been authorized through normal University channels to use. They should use these resources in a responsible and efficient manner consistent with the objectives underlying their authorization to use them. 2). Individuals should respect the rights of other authorized users of University computing facilities. Thus, they should respect the rights of other users to security of files, confidentiality of data, and the benefits of their own work. Users should respect the rights of others to access campus computing resources and should refrain from: (1) using the computer access privileges of others without their explicit approval; (2) accessing, copying, or modifying the files of others without their permission; and (3) harassing others in any way or interfering with their legitimate use of computing facilities. 3). Individuals should respect the property rights of others by refraining from the illegal copying of programs or data acquired by the University or other users or putting software, data files, etc. on University computers without the legal right to do so. 4). Individuals should not attempt to interfere with the normal operation of computing systems or attempt to subvert the restrictions associated with such facilities. They should obey the regulations affecting the use of any computing facility they use. Disciplinary Actions -------------------- Reasonable suspicion of a violation of the principles or practices laid out in this Guide may result in disciplinary action. Such action will be taken through normal University channels. Nothing in this Guide diminishes the responsibility of system administrators of computing services to take remedial action in the case of possible abuse of computing privileges. To this end, the system administrators with the approval of the President and with due regard for the right of privacy of users and the confidentiality of their data, have the right, to suspend or modify computer access privileges, examine files, passwords, accounting information, printouts, tapes, and any other material which may aid in an investigation of possible abuse. Whenever possible, the cooperation and agreement of the user will be sought in advance. Users are expected to cooperate in such investigations when requested. Failure to do so may be grounds for cancellation of computer access privileges. - Passed by Dalhousie Senate, 24 November 1986.