Link to the University of Waterloo home page
2008-2009

The Undergraduate Calendar

 

 

General Information

Guidelines on Use of UW Computing and Network Resources

Guidelines on Use of UW Computing and Network Resources

Computing and network resources are important components of the University infrastructure. These Guidelines govern the appropriate and ethical use of these resources, inform users of expectations and responsibilities assumed in the use of UW computing and network resources, and clarify the context.

Guiding Principles

  • UW encourages the use of computing and network resources to enhance the working and learning environment of its members.
  • These resources are provided primarily to support and further the mission of UW.
  • UW values and strives to provide its members with an environment of free inquiry and expression. Freedom of expression and academic freedom in electronic format have the same latitude as in printed or oral communication.
  • Members of the UW community are responsible and accountable for their actions and statements, which includes exercising reasonable restraint in the consumption of shared resources. Users of computing and network resources are expected to be aware of and comply with applicable provincial and federal laws and pertinent UW policies (e.g., Ethical Behaviour #33; Extra-University Activity (Faculty Members) #49; Use of Proprietary Software #64; Conflict of Interest #69; Student Academic Discipline #71; Intellectual Property Rights #73).
  • UW strives to protect the privacy of system users and to provide reasonable security for UW computing and network resources. A system user's account is normally accessed only with the user's informed consent. 1 However, circumstances may arise that justify access absent the user’s consent; examples include where security is at issue, or apparent breach of applicable laws or UW policies and procedures.

Rights/Responsibilities

Contained within and following from the Guiding Principles are rights and responsibilities of both the user and the University. Some of these are presented below.

UW Rights and Responsibilities:

  • To allocate the use of and access to UW computing and network resources.
  • To define access privileges of UW users and, for just cause, to revoke such privileges.
  • To inform UW users of their rights and responsibilities in the use of UW computing and network resources, and to communicate clearly the terms and conditions under which access to and use of such resources are provided.
  • To ensure reasonable safeguards to protect the privacy of UW users.
  • To ensure reasonable security for UW computing and network resources and to act upon complaints.

User Rights and Responsibilities:

  • To a presumption of reasonable privacy in the use of the computing resources assigned to them.2
  • To use University computing and network resources in a manner which does not unduly interfere with the study, work or working environment of other users.
  • To be accountable for the use of computing and network resources assigned to the user.
  • To seek permission from the appropriate University authority to use UW computing or network resources for purposes different from those for which they were allocated or acquired.

Privacy/Adjudication/Disciplinary Action

When circumstances arise that would appear to justify accessing a user’s account absent consent, the appropriate course of action will be determined by the supervisor(s) of the user in question, in consultation with the appropriate member(s) of UCIST 3. When criminal behaviour is suspected, UW Police will provide advice on how to proceed. If the person requesting access is the user’s supervisor (directly or indirectly), then his/her supervisor will make the determination. When agreement on a course of action cannot be reached, the issue will be escalated to the next supervisory level, with the final link in the escalation path being the Provost or his/her delegate. The Provost’s decision is final. When there is doubt as to what action is appropriate, advice should be obtained from the Associate Provost, Information Systems & Technology and/or the Secretary of the University, who may in turn seek legal advice.

Misuse of the University's computing and network resources may result in disciplinary action within the University. Any such action undertaken will be governed by relevant UW policies (e.g., Staff Employment #18; Ethical Behaviour #33; Student Academic Discipline #71) and the Memorandum of Agreement. Disciplinary measures resulting from alleged infringements of UW policies may be appealed under the grievance processes for staff (Policy 36), students (Policy 70), and faculty (Article 9 of the Memorandum of Agreement).

Approved by UCIST, February 3/06
Endorsed by Executive Council, February 15/06


The set of examples that illustrate the application of this document can be found at: www.adm.uwaterloo.ca/infocist/use2006examples.htm.

The full text of the guidelines is available electronically on the web at www.adm.uwaterloo.ca/infocist/use2006.htm. Copies can also be obtained from IST's help desk (MC, Room 1052).


Office of the Registrar
University of Waterloo
2nd Floor, Needles Hall
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4567