Originator: Information Technology Governance Committee
Approver: President’s Council
Effective: October 16, 2007
Replaces: A20 – Acceptable Use of Computer Facilities October 1, 1997
The vision of Red River College Polytechnic is “to be recognized as a leader through the innovative use of technologies.” To that end, Information Technology Solutions (hereinafter IT Solutions) will “make a positive contribution to meet the goals of the College Community by working collaboratively with the Community to deliver quality service and solutions that meet the current needs and changing requirements.”1
In turn, the use of College information technology resources imposes responsibilities and obligations on the Users of these resources. Users must maintain an environment in which access to all information technology resources is shared fairly among users and is conducive to teaching and learning.
The College will ensure that all assets, including information technology resources, are protected, adequately maintained and not subject to unnecessary risk.”2
Red River College Polytechnic information technology resources will be used to support the administrative, teaching, learning, research and community services goals of the College.
Users of information technology resources will act responsibly and must respect the rights of other Users, the integrity of the system and related physical resources. They must observe all relevant College Policy, Federal and Provincial law, regulations and contractual obligations.
The College believes that it has a social responsibility to provide leadership and follow community standards with respect to the distribution and use of offensive materials. The College has a zero tolerance for these inappropriate activities.
A normal expectation of privacy cannot be guaranteed to a User of College information technology resources.
Information Technology resources (hereinafter IT resources) are defined as, but not limited to:
Users are students, staff and external clients with whom the College maintains a business relationship. It also includes the general public in public access locations.
By accepting a College information technology account, Users accept the responsibilities of this Policy and the consequences of failure to comply. Users must read and abide by the intent and content of this Policy. Their acceptance is implicit by the use of their account.
Instructors and supervisors will provide a warning to students or staff of a breach of this Policy.
Repeated or serious violations by staff are to be reported to the individual’s supervisor and to IT Solutions.
Repeated or serious violations by a student are to be reported to the student’s program head and to IT Solutions.
College Security Services and authorities outside the College may report suspicious, harassing or other unacceptable use of IT resources to IT Solutions.
IT Solutions will investigate all reports. This investigation may include, but is not limited to, such methods as tracking of network activity, review of email transactions and review of the contents of all data storage devices that are attached to or part of College-owned equipment. The investigation will be documented as appropriate.
Based upon initial findings, the Director – IT Solutions or the Supervisor – Information Protection and Compliance may authorize immediate suspension of the individual’s access privileges.
The following examples include, but are not limited to, activities that are specifically prohibited under this Policy:
Users may use their computers and network accounts for non-College matters except where such use would be prohibited by this or other College Policy or where such use unreasonably interferes with administrative and academic uses, job performance, or system performance and operation.
Use of information technology resources for commercial and business purposes is prohibited except for those activities sponsored or sanctioned by the College.
Information Technology Solutions has the right and the responsibility to monitor the use of IT resources and traffic across the network. They have the responsibility to manage, and possibly restrict, such use as required to ensure acceptable use as defined in this Policy. Information Technology Solutions is also responsible for:
Users of IT resources provided by the College are fully responsible for their use of these resources and for the information they willfully or knowingly transmit, receive or store. User’s of the College’s IT resources are also responsible for:
College Instructional Staff are responsible to enforce compliance with this Policy in the classroom. Instructors have the responsibility to report serious or repeated breaches of this Policy to the program head and IT Solutions.
Persons who violate this or other related Policy may be subject to disciplinary action up to and including dismissal or expulsion as outlined in College Policy and Collective Agreements. Unacceptable use may result in the immediate loss of account privileges and access to information technology resources. Additionally, dependant on circumstances, they may face civil action and/or criminal prosecution. Disciplinary action may be appealed under appropriate Policy or the MGEU Collective Agreement.
IT Strategic Plan Executive Summary, Deloitte Inc. March 2006
2.12 Asset Management – Executive Limitation Board of Governors Policy Manual
H1 – Respectful College
S1 – Student Code of Rights and Responsibilities
S2 – Student Discipline
S3 – Student Appeal – Non Academic Decisions
MGEU Collective Agreement
1 IT Strategic Plan Executive Summary
2 Board of Governors Policy Manual
3 Criminal Code, R.S.C. 1985, c. C-46, S. 163(8)
RRC Polytech campuses are located on the lands of Anishinaabe, Ininiwak, Anishininew, Dakota, and Dené, and the National Homeland of the Red River Métis.
We recognize and honour Treaty 3 Territory Shoal Lake 40 First Nation, the source of Winnipeg’s clean drinking water. In addition, we acknowledge Treaty Territories which provide us with access to electricity we use in both our personal and professional lives.