Policies on Information Technology
This document outlines CHASS policies regarding the use of its information technology. It closely follows policies adopted by the University and/or UTC. These policies were approved on May 5, 1995, by the CHASS director.
The University of Toronto is committed to ensuring a working and learning environment in which all persons treat others with humanity and respect. University information technology facilities include computing devices and associated peripherals, communications infrastructure and related equipment, facsimile machines, scanners, copiers, telephones, video and other multimedia devices and all forms of software. Such resources and tools are made available to employees in support of their teaching, research, and administrative activities and to students in support of their respective academic objectives and requirements. Their use is circumscribed by codes such as the Code of Student Conduct, the Code of Behaviour for Academic Matters, the Ontario Human Rights Code, and the Criminal Code of Canada in concert with various rules and guidelines adopted in local units.
Every user bears the primary responsibility for the material he or she chooses to access, send, or display. The facilities may not be used in any manner to create, send or display material which contravenes the relevant policies or statutes. Where devices, such as portable computers, are the property of the user, the appropriate use expectations still apply when such devices are used to access University information technology facilities.
Failure to adhere to these guidelines may result in the suspension of access privileges as well as other action as deemed appropriate by CHASS and/or the University of Toronto.
Appropriate use of information technology includes, for example:
- respect for the rights of others;
- respect for the property of others;
- consideration of other persons using shared systems, equipment and facilities;
- confidentiality in use of passwords;
- a presumption of the right to privacy;
- use of tools for the purpose for which they are intended;
- adherence to the rules governing use of accounts, equipment, networks, or other facilities, whether the rules are established by CHASS or the University of Toronto;
- adherence to etiquette and culture as defined in systems that you use.
- unauthorized access, alteration, destruction, removal and/or disclosure of data, information, equipment, software, or systems;
- deliberate over-extension of the resources of a system or interference with the processing of a system;
- disclosure of confidential passwords and/or access devices or information for accounts, equipment, and telephone voice mail;
- use of University facilities and resources for commercial purposes;
- propagation of hate literature;
- harassment, including sexual harassment;
- theft of resources;
- malicious or unethical use;
- use that violates provincial or federal laws.
The nature, severity and possible consequences arising from infractions of the appropriate use of CHASS information technology resources cover a wide spectrum. These can range from mere inconvenience or loss of privileges to damage to CHASS's or the University's reputation or even to charges being laid if federal or provincial laws have been violated. The speed, nature and escalation of notification procedures will be commensurate with the severity of the infraction.
For infractions that contravene established University policy or CHASS Computing Facility rules, the CHASS Systems Administrator will proceed in accordance with the applicable codes or rules and will inform the department head or chair of the event and the action taken.
Violations that have broader consequences such as unauthorized access to and/or modification of institutional data here or elsewhere, or the commission of illegal acts require additional consideration. The process will include notification of the dean or division head as well as the department head or chair. At the same time, Security Administration in the Technology Support department of Computing and Communications will be informed immediately by telephone, voicemail, electronic mail, or facsimile. In the absence of a response confirming receipt of the notification within an hour, the vice-provost and assistant vice-president (planning) will be informed directly.
Should the circumstances warrant it, the dean or division head, in collaboration with the vice-provost and assistant vice-president (planning), should inform the provost or president and a joint decision may be taken to inform the appropriate legal body or law enforcement agency.
Infractions may be reported to the CHASS Information Officer at (416) 978-2535, or to the CHASS director at (416) 978-4304.
CHASS does not and will not act as a censor of information available on our network but will investigate properly identified allegations arising from the University community and will comply with applicable federal and provincial laws. To the extent that the latter requires specifically identified information to be banned pursuant to a court order, CHASS will make every practical attempt to comply with both the spirit and the substance of the law.
By way of clarification, it must be noted that there can be many practical reasons including network and storage resource constraints that would cause CHASS to limit the numbers, types and storage retention periods of various information classes, either temporarily or permanently. Similar decisions which might further restrict the classes of information available locally can and should be made by local units, such as colleges and departments, consistent with the intended usage of available information and the capacity of local facilities.
These guidelines address the issue of potentially offensive information on the CHASS computer systems, whether generated locally or imported from other systems via the Internet. Other than the particular modality of the computer and network, the issues to be addressed are not generally technical. Any guidelines or procedures for handling this particular situation address only a single facet of a much broader policy issue regarding the production, storage, dissemination of and access to information available using information technology facilities. Rather than dealing with the global issue, these guidelines (in this section) focus only on the handling, dissemination and display of objectionable material.
First, a guiding principle is that CHASS will ensure that its efforts to create an environment in which all its members treat each other with respect extend to facilities and activities associated with information technology.
There are wide variations in the range of things to which people take offense. What may be offensive to one person may seem innocuous or even informative to another. Generally, a person's access to a particular piece of information will not be proscribed simply because someone else finds it offensive. On the other hand, no one should be involuntarily presented with information which the person transmitting it should reasonably know would be viewed by the recipient as offensive or insulting.
Thus, when a member of the University community, with properly authorized access to the CHASS network, actively seeks information which is legitimately and publicly available on a computer or network, CHASS will ordinarily take no action to restrict that individual's access based on the nature of the information being sought.
In situations where a member of our community is presented, through the network, with offensive information without consent having been either sought or granted, CHASS will investigate the incident and take appropriate action. Such action may include, for example, referring any information about the incident to the faculty, offices or college, or assisting the complainant in bringing action under the appropriate University code of behaviour. Relevant policies include the Code of Student Conduct and the Sexual Harassment policy, among others.
Complaints about potentially illegal information being produced locally will be investigated, and the University may initiate criminal charges directly and/or actions under the relevant University codes of behaviour.
Comments and suggestions regarding this page can be sent to Chris Leowski of the CHASS Computing Facility.
Created May 5, 1995.
Last updated October 10, 1998.