The
This policy document applies to all members of the
This policy governs the use of all information technology at, or belonging to Lakefield College School (hereinafter referred to as the School), including but not limited to: laptop & desktop computers, servers & server storage space, network routing & connection hardware, printers, scanners, LCD projectors, computer software, databases, operating systems, CD-ROMs, the e-mail system, the Internet, the School intranet and the School web presence. Collectively, this hardware, software and any data contained therein will be referred to hereinafter as the Network.
Authorized School representative shall hereinafter refer to members of the Lakefield College School Information Technology area, including Richard Life, Todd Harris, Simon Spivey, Jason Ayotte and Brad Clairmont.
By accessing, operating or otherwise using the Network, Users agree to be bound by the terms and conditions of this Information Technology Acceptable Use Policy.
The School retains ownership over all information stored on, or transmitted via the Network, including but not limited to messages, files and data.
Access to various parts of the Network is granted to all Users based on their individual grade, job, role or needs as determined by the School. Granted access may be limited by time restrictions, and may be revoked at any time as seen fit by the School.
The Network is provided to students for educational usage only, and to other Users for educational and business usage related to their individual role at the School.
The User may access the Network, if access and use are justified by:
While accessing and using the Network, the User may not, for any reason whatsoever, do any act that constitutes illegal or unacceptable behavior. More specifically, but without limitation, the User may not, voluntarily or through negligence:
In general, it is expected that laptops would be used both on and off campus, while all other Network equipment would remain on campus at all times. Access to most information resources is provided to Users via the Internet via independent Internet Service Providers.
All Network equipment, with the exception of laptops, must remain on campus at all times, unless explicit permission has been granted by an authorized School representative. Usage of equipment assigned into the care of an individual User for use off campus, including laptops, is subject to the terms of an additional equipment user agreement.
This entire document applies equally to User accessing their School account or the School Network in any way from outside the School campus or from outside the Network.
Personal usage of the Network must not contravene the law or any other School policies including this document; personal usage is further limited by the following exceptions and limitations.
While accessing and using the Network for personal use, the User may not, voluntarily or through negligence:
It is the user’s individual and sole responsibility to:
Ensure that their account and access to their account is secure at all times, by maintaining secure passwords, and by periodically changing their passwords;
Remain in contact with other members of the community by checking e-mail at least once per academic day, for student and faculty Users, or at least once per workday for all other Users;
Ensure that all software installed on their laptop or workstation by the School remains in working order;
Prevent the spread of viruses, by running the background virus checking software provided on their workstation or laptop, by periodically running thorough virus checks of their entire workstation or laptop, and by following any directions or statements issued by the Information Technology department;
Prevent the spread of chain mail, by refraining from creating or forwarding messages which request the recipient to pass the message on to other people – this includes messages which seem to be providing a public service;
Ensure that storage space provided on the Network (H: drive and G: drive), and in the e-mail system is not occupied by excessive, out-of-date, expired, or unnecessary information, files, messages or data, by periodically purging information, files, messages or data from the provided areas;
Ensure that the quantity and size of data and files transmitted over the Network by any software or by the use of software, including web surfing, email and downloading, does not make excessive demands on the Network and thereby affect the ability for other Users to effectively use the Network.
Ensure the integrity of the data they work with, by saving frequently and, if necessary, by backing data up (copying) to a secondary storage area or device – Laptop User’s should strive to save all work to a network drive (H:) and avoid saving work only to their local hard drive (C:);
Ensure the security, reliability and integrity of all business transactions entered into or completed using the Network – personal transactions are always the sole responsibility of the individual User;
Ensure their own personal safety by not providing personal contact information to a website, a chat room, via e-mail or in any way using the Network, without careful consideration as to the third-party’s legitimate need for the information, and by not agreeing to meet someone in person who was met online; and
Report all problems with the Network functionality or security, the user’s responsibilities, or the proper usage of the Network immediately to a member of the Information Technology department.
While accessing and using the Network, the User may not, for any reason whatsoever, plagiarize the work of others – that is present the ideas, writings or creations of others as your own. Information on the correct methods for acknowledging the contributions of others to your work can be obtained from the school Librarian.
While accessing and using the Network, the User may not, for any reason whatsoever, copy the work of others without their express written permission – that is copy, reproduce, print, save, store, or transfer any data, information, files, images, movies, music, or software that doesn’t belong to you, unless the rightful owner has given you permission, or you are using only a small part of the work for educational purposes.
In the ordinary course of its business and for legitimate reasons of management or of security, the School may, at its sole discretion and without prior notice:
Violations of this policy document will lead to sanctions against the User. More specifically, but without limitation, any or all of the following sanctions may be applied at the sole discretion of the School:
In the event that there is a claim that a User has violated this policy document, the User will be provided with prompt notification and the opportunity to present an explanation to a member of the Information Technology department, or to the appropriate advisor, manager, supervisor or Head of House. At the school’s sole discretion, account access may be suspended immediately.
It is possible that this policy may limit legitimate educational or business usage of the Network. Requests may be made to derogate from this policy document in writing to Richard Life, Assistant Head of School.
In no event shall the School be liable to any User in whole or in part for damages, whether direct, indirect, special or consequential, arising out of use of the Network, accuracy of information contained therein, or related directly or indirectly to failure of the Network, interruption of service, or loss of data.