Â鶹AV

Information Technology

What You Need to Know


Review the following policies in full in the Handbook on Student Rights and Responsibilities:
Ìý

Policy on E-Mail Communication with Students

The policy applies to any student who is, or has been, assigned a Uniform E-Mail Address (UEA), as well as Â鶹AV employees who manage official communications with students.Ìý

Policy on Responsible Use of Â鶹AV Information Technology Resources

Â鶹AV information technology resources (hereafter Â鶹AV IT Resources) serve the University’s mission of the advancement of learning through teaching, scholarship and service to society. The University provides an atmosphere that encourages access to knowledge and sharing of information. The University is responsible for ensuring the effective and reliable operation of our systems and protection of our information technology resources. This policy outlines the responsibilities of the University and members of the University community in the use of Â鶹AV IT Resources.

Article 2 - Principles

The following principles apply to all Â鶹AV staff, students and other users of the Â鶹AV's Information Technology Resources:

2.1. Â鶹AV IT Resources serve the teaching, research and administrative purposes of the University.

2.2. Authorized Users shall use Â鶹AV IT Resources in an ethical, responsible and lawful manner, in accordance with University policies.

2.3. Authorized Users have a reasonable expectation of privacy in their use of Â鶹AV IT Resources.

2.4. Authorized Users shall take all reasonable steps to protect the Confidentiality, Integrity, and Availability of Â鶹AV IT Resources.

2.5. Authorized Users shall only access Â鶹AV IT Resources in accordance with Â鶹AV’s policies and procedures. Ability to access Â鶹AV IT Resources does not, by itself, imply authorization to do so.

2.6. Authorized Users shall respect the intellectual property, including but not limited to, trademarks and copyrights, of owners of software and Data stored in or transmitted through Â鶹AV IT Resources, including library and archival resources.

ÌýRelated Notes

  • Users are referred to the sections on Credentials, Security, Data, Public Web Sites, Network Systems Administration and Non-Â鶹AV use.
  • Any violation of this policy shall be reported in conformity with the relevant University regulation, policy or collective agreement.
  • Any individual who has reasonable cause to believe that there has been a breach of this policy shall report the matter to the Office of the CIO.

Who You Can Talk To


What Else You Can Do

If you encounter a problem, you can contact the:

Back to top