Effective Date: 0000-00-00
Review Date: 2017-05-01
Vice-President (Administration and Finance) through the Director of Information Technology Services.
The University is committed to the creation of an intellectual environment in which students, staff, and faculty may feel free to collaborate with colleagues both at the University and at other institutions, without fear that the products of their intellectual efforts will be violated by misrepresentation, tampering, destruction and/or theft.
It is also committed to fostering an environment in which students, staff, and faculty may feel free to challenge accepted ideas in a climate of free inquiry and debate.
To limit the University's liability as a supplier of computer services to the University community.
All uses of computing facilities at all campuses and other locations of Memorial University.
Computing Facilities - refers to computer networks, hardware and software.
The University will exercise best practices in conjunction with users' expectations that their legitimate access to information, their authorized use of university-owned and contracted Computing Facilities and their use of any resources connected with their authorized access to services will be protected by the University to a degree that is reasonable and technically feasible.
This commitment to service notwithstanding, the University makes no warranty, expressed or implied, regarding the computing services offered, or their fitness for any particular purpose.
Computing Facilities will be designed to serve the broad base of users in the community, but cannot be expected to meet every specialized need or support extremely specialized requirements.
Users must accept responsibility for their own use of Computing Facilities and the University cannot undertake to shelter users from offensive material or behaviour which they may encounter as a result of their use of Computing Facilities.
All users are expected to refrain from inappropriate use of computing facilities [see Appropriate Use of Computing Resources Policy].
Users should report cases of apparent inappropriate use to the Information Technology Services or to another appropriate person, such as the person responsible for administering the system in question.
The University will use reasonable efforts to ensure that all responsible steps are taken to protect the privacy of users. In particular, the contents of user accounts will be examined by system administrators only in particular circumstances more fully described in the Appropriate Use of Computing Resources Policy or the Computer System Administration Policy, except where a user has permitted more general access. Users should not assume, however, that unencrypted material stored or transmitted on University-owned facilities can be guaranteed to be kept confidential.
There are no procedures associated with this policy.