Home Home Search Contact Us
 U of S / Course Calendar / Policies & Regulations / Computer Use Policy
The University of Saskatchewan
Important Dates
Undergraduate Admission
Graduate Studies
Registration, Student Records & Convocation
Tuition & Fee Information
Examinations & Grading
Student Financial Assistance & Awards
Student Services & Special Programs
Policies & Regulations
Colleges & Programs
Course Descriptions
Governance, Faculty, Staff & Organizations
Contact Information
Search

Logo: It's All About You


Computer Use Policy

There are three policies relating to appropriate computer use. They can be found at the following Website: www.usask.ca/its/online_docs/computer_policies.html.

Appropriate Use of University Computing Facilities

As an individual using University computing facilities, it is your responsibility to:
     
  • Obey all laws, University policies, regulations and guidelines regarding use of University computing facilities.
  • Use computing facilities for bona fide educational purposes, for purposes for which you have been authorized, and in support of University Goals and Objectives. Other uses, such as conducting commerce not authorized by the University, are not permitted.
  • Use the facilities in a responsible manner. Do not waste resources, do not purposefully deny, or consume resources with the purpose of denying or restricting resources to others.
  • Abide by the security measures and restrictions in place. Do not attempt to circumvent security measures. For example, do not share your account or give your password to anyone else unless you have permission from the computer's custodian or system manager.
  • Respect the copyrights of authors and adhere to University policy AD 8-60.3, Copyright Compliance - Computer Programs and Software Licenses.
  • Refrain from using University computing facilities in threatening, discriminatory, harassing, or obscene manner.
  • Respect the policies of external networks and remote sites. Use only facilities for which you have been authorized.
  • Respect the privacy of other users. Just because you can read someone's files does not mean that they were intended for you or that you have permission to do so.
  • Provide proper and correct sender identification in all electronic correspondence within and leaving the University facilities.
  • Report violations of this policy and possible security lapses to the appropriate laboratory or system manager, department head or dean, so that security of University computing facilities can be maintained.


 Questions? Contact Us Home  Search  Contact Us