Computing Policies

These policies are intended to promote the responsible and ethical use of University computer resources. These resources should be used for the purposes for which access is granted, according to practices which ensure that the rights of all users are protected. A "user" is defined as any student, staff or faculty member with authorized access to any computer system at Acadia. Any employee with a demonstrable work related need for computer access, and who has departmental authorization, is entitled to a computer account.

NOTE: These policies are reviewed periodically. Please be advised that these policies may change. Watch for system messages, posters, etc.

Certain activities by users constitute abuse. Computer abusers are liable for monetary payment of their abuse, restriction or curtailment of computing privileges, and may be subject to further discipline by the University. In some cases, they may be liable for civil or criminal prosecution. Complaints against students regarding violation of computing policies are handled through the Office of Student Services and follow the judicial procedures outlined in the Student Handbook. Complaints against other users regarding violation of computing policies are handled by the unit responsible for the individual against whom the complaint was made and/or the unit responsible for the location where the action giving rise to the complaint occurred. Appeals concerning the imposition of any penalty may be made to the appropriate Director and then to the Senior Administrator responsible for that Director.These policies govern the use of all of Acadia's computing facilities including terminals, microcomputers, mini-computers, mainframes or network facilities which are the property of Acadia University.

Acadia University has established the following general principles:

  1. The use of University computing and networking facilities requires authorization and is for University use only.
  2. Attempting to discover or disclose confidential information stored on University computing facilities is not permitted.
  3. The University abides by the terms of the licensing agreements it has entered into for computer software and equipment facilities.
  4. University related work takes priority.
  5. The University does not permit the use of its computing and networking facilities for illegal activities or harassment.
  6. The use of University computing and networking facilities complies with University operational policies and procedures.
  7. Breaking Acadia University published policies constitutes a breach of employment conditions and/or academic integrity.
  8. Permission to access data in another user's account must be authorized in writing by that user, or, where this is not possible, by the appropriate Senior Administrator.
  9. Users are responsible for activities originating on computer equipment and/or network connections assigned to them.
  10. It is an offense to break any computing policies set by the University.



  1. Permit another person to login to your account (your account passwords are confidential and under no circumstances should they be distributed).
  2. Login to another person's account, even if you have permission.
  3. Attempt to discover another user's password.
  4. Copy, disclose, or transfer any of the computer software provided by Acadia University without written permission from the department that acquired or licensed it.
  5. Use any Acadia University computer/network equipment or software to violate the terms of any Software License Agreement.
  6. Attempt to bypass standard procedures. This includes, but is not limited to, circumventing standard disconnect functions for dial-in lines, unauthorized use of a password and accessing a file without permission. Accessing a file refers to copying, reading, renaming, changing or deleting. Lack of file protection does not give you t he right to do any of these things.
  7. Use university computing/network facilities for personal profit making activities.
  8. Exceed any posted time limit on a terminal or microcomputer when others are waiting.
  9. Use University network facilities to send nuisance , abusive, obscene, forged or anonymous messages to anyone within the university community or externally.
  10. Use University network facilities to harass other users.
  11. Change the name assigned to an account.
  12. Tamper with University computing/network equipment such as microcomputers, printers, or network jacks. Problems should be reported to the appropriate department.
  13. Use more than one terminal and/or microcomputer at a time when others are waiting.
  14. Collect or discard output other than your own without the owner's permission.
  15. Violate any of the `LAB RULES' posted in the public microcomputer laboratory facilities.
  16. Use the University network facilities to provide computing services outside the University's network, without authorization from the Computing Services department.
  17. Use the University network facilities to provide any external computing service to the campus community, without authorization from the Computing Services department.

Software Policies

The use of software on the Acadia University computers is governed by the terms of License Agreements between Acadia University and software vendors. These software programs are of a proprietary nature and/or may contain trade secrets or be subject to a copy right or patent as defined in License Agreements. All users of software acquired by Acadia University must abide by the terms of these License Agreements.

The following actions are considered illegal and may subject the perpetrator to sanctions by the university:

  1. Providing copies of copyrighted or licensed software to others while maintaining copies for one's own use, unless there is a specific provision in the license which allows such activity. The activity is forbidden even if the software is provided without cost for an educational purpose.
  2. Using software or documentation known to have been obtained in violation of the Copyright Law or a valid license provision. Use of a copy of a copyrighted program obtained from another party for which no license exists that allows such a transfer will be presumed to be knowing and the burden of demonstrating that the use was innocent will rest with the user.
  3. Using a copyrighted program on more than one machine at the same time, unless a specific license provision permits such activity.
  4. Copying any copyrighted printed documentation. You should be aware that a violation of any of these policies is considered an abuse of the privilege granted to you, and may lead to the withdrawal of your account and/or other disciplinary action.

Administrative Policies

  1. A computer account is created for each new student at the start of the academic year, and the account remains valid until mid-September of the following year. After each fall registration and prior to the expiry date, network and email accounts for all registered students (as well as accounts for registered BCS students on the academic Unix server) are automatically extended for another year, without any additional action by the student. Any student withdrawing from Acadia will have his/her account(s) disabled immediately, and such account(s) will be deleted after two weeks.
  2. Computing Services has the right to disable any account after having reasonable evidence that one or more of the above policies has/have been violated .
  3. The Computing Services Systems Support Group has the responsibility for keeping systems working and to protect the confidentiality of a user's work. This confidentiality will be respected until there is an indication that the user has become part of something that has caused a problem with the operations of systems or the confidentiality of another user's work.
  4. A request to access data in another user's account must be authorized in writing by the user, or, where this is not possible, by the appropriate Senior Administrator. 
  5. Computing Services reserves the right to view and/or delete user files without prior notice or written authorization when the stability, integrity and/or the security of the system is being threatened by actions on the part of that user.
  6. Computing Services also has the right to terminate any process when deemed necessary, in order to maintain the system.
  7. It should be noted that abusers are normally identified by their user names. Users who allow others to use their accounts may find themselves restricted and/or disciplined if others abuse the system in their name.
  8. When in doubt, it is best to do only what you have been specifically permitted to do; e.g. if you have permission to use a program or file, do not make a copy (even on paper) unless you have been explicitly told you may do so.
  9. The use of University computing and network facilities to solicit credit card information requires authorization from Computing Services.
80% helpful - 5 reviews


Article ID: 84
Thu 9/24/15 2:49 PM
Tue 4/5/22 2:34 PM