1. The purpose of the Concordia University network is to support education, communication, and research by providing access to unique resources and the opportunity for interaction and collaborative work on the Internet and through E-mail and other applications. The following operations are acceptable uses of the Internet and E-mail network at Concordia University.
  2. Instructional use in Concordia University classes
  3. Faculty Research
  4. Student Research
  5. Class Assignments
  6. Official work of students, faculty, administration, and staff, recognized student and campus organizations, and agencies of the University
  7. Electronic communication that supports instruction, research, or official work of students, faculty, administration, and staff
  8. Personal use by authorized users that does not interrupt or diminish access to resources for other users
  9. It is contrary to the Concordia University Acceptable Use Policy to engage in any of the following behaviors:
  10. Violate the “Statement of Software and Intellectual Rights.” Computer software must be used in accordance with license agreements, whether it is licensed to the University or to students/faculty/staff.
  11. Violate the Federal Copyright Law by downloading copyrighted audio, video, graphics or text materials from the Internet without proof of proper licensing arrangements.
  12. Use another person’s account or pin number or give your password, pin number or identification to another person for the purpose of gaining access to a University-owned computer, network or database resource. This includes, but is not limited to, unauthorized use of an account, use of an account for a purpose for which it was not intended or use of another person’s e-mail address. Changing another person’s password may be considered harassment.
  13. Access a file on a University-owned computer or network without the permission of the owner to copy, rename, modify, examine or change file protection or visibility. Lack of protection on a file does not imply right of access.
  14. Interrupt or inhibit the access of Concordia University technology resources by actions such as distributing computer viruses, worms, or bulk e-mail. This includes any other procedures that interfere in any way with the information technology resources available to a user. Virus-scanning software is supplied and it is required for all student, faculty and staff to continually update their computers with it.
  15. Understand that text and graphic files available over the Internet may be considered offensive by some members of the Concordia community. As potential consumers of these materials, users are expected to exercise proper judgment and sensitivity as to how and where these materials are displayed.
  16. Operate a University-owned computer in a manner that is otherwise wasteful of any computing or network resource (for example, setting up file sharing servers/applications on the university network is not allowed).
  17. Employ a computer to annoy or harass other users; for example, to send obscene, abusive, or threatening email.
  18. Use a computer to violate the principles of academic honesty.
  19. Misuse information accessed while performing work as a Concordia University employee. Information stored on administrative computers and microcomputers is confidential. Use or distribution of such information other than as assigned is prohibited by University policy and State and Federal laws.
  20. Use or distribute any parts of Concordia University’s administrative records that are accessed unintentionally. These include, but are not limited to information stored on disk, tape, hardcopy, microfilm as well as information on terminal screens.
  21. Use University-owned computer resources for commercial work except as permitted by faculty and staff handbooks and licensing agreements.
  22. Tamper with terminals, microcomputers, printers or any other associated University-owned equipment. Remove computer equipment, disks, paper or documentation from a computing facility. Equipment and software failures should be reported to the Office of Information Technology.
  23. Gain access to Concordia University technology resources when one is no longer eligible.
  24. Results of failing to follow Concordia University Acceptable Use Policy:
  25. Failure to follow the policies set forth in this document constitutes an offense.
  26. As with all matters of law and ethics, ignorance of the rules does not excuse violations.
  27. Authorized users learning of any policy violations should notify their immediate supervisor, who will notify the CIO and the appropriate division Vice President. Student violations will also be reported to the Dean of the student’s college or school.
  28. Ethical policy abuses may result with immediate denial of service and penalties that range from the loss of computing privileges through suspension or expulsion from the University.
  29. Ethical policy abusers are liable for monetary payment and may also be liable for civil or criminal prosecution under State and Federal statutes.
  30. The Office of Information Technology will not provide support to users who fail to follow the Acceptable Use Policy.

Last modified: January 25, 2018