Difference between revisions of "Bose Portable PA Encyclopedia:Policy"
m |
m (BoseWiki:Policy moved to Bose L1 Encyclopedia FAQ & Wiki:Policy: naming convention) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
− | 1. | + | 1. {{SITENAME}} ({{SiteNameShort}}) encourages research and scholarship to increase knowledge and understanding. It upholds the academic freedom of all members of {{SiteNameShort}} to engage in open inquiry and public discourse in an atmosphere of mutual respect. |
− | 2. Computing and communications facilities (including any | + | 2. Computing and communications facilities (including any {{SiteNameShort}} owned or {{SiteNameShort}} leased computing, telephone and communications services, equipment and facilities) shall be used in a manner which is consistent with the requirements of {{SiteNameShort}}. |
3. Computer IDs, accounts, and other communications facilities are to be used for authorized purposes. Incidental personal use is acceptable as long as it does not interfere with use of the facility for its intended purpose. | 3. Computer IDs, accounts, and other communications facilities are to be used for authorized purposes. Incidental personal use is acceptable as long as it does not interfere with use of the facility for its intended purpose. | ||
Line 11: | Line 11: | ||
6. Users must not misrepresent their identity as senders of messages nor the content of such messages. | 6. Users must not misrepresent their identity as senders of messages nor the content of such messages. | ||
− | 7. Breaches of this Policy may be subject to the full range of disciplinary and other formal actions. In addition to any other sanctions that | + | 7. Breaches of this Policy may be subject to the full range of disciplinary and other formal actions. In addition to any other sanctions that {{SiteNameShort}} may levy in the event of a violation, {{SiteNameShort}} may withdraw computing privileges and network access. |
− | 8. All users must adhere to | + | 8. All users must adhere to {{SiteNameShort}} policies and all laws that govern the use of {{SiteNameShort}} <nowiki>’</nowiki>s computing and communication facilities. Applicable legislation includes, but is not limited to, the Criminal Code of Canada, the B.C. Civil Rights Protection Act, the B.C. Freedom of Information and Protection of Privacy Act, and the B.C. Human Rights Code. |
====Privacy and Security==== | ====Privacy and Security==== | ||
Line 26: | Line 26: | ||
For example, users must not: intentionally develop programs or make use of already existing programs to harass other users, infiltrate a computer or computing system, damage or alter the components of a computer or computing system, gain unauthorized access to other facilities accessible via the network, or inappropriately use the telephone system. | For example, users must not: intentionally develop programs or make use of already existing programs to harass other users, infiltrate a computer or computing system, damage or alter the components of a computer or computing system, gain unauthorized access to other facilities accessible via the network, or inappropriately use the telephone system. | ||
− | 2. | + | 2. {{SiteNameShort}} reserves the right to limit, restrict or extend computing privileges and access to its computing and communications resources, including all information stored therein. |
3. No guarantees can be given for the privacy of files but the user community can be assured that system administrators will not examine personal files without the individual<nowiki>’</nowiki>s knowledge, except in emergencies or under unusual circumstances. | 3. No guarantees can be given for the privacy of files but the user community can be assured that system administrators will not examine personal files without the individual<nowiki>’</nowiki>s knowledge, except in emergencies or under unusual circumstances. | ||
− | 4. | + | 4. {{SiteNameShort}} will comply with all applicable legislation including the B.C. Freedom of Information and Protection of Privacy Act especially with respect to the sale of personal information (such as names and addresses) to third parties. |
====Intellectual Property==== | ====Intellectual Property==== | ||
1. Users must respect the legal protection provided by copyright laws for computer programs and data compilations and for all other works (literary, dramatic, artistic or musical). Also, users must respect the legal protection provided by trademark law and the common law for names, marks, logos, and other representations that serve to distinguish the goods or services of one person from another. | 1. Users must respect the legal protection provided by copyright laws for computer programs and data compilations and for all other works (literary, dramatic, artistic or musical). Also, users must respect the legal protection provided by trademark law and the common law for names, marks, logos, and other representations that serve to distinguish the goods or services of one person from another. | ||
− | 2. Users must respect the rights of others by complying with all | + | 2. Users must respect the rights of others by complying with all {{SiteNameShort}} policies regarding intellectual property regardless of medium (i.e. paper or electronic). |
====Freedom of Expression==== | ====Freedom of Expression==== | ||
− | The | + | The {{SiteNameShort}} does not and will not act as a censor of information available but will comply with applicable legislation. To the extent that the latter requires specifically identified information to be banned pursuant to a court order, the {{SiteNameShort}} will comply. |
====Discrimination and Harassment==== | ====Discrimination and Harassment==== | ||
− | Users must recognize that the | + | Users must recognize that the {{SiteNameShort}} , as a community sharing a commitment to study and learning, upholds the principles of academic freedom, mutual respect and equality of opportunity for all. The {{SiteNameShort}} policy on Discrimination and Harassment specifically prohibits discrimination and harassment on any of the protected grounds as identified under the B.C. Human Rights Code, including but not limited to, age, ancestry, colour, family status, marital status, physical or mental disability, political belief, place of origin, race, religion, sex, sexual orientation, and unrelated criminal conviction. With respect to penalties and sanctions, related documents include, but are not limited to, the student discipline policy, collective agreements with faculty and staff, and the terms of employment applicable to non-unionized staff. |
====Examples of Illegal Uses==== | ====Examples of Illegal Uses==== | ||
Line 67: | Line 67: | ||
• attempting to circumvent computer security methods or operating systems (e.g. subverting or obstructing a computer or network by introducing a worm or virus); | • attempting to circumvent computer security methods or operating systems (e.g. subverting or obstructing a computer or network by introducing a worm or virus); | ||
− | • using | + | • using {{SiteNameShort}}-provided computer accounts for commercial purposes such as promoting by broadcast non-educational profit-driven products or services; |
• intercepting or examining the content of messages, files, or communications in transit on a voice or data network; | • intercepting or examining the content of messages, files, or communications in transit on a voice or data network; | ||
Line 75: | Line 75: | ||
• harassing or discriminatory telephone messages. | • harassing or discriminatory telephone messages. | ||
− | [[ | + | [[Category:Site]] |
− | [[ | + | [[Category:Policy]] |
Latest revision as of 11:35, 5 January 2009
1. Bose Portable PA Encyclopedia (Bose® L1® Wiki) encourages research and scholarship to increase knowledge and understanding. It upholds the academic freedom of all members of Bose® L1® Wiki to engage in open inquiry and public discourse in an atmosphere of mutual respect.
2. Computing and communications facilities (including any Bose® L1® Wiki owned or Bose® L1® Wiki leased computing, telephone and communications services, equipment and facilities) shall be used in a manner which is consistent with the requirements of Bose® L1® Wiki.
3. Computer IDs, accounts, and other communications facilities are to be used for authorized purposes. Incidental personal use is acceptable as long as it does not interfere with use of the facility for its intended purpose.
4. Users are prohibited from accessing other users’ computer IDs or accounts and communications, without specific prior authorization from the appropriate administrative head of unit.
5. Users are responsible for the uses to which their computing accounts are put. Users must not share the passwords to any accounts to which they have access.
6. Users must not misrepresent their identity as senders of messages nor the content of such messages.
7. Breaches of this Policy may be subject to the full range of disciplinary and other formal actions. In addition to any other sanctions that Bose® L1® Wiki may levy in the event of a violation, Bose® L1® Wiki may withdraw computing privileges and network access.
8. All users must adhere to Bose® L1® Wiki policies and all laws that govern the use of Bose® L1® Wiki ’s computing and communication facilities. Applicable legislation includes, but is not limited to, the Criminal Code of Canada, the B.C. Civil Rights Protection Act, the B.C. Freedom of Information and Protection of Privacy Act, and the B.C. Human Rights Code.
Contents
Privacy and Security
1. Users must
• preserve the privacy of data to which they have access;
• respect the privacy of others by not tampering with e-mail, files, or accounts they use; and
• respect the integrity of computing systems and data.
For example, users must not: intentionally develop programs or make use of already existing programs to harass other users, infiltrate a computer or computing system, damage or alter the components of a computer or computing system, gain unauthorized access to other facilities accessible via the network, or inappropriately use the telephone system.
2. Bose® L1® Wiki reserves the right to limit, restrict or extend computing privileges and access to its computing and communications resources, including all information stored therein.
3. No guarantees can be given for the privacy of files but the user community can be assured that system administrators will not examine personal files without the individual’s knowledge, except in emergencies or under unusual circumstances.
4. Bose® L1® Wiki will comply with all applicable legislation including the B.C. Freedom of Information and Protection of Privacy Act especially with respect to the sale of personal information (such as names and addresses) to third parties.
Intellectual Property
1. Users must respect the legal protection provided by copyright laws for computer programs and data compilations and for all other works (literary, dramatic, artistic or musical). Also, users must respect the legal protection provided by trademark law and the common law for names, marks, logos, and other representations that serve to distinguish the goods or services of one person from another.
2. Users must respect the rights of others by complying with all Bose® L1® Wiki policies regarding intellectual property regardless of medium (i.e. paper or electronic).
Freedom of Expression
The Bose® L1® Wiki does not and will not act as a censor of information available but will comply with applicable legislation. To the extent that the latter requires specifically identified information to be banned pursuant to a court order, the Bose® L1® Wiki will comply.
Discrimination and Harassment
Users must recognize that the Bose® L1® Wiki , as a community sharing a commitment to study and learning, upholds the principles of academic freedom, mutual respect and equality of opportunity for all. The Bose® L1® Wiki policy on Discrimination and Harassment specifically prohibits discrimination and harassment on any of the protected grounds as identified under the B.C. Human Rights Code, including but not limited to, age, ancestry, colour, family status, marital status, physical or mental disability, political belief, place of origin, race, religion, sex, sexual orientation, and unrelated criminal conviction. With respect to penalties and sanctions, related documents include, but are not limited to, the student discipline policy, collective agreements with faculty and staff, and the terms of employment applicable to non-unionized staff.
Examples of Illegal Uses
The following are representative examples only and do not comprise a comprehensive list of illegal uses:
• uttering threats (by computer or telephone);
• distribution of pornographic materials to minors;
• child pornography;
• pyramid schemes; and
• copyright infringement.
Examples of Unacceptable Uses
The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:
• seeking information on passwords or data belonging to another user;
• making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others;
• copying someone else’s files, or programs, or examining such information unless authorized;
• attempting to circumvent computer security methods or operating systems (e.g. subverting or obstructing a computer or network by introducing a worm or virus);
• using Bose® L1® Wiki-provided computer accounts for commercial purposes such as promoting by broadcast non-educational profit-driven products or services;
• intercepting or examining the content of messages, files, or communications in transit on a voice or data network;
• interfering with the work of other users of a network or with their host systems, seriously disrupting the network (e.g. chain letters or spamming), or engaging in any uses that result in the loss of another user’s files or system; and
• harassing or discriminatory telephone messages.