Cloud Hosting Acceptable Use Policy

PURPOSE

Reality Bytes Incorporated encourages the use of computing and network resources to enhance the working environment of the Reality Bytes Incorporated community, and our client base. However, access to the computing and network environment at Reality Bytes Incorporated is to be used in effective, ethical and lawful ways that support the values of Reality Bytes, and Canadian Law.

 

AUTHORITY

Reality Bytes Incorporated has authority over this Policy. Administration of this Policy and the associated procedures are delegated to the Reality Bytes Incorporated's Senior Executive Officers.

 

APPLICATION

This Policy and related procedures applies to all individuals employed by Reality Bytes Incorporated, all clients of Reality Bytes Incorporated and all visitors and community users who use Reality Bytes Incorporated's computer resources and services.

 

This company-wide policy applies to the use of computers, data networks and the resources these technologies make available in support of the Reality Bytes Incorporated's activities. It applies to any devices and/or computers owned by Reality Bytes Incorporated, as well as, those owned by users who have been authorized to install or connect personal equipment either on the premises or to the network.

 

Reality Bytes Incorporated computer resources are defined to include but are not limited to such devices as desktop computers, laptop/tablet computers, monitors, hard drives, disk space, printers, scanners, network devices, Personal Digital Assistant devices (PDAs), network routers, network bridges, network switches, servers, access to the Internet and other networks provided by the University including wireless, computer labs, software acquired by Reality Bytes Incorporated and relevant data. This section is also extended to include any computer system or resource that is owned or managed by Reality Bytes Incorporated regardless of its location.

 

PRINCIPLES

The following principles are the basis of managing Reality Bytes Incorporated's computer resources in an ethical and effective manner. These principles shall guide all employees, and clients/customers in achieving fair, reasonable and current practices for proper use of computer resources.

 

Reality Bytes Incorporated will endeavor to create an atmosphere that balances respect for individual computer usage and institutional computing needs while maintaining the ethical and community standards of Reality Bytes Incorporated.

Reality Bytes Incorporated will endeavor to create an environment whereby the institution's computer resources are considered to be reliable, secure and efficient.

All Reality Bytes Incorporated computer resources shall be used primarily for work-related activities (i.e. business related, educational, academic research and administration purposes) and as such using the institution's computer resources and access to the Internet for incidental personal purposes shall be minimized.

 

GUIDELINES FOR THE USE OF RBI COMPUTING RESOURCES

Individuals using Reality Bytes Incorporated-owned computer resources are expected to comply with provincial and federal laws and relevant Reality Bytes Incorporated policies and procedures. Users should note that some of the material used at Reality Bytes Incorporated is copyrighted, protected by intellectual property law and/or license agreements. Users should undertake reasonable efforts to ensure that they do not violate the various laws, policies, procedures and license agreements.

Users of Reality Bytes Incorporated computing and network resources are responsible and accountable for their actions and statements in the electronic working and learning environment, according to the disciplinary processes of Reality Bytes Incorporated contained in both policy documents and the various Collective Agreements.

Users are expected to use reasonable restraint in consumption of these valuable shared resources, and to use them in ways that do not interfere with the work or working environment of other users.

Any data stored by or transmitted to members of the Reality Bytes Incorporated community is confidential and will not be accessed by Reality Bytes Incorporated without cause and due process. In any circumstances of alleged or suspected impropriety, formal procedures permit persons responsible for computers or networks to examine directories, files, email or other electronic records that are relevant to the investigation of the allegation or suspicion.

Users accessing external networks such as accessing the Internet or SuperNet through Reality Bytes Incorporated computing and network resources are bound by both their policies and Reality Bytes Incorporated's policies. Users should be aware that the more restrictive of the policies will apply.

Anyone who observes actual or apparent use by employees which appears to violate this policy or other Information Technology Services policies will report it to This email address is being protected from spambots. You need JavaScript enabled to view it.

Anyone who observes actual or apparent use by staff which appears to violate this policy or other Information Technology Services policies will report it to This email address is being protected from spambots. You need JavaScript enabled to view it. , Information Technology Services or his/her designate who in turn will report it to the RBI team.

SUPPORT

Reality Bytes Incorporated's Information Technology Services Department is available to assist, advise and consult with users on the proper use of computer resources and interpretation of this Policy. If there are any questions or uncertainty about this Policy, users are encouraged to contact the Chief Information Officer, Information Technology Services Department or his/her designate for clarification.

 

UNACCEPTABLE USES

Below are a number of examples of unacceptable uses of Reality Bytes Incorporated computing resources. The list is not comprehensive but serves to guide users of the types of activities that are not permitted.

 

Unauthorized access (e.g., hacking, phishing* or pharming**): This may include using unauthorized user names, passwords, computer addresses or identities or modifying assigned network settings to gain access to computer resources and/or data, or otherwise attempting to evade, disable or "crack" security provisions of Reality Bytes Incorporated or external systems. The Criminal Code of Canada has two related sections: Section 342.1 - Unauthorized use of computer and Section 342.2 - Possession of device to obtain computer service.(http://www.canlii.org )

* Phishing is the act of tricking someone into giving them confidential information or tricking them into doing something that they normally wouldn't do or shouldn't do. For example: sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

 

** Pharming involves Trojan programs, worms, or other virus technologies that attack the Internet browser address bar and is much more sophisticated than phishing. When users type in a valid URL they are redirected to the criminals' websites instead of the intended valid website.

 

Unauthorized Distribution and Disclosure of Information: Every effort must be made to prevent the unauthorized disclosure and distribution of information that is the property of Reality Bytes Incorporated.

Vandalism of Data: Deliberate alteration or destruction of computer files is a Criminal Code offence (Section 430.1). Under no circumstance may a user inspect, alter, delete, publish or otherwise tamper with files or file structures that the individual is not authorized to access. The Freedom of Information and Protection of Privacy Act (FOIP) also deals with deliberate destruction of data (refer to Policy 1005: Information Management) for further information.

Deliberate Interference with Other Users' Work: This includes use of any process that causes other users to be deprived of services or resources that they would normally expect to have available. It covers but is not limited to the creation of "SPAM" (excessive email distribution), downloading or electronic transferring of excessively large resources and/or the deliberate introduction of viruses or electronic chain letters.

Sharing of Account: Reality Bytes Incorporated's computing resources are allocated to groups and individuals for specific work related, research, and administrative purposes. It is not acceptable to give, sell, or otherwise provide computing resources to other individuals or groups that do not have explicit permission to use them. Users are not to share computer accounts without getting permission from Reality Bytes Incorporated administration and/or the Information Technology Services Department.

Squandering Resources: Resources are shared and no user may deliberately degrade Reality Bytes Incorporated's computer resources by: unwarranted data space, time and bandwidth consumption through resource-intensive programs, excessively large downloads, excessively large electronic transfer of files, unattended network connections and/or lengthy print jobs. As the use of institutional resources change and the technology capabilities change over time – users are encouraged to work with the Information Technology Services Department in defining appropriate and efficient uses of computer resources. Notwithstanding, in the interest of providing technology enabled services to the Reality Bytes Incorporated community as a whole, Reality Bytes Incorporated's Senior Executives reserve the right to terminate, temporarily, access privileges to one or more individuals whose activities when using Reality Bytes Incorporated computer resources severely impacts services to others.

Personal Uses: Reality Bytes Incorporated's computer resources are to be used primarily for business purposes under regular scope of our client’s business (i.e., regular work, academic research and administrative). All users have the responsibility to ensure that incidental personal use of Reality Bytes Incorporated computer resources is minimized and does not interfere with the normal course of their work. Use of a computer workstation for activities which may bring viruses or spy ware into your computer and the Reality Bytes Incorporated network is not permitted. Examples of websites which may attract viruses and spy ware are on-line gaming sites, gambling sites and pornographic sites. Reality Bytes Incorporated computer resources are not provided for the playing of games, viewing pornography, illegal file sharing, nor for commercial purposes (i.e., operating a business). Such uses can cause increased risk of compromises to the Reality Bytes Incorporated network environment, increased SPAM, excessive demand on network resources and causes unnecessary additional work for IT Services staff.

Remote Access: Use of Reality Bytes Incorporated's computer systems or networks that are used remotely from off-site of your regular business office location is permissible so long as the usage does not compromise or violate either the network, computer, or data security and/or the ethical principles set forth by Reality Bytes Incorporated.

Breach of Copyright: This includes installing, reproducing and/or distributing copyrighted materials such as proprietary software, publications or files without permission. Reality Bytes Incorporated software is provided under license agreements with various vendors and may not be copied or otherwise removed. Third party copyrighted information or software that the users do not have specific approval to store and/or use, must not be stored on Reality Bytes Incorporated systems or networks.

Offensive Material: Materials not subject to legal sanction may be objectionable or extremely offensive to persons other than the computer user. Importation or distribution of such material (including, but not limited to racist material, hate literature, sexist slurs or sexually explicit material) is permitted for academic or research purposes as long as it complies with Reality Bytes Incorporated's Offensive/Discriminatory Materials Policy. In some cases it is recommended that prior consultation with management be obtained to ensure that Reality Bytes Incorporated's community and ethical standards are maintained. If required, consultation with the Information Technology Services Department is available in order to facilitate the above activities.

Hostile Atmosphere: The display of sexually explicit or violent images in public spaces and/or the initiation of unsolicited communication with sexual content contravene Reality Bytes Incorporated's Human Rights Policy. In some cases where a presentation requires the display of potentially disturbing images, it is recommended that prior consultation with the appropriate manager, Director of a Department be obtained to ensure that Reality Bytes Incorporated's community and ethical standards are maintained. If required, consultation with the Information Technology Services Department is available in order to facilitate the above activities

Harassment: Harassing or defamatory material may not be sent by electronic means, including email and voice mail, or posted to news groups. The Criminal Code of Canada outlines the offense and punishments for Criminal Harassment in Section 264(1) C.C. (http://www.canlii.org )

Security Software: Users are not permitted to remove or disable any security software installed by IT Services from workstations connected to the Reality Bytes Incorporated network. This includes, (but is not limited to), anti-virus software, workstation management software, and agent components thereof.

Software Installation: All software installed on Reality Bytes Incorporated-owned computers, including laptops, must be properly licensed to Reality Bytes Incorporated. Users are typically not permitted to install software on any Reality Bytes Incorporated-owned computer. Exceptions to this rule can be made for those users who clearly understand the implications of installing software on Reality Bytes Incorporated-owned computers. These users will be required to sign an agreement outlining their responsibilities. Users are encouraged to work with the Bookstore on the acquisition of software and Information Technology Services on the installation of any software required to do their work for Reality Bytes Incorporated. (Each installation of unlicensed software on Reality Bytes Incorporated computers which has not been properly licensed to the institution could result in a $50,000 fine by the Canadian Alliance Against Software Theft (CAAST)).

Home Computers: Users of Reality Bytes Incorporated-owned computers which are used at home must still abide by this Policy. Proper and safe computing practices are encouraged. Users are responsible for the use, content and maintenance of this equipment and software. Any software installation on home computers which are the property of Reality Bytes Incorporated must be properly licensed to either Reality Bytes Incorporated or to the user. Information Technology Services is not responsible for the ongoing maintenance of this equipment.

DISCIPLINE, JURISDICTION AND PENALTIES

Preamble

If Reality Bytes Incorporated learns that offensive material is being distributed or there is an inappropriate use of Reality Bytes Incorporated computer resources, Reality Bytes Incorporated may take disciplinary action. The Information Technology Services Department will investigate properly identified allegations/suspicions to ensure compliance with applicable federal and provincial laws and with institutional policies and procedures and report all such incidents by employees to the Associate Vice-President, Human Resources by way of This email address is being protected from spambots. You need JavaScript enabled to view it.

Disciplinary action

Misuse of Reality Bytes Incorporated's computing and network resources may result in disciplinary action by way of termination of the entire hosting agreement, or suspension of the agreement until a full investigation is completed.

 

a) EMPLOYEES INCLUDING CONTRACT EMPLOYEES AND 3rd PARTY CONSULTANTS

 

The Department of Human Resources will work with Information Technology Services to determine the extent and nature of the misuse and then the Department of Human Resources will work with the individual's administrative supervisor and appropriate Division Head to determine the appropriate level of disciplinary action, which may include termination. Any perceived violations of the law will be reported to the appropriate law enforcement authorities. Any employee discipline will occur in a manner that is consistent with the appropriate Collective Agreement and policy for employees.