Information and Educational Technology Acceptable Use

Policy Number: 
Policy Responsibility: 
Vice-President, Finance & Administration
Board of Governors
November 22, 2012

Context / Purpose: 

The JIBC provides Information and Educational Technology (IET) resources to JIBC staff, faculty and students to support the teaching, learning, research and administrative goals and functions of the JIBC. These IET resources are valuable community assets which are expected to be used and managed responsibly to ensure their integrity, security and availability for the educational and administrative activities of the JIBC. 

Policy Statement: 

This policy establishes guidelines for both acceptable and unacceptable uses of JIBC owned or leased IET resources, thereby ensuring a stable, effective and efficient operation while minimizing potential disruption and risk.

Breaches of this Policy may be subject to the full range of disciplinary and other formal actions up to and including dismissal. In addition to any other sanctions that JIBC may levy in the event of a violation, JIBC may withdraw computing privileges and network access.

JIBC reserves the right to limit, restrict or extend computing privileges and access to its computing and communications resources, including all information stored therein.

NOTE: This Policy is not intended to set forth an exhaustive list relating to the use of JIBC computing resources. All users continue to be subject to all applicable laws and JIBC policies.


This Policy and related Procedures apply to:

  • All JIBC owned or leased IET resources including networks, information systems, applications, computers, Smartphones, tablets and other communication devices and information assets.
  • Any member of the JIBC community including students, employees and other individuals or organizations that uses JIBC IET resources on or off Campus.
  • The use of personal equipment (e.g. laptop, smartphones, tablets, etc.) connected to the JIBC’s data & voice networks.
  • User-created content through online publishing and discussion including blogs, wikis, file-sharing, user-generated video, audio, virtual worlds and social networks sites.
  • Portable storage devices such as external hard drives, USB flash drives, CD-ROM, DVD-ROM


Intellectual Property

  • Users must respect the legal protection provided by copyright laws for computer programs and data compilations and for all other works (literary, dramatic, artistic or musical). Also, users must respect the legal protection provided by trademark law and the common law for names, marks, logos, and other representations that serve to distinguish the goods or services of one person from another.
  • Users must respect the rights of others by complying with all JIBC policies regarding intellectual property regardless of medium (i.e. paper or digital).

Freedom of Expression

Users should be aware that, while the JIBC has programs to screen emails for viruses, worms etc., its practice is not to control the information available on our campus network.


All users must comply with the JIBC Harassment Policies 

Examples of Illegal Uses

The following are representative examples only and do not comprise a comprehensive list of illegal uses:

  • Uttering threats (by computer or telephone);
  • Accessing, storing or distributing child pornography; and
  • Copyright infringement.

 Examples of Unacceptable Uses

The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:

  • Use of the JIBC’s IET resources for outside business, commercial or non-incidental personal use is prohibited unless such use is sponsored and approved by the JIBC.
  • Seeking information on passwords or data belonging to another user;
  • Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others;
  • Distribution of pornographic materials (exception: those with a legitimate academic purpose for doing so may distribute such material for a stated legitimate academic purpose);
  • Copying someone else's files, or programs, or examining such information unless authorized;
  • Attempting to circumvent computer security methods or operating systems (e.g. subverting or obstructing a computer or network by introducing a worm or virus);
  • Using JIBC-provided computer accounts for commercial purposes such as promoting by broadcast non-educational profit-driven products or services;
  • Intercepting or examining the content of messages, files, or communications in transit on a voice or data network;
  • Adding unauthorized servers, network devices, or any unauthorized electronic devices that could compromise the security of JIBC electronic information
  • Interfering with the work of other users of a network or with their host systems, seriously disrupting the network (e.g. chain letters or spamming), or engaging in any uses that result in the loss of another user's files or system; and
  • Gambling, betting, or pyramid schemes;
  • Harassing, discriminatory messages including cyber-bullying.

System Administrators

Subject to ‘Privacy and Security Section 2’ above, this policy shall not be construed as preventing or restricting duly authorized system administrators or other technical personnel from carrying out their duties. Complaints regarding this section of the policy may be directed to the Director of Technology Services. 


Responsible Use

  1. Computer IDs, accounts, and other communications facilities or equipment are to be used for authorized purposes. Subject to any JIBC Conflict of Interest policies, limited personal use is acceptable if it does not interfere with use of the facility for its intended purpose and, in the case of employees, if does not interfere with job performance.
  2. Users are responsible for the use to which their computing accounts are put. Users must not share their login credentials (username and password) for any accounts to which they have access.
  3. Users are prohibited from accessing other users' computer IDs or accounts and communications, without specific prior authorization of the user and from the appropriate Director, Dean or Vice -President.
  4. Users must not misrepresent their identity as senders of messages or alter the content of such messages with intent to deceive.
  5. All users must adhere to JIBC policies and all legislation that govern the use of JIBC’s computing and communication facilities. Applicable legislation includes, but is not limited to, the Criminal Code of Canada, the B.C. Civil Rights Protection Act, the Canadian Copyright Act, the B.C. Freedom of Information and Protection of Privacy Act, and the B.C. Human Rights Code.
  6. Users must not use JIBC’s information technology facilities and assets for activities like gambling, betting, pyramid schemes, personal gain or illegal activities.

Privacy and Security

Users must:

  1. Preserve the privacy of data to which they have access in accordance with applicable laws and the JIBC’s policies including our Freedom of Information and Protection of Privacy Policy;
  2. Respect the privacy of others by not tampering with email, files, or accounts they use; and
  3. Respect the integrity of computing systems and data.
  4. For example, users must not: intentionally develop programs or make use of already existing programs to harass or bully other users, infiltrate a computer or computing system, damage or alter the components of a computer or computing system, gain unauthorized access to other facilities accessible via the network, or inappropriately use the telephone system.
  5. JIBC confidential or private information classified under the BC Privacy Act must not be downloaded to insecure or unencrypted media such as laptops, storage devices (USB’s, external hard drives, etc.). smartphones, tablets or other types of electronic devices
  6. Although electronic records on JIBC equipment are the property of JIBC and JIBC is entitled to review those records, the user community can be assured that system administrators will not examine electronic files without the individual's prior knowledge, except in emergencies or under extenuating circumstances. In no event will JIBC personnel examine other users’ electronic files without authorization in writing from a member of the JIBC executive. 

Last updated May 19, 2015