
Acceptable Use of Technology Procedure
- Approver:
- Academic Coordinating Committee
- Policy Owner:
- Vice President, Information Technology & Systems
- Policy Lead(s):
- Manager, IT & Systems Budget, Assets & Reporting
- Effective date:
- 2011-09-28
- Date of last approval:
- 2024-11-20
- Status:
- Approved
Procedure Statement
The purpose of this procedure is to outline and inform the ethical and lawful use of
technology at the ÌÇÐÄvlog¾«Æ· Institute of Technology and Advanced Learning
(Conestoga). This includes the use of technology and technology resources. This
procedure applies to all technology users.
Definitions
ÌÇÐÄvlog¾«Æ· maintains a glossary of terms specific to the institution. The ones in use for this document are defined below.
- Cellular Device
- Any electronic device that can connect to a cellular network using the mobile service provider’s SIM card installed within it.
- Conestoga Business
- Activities performed for business and operations purposes on behalf of Conestoga including academic, administrative and research activities and purposes.
- Contractor
- Any person or entity contracted by Conestoga to provide goods or services on Conestoga-owned or leased property or at Conestoga coordinated off-site programs, functions, or events. A contractor shall be considered an employer and meet or exceed Conestoga’s health and safety management system requirements unless otherwise determined to be a constructor.
- Data
- Individual symbols or pictures that represent raw facts or figures, which on their own do not comprise meaning and have no discernible arrangement. It can be processed by a computer, computer system or application.
- Employee
- An individual employed by the College, whether employed full-time, part-time, or on a contract basis, and includes, but is not limited to, faculty, researchers, support staff and administrators.
- Guest
- An individual who is not an employee, contractor, or student and is external to Conestoga, which includes, but is not limited to, Board members, visitors, alumni, and volunteers.
- Information
- Data that has been given value or meaning through interpretation or analysis and that has been organized to create meaning.
- Mobile Device
- Any communication device that does not require a physical wire to relay information from one device to another. It is designed or architected product that is able to be moved easily and used at a variety of locations.
- Multifactor Authentication (MFA)
- Authentication using two or more different factors to achieve authentication. Factors include something you know (e.g., PIN, password), something you have (e.g., cryptographic identification device, token), or something you are (e.g., biometric). MFA is generally considered secondary authentication in addition to a primary authentication method.
- Passphrase
- A secret consisting of a sequence of words or other characters to authenticate an identity or to authorize access to data. A passphrase is like a password in usage but is generally longer for added security.
- Password
- A protected/private string of letters, numbers, and/or special characters used to authenticate an identity or to authorize access to data.
- Technology
- Any computing and/or communications hardware and/or software components and related resources that can collect, store, process, maintain, share, transmit, or dispose of data or information. Components can include, but are not limited to, computers and associated peripheral devices, computer operating systems, utility/support software, accounts, and communications hardware and software.
- Technology Resource
- Any hardware, software, or communication equipment that a user interacts with for data or information management. This includes but is not limited to computers, mobile devices, cellular devices, applications, user accounts, wired and wireless network services that a user uses for tasks such as creating documents, sending messages, or retrieving data or information from repositories. These resources are owned, leased or in the care, custody, or control of Conestoga.
- Technology User
- An individual or entity that uses technological tools, devices, or systems for various information and data tasks, which includes, but is not limited to, guests, contractors, students, and employees. These users are authorized to use technology resources owned, leased or in the care, custody, or control of Conestoga with proper authentication and/or identification.
Responsibilities
Technology Users
- Safeguard their unique passwords/passphrases and accounts. Do not disclose passwords/passphrases to others and secure all methods of authentication from compromise or misuse.
- Protect the confidentiality, integrity, and availability of Conestoga's information and technology resources in accordance with the Technology Governance Policy.
- Comply with the requirements of contracts and licenses applicable to the software, applications, information, and data they install or store on Conestoga technology resources.
- Utilize only technology resources that they are authorized to use and use them only in the manner and to the extent authorized.
- Respect the privacy of other technology users and their technology resources, regardless of whether those technology resources are securely protected. For example, an unattended device is left unlocked in a public space should be secured or removed from public access.
- Respect the capacity of those technology resources and limit use so as not to consume an unreasonable amount of those technology resources or to interfere unreasonably with the activity of other technology users. For example, avoid consuming more than an average amount of network bandwidth.
Conestoga Supervisors
- Ensure that employees comply with the Technology Governance Policy, this procedure, and any other technology related policies and procedures.
- Ensure employees have the technology resources needed to perform their job functions.
- Ensure employee access to technology resources and information is revoked or removed when no longer required.
Information Technology and Systems Department (IT & S)
- The maintenance and operation of Conestoga technology.
- Integration, deployment, and support for new, existing, and renewed technology.
- Support technology users with use of technology, including addressing issues, breakage, and replacement of technology.
Cyber Security Team
- Maintain the confidentiality, integrity, and availability of Conestoga technology.
- Monitoring and responding to breaches of this procedure, security issues, or other malicious activity.
- Provide end user notifications and support in cases of breaches or misuse, as defined in this procedure.
Procedure
- Conestoga Accounts
- All technology users will be issued individual accounts. Shared accounts with the same username and password information or the sharing of passwords/passphrases of accounts will not be allowed.
- Information on individual current account lifecycles for employees can be found online. Information on individual account lifecycles for students can be found online. Account lifecycles will be managed via automated processes and align to the information provided.
- Some technology users will require secondary accounts. Privileged accounts are used when a technology user needs elevated access to complete tasks. Privileged accounts are issued after approval from the Cyber Security team. These accounts are to be used to perform authorized administrative actions on, to, or within technology resources, which the technology user is authorized to do so. Privileged account access can be revoked at any time. Privileged account access cannot be shared with other technology users. Privileged accounts must only be used for work-related activities in cases where elevated access is required.
- Privileged accounts are terminated on the employee's last day of employment or at Cyber Security's discretion.
- Long-Term Leave of Absence
- Employee Long Term Leaves of Absence
- A long-term leave of absence as defined by Human Resources is a planned leave of longer than six months. The type of leave and approval processes reside with the Human Resources department.
- In the case of an approved leave of absence, the employee will return their college-issued technology for the duration of the absence. The employee's access to technology resources will be suspended for the duration of the leave. All exceptions to this process are subject to approval by the relevant department that provides oversight for the technology user (e.g., Human Resources for employees).
- Student Long Term Leaves of Absence
- A long-term leave of absence as defined by the Registrar's Office and business logic contained within the Student Information System.
- In the case of a leave of absence, the student will return their college-issued technology for the duration of the absence. The student's access to technology resources will be suspended for the duration of the leave. All exceptions to this process are subject to approval and relevant changes of status in the Student Information System.
- Suspected Account/Device Compromise
- Conestoga retains the right to isolate technological resources connected to Conestoga's technology when indicators of compromise are observed. Technology user accounts may also have any active sessions revoked, and/or passwords/passphrases changed in the event a compromise is suspected or has occurred. In the case of a confirmed technology resource breach, the technology user of the account may also be assigned additional security awareness training.
- Technology resources are released from isolation when the technology user can prove the technology resource is no longer a threat to other technology resources or technology users. After receiving notice from Cyber Security or the IT and S Service Delivery team, a technology user will regain access to their technology resources through setting a new password/passphrase and/or confirming or updating MFA methods and/or proving that a device is no longer compromised. Compromised devices can be proven cleared of compromise by re-imaging, restoration to a previously secure state, or vetting the security of the device by a member of the IT and S department.
- Network and Infrastructure Access
- Technology resources that are allowed to connect to other technology resources such as data networks require approval or are issued by the IT and S department. Personal devices are allowed to connect to Conestoga technology resources only by those with active authorization.
- Conestoga technology allows for fair use by all authorized technology users. Overutilization, unfair use, or negative impact to other technology users could result in technology resources being blocked from the network.
- Technology resources not issued by the IT and S department can be reviewed for access by contacting the IT Service Desk. Questions or concerns regarding allowed technology resources should be directed to the IT and S desk via email at itsdesk@conestogac.on.ca.
- Software and Applications
- All third-party technology resources must be reviewed and approved for use by the Cyber Security team prior to use by technology users. All requests for review should be emailed to itsdesk@conestogac.on.ca.
- When using approved technology resources, technology users will abide by any licensing requirements and terms of use and/or service.
- Conestoga prohibits the use of free trial software without previous approval. For a full list of approved software Conestoga offers to technology users refer to Conestoga IT downloads or the technology register.
- Electronic Communications
- Employees
- Employees may be given access to Microsoft Teams, Outlook email, mobile technology resources, and other technology for communication purposes. These technology resources are to be used for Conestoga business. Acceptable uses include work-related discussions, collaboration, sharing of information pertinent to job roles, and communication with vendors, partners, students, or colleagues.
- Students
- Students may be given access to Microsoft Teams, Outlook email, and other technology for communication purposes. These technology resources are to be used for academic/school-related purposes. Acceptable uses include academic-related discussions, collaboration, sharing of information pertinent to learning activities, and communication with other students and staff.
- Guests\Contractors
- Guests\Contractors may be given access to Microsoft Teams, Outlook email, and other technology for communication purposes. These technology resources are to be used for Conestoga business. Acceptable uses include work-related discussions, collaboration, sharing of information pertinent to job duties, and communication with Conestoga employees or students.
- Labs and Shared Computers
- Labs and shared computers are available to technology users to access e-mail, web browsing, and to make use of installed software to increase their computer knowledge, enhance their computing skills, and further their learning experience. The computers in the labs provide technology users with the latest in hardware, operating/applications software, and related services. Students are expected to be considerate and respectful of other technology users using the labs and shared computers.
- If required, contact Security Services or IT and S for access to a lab and shared computer area. Technology users may be directed to use an alternative lab and shared computer that is available.
- Under no circumstances should technology resources within the labs be moved, modified, or disconnected. Network printers and associated supplies are paid for from technology fees. For further information please refer to the printing guidelines.
- Usage of Technology
- Personal Usage
- Occasional personal usage of technology and technology resources provided by Conestoga is permitted if the user is authorized to use Conestoga's technology. Conestoga technology will be primarily used for business purposes. Personal usage may include but is not limited to using technology on work breaks, to access personal accounts, and limited personal communications.
- Prohibited Usage
- Prohibited usage of technology and technology resources include but are not limited to activities that are against other policies and procedures, activities that break laws or regulations, use of technology for personal gain or profit, and use of technology causing direct harm or malicious activities towards a person, group of people, or other technology users.
- Prohibited uses of technology will result in an immediate termination of authorization to use technology and may result in the reporting of activities to the authorities.
- Acceptable and Unacceptable Usage Examples
- Acceptable and unacceptable usage of technology examples for technology users can be located here. All technology users will abide by these examples as they will change over time as technology changes. Any questions or concerns may be directed to itsdesk@conestogac.on.ca.
- Bring Your Own Technology (BYOT)
- Staff
- Technology that is not issued to staff by the IT and S department or deployed from an academic area will be considered BYOT. This technology is the responsibility of the staff member. However, support may be provided by academic areas and the IT and S department when it comes to interconnections between BYOT and Conestoga technology. All BYOT will abide by the same requirements of Conestoga technology and Conestoga retains the right to prevent the use of BYOT if it fails to meet those requirements.
- Students
- Students are expected to bring technology to Conestoga as required for their academic and school-related purposes. This technology is the responsibility of the student. However, support may be provided by academic areas and the IT and S department when it comes to interconnections between BYOT and Conestoga technology. All BYOT will abide by the same requirements of Conestoga technology and Conestoga retains the right to prevent the use of BYOT if it fails to meet those requirements.
- Monitoring of Technology
- Conestoga will monitor usage and status of technology as part of ongoing operations. This monitoring will be for tracking issues, supporting technology users, and ensuring proper usage of technology. Monitoring will also include security monitoring to ensure that technology remains safe and secure. Technology auditing will be done on a regular basis to ensure proper access control, technology usage, and that technology is functional and in a supported state. Monitoring and auditing of technology shall be done in accordance with the Freedom of Information and Protection of Privacy Act.
- Security
- All technology users are responsible for keeping their technology resources secure and to not knowingly provide access to their technology resources to another technology user or third parties. If a technology user suspects any sort of compromise, they are to communicate with IT and S via one of the contact methods listed on the
IT Service Desk page.
Relevant Legislation and Related Documents
Relevant legislation
The Criminal Code of Canada
Canada's Anti-Spam Legislation
Accessibility for Ontarians with Disabilities Act (AODA)
The Personal Information Protection and Electronic Documents Act (PIPEDA)
Freedom of Information and Protection of Privacy Act (FIPPA)
Related documents
Employee
Discipline Procedure
Technology Governance Policy
Revision Log
‸¾²¹³Ù±ð | ‸¾±ð³Ù²¹¾±±ô²õ |
​2011-09-28 | ​Academic Coordinating Committee approval |
​2024-03-13 | ​Major revisions completed for policy review |
​2024-11-20 | ​Academic Coordinating Committee approval |