University Regulations


III. Procedures for Dealing with Infractions to the Principles in the Use of Information Technology

Introduction

Procedures:

  1. When it appears that a user is not fully aware of the policy, it is recommended that the appropriate section of the policy should be brought to their attention by either their manager or Computing and Communication Services.
  2. Offenses which are violations of criminal and/or civil law may result in immediate loss of all privileges and will be reported to the appropriate University and law enforcement agencies.

    Violations will result in the following disciplinary steps if the individual is not subject to disciplinary procedures specified elsewhere:

  3. A warning to cease the behaviour. At the individual's request, a meeting will be held to review the violation, discuss the warning and allow the individual an opportunity to respond.
  4. Continued violations will result in either a restriction in access to the facilities or a complete suspension of access to the computing facilities. This restriction may be in effect for the equivalent of one full academic term and may span academic years. The appropriate department heads and deans will be notified.
  5. In the process of investigating possible violations, Computing and Communication Services may temporarily suspend access to facilities.
  6. In extreme cases of abuse or if major damage has occurred, the process will be accelerated.


University Regulations
Principles in the Use of Information Technology

[Previous] [Parent] [Next]

[Table of Contents] [Index] [Glossary]
[Courses by Subject] [Courses by Name] [Awards by Category] [Awards by Name] [Calendar Search]

Official electronic version updated on November 17, 2000

[LAURIER Home Page] [COMMENTS] M. Watson, Editor

[Course Timetable]