ResNet Information Kit

 

 

 

1. What ResNet is:

The Trinity College ResNet is a 100 to 1000 Megabit local area network operating in the Trinity and St. Hilda's buildings. It is connected to the University of Toronto's (U of T's) fibre-optic backbone for internet access.

The ResNet exists primarily for academic needs. It is, however, accepted that non-academic uses can coexist on ResNet. Our concern is simply that ResNet works well for its intended purpose. The rules and policies outlined in this document are designed to achieve this goal while permitting legal, non-disruptive activities which can safely coexist with it.

2. Prerequisites for ResNet Access:

All ResNet users are required to protect their computers against viruses or other activity that can impair network performance. Computers without a functional virus scanner are not allowed on the network. Unprotected computers can become infected within seconds of being on the ResNet! We recommend that you install Microsoft's free Security Essentials antivirus software. The use of adware removers and a firewall is recommended but optional. Infected computers might not be allowed back onto ResNet without an in-person check by a ResNet administrator as a necessary means of preventing the proliferation of infections on the network. It is your responsibility to make sure that your virus scanner updates its virus definition files automatically. Failure to realize that your computer is infected is not accepted as a reason for early reconnection. The disconnection penalties outlined in section 4 are strictly enforced to minimize administrative overhead and to avoid any perception of favouritism.

If you agreed to the ResNet terms and conditions on your Residence Application, proceed with the "online registration procedure" outlined in the ResNet Essentials handout. Your jack will be de-activated if you have not agreed to the ResNet terms and conditions. ResNet jacks are activated by default unless the occupant has not confirmed ResNet policy agreement upon move-in, or has been disconnected for an administrative reason.

3. Traffic Quota:

Trinity no longer enforces a traffic quota but reserves the right to disconnect any user if their traffic is deemed excessive and thus disruptive to other users. We disconnect our users whenever U of T Network Operations notify us that any of our residents exceed the U of T limits: basically 16+ GB in a day, or 8+ GB/day twice in a week.  It may become determined that our local limits need to be stricter than the U of T limits (to maintain local network integrity) but the U of T limits are what we normally enforce at Trinity. See www.noc.utoronto.ca/net-ops/security/traffic.htm for more information on U of T internet traffic policy.

Please note that ResNet activities such as file-sharing movies can impair the speed of the network for other ResNet users. Moreover, sharing copyrighted material is illegal and may invoke litigation against you. File-sharing (such as running uTorrent, BitTorrent, etc.) programs typically enable unlimited seeding of the file you are downloading, so even if you are only downloading one file, you may upload several times that file's size in data during the download, and the uploads typically persist until you disable them. Thus it is easy to upload a lot of traffic without realizing it, and it is the uploading of files that tends to incur copyright violation investigations against our students. Please disable (or at least minimize) your seeding accordingly.  

While we do not attempt to police file-sharing, the U of T does implement traffic-shaping protocols which limit the volume of traffic involved in file-sharing. (The restrictions are usually reduced between midnight and 8 AM.) Some specific file-sharing programs may be blocked if it is determined that they pose a security threat (e.g., if they leave vulnerable ports open) or if they pose a severe traffic congestion issue. Those who insist on file-sharing would be wise to review the various U of T network security issues described at www.noc.utoronto.ca/net-ops/security.htm. Also note that Trinity is contacted several times each year by legal representatives of copyrighted materials regarding infringements by students who then have to see the Bursar to negotiate reconnection. Repeat copyright offenders are permanently banned from ResNet.

Excessive use of available bandwidth does affect your network neighbours, causes network hardware crashes, and invokes the attention of U of T Computing and Networking Services. While there is no current traffic monitoring site for ResNet users, if you think your traffic might be high (ex: you regularly download large files then you should be checking if your IP number appears at the various lists at www.noc.utoronto.ca/TS. (Note that only your internet traffic is counted: traffic that stays within the St. George Campus is disregarded.)  Due to the administrative overhead required to handle transgressors (and the potentially disruptive effects of their activities), no excuse can be accepted (e.g., "My friend installed something on my computer and didn't tell me...."). How your own computer affects other users is entirely your own responsibility.

The following disconnection period policy must unfortunately be strictly enforced when a resident's traffic volume exceeds the U of T limit (described above), or when a resident's computer is determined to have an infection, or when some other security violation is detected.

4. Disconnection Procedure:

  • 1st time2 business day disconnection from ResNet. To see if you have been disconnected, at an online computer you can check the "Status" box for your room at www.trinity.utoronto.ca/myjack. At the time of disconnection you will receive a voice message (at your room's extension) explaining why and you will receive a "Misuse Declaration" form in your mailbox for you to sign (stating that you understand the penalties and agree to not contravene the rules again). After the 2 days (and provided that you have returned the Declaration) you will be reconnected.

  • 2nd time: Same as 1st time but with a one week disconnection before reconnection.

  • 3rd time: Same as 1st time, but with a one month disconnection.

  • 4th time: Disconnection for remainder of the academic session (minimum 3 months).

Note: Disconnection offenses are cumulative (they do not reset to zero each year).

In some cases (such as repeated high traffic) Trinity will require, at its sole discretion, a ResNet administrator’s inspection of a resident's computer prior to reconnection to verify that the computer is free of file-sharing software and has adequate virus protection. If you refuse to allow the inspection then you may not be allowed further access to ResNet.

For serious violations the disconnection procedure may also be accelerated (immediate and permanent disconnection is possible, depending on the nature of the violation -- see ResNet Polices section below).

ResNet ports of high traffic generators are routinely capped (after reconnection) to limit future traffic bandwidth to reduce the likelihood of future excess traffic.

5. SHARING your ResNet connection in residence is BANNED:

U of T Network Security Policy states that “Departments must take steps to prohibit unauthorized access point installations by their users"  and that  "Departments must ensure that all access to wireless and wired docking area connectivity is controlled by an authentication system..."  that  "...can be traced to an identifiable end user".  This means that you are prohibited from using a wireless transmitter to allow unsecured (password-free) access to your ResNet connection (users not identifiable). The UofT networks are NOT a service for anonymous users or for the general public.

U of T policy posted at www.provost.utoronto.ca/policy/use.htm states that "Access to ICT resources at the University of Toronto may only be provided by the personnel who are responsible for those systems. A person who has been given such access does not, in general, have the authority to extend that privilege to anyone else." This means that Trinity College adminstrators are not authorized to allow you to share your ResNet connection with ANYONE, in any way. As a result, YOU assume responsibility for ANY traffic that you enable (even unwittingly) via your ResNet jack. You may, however, set up a password-protected wireless connection (using a router or access point) for your own use, but you are prohibited from sharing that connection (by giving out the password or by allowing password-free access). Sharing your ResNet connection is not allowed, even if you set up password protection so that only a trusted friend can connect. Providing ResNet access to others through your wireless transmitter will also result in your own traffic total being increased (all traffic routed through your ResNet jack counts toward your own total). Routine checks for rogue wireless access points that are not password-protected are conducted and penalties are imposed. Your Residence Application affirmation that you agree to these ResNet usage terms means that YOU are LEGALLY responsible for both the quantity and CONTENT of ALL the traffic that traverses your ResNet connection. 

An additional reason for Trinity to prevent sharing via wireless transmitting equipment is that they have been unacceptably used in the past to restore ResNet access to students who have been disconnected for violations of ResNet Policy (and sometimes even resumed their disruptive activity as soon as they were wirelessly enabled by a neighbour to regain access to the network). Trinity deals sternly with those who circumvent their ResNet disconnections and also with those who assist them (expulsions have occurred).

Regarding routers: Even though routers are allowed on ResNet for your own use, several routers include built-in DHCP servers. If activated, the DHCP server in your router may issue non-functional IP numbers to other ResNet computers when their IP leases expire (ResNet leases are typically renewed daily). As a result, your router may cause many ResNet users to lose ResNet access because their computers have obtained an unusable IP number from your router. This happens every year and is a seriously disruptive violation. Your not realizing that your router is running DHCP is not an acceptable excuse to avoid a subsequent extended disconnection penalty. Check to see if your router has a DHCP-server function BEFORE you connect it (and learn how to disable it if it does). 

6. UTORcwn Wireless networks at Trinity:

UTOR Campus Wireless Network (UTORcwn) access points provide wi-fi access in all common areas of the College as well as to all residence rooms, the Larkin building and the Graham Library. 

UTORcwn provides two SSID's in your list of available wi-fi networks at Trinity: "UofT" and "eduroam". "eduroam" is intended only for UT students who are planning to attend other universities or for temporary visiting students from other universities. 

UofT SSID:  The "UofT" network requires a UTORid for access. UTORid's are provided in advance during enrolment application procedures, however new UTORid's are only activated when you receive your T-Card and activation key at the T-Card office at Robart's Library (room 2054A). Before you can access the UofT wi-fi network, you will need to register your UTORid by using the VERIFY TOOL (at https://www.utorid.utoronto.ca/cgi-bin/utorid/verify.pl), even if your UTORid is working for other services. There will be a short delay between verifying and being able to access UofT. There  is no See http://help.ic.utoronto.ca/content/20/704/en/wireless-access.html for a step-by-step guide to connect your computer.  

Please note that wireless devices are registered with the UTORid and password used, so it is not recommended that you share your wireless computers or devices (you are liable for activity on the device registered with your UTORid).

ALL support for the UTORcwn wireless networks is provided by Robart's Library Info Commons Helpdesk and Helpline (416-978-HELP). Trinity College IT staff are not tasked with providing support for the wireless networks (so please contact Robarts instead!)

7. Outgoing mail server requirements:

UTmail+ is the student email and calendar service at the University of Toronto. The service is powered by Microsoft’s Live@edu platform and supports integrated email, calendaring, contacts and task lists. UTORmail is now an email service for University of Toronto staff and faculty.

UTmail+ lets you use a web browser to access your mailbox from any computer that has an internet connection. You can also access UTmail+ through mail clients like Outlook, or mobile devices like iPhone. UTmail+ users also have the option of signing up for Microsoft Skydrive, which provides 7 GB of free online storage.

Please see http://help.ic.utoronto.ca/solution_id_1754.html for details on getting and configuring UTmail+.

Those who use commercial email accounts (such as Rogers email) and an email client program (as opposed to webmail) must obtain their outgoing mail server settings from their email provider (e.g., Rogers).

ResNet access and getting help

For activation procedures please read the ResNet Essentials handout. To troubleshoot problems, please read the ResNet Assistance Request Form. If you have already read all the information but still have trouble, please follow the instructions on the ResNet Assistance Request Form for how to report your problem.  

 

Trinity College ResNet Policies

1. ResNet users shall obey all University of Toronto rules on "Appropriate use of Information and Communication Technology" (see www.provost.utoronto.ca/policy/use.htm).

Comment: These rules are subject to change without notice.

Penalty: Varying penalties (warnings to expulsion).

2. Internet server software restrictions for ResNet.

Comment: Internet server software is any software that allows your computer to be accessed from outside the ResNet i.e. the Internet, including: HTTP (web), FTP, telnet, DNS, DHCP/BOOTP, SMTP/POP/IMAP, Remote Access servers, and any other software that automatically shares or collects data to or from your computing device. All such traffic must not be excessive --  see "3. Traffic Quota" section for elaboration. This rule exists simply to prevent disruption or compromise of service to other users on the shared ResNet service. All filesharing software (such as BitTorrent) is further restricted to exclude unauthorized transmission of ANY copyrighted data. Security measures are in place to prevent some server software from working, and periodic checks will be made on suspect computers. Running a disruptive server (such as a busy web server as part of a commercial enterprise) may result in extended termination of your ResNet access and doing so unknowingly or by accident is not accepted as an excuse for lenience!

Penalty: Extended disconnection, varying penalties depending on severity

3. No illegal or hate materials shall be disseminated from a ResNet port.

Comment: For example, no child pornography, hate literature of any type, death threats, etc.

Penalty: Extended Disconnection, varying penalties depending on severity

4. No unsolicited commercial email (Spam) shall be sent from a ResNet port.

Comment: Spam is an annoyance to everyone.

Penalty: Disconnection, varying penalties depending on severity

5. No ResNet port shall be used to attempt to gain illegal access to any other computer system.

Comment: i.e. no hacking. This includes connecting to an outside computer and hacking from there. You are responsible as long as your connection is anywhere in a chain of systems used for hacking.

Penalty: Extended disconnection, varying penalties depending on severity.

6. No ResNet port shall be used to attempt to obtain sensitive information without the knowledge of all parties involved.

Comment: This means no attempts to "sniff packets on the network for passwords, personal email, etc..

Penalty: Extended disconnection, varying penalties depending on severity

7. No ResNet port shall be used to attempt to make malicious attacks on any computer systems.

Comment: No denial-of-service attacks (Teardrop), Ping of Death, SATAN attacks, etc..

Penalty: Extended disconnection, varying penalties depending on severity

8. No ResNet port hardware (data jack, sticker, wire, screw, clip, molding, conduit, access hatch, hub, or hub closet) may be opened, removed, relocated, or damaged in any way. The only permitted use of this hardware is the connection and disconnection of a patch cable from a data jack to a network card or hub.

Comment: Tampering is vandalism. Repairs are very costly, and you are responsible for your port.

Penalty: Repair bill & fine against your residence/academic account. Extended disconnection, varying penalties depending on severity

9. Devices connected to ResNet must be both virus-free and adequately protected against virus infection.

Comment: Computers with no virus scanner are virtually guaranteed to become infected. Infected computers are not allowed on the network because they may infect other network devices. We recommend Microsoft Security Essentials for all Windows computers (free)  or  ClamXav  (also free) for Mac computers running OS X.

Penalty: for causing a disruption on ResNet by using a computer without a virus scanner installed: Minimum 1-week disconnection.

10. Only the IP number assigned by a ResNet DHCP server may be used by your computer (i.e., you are not permitted to set a fixed or static IP number on your computer in residence).

Comment: All ResNet ports get automatically assigned IP numbers by ResNet DHCP servers. Using a fixed IP number will cause conflicts with other ResNet users and will prevent network access for them. This is a serious inconvenience for those affected.

Penalty: Minimum 1-week disconnection, depending on severity.

11. Giving others access to your ResNet service is banned (by allowing physical plug-in or by wireless access).

Comment: See section 4 of this ResNet Kit.

Penalty: Disconnection, varying penalties depending on severity

**********************************************

 

The following is excerpted from www.provost.utoronto.ca/policy/use.htm

 

Appropriate Use of Information and Communication Technology

The University’s information and communication technology (ICT) resources provide a rich array of services to our community. Ensuring the continuing utility and availability of these resources is the responsibility of service providers and consumers. These guidelines are intended to provide a framework for the protection and effective utilisation of these resources.

ICT provided by the University for the use of employees, students and other members of the University community is the property of the University, and is intended to be used in a manner that is consistent with the University’s mission.

These guidelines apply to all of the University’s information and communication technologies, including, hardware such as personal computers, personal digital assistants, telephones and printing devices, as well as software and other forms of information and communication technology that exist today or may be developed in the future. The use of personally-owned equipment on the University’s networks is covered by these guidelines as this also involves the use of University resources.

Additionally, these guidelines address the services that are provided through the University’s ICT, including e-mail, Internet access, departmental network services, telephone, fax and voice-mail, and other technologies. Moreover, as information technology protocols, applications, utilities and services are constantly changing, nothing in these guidelines restricts the authority of the relevant offices from initiating new rules or guidelines as circumstances dictate or as technology evolves.

Users of University ICT are expected to limit their use to the performance of University-related activities, although a reasonable allowance will be made for personal use. Whether or not an amount of personal use would be considered reasonable would depend on the particular circumstances and the applicable laws and policies. Users of University ICT are required to abide by all applicable laws and policies in addition to these guidelines. Reasonable personal use does not include in any circumstances the visiting of pornographic websites, the storage or distribution of pornographic material, or the accessing, storage or distribution of unlawful or otherwise inappropriate (within the meaning of the guidelines) information.

Users should not have an expectation of complete privacy in using the University’s ICT and related services. The issue of privacy is discussed further within these guidelines.

The various departments within the University that provide access to ICT have the authority to implement these guidelines and to monitor the usage of their services if they so choose.

There are two fundamental principles that the University follows in determining when usage of its ICT is unacceptable. One is the quantity of resources consumed; the other, the quality of the information transmitted. The former is primarily an issue of fairness – of the equitable distribution of ICT resources; the latter is an issue of the legality and potential harmfulnessof the information content, which is assessed according to the policies, codes and external laws that govern behaviour within the University.

It is recognised that some individuals using the University’s ICT are extended members of our community and may not be involved in the performance of University-related activities. For example, Alumni, or guests using public access terminals, will not necessarily be performing University-related activities. The principles of fair and appropriate use as discussed in these guidelines are still applicable to the extent that they are relevant to specific ICT uses. For example, the use of public access terminals for extended periods of time thereby preventing students from accessing computing services, or sending mass mailings through the University’s e-mail systems without appropriate authorisation, would be considered an inappropriate use of resources.

Fair Allocation of Resources

The University of Toronto has many facilities and services that provide ICT to users. Since the capacity of the resources is finite, there are limitations that may be imposed upon the use of specific services. Those responsible for each facility or service may establish rules governing their users; such rules can address issues peculiar to the technology involved, and may constrain the use of any resource by any user, should such constraint be deemed necessary to provide equitable sharing of the resource among all eligible users.

When a facility or service establishes rules for its users, the following principles shall be observed.

1.       The use of institutionally provided ICT resources must be consistent with the academic mission of the University.

2.       The facility or service has a responsibility to make users aware of all such rules, preferably at the time that access to the facility or service is granted. Where feasible, users should be required to acknowledge their agreement to abide by these rules when using the facility or service.

3.       All such rules must be applied fairly and consistently to all the users governed by them.

The providers of services have the authority to implement, monitor and apply the rules and Guidelines.

Appropriate Use of Resources

While quantitative limits on resource consumption are best set by those who manage the particular facility or service, qualitative constraints should be common across the University community and arise out of a variety of sources that are not necessarily specific to ICT. For example, a complaint about discrimination or harassment in which information technology was used as a vehicle should be dealt with as any other case of discrimination or harassment would be; the involvement of ICT does not of itself make the problem special. In this regard, these guidelines simply serve as reference to some of the relevant laws, policies and codes that should be used to determine whether usage is appropriate, what action to take when inappropriate use is alleged or suspected, and what penalties may apply for misuse.

Freedoms

The University of Toronto is committed to maintaining respect for the core values of freedom of speech, academic freedom, and freedom of research. In matters of freedom of speech versus responsible speech, it should be noted that speech using ICT is not intrinsically different from speech that does not use ICT. While the University does not censor information on its networks and servers, it will act on allegations about the distribution of unlawful material, about the use of its information technology to direct abusive, threatening or harassing communication at any individual or about any other inappropriate use. There is further discussion in the “Inappropriate Use…” section below.

When exercising free speech using the University’s ICT resources, such as when posting information to a publicly accessible file or web page, personal opinions must be identified as such, so that the reader understands the author is not speaking for the University. However, simply identifying an opinion as personal does not exempt it from the constraints of the law or the University's policies and codes.

Privacy

The University respects the reasonable privacy of electronic files stored or distributed on its servers and networks.  However, users cannot have an expectation of complete privacy when using the University’s ICT. ICT resources remain the University’s property, and are provided to advance the University’s mission. Accordingly, the University reserves the right to examine any electronic files where the University, in its sole discretion, determines that it has reason to do so. Without limiting the University’s discretion in this regard, the following represent some examples of situations in which the University may decide to examine a user’s electronic files:

  • During an investigation into an allegation of usage that contravenes existing laws, policies, or guidelines; or
  • When complying with a Freedom of Information request for data; or
  • Where necessary to carry out urgent operational requirements during an employee’s absence when alternative arrangements have not been made.

It should be noted, that files stored electronically have an existence that differs from paper files. While paper documents may be shredded, electronic documents may exist in multiple locations—on multiple servers and disk drives, as e-mail attachments, and in backup tapes or disks. The act of deletion from one’s own hardware does not assure permanent erasure. Users of ICT should be aware of the continuing existence of their files.

In addition to the University’s broad right to examine electronic files, as set out above, some policies address the University’s rights with respect to particular data. For example:

  1. Student and personnel records are subject to a policies regarding access to and disclosure of specified information.
  2. Some facilities or services include as part of their terms of use that users’ files may be read by authorised personnel. Examples include a computing facility in which instructors may be given access to certain student files for teaching purposes, or a business unit in which supervisory staff may be given access to e-mail correspondence with customers of that unit. Where such notice is not provided, however, the University as provider of ICT resources to advance its mission is not precluded from reviewing files, as may be reasonable in the circumstances.

Inappropriate Use of Information and Communication Technology

Users of information and communication technology may enjoy relatively unencumbered use of these services but in return they have an obligation to act responsibly and respect the rights of others. An obvious requirement is to obey the laws of Canada and Ontario, and to abide by the policies and codes of the University. These provisions deal with issues such as harassment, threatening behaviour, hate crimes, libel and defamation, discrimination, theft, fraud and plagiarism, whether ICT is involved or not. Particular facilities and services may impose additional conditions on their users.  Some specific examples of inappropriate use that might arise from the violation of laws or University policies are set out below. The list is not exhaustive.

Unauthorized Use

For students, refer to section B.5.b of the Conduct which addresses the use of computer systems for which access rights have not been granted, or using University facilities for commercial, disruptive or malicious purpose.

For employees, refer to the policy on conflict of interest and relevant contractual and collective agreement provisions. The University is entitled to determine whether an activity is a legitimate use of the employee’s time and is consistent with the employee’s other obligations. If an employee is making personal use of a facility or service, the employer has the discretion to require that this activity cease, and in some cases may impose disciplinary action up to and including dismissal if a directive to cease is not complied with, or if there is other inappropriate use of ICT resources.

Other members of the University community (alumni, status-only appointees, visiting professors, post-doctoral fellow, consultants…) who are granted access to our systems also have an obligation to use ICT resources in a way that does not conflict with the interests of the University, which is providing the resources.

Authorization Of Access

Access to ICT resources at the University of Toronto may only be provided by the personnel who are responsible for those systems. A person who has been given such access does not, in general, have the authority to extend that privilege to anyone else.

Individuals who have been assigned an e-mail or computer account have a responsibility not to share their access with anyone else, even for the sake of convenience. Users should never share their passwords, nor should they permit other people, either internal or external to the organisational unit, to access or use their account by any other means.

Individuals are responsible for the actions taken under their identity. Any person who has reason to suspect that access to his or her account may have been compromised has an obligation to bring the situation promptly to the attention of the administrators of the system.

On occasion, situations may arise related to accessing voice-mail and e-mail accounts assigned to an individual where their password is required, and the person is not available to access the data or service. Since, as a guiding principle, voice-mail and e-mail passwords should not be shared, alternative approaches, such as directing auto-reply e-mail and extended absence voice-mail messages to a colleague or supervisor’s e-mail or phone number should be implemented, wherever reasonably possible.

Discrimination and Harassment

Issues of harassment based on sex and sexual orientation are covered by the Policy and Procedures: Sexual Harassment, whether or not ICT is involved.

Issues of discrimination and discriminatory harassment, including harassment based on race and creed, are covered by the Statement on Prohibited Discrimination and Discriminatory Harassment, whether or not ICT is involved.

Additionally, issues or harassment and discrimination are covered by the Ontario Human Rights Code and the Criminal Code of Canada,

Unsolicited correspondence (including spam) may be viewed as harassment by the recipient. The University policy on harassment, however, is concerned with comments that are directed at specific individuals because of their personal characteristics. If the correspondence is mass-mailed, it should be addressed under local rules for the service used, which should prohibit or restrict unsolicited bulk mail.

Users of e-mail are advised to delete spam without opening any attachments, and to turn off the “viewing pane” in their e-mail application so as to prevent message contents from appearing automatically.

Pornography

Possession of child pornography is a criminal offence.

Unauthorized Disclosure of Information

The disclosure of certain types of information is prohibited by law and/or policy, which are applicable whether or not ICT is involved. The key University policy in this area is the Policy on Access to Information and Protection of Privacy. For student records, there is a specific Policy on Access to Student Academic Records

Copyright, Trademark and Intellectual Property Rights Violations

Unauthorized copying of software is covered by the Canadian Copyright Act, and constitutes a criminal offence. The “fair use” provisions that apply to photocopies used for teaching do not apply to Web pages. The Resource Centre for Academic Technology (RCAT) in Robarts Library can provide guidance to instructors.

The use of commercial software for which a license fee is required, or the downloading and/or distribution of music or video files, for which license fees and distribution rights have not been paid or agreed upon, constitutes an infringement of Copyright, Trademark and Intellectual property rights, and is illegal. (This is a transitory issue relative to music as a Federal Court decision is being appealed by CRIA.)

Registered marques of the University of Toronto may be used only within the parameters of the Trademark and Licensing Policy and the University of Toronto Code of Conduct for Licensees.

The unauthorised use of any form of device to audiotape, photograph, video-record or otherwise reproduce lectures, course notes or teaching materials provided by instructors is covered by theCanadian Copyright Act and is prohibited. Students must obtain prior written consent to do such recording. In the case of private use by students with disabilities, the instructor's consent must not be unreasonably withheld.

In other situations where an individual photographs, audiotapes or otherwise records activities in which she or he is taking part, without the permission of other participants, the nature of the activities must be examined. Where participants have a reasonable expectation of privacy, unauthorised recording of their activities may be unlawful.

Additionally, the Criminal Code of Canada makes surreptitious third party recording of conversations or other activities illegal except where there is explicit legal authority to make such recordings [e.g. phone-tapping].

Plagiarism

Issues of plagiarism and misrepresentation are covered by the Code of Behaviour on Academic Matters, whether or not ICT is involved.

Criminal Activity

Issues of possible criminal activity, such as theft or criminal harassment or threats, are covered by statute (such as the Criminal Code of Canada) as well as by internal policies such as the Code of Student Conduct. They should be referred to the Community Safety Office and to the University Police, who can provide advice about appropriate responses and assistance with prosecution of the offence, whether or not ICT is involved.

U of T Reference Documents

 … Please go to the bottom of www.provost.utoronto.ca/policy/use.htm to view the list of reference documents pertaining to the above excerpt