ResNet Information Kit
1. What ResNet is:
The Trinity College ResNet is a 100MB local area network operating in the Trinity and St. Hilda's buildings. It is connected to the University of Toronto's (U of T's) fibre-optic backbone for internet access.
The ResNet exists primarily for academic needs. It is, however, accepted that non-academic uses can coexist on ResNet. Our concern is simply that ResNet works well for its intended purpose. The rules and policies outlined in this document are designed to achieve this goal while permitting legal, non-disruptive activities which can safely coexist with it.
2. Prerequisites for ResNet Access:
All ResNet users are required to protect their computers against viruses or other activity that can impair network performance. Computers without a functional virus scanner are not allowed on the network. Unprotected computers can become infected within seconds of being on the ResNet! We recommend that you install Microsoft's free Security Essentials antivirus software. The use of adware removers and a firewall is recommended but optional. Infected computers might not be allowed back onto ResNet without an in-person check by a ResNet administrator as a necessary means of preventing the proliferation of infections on the network. It is your responsibility to make sure that your virus scanner updates its virus definition files automatically. Failure to realize that your computer is infected is not accepted as a reason for early reconnection. The disconnection penalties outlined in section 4 are strictly enforced to minimize administrative overhead and to avoid any perception of favouritism.
If you agreed to the ResNet terms and conditions on your Residence Application, proceed with the "online registration procedure" outlined in the ResNet Essentials handout. Your jack will be de-activated if you have not agreed to the ResNet terms and conditions. ResNet jacks are activated by default unless the occupant has not confirmed ResNet policy agreement upon move-in, or has been disconnected for an administrative reason.
3. Traffic Quota:
Subsequent to various upgrades Trinity no longer enforces a traffic quota but reserves the right to disconnect any user if their traffic is deemed excessive and thus disruptive to other users. We disconnect our users whenever U of T Network Operations notify us that any of our residents exceed the U of T limits: basically 16+ GB in a day, or 8+ GB/day twice in a week. It may eventually be determined that our local limits need to be stricter than the U of T limits (to maintain local network integrity) but for now the U of T limits are what we enforce at Trinity. See www.noc.utoronto.ca/net-ops/security/traffic.htm for more information on U of T internet traffic policy.
Please note that ResNet activities such as viewing streaming videos or file-sharing movies and popular music files can severely impair the speed of the network for other ResNet users. Moreover, sharing copyrighted material is illegal and may invoke litigation against you. File-sharing (such as running uTorrent, Frostwire, BitComet, etc.) means that you are running server software, which is a violation of the ResNet rules and U of T policies.
While we do not attempt to police all file-sharing, the U of T does implement traffic-shaping protocols which limit the volume of traffic involved in file-sharing. (The restrictions are usually reduced between midnight and 8 AM.) Some specific file-sharing programs may be blocked if it is determined that they pose a security threat (e.g., if they leave vulnerable ports open) or if they pose a severe traffic congestion issue. Those who insist on file-sharing would be wise to review the various U of T network security issues described at www.noc.utoronto.ca/net-ops/security.htm. If you have file-sharing software installed, we strongly urge you to remove all files from your shared folders (or otherwise disable the file-sharing) in order to prevent unexpected disconnection. Also note that Trinity has been contacted many times by legal representatives of copyrighted materials regarding infringements by students who then had to see the Bursar to negotiate reconnection. Repeat copyright offenders are permanently banned from ResNet.
Excessive use of available bandwidth does affect your network neighbours, causes network hardware crashes, and invokes the attention of U of T Computing and Networking Services. While there is no current traffic monitoring site for ResNet users, if you think your traffic might be high (ex: you regularly download large video files or you fileshare using P2P software despite our ban) then you should be checking if your IP number appears at the various lists atwww.noc.utoronto.ca/TS. (Note that only your internet traffic is counted: traffic that stays within the St. George Campus is disregarded.) Due to the administrative overhead required to handle transgressors (and the potentially disruptive effects of their activities), no excuse can be accepted (e.g., "My friend installed something on my computer and didn't tell me...."). How your own computer affects other users is entirely your own responsibility.
The following disconnection period policy must unfortunately be strictly enforced when a resident's traffic volume exceeds the U of T limit (described above), or when a resident's computer is determined to have an infection, or when some other security violation is detected.
4. Disconnection Procedure:
1st time: 2-business-day disconnection from ResNet. (To see if you have been disconnected, at an online computer check the "Status" box for your room atwww.trinity.utoronto.ca/myjack.) At the time of disconnection you will receive a voice message (at your room's extension) explaining why and your room will be mailed a "Misuse Declaration" form to sign (stating that you understand the penalties and agree to not contravene the rules again). After the 2 days (and provided that you have returned the Declaration) you will be reconnected.
2nd time: Same as 1st time but with a one week disconnection before reconnection.
3rd time: Same as 1st time, but with a one month disconnection.
4th time: Disconnection for remainder of the academic session (minimum 3 months).
Note: Disconnection offenses are cumulative (they do not reset to zero each year).
In some cases (such as repeated high traffic) Trinity will require, at its sole discretion, a ResNet administrator’s inspection of a resident's computer prior to reconnection to verify that the computer is free of file-sharing software and has adequate virus protection. If you refuse to allow the inspection then you may not be allowed further access to ResNet.
For serious violations the disconnection procedure may also be accelerated (immediate and permanent disconnection is possible, depending on the nature of the violation -- see ResNet Polices section below).
ResNet ports of violators are routinely capped (after reconnection) to limit future traffic bandwidth to reduce the likelihood of future excess traffic.
5. SHARING your ResNet connection in residence is BANNED:
U of T Network Security Policy at www.utoronto.ca/security/documentation states that “Departments must take steps to prohibit unauthorized access point installations by their users" and that "Departments must ensure that all access to wireless and wired docking area connectivity is controlled by an authentication system..." that "...can be traced to an identifiable end user". This means that you are prohibited from using a wireless transmitter to allow password-free access to your ResNet connection (users not identifiable).
U of T policy posted at www.provost.utoronto.ca/policy/use.htm states that "Access to ICT resources at the University of Toronto may only be provided by the personnel who are responsible for those systems. A person who has been given such access does not, in general, have the authority to extend that privilege to anyone else." This means that Trinity College adminstrators are not authorized to allow you to share your ResNet connection with ANYONE, in any way. As a result, YOU assume responsibility for ANY traffic that you enable (even unwittingly) via your ResNet jack. You may set up a password-protected wireless connection (using a router or access point) for your own use, but you are prohibited from sharing that connection (by giving out the password or by allowing password-free access). Sharing your ResNet connection is not allowed, even if you set up password protection so that only a trusted friend can connect. Wirelss devices with password protected access are permitted for your OWN use only. Providing ResNet access to others through your wireless transmitter will also result in your own traffic total being increased (all traffic routed through your ResNet jack counts toward your own total). Routine checks for rogue wireless access points that are not password-protected are conducted and penalties are imposed. Your Residence Application affirmation that you agree to these ResNet usage terms means that YOU are LEGALLY responsible for both the quantity and CONTENT of ALL the traffic that traverses your ResNet connection.
An additional reason for Trinity to prevent sharing via wireless transmitting equipment is that they have been unacceptably used in the past to restore ResNet access to students who have been disconnected for violations of ResNet Policy (and sometimes even resumed their disruptive activity as soon as they were wirelessly enabled by a neighbour to regain access to the network). Trinity deals sternly with those who circumvent their ResNet disconnections and also with those who assist them (expulsions have occurred).
Regarding routers: Even though routers are allowed on ResNet (for your own use), several routers include built-in DHCP servers. If activated, the DHCP server in your router may issue non-functional IP numbers to other ResNet computers when their IP leases expire (ResNet leases are typically renewed daily). As a result, your router may cause many ResNet users to lose ResNet access because their computers have obtained a bad IP number from your router. This happens every year and is a seriously disruptive violation. Your not realizing that your router is running DHCP is not an acceptable excuse to avoid a subsequent extended disconnection penalty. Check to see if your router has a DHCP-server function built-in BEFORE you connect it (and learn how to disable it if it does).
6. UTORcwn Wireless networks at Trinity:
Wireless transmitters provide UTORcwn access (via the UofT, UTORwin, and eduroam SSIDs) in most of the common areas of the College as well as in many student rooms. The Larkin building and the Graham Library also have UTORcwn transmitters. Of course the signal strength depends on proximity and how much wall is between a user's computer and the nearest transmitter.
To connect to the internet through the wireless transmitters, the usual UTORcwn procedures and policies apply (see www.wireless.utoronto.ca). Essentially, users select the "UofT" wireless network (from the options in their available networks list), then they enter the UTORcwn security key (UToronto1home), and then login with their UTORid and password (obtain a UTORid atwww.utorid.utoronto.ca). Once a computer has been thus registered on the UTORcwn network, it will not be necessary to enter the security key again but UTORid login may be required after 30 minutes of network inactivity. Immediately following the first login authentication, computers must pass an ESP (endpoint security policy) scan (exactly the same as that for ResNet access). This scan checks for a functional virus scanner and current Windows updates (computers with Mac and Linux operating systems automatically pass). Limited network access is provided to computers that initially fail the test and need to install updates from Microsoft.com or Symantec Endpoint from www.antivirus.utoronto.ca (free to UTORid holders).
There is no quota on the UofT SSID. [There is a 2 GB per week UTORwin quota, however, starting at 6 AM on Mondays. Computers that exceed the quota are blocked until the next cycle starts.] Connection speeds depend on proximity and total number of users connected per transmitter. The UTORcwn wireless networks are operated and supported by U of T Information + Technology Services and Robarts Library. If an individual requires assistance then they must call theRobart's Helpdesk (978-HELP) rather than the ResNet helpline. If one of our local transmitters seems to be offline (i.e., if users find that there is no longer any signal in one of our normally-functional wireless zones), however, then this should be brought to the attention of Trinity Computing Services (ask the Porters to pass on the message or leave voicemail at ext. 4999).
7. Outgoing mail server requirements:
U of T Computing and Networking Services restricts outgoing mail (SMTP) connections from residence computers to prevent spam relaying from residences (many viruses and spyware contain their own SMTP servers by which they propagate). All U of T students should use authenticated SMTP atsmtp.utoronto.ca (as their outgoing mail server), using TLS on port 587 and SSL on port 465 if they don't use the U of T web-based email interface (www.my.utoronto.ca).
Those staying in residence who are not eligible for a UTORid account (or who do not have a UTOR email account) should use smtp-res.ns.utoronto.ca as their residence SMTP server.
ResNet access and getting help
For activation procedures please read the ResNet Essentials handout. To troubleshoot problems, please read the ResNet Assistance Request Form. If you have already read all the information but still have trouble, please follow the instructions on the ResNet Assistance Request Form for how to report your problem.
Trinity College ResNet Policies
1. ResNet users shall obey all University of Toronto rules on "Appropriate use of Information and Communication Technology" (seewww.provost.utoronto.ca/policy/use.htm).
Comment: These rules are subject to change without notice.
Penalty: Varying penalties (warnings to expulsion).
2. No Internet server software shall be run from a ResNet port.
Comment: Server software is any software that allows your computer to be accessed from outside the ResNet i.e. the Internet. This means no HTTP (web), FTP, telnet, DNS, DHCP/BOOTP, SMTP/POP/IMAP, or Remote Access servers, and no running software that automatically shares out large amounts of files or data from your computer (ex: file-sharing programs such as Limewire, Ares, or BitTorrent). This rule is designed to prevent excessive traffic on the shared ResNet. Security measures are in place to prevent some server software from working, and periodic checks will be made on suspect computers. Running servers may result in extended termination of your ResNet access (due to the potential results) and doing so unknowingly or by accident is not accepted as an excuse for lenience!
Penalty: Extended disconnection, varying penalties depending on severity
3. No illegal or hate materials shall be disseminated from a ResNet port.
Comment: For example, no child pornography, hate literature of any type, death threats, etc.
Penalty: Extended Disconnection, varying penalties depending on severity
4. No unsolicited commercial email (Spam) shall be sent from a ResNet port.
Comment: Spam is an annoyance to everyone.
Penalty: Disconnection, varying penalties depending on severity
5. No ResNet port shall be used to attempt to gain illegal access to any other computer system.
Comment: i.e. no hacking. This includes connecting to an outside computer and hacking from there. You are responsible as long as your connection is anywhere in a chain of systems used for hacking.
Penalty: Extended disconnection, varying penalties depending on severity.
6. No ResNet port shall be used to attempt to obtain sensitive information without the knowledge of all parties involved.
Comment: This means no attempts to "sniff packets on the network for passwords, personal email, etc..
Penalty: Extended disconnection, varying penalties depending on severity
7. No ResNet port shall be used to attempt to make malicious attacks on any computer systems.
Comment: No denial-of-service attacks (Teardrop), Ping of Death, SATAN attacks, etc..
Penalty: Extended disconnection, varying penalties depending on severity
8. No ResNet port hardware (data jack, sticker, wire, screw, clip, molding, conduit, access hatch, hub, or hub closet) may be opened, removed, relocated, or damaged in any way. The only permitted use of this hardware is the connection and disconnection of a patch cable from a data jack to a network card or hub.
Comment: Tampering is vandalism. Repairs are very costly, and you are responsible for your port.
Penalty: Repair bill & fine against your residence/academic account. Extended disconnection, varying penalties depending on severity
9. Devices connected to ResNet must be both virus-free and adequately protected against virus infection.
Comment: In preceding years, epidemic virus activity has repeatedly brought ResNet and the University's computer network to a halt. The University has purchased site licenses for antivirus software and requires the use of antivirus software on all computers connected to its network. The U of T also requires that all computers connected to its network to be protected with operating system updates against virus infection. You will be prompted to scan your computer upon your first use of a web browser on a ResNet port. You must successfully virus scan your computer before being allowed full use of ResNet. The College has network servers which will scan your computer for vulnerabilities and automatically segregate your computer from ResNet while allowing connection to antivirus and operating system update websites. The servers will automatically connect your computer to ResNet after vulnerabilities have been removed.
Penalty: for using ResNet without a virus scanner installed on your computer: Minimum 1-week disconnection.
10. Only the IP number assigned by a ResNet DHCP server may be used by your computer (i.e., you are not permitted to set a fixed or static IP number on your computer in residence).
Comment: All ResNet ports get automatically assigned IP numbers by ResNet DHCP servers. Using a fixed IP number will cause conflicts with other ResNet users and will prevent network access for them. This is a serious inconvenience for those affected.
Penalty: Minimum 1-week disconnection, depending on severity.
11. Giving others access to your ResNet service is banned (by allowing physical plug-in or by wireless access).
Comment: See section 4 of this ResNet Kit.
Penalty: Disconnection, varying penalties depending on severity
The following is excerpted from www.provost.utoronto.ca/policy/use.htm
Appropriate Use of Information and Communication Technology
The University’s information and communication technology (ICT) resources provide a rich array of services to our community. Ensuring the continuing utility and availability of these resources is the responsibility of service providers and consumers. These guidelines are intended to provide a framework for the protection and effective utilisation of these resources.
ICT provided by the University for the use of employees, students and other members of the University community is the property of the University, and is intended to be used in a manner that is consistent with the University’s mission.
These guidelines apply to all of the University’s information and communication technologies, including, hardware such as personal computers, personal digital assistants, telephones and printing devices, as well as software and other forms of information and communication technology that exist today or may be developed in the future. The use of personally-owned equipment on the University’s networks is covered by these guidelines as this also involves the use of University resources.
Additionally, these guidelines address the services that are provided through the University’s ICT, including e-mail, Internet access, departmental network services, telephone, fax and voice-mail, and other technologies. Moreover, as information technology protocols, applications, utilities and services are constantly changing, nothing in these guidelines restricts the authority of the relevant offices from initiating new rules or guidelines as circumstances dictate or as technology evolves.
Users of University ICT are expected to limit their use to the performance of University-related activities, although a reasonable allowance will be made for personal use. Whether or not an amount of personal use would be considered reasonable would depend on the particular circumstances and the applicable laws and policies. Users of University ICT are required to abide by all applicable laws and policies in addition to these guidelines. Reasonable personal use does not include in any circumstances the visiting of pornographic websites, the storage or distribution of pornographic material, or the accessing, storage or distribution of unlawful or otherwise inappropriate (within the meaning of the guidelines) information.
Users should not have an expectation of complete privacy in using the University’s ICT and related services. The issue of privacy is discussed further within these guidelines.
The various departments within the University that provide access to ICT have the authority to implement these guidelines and to monitor the usage of their services if they so choose.
There are two fundamental principles that the University follows in determining when usage of its ICT is unacceptable. One is the quantity of resources consumed; the other, the quality of the information transmitted. The former is primarily an issue of fairness – of the equitable distribution of ICT resources; the latter is an issue of the legality and potential harmfulnessof the information content, which is assessed according to the policies, codes and external laws that govern behaviour within the University.
It is recognised that some individuals using the University’s ICT are extended members of our community and may not be involved in the performance of University-related activities. For example, Alumni, or guests using public access terminals, will not necessarily be performing University-related activities. The principles of fair and appropriate use as discussed in these guidelines are still applicable to the extent that they are relevant to specific ICT uses. For example, the use of public access terminals for extended periods of time thereby preventing students from accessing computing services, or sending mass mailings through the University’s e-mail systems without appropriate authorisation, would be considered an inappropriate use of resources.
The University of Toronto has many facilities and services that provide ICT to users. Since the capacity of the resources is finite, there are limitations that may be imposed upon the use of specific services. Those responsible for each facility or service may establish rules governing their users; such rules can address issues peculiar to the technology involved, and may constrain the use of any resource by any user, should such constraint be deemed necessary to provide equitable sharing of the resource among all eligible users.
When a facility or service establishes rules for its users, the following principles shall be observed.
1. The use of institutionally provided ICT resources must be consistent with the academic mission of the University.
2. The facility or service has a responsibility to make users aware of all such rules, preferably at the time that access to the facility or service is granted. Where feasible, users should be required to acknowledge their agreement to abide by these rules when using the facility or service.
3. All such rules must be applied fairly and consistently to all the users governed by them.
The providers of services have the authority to implement, monitor and apply the rules and Guidelines.
While quantitative limits on resource consumption are best set by those who manage the particular facility or service, qualitative constraints should be common across the University community and arise out of a variety of sources that are not necessarily specific to ICT. For example, a complaint about discrimination or harassment in which information technology was used as a vehicle should be dealt with as any other case of discrimination or harassment would be; the involvement of ICT does not of itself make the problem special. In this regard, these guidelines simply serve as reference to some of the relevant laws, policies and codes that should be used to determine whether usage is appropriate, what action to take when inappropriate use is alleged or suspected, and what penalties may apply for misuse.
The University of Toronto is committed to maintaining respect for the core values of freedom of speech, academic freedom, and freedom of research. In matters of freedom of speech versus responsible speech, it should be noted that speech using ICT is not intrinsically different from speech that does not use ICT. While the University does not censor information on its networks and servers, it will act on allegations about the distribution of unlawful material, about the use of its information technology to direct abusive, threatening or harassing communication at any individual or about any other inappropriate use. There is further discussion in the “Inappropriate Use…” section below.
When exercising free speech using the University’s ICT resources, such as when posting information to a publicly accessible file or web page, personal opinions must be identified as such, so that the reader understands the author is not speaking for the University. However, simply identifying an opinion as personal does not exempt it from the constraints of the law or the University's policies and codes.
The University respects the reasonable privacy of electronic files stored or distributed on its servers and networks. However, users cannot have an expectation of complete privacy when using the University’s ICT. ICT resources remain the University’s property, and are provided to advance the University’s mission. Accordingly, the University reserves the right to examine any electronic files where the University, in its sole discretion, determines that it has reason to do so. Without limiting the University’s discretion in this regard, the following represent some examples of situations in which the University may decide to examine a user’s electronic files:
- During an investigation into an allegation of usage that contravenes existing laws, policies, or guidelines; or
- When complying with a Freedom of Information request for data; or
- Where necessary to carry out urgent operational requirements during an employee’s absence when alternative arrangements have not been made.
It should be noted, that files stored electronically have an existence that differs from paper files. While paper documents may be shredded, electronic documents may exist in multiple locations—on multiple servers and disk drives, as e-mail attachments, and in backup tapes or disks. The act of deletion from one’s own hardware does not assure permanent erasure. Users of ICT should be aware of the continuing existence of their files.
In addition to the University’s broad right to examine electronic files, as set out above, some policies address the University’s rights with respect to particular data. For example:
- Student and personnel records are subject to a policies regarding access to and disclosure of specified information.
Inappropriate Use of Information and Communication Technology
Users of information and communication technology may enjoy relatively unencumbered use of these services but in return they have an obligation to act responsibly and respect the rights of others. An obvious requirement is to obey the laws of Canada and Ontario, and to abide by the policies and codes of the University. These provisions deal with issues such as harassment, threatening behaviour, hate crimes, libel and defamation, discrimination, theft, fraud and plagiarism, whether ICT is involved or not. Particular facilities and services may impose additional conditions on their users. Some specific examples of inappropriate use that might arise from the violation of laws or University policies are set out below. The list is not exhaustive.
For students, refer to section B.5.b of the Conduct which addresses the use of computer systems for which access rights have not been granted, or using University facilities for commercial, disruptive or malicious purpose.
For employees, refer to the policy on conflict of interest and relevant contractual and collective agreement provisions. The University is entitled to determine whether an activity is a legitimate use of the employee’s time and is consistent with the employee’s other obligations. If an employee is making personal use of a facility or service, the employer has the discretion to require that this activity cease, and in some cases may impose disciplinary action up to and including dismissal if a directive to cease is not complied with, or if there is other inappropriate use of ICT resources.
Other members of the University community (alumni, status-only appointees, visiting professors, post-doctoral fellow, consultants…) who are granted access to our systems also have an obligation to use ICT resources in a way that does not conflict with the interests of the University, which is providing the resources.
Authorization Of Access
Access to ICT resources at the University of Toronto may only be provided by the personnel who are responsible for those systems. A person who has been given such access does not, in general, have the authority to extend that privilege to anyone else.
Individuals who have been assigned an e-mail or computer account have a responsibility not to share their access with anyone else, even for the sake of convenience. Users should never share their passwords, nor should they permit other people, either internal or external to the organisational unit, to access or use their account by any other means.
Individuals are responsible for the actions taken under their identity. Any person who has reason to suspect that access to his or her account may have been compromised has an obligation to bring the situation promptly to the attention of the administrators of the system.
On occasion, situations may arise related to accessing voice-mail and e-mail accounts assigned to an individual where their password is required, and the person is not available to access the data or service. Since, as a guiding principle, voice-mail and e-mail passwords should not be shared, alternative approaches, such as directing auto-reply e-mail and extended absence voice-mail messages to a colleague or supervisor’s e-mail or phone number should be implemented, wherever reasonably possible.
Discrimination and Harassment
Issues of harassment based on sex and sexual orientation are covered by the Policy and Procedures: Sexual Harassment, whether or not ICT is involved.
Issues of discrimination and discriminatory harassment, including harassment based on race and creed, are covered by the Statement on Prohibited Discrimination and Discriminatory Harassment, whether or not ICT is involved.
Additionally, issues or harassment and discrimination are covered by the Ontario Human Rights Code and the Criminal Code of Canada,
Unsolicited correspondence (including spam) may be viewed as harassment by the recipient. The University policy on harassment, however, is concerned with comments that are directed at specific individuals because of their personal characteristics. If the correspondence is mass-mailed, it should be addressed under local rules for the service used, which should prohibit or restrict unsolicited bulk mail.
Users of e-mail are advised to delete spam without opening any attachments, and to turn off the “viewing pane” in their e-mail application so as to prevent message contents from appearing automatically.
Using ICT resources to visit pornographic sites, or for the storage, or dissemination of pornographic material is inappropriate. Possession of child pornography is also a criminal offence.
Unauthorized Disclosure of Information
The disclosure of certain types of information is prohibited by law and/or policy, which are applicable whether or not ICT is involved. The key University policy in this area is the Policy on Access to Information and Protection of Privacy. For student records, there is a specific Policy on Access to Student Academic Records.
Copyright, Trademark and Intellectual Property Rights Violations
Unauthorized copying of software is covered by the Canadian Copyright Act, and constitutes a criminal offence. The “fair use” provisions that apply to photocopies used for teaching do not apply to Web pages. The Resource Centre for Academic Technology (RCAT) in Robarts Library can provide guidance to instructors.
The use of commercial software for which a license fee is required, or the downloading and/or distribution of music or video files, for which license fees and distribution rights have not been paid or agreed upon, constitutes an infringement of Copyright, Trademark and Intellectual property rights, and is illegal. (This is a transitory issue relative to music as a Federal Court decision is being appealed by CRIA.)
Registered marques of the University of Toronto may be used only within the parameters of the Trademark and Licensing Policy and the University of Toronto Code of Conduct for Licensees.
The unauthorised use of any form of device to audiotape, photograph, video-record or otherwise reproduce lectures, course notes or teaching materials provided by instructors is covered by theCanadian Copyright Act and is prohibited. Students must obtain prior written consent to do such recording. In the case of private use by students with disabilities, the instructor's consent must not be unreasonably withheld.
In other situations where an individual photographs, audiotapes or otherwise records activities in which she or he is taking part, without the permission of other participants, the nature of the activities must be examined. Where participants have a reasonable expectation of privacy, unauthorised recording of their activities may be unlawful.
Additionally, the Criminal Code of Canada makes surreptitious third party recording of conversations or other activities illegal except where there is explicit legal authority to make such recordings [e.g. phone-tapping].
Issues of plagiarism and misrepresentation are covered by the Code of Behaviour on Academic Matters, whether or not ICT is involved.
Issues of possible criminal activity, such as theft or criminal harassment or threats, are covered by statute (such as the Criminal Code of Canada) as well as by internal policies such as the Code of Student Conduct. They should be referred to the Community Safety Office and to the University Police, who can provide advice about appropriate responses and assistance with prosecution of the offence, whether or not ICT is involved.
… Please go to the bottom of www.provost.utoronto.ca/policy/use.htm to view the list of reference documents pertaining to the above excerpt