1.1.4 SDLF Acceptable Use Policy

POLICY TYPE: 1.0 Administrative Policies \ 1.1 Fair Treatment
EFFECTIVE DATE: 2026-05-19 LAST REVISED:
THIS POLICY APPLIES TO:

Policy Statement

SelfDesign Learning Foundation (SDLF) is committed to providing secure, ethical, and responsible use of its technology resources by contractors, support providers, volunteers, and board members. These resources support the foundation’s operational, administrative, and educational mission.

Definitions

Cryptocurrency Mining – The use of computing resources to validate and record transactions on a blockchain network by solving complex mathematical problems, often consuming significant processing power and electricity.

Network Resources – Encompasses all hardware, software, data storage, and communication infrastructure.

Vandalism – Actions involving deliberate defacement, alteration, destruction of, or damage to public or private property. In the context of technology and data, vandalism includes any malicious attempt to harm, disrupt, or destroy digital data, computer systems, networks, or related resources, including but not limited to the creation or distribution of computer viruses or malware.

Policy

SelfDesign Learning Foundation (SDLF) provides network services and technology resources to support its business operations. Access to SDLF’s network resources is granted exclusively for authorized business and administrative functions directly related to SDLF’s mission.

Users must use these resources responsibly, ethically, and in compliance with all applicable laws and SDLF policies. The creation, distribution, or access of any materials that are incompatible with the legitimate business purposes of SDLF is strictly prohibited.

This policy aims to protect SDLF’s technology infrastructure, ensure data security and privacy, and maintain operational integrity by setting clear expectations for acceptable use by contractors, support providers, volunteers, and board members.

Protocol

The following guidelines and behaviours are intended to ensure responsible, secure, and ethical use of SDLF technology resources:

  • SDLF’s network resources are intended only for authorized business and administrative functions directly supporting SDLF’s operations.
  • Access to these services shall be used exclusively by authorized persons. Users of password-protected accounts are personally responsible for all activities conducted under their credentials.
  • SDLF network resources require fair and efficient use. Usage and storage quotas are in effect to ensure equitable access for all users. Users may be required to limit or relinquish access to high-priority processes as needed.
  • Users shall not use SDLF network resources for illegal, obscene, harassing, or inappropriate purposes, or in support of such activities.
  • When interacting with other users on SDLF network resources or supported services, users are expected to behave as they would in any professional environment, conducting themselves responsibly, ethically, and politely in accordance with SDLF’s standards of propriety.
  • Users shall not violate, or attempt to violate, the security of SDLF’s network resources. Any unauthorized access attempts may result in termination of network privileges and potential further disciplinary or legal action.
  • Users found to be security risks or with histories of technology misuse may be denied access to SDLF’s network resources.
  • The following activities are expressly prohibited on SDLF network resources:
    • Accessing another individual’s personal information without proper authorization and unrelated to SDLF’s administration and operations.
    • Transmitting material that violates Canadian laws.
    • Creating, uploading, or distributing computer viruses, malware or any other malicious software that harms or disrupts SDLF networks, data, or connected systems.
    • Duplicating, storing, or transmitting pornographic materials.
    • Transmitting or posting threatening, abusive, obscene, or harassing content.
    • Duplicating, storing, or transmitting copyrighted material without proper authorization, thereby infringing copyright laws.
    • Utilizing SDLF resources for cryptocurrency mining or shared processing purposes, engaging in unsolicited communication, pyramid schemes, chain mail, or other forms of harassment targeting other users.

Standard Operating Procedure

N/A

Related Documents

  • SDLC Acceptable Use Policy
  • Account Sharing and Usage Policy
  • Administrative External Account Policy

 

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>