(i) Policy Statement
“It is the Policy of Seneca College that all members of the Seneca Community are responsible for obeying Provincial and Federal laws/regulations and College Policy concerning the use of information technology services, facilities and equipment. The College’s Information Technology resources remain the sole property of Seneca College. Seneca College grants students, clients and employees the privilege to use its information technology services, facilities and equipment to further learning, teaching and working.
Further, any materials which may violate a person’s right to work and study in an environment free from discrimination/ harassment are not to be stored, displayed, transmitted or otherwise linked to Seneca College information technology services, facilities and equipment.
However, Seneca College recognizes the individual right to access information. As a user of the College information technology services, facilities and equipment, you are responsible for abiding by the Information Technology Acceptable Use Policy and the Protocol for Dealing with Information Technology Abuse.”
(ii) Prevention, Education and Enforcement
Seneca College is committed to preventing behaviour which results in the inappropriate use of the College’s Information Technology Services and Facilities. The College is responsible for communicating to all employees, students, clients, the public, and/or contractors that the inappropriate use of the College’s IT services, facilities and equipment is prohibited. This includes ongoing proactive education/prevention campaigns such as staff and student training, regular communication of the ITAUP through internal media, and the articulation of the ITAUP into the ICA 001 curriculum. The College maintains its responsibility for communicating, monitoring, implementing and enforcing, where necessary, all aspects of the ITAUP.
Official College E-Mail is available to all employees and students. Faculty, staff and students are reminded that College correspondence should only be disseminated electronically through official College-provided e-mail. Alternate e-mail addresses, such as Yahoo mail or Hotmail mail, are not authenticable through Seneca.
(iii) Policy Regulations and Responsibilities
Seneca College Provides Information Technology services, facilities and equipment to meet your learning, teaching or working needs.
However, it is a violation of College Policy to:
- enter, without authorization, into equipment, facilities, networks or accounts to use, read, transfer or change the contents, or for any other purpose;
- use another individual’s information technology account;
- grant another individual access to your information technology account;
- use any College information technology facilities to interfere with the work of other students, faculty members or college officials;
- use information technology facilities to send obscene, abusive, derogatory or harassing messages;
- display, transmit, distribute or make available information that expresses or implies discrimination or an intention to discriminate;
- use information technology facilities to interfere with the normal operation of College information technology systems and connecting networks; this list would include such things as flooding the network with messages or sending chain letters or pyramid solicitations. Unauthorized use of information technology facilities and accounts and removing or altering data is a criminal offense in Canada;
- use Seneca College’s computer facilities for profit or commercial gain;
- create and/or use world-wide web information pages or links to point to offending materials that do not comply with the Ontario Human Rights Code or the Criminal Code of Canada;
- use Seneca College’s computer facilities for any purpose that could be seen as a violation of the Criminal Code of Canada.
(iv) Consequences of Policy Violations
Employees, students and clients are responsible for reporting all real, or perceived infractions of the Information Technology Acceptable Use Policy to the Information Technology Security Officer (CSO). The CSO can be reached electronically at email@example.com. Documented and substantiated complaints shall be handled through the Protocol for Dealing with Information Technology Abuse.
Overall, the Information Technology Acceptable Use Policy asks that you obey the law and be considerate of others’ needs.
Failure to adhere to the Information Technology Acceptable Use Policy could result in suspension of usage privileges or other discipline as appropriate.
When there is a suspected violation of the Policy, the College has the authority to conduct appropriate search and seizure procedures of all College owned and operated Information Technology services, facilities and equipment. The College also reserves the right to review and/or restrict services and programs that are deemed potential violations of College Policy.
ALLEGED VIOLATIONS OF THE ABOVE POLICY ARE HANDLED BY THE RESOLUTION, EQUITY AND DIVERSITY CENTRE (REDC), IN CONJUNCTION WITH INFORMATION TECHNOLOGY AND TELECOMMUNICATION SERVICES.
You must accept the terms and conditions of the Information Technology Acceptable Use Policy before accessing the Password Service.
Please read the Information Technology Acceptable Use Policy carefully before accepting it.
(Sub Program: This is for Educational Purposes only.)
O00061(CENTRE DRILL, DRILL, COUNTER SINK & TAP EXERCISE)
(PROGRAMMMER: ______ ___)
(THURSDAY, NOV __ /09)
N10 G17 G20 G40 G49 G80 G90 G98
N20 G28 G91 Z0
N30 G28 X0 Y0
N40 T13 M6 (#3 C’DRILL)
N50 G0 G54 G90 X1.2 Y1. S5454 M3 (#01)
N60 G43 Z2. H13 M8
N70 G99 G81 Z-.21 R.1 F4.8
N80 M98 P5000
N90 G28 G49 G91 Z0 M5
N110 T14 M6 (5/16″ DRILL)
N120 G0 G54 G90 X1.2 Y1. S1920 M3 (#01)
N130 G43 Z2. H14 M8
N140 G99 G83 Z-.8188 R.1 Q.15 F9.6
N150 M98 P5000
N160 G28 G49 G91 Z0 M5
N180 T18 M6 (1/2X82″ C’SINK)
N190 G0 G54 G90 X1.2 Y1. S354 M3 (#01)
N200 G43 Z2. H18 M8
N210 G99 G82 Z-.2291 R.1 P.508 F1.9
N220 M98 P5000
N230 G28 G49 G91 Z0 M5
N250 T20 M6 (3/8-16″ TAP)
N260 G0 G54 G90 X1.2 Y1. S373 M3 (#01)
N270 G43 Z2. H20 M8
N280 G99 G83 Z-.875 R.3 F23.3125
N290 M98 P5000
N300 G28 G49 G91 Z0 M5
N310 G28 X0 Y0
N340 X1.7 (#02)
N350 X1.2 Y1.5 (#03)
N360 X.7 Y1. (#04)
N370 X1.2 Y.5 (#05)
N380 X2.55 Y1.5 (#06)
N390 X3.05 (#07)
N400 X2.55 Y2. (#08)
N410 X2.05 Y1.5 (#09)
N420 X2.55 Y1. (#10)
N430 X4. Y1.25 (#11)
N440 X4.5 (#12)
N450 X4. Y1.75 (#13)
N460 X3.5 Y1.25 (#14)
N470 X4. Y.75 (#15)
N480 G0 G80 Z2. M9
Disclaimer, not 100% sure this is right, use at your own risk. the author, school, staff, students, do not take any responsibility for your actions with what is found here.
This is for Educational Purposes only.