Please enter your current Populi username and password.
By initializing your SBC Account you are agreeing to the following Acceptable Use Policy
- In making acceptable use of SBC IT resources, students must:
- Use resources only for authorized purposes
- Protect your user identity, password and system from unauthorized use. All students are responsible for all activities on their user accounts or that originate from their devices
- Access only information that you own, that is publicly available, or to which you have been given authorized access
- Use only legal versions of copyrighted software in compliance with vendor license requirements
- Be considerate in your use of shared resources. Refrain from monopolizing systems, overloading networks with excessive data, degrading services, or wasting computer time, connect time, disk space, printer paper, manuals, or other resources
- Report incidents such as stolen laptops or passwords, or virus infections that are not automatically cleaned by anti-virus software. Any such activity must be reported immediately to the IT Service Desk.
- Unacceptable uses of SBC IT resources include but are not limited to the following:
- Using the resources for any purpose which violates local, provincial or federal laws
- Illegally downloading or uploading copy-written materials (including but not limited to: games, videos, music, books)
- Disrupting or attempting to circumvent network security systems
- Sending unsolicited e-mail
- Visiting Internet sites that contain obscene, hateful or other objectionable materials
- Misrepresenting your identity or affiliation while using IT resources
- Using someone else's identity and password for access to IT resources, logging others into the network to access IT resources, or using the network to make unauthorized entry to other information, or communications devices
- Attempting to evade or crack passwords of systems on the network
- Copying or modifying files belonging to others or to the college without authorization, including altering data, introducing or propagating viruses, Trojans or worms, or simply damaging files
- Intercepting or altering network packets
- Engaging in any other activity that interferes with the work of other students, faculty, or staff or the normal operation of the college IT resources