Email and Faculty of Medicine Intranet (DalMedix)
Having and maintaining a Dalhousie University email is required. Dalhousie University provides faculty, staff and students with email on a central email server. All information provided by the PGME Office and any other Dalhousie University department, such as Student Accounts and the Registrar’s Office, will only be communicated to you by email to your Dalhousie email account. Please check and maintain your email account on a regular basis.
New postgraduate medicine trainees at Dalhousie University are provided with a Banner ID number which is used to obtain their email (“NetID”) username online.
Your Dalhousie email account is a component of the new online mechanism for inputting, on DalMedix, your monthly-calls for which you will receive remuneration. A separate username and password are provided for accessing DalMedix which is the Intranet (password-protected website) for the Faculty of Medicine. Articles for PGME workshops will be posted on DalMedix. The instructions to access DalMedix and set up your Dalhousie email account are sent to all new trainees from the PGME Office with their orientation information.
PLEASE NOTE: To download materials from the DalMedix site the browser requirements for login include:
For technical problems please contact DalMedix@dal.ca For telephone support, call within Halifax: 902-494-1234 or toll free outside Halifax: 1-866-327-8256.
Students who do not have their own computer connected to the Internet may use myDal from the student Learning Commons areas within the libraries on campus. This includes the Kellogg library that is within the Tupper Building, as well as the main Killam library.
Dalhousie University Email: Acceptable use policy
The purpose of this policy is to outline appropriate use of Information Technology Resources owned, leased, controlled and/or operated by the university.
This policy applies to all individuals who have been granted a NetID and/or Banner account by the university.
This policy does not replace other policies, procedures or guidelines concerning the use of specific IT Resources or data management but rather sets out a minimum standard of acceptable use.
In this policy, “User Account” means a NetID and/or Banner account issued by the University.
“Information Technology Resources”, or “IT Resources”, means computing equipment,
peripherals, facilities, networks or systems owned, leased, controlled or operated by the
University, including those purchased through research funds.
“User” means an individual who has been issued a User Account.
- Authorized access to IT Resources requires a User Account. User Accounts are non-transferrable.
- Users are responsible for any and all uses of their User Account and are expected to take reasonable steps to ensure the security of their User Account.
- Acceptable Use
- Users shall use IT Resources for authorized purposes only.
- No User shall use IT Resources for any disruptive or unauthorized purpose, or in a manner that violates any law, university regulations, policies or procedures. Examples of unacceptable uses of IT Resources include, but are not limited to, the following:
2.2.1 using another person’s User Account, or misrepresenting themselves as another User;
2.2.2 disclosing passwords or other access codes assigned to themselves or others;
2.2.3 interfering with the normal operation of IT Resources by, among other things, unauthorized network interception, network traffic, flooding the network with messages, sending chain letters or pyramid solicitations;
2.2.4 copying, removing or distributing proprietary software and/or data without authorization;
2.2.5 breaching terms and conditions of software licensing agreements;
2.2.6 accessing, displaying, transmitting, or otherwise making available information that is discriminatory, obscene, abusive, derogatory, harassing or otherwise objectionable in a university setting;
2.2.7 destroying, misplacing, misfiling, or rendering inoperable any stored information on a university administered computer or other information storage, processing or retrieval system;
2.2.8 unauthorized use of IT Resources for profit or commercial gain; and
2.2.9 attempting to or circumventing security facilities on any system or network.
- Consequences of Unacceptable Use
- If there is reason to suspect that a User has violated this policy, the Assistant Vice-President, Information Technology Services or the Information Security Manager may temporarily revoke or restrict User Account access privileges of any User, pending further investigation by the Information Security Manager.
- To aid in the investigation of a suspected violation of this policy, the Information Security
Manager may examine a User’s User Account information, including, but not limited to, emails, files, and any other material or data connected with the User Account, provided that s/he obtains the Assistant Vice-President Information Technology Services’ prior written approval. If the User in issue works within the Information Technology Services Department, then approval must be obtained from the President.
- If the investigation concludes that a violation of this policy has occurred, the Assistant Vice-President Information Technology Services may restrict, suspend or revoke the User’s access to any or all of the University’s IT Resources, and may
3.3.1 in the case of students, initiate disciplinary proceedings under the Code of Student Conduct; or
3.3.2 in the case of employees, refer the matter for consideration of discipline in accordance with applicable collective agreements or human resource policies, as appropriate.