1.0 - Introduction
Whilst promoting an Open Access Policy to the use of Computing and Internet facilities, there are responsibilities and rules regarding usage. As a student at the College you are entitled to use IT facilities and have access to the Joint Academic Network (Janet), but this access is through clear adherence to the nationally specified regulations for all Janet users.
The College regulations published here apply to anyone using any kind of computer hardware or software, for any purpose at the College, even if it is their own equipment and even if it is only connected to the institution through a network from an outside location. Even where no formal registration or permission is required, any use of IT facilities constitutes an acceptance of the regulations within this document.
If you break these rules you may be liable to disciplinary, criminal or civil action which may lead to prosecution. In addition, failure to adhere to these rules will result in withdrawal of access to IT facilities.
2.0 - Law
Students must comply with the laws relating to the use of computer equipment. These include:
- Data Protection Act 1984
- Copyright, Designs & Patents Act 1988
- Computer Misuse Act 1990
- Criminal Justice and Public Order Act 1994
- Amended Data Protection Act 1998
3.0 - Scope of Use
The use of IT facilities is granted for academic or administrative purposes only. Use for personal purposes or commercial gain must have the permission of the College Communications Manager and may be subject to charge. College IT equipment is defined as:
- Desktop PC’s
- Laptop/Tablet devices
- Telephones, both fixed and mobile
- Mobile phones
- Digital video camera or camcorders
- Digital audio recording devices
- Reproduction devices (scanners, printers, etc..)
- Any and all software and IT services provided by the College
4.0 - Equipment Usage & Monitoring
No equipment or other IT facility may be moved without prior agreement or be connected in any way into any network or other IT facility of the College without the prior written agreement of the College IT Manager.
All communications and data that are sent, received, created or contained within the College’s IT Systems are the property of the College. The College reserves the right to monitor, log and access all computer, telephone and network activity including internet access and e-mail, with or without notice, to or from any device owned by the College, or connected to the College’s IT Systems.
Monitoring and access will take place in order to:
- Establish the existence of facts
- Investigate disciplinary issues
- Detect and/or prevent crime
- Ensure that any use (including any personal use permitted by this policy) is lawful and complies with this policy
- Ensure the operational effectiveness of the IT Systems, i.e. protection against malware, spam, etc…
The College may make and keep copies of email and other data stored or transmitted via its systems for any of the above purposes. Users should, therefore, have no expectations of privacy in the use of these systems.
Monitoring of usage and access to systems will be made with the authorisation of the Director or their appointed deputy.
4.1 - Acceptable Use Policy
Users of the College networks must adhere to the Acceptable Use Policy. Evidence of failure to do so will lead to immediate withdrawal of access to IT facilities. In particular, the use of network facilities for the downloading or distribution of pornographic material is not permitted unless part of some genuine research or academic project. If academic work involves such material then the student concerned must obtain written permission from their Tutor and the College Director, prior to downloading the material.
4.2 - Viruses
Users must not deliberately introduce any virus, worm, Trojan horse or other harmful, or nuisance program, or file into any IT facility, nor take deliberate action to circumvent any precautions taken by the institution to prevent this.
All users must also submit any portable media for virus checking, if so requested by a member of the College staff.
4.3 - Software Modification and Installation
Users must not change any software or settings related to the software. Also, users must not install software onto the IT facilities.
4.4 - Damage
Users must not in any way cause any form of damage to the College’s IT facilities, nor to any of the accommodation or services associated with them.
5.0 - Security
Access and usage of systems must be in accordance with the College’s Information Security Policy.
In terms of acceptable usage a user must:-
- Not deliberately reveal the account password or allow another person to use their account
- Not use another individual’s account
- Not attempt to log on as another user
- Notify the Tutor immediately if they identify a security problem, including out of date virus protection.
- Not show or identify a security problem to anyone other than the College’s IT staff or their line manager
- Take reasonable precautions to protect the College’s systems from security issues such as computer viruses, spyware and other malware.
- Use only properly supplied and authorised systems for undertaking College business
- Not attempt to circumvent any security measures or virus protection put in place by IT Services.
5.1 - Acceptable Behaviour
The creation, display, production, transmission or circulation of offensive, or defamatory material in any form or medium, is expressly forbidden.
5.2 - Smoking, eating and drinking
In particular, smoking, eating or drinking in any room with IT facilities is expressly forbidden.
5.3 - Mobile Phones
Mobile phones are to be turned off at all times. Should a user wish to make a call, then this must be done outside and with the permission from the Tutor.
5.4 - Other users
Users must respect the rights of others and should conduct themselves in a quiet and orderly manner when using IT facilities. Failure to do so will result in the offending personnel being removed from the appropriate IT room.
5.5 - Backups
IT Services will take all reasonable measures to ensure that network servers and resources are backed up on a regular basis in accordance with their backup procedures.
The IT department strongly advises users not to store any documents on the local hard drives (i.e. C) of their workstations. It is the responsibility of the user to ensure that any files stored on local hard drives are backed up; furthermore the IT department must be made aware, in writing, of any machines which have documents stored on their local hard drives.
6.0 - Disclaimer
The College cannot accept responsibility for the malfunctioning of any IT facility or part thereof, whether hardware, software or other. The College also cannot accept responsibility for the loss of data or software