to download a copy of the staff handbook. - Downing College
to download a copy of the staff handbook. - Downing College
to download a copy of the staff handbook. - Downing College
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
SECTION 3.15<br />
POLICIES & PROCEDURES<br />
4.<br />
Computer facilities, e-mail & <strong>the</strong> internet<br />
continued...<br />
MISUSE OF COMPUTING FACILITIES<br />
As stated above, <strong>the</strong> <strong>College</strong> permits reasonable personal as well as<br />
pr<strong>of</strong>essional use <strong>of</strong> computing facilities. You should be careful not <strong>to</strong><br />
misuse <strong>the</strong>se facilities, for instance by:<br />
• Hacking – attempting <strong>to</strong> access systems or information within or outside<br />
<strong>the</strong> <strong>College</strong> without authority, or encouraging o<strong>the</strong>rs <strong>to</strong> do so.<br />
• Accessing from <strong>the</strong> Internet material which is counter ei<strong>the</strong>r <strong>to</strong><br />
legislation, <strong>College</strong> rules or policies (e.g. equal opportunities) or <strong>to</strong><br />
commonly accepted standards, or is likely <strong>to</strong> be <strong>of</strong>fensive <strong>to</strong> reasonable<br />
people. If you are concerned that accidental access <strong>to</strong> such sites has<br />
taken place, you may wish <strong>to</strong> report your concerns <strong>to</strong> an appropriate<br />
person.<br />
• e-mail communications, which constitute bullying or harassment, as<br />
defined in section 3:5 <strong>of</strong> <strong>the</strong> <strong>College</strong> Staff Handbook.<br />
5.<br />
INVESTIGATION OF MISUSE AND INTERCEPTION<br />
The <strong>College</strong> will investigate any suspected misuse <strong>of</strong> computing facilities.<br />
Investiga<strong>to</strong>rs may need <strong>to</strong> inspect any files held on any <strong>of</strong> <strong>the</strong> <strong>College</strong>’s<br />
computing systems. These inspections will be applied only when <strong>the</strong>re<br />
are grounds <strong>to</strong> suspect that misuse has occurred and in a strictly<br />
controlled manner. When inspection is deemed <strong>to</strong> be necessary, <strong>the</strong><br />
Bursar shall give permission for such access. Access will only be allowed<br />
in so far as it is necessary for <strong>the</strong> <strong>College</strong> <strong>to</strong> comply with national<br />
legislation, e.g. <strong>the</strong> Regulation <strong>of</strong> Investiga<strong>to</strong>ry Powers Act and <strong>the</strong> Lawful<br />
Business Practice Regulations, or in connection with <strong>the</strong> investigation <strong>of</strong><br />
misuse. Access will be initiated in accordance with <strong>the</strong> provisions <strong>of</strong> that<br />
legislation and <strong>to</strong> <strong>the</strong> extent permitted by data protection and human<br />
rights legislation and by general principles <strong>of</strong> employment law.<br />
Computer facilities,<br />
E-mail & internet<br />
106 S<br />
TAFF HANDBOOK