03.04.2015 Views

to download a copy of the staff handbook. - Downing College

to download a copy of the staff handbook. - Downing College

to download a copy of the staff handbook. - Downing College

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SECTION 3.15<br />

POLICIES & PROCEDURES<br />

4.<br />

Computer facilities, e-mail & <strong>the</strong> internet<br />

continued...<br />

MISUSE OF COMPUTING FACILITIES<br />

As stated above, <strong>the</strong> <strong>College</strong> permits reasonable personal as well as<br />

pr<strong>of</strong>essional use <strong>of</strong> computing facilities. You should be careful not <strong>to</strong><br />

misuse <strong>the</strong>se facilities, for instance by:<br />

• Hacking – attempting <strong>to</strong> access systems or information within or outside<br />

<strong>the</strong> <strong>College</strong> without authority, or encouraging o<strong>the</strong>rs <strong>to</strong> do so.<br />

• Accessing from <strong>the</strong> Internet material which is counter ei<strong>the</strong>r <strong>to</strong><br />

legislation, <strong>College</strong> rules or policies (e.g. equal opportunities) or <strong>to</strong><br />

commonly accepted standards, or is likely <strong>to</strong> be <strong>of</strong>fensive <strong>to</strong> reasonable<br />

people. If you are concerned that accidental access <strong>to</strong> such sites has<br />

taken place, you may wish <strong>to</strong> report your concerns <strong>to</strong> an appropriate<br />

person.<br />

• e-mail communications, which constitute bullying or harassment, as<br />

defined in section 3:5 <strong>of</strong> <strong>the</strong> <strong>College</strong> Staff Handbook.<br />

5.<br />

INVESTIGATION OF MISUSE AND INTERCEPTION<br />

The <strong>College</strong> will investigate any suspected misuse <strong>of</strong> computing facilities.<br />

Investiga<strong>to</strong>rs may need <strong>to</strong> inspect any files held on any <strong>of</strong> <strong>the</strong> <strong>College</strong>’s<br />

computing systems. These inspections will be applied only when <strong>the</strong>re<br />

are grounds <strong>to</strong> suspect that misuse has occurred and in a strictly<br />

controlled manner. When inspection is deemed <strong>to</strong> be necessary, <strong>the</strong><br />

Bursar shall give permission for such access. Access will only be allowed<br />

in so far as it is necessary for <strong>the</strong> <strong>College</strong> <strong>to</strong> comply with national<br />

legislation, e.g. <strong>the</strong> Regulation <strong>of</strong> Investiga<strong>to</strong>ry Powers Act and <strong>the</strong> Lawful<br />

Business Practice Regulations, or in connection with <strong>the</strong> investigation <strong>of</strong><br />

misuse. Access will be initiated in accordance with <strong>the</strong> provisions <strong>of</strong> that<br />

legislation and <strong>to</strong> <strong>the</strong> extent permitted by data protection and human<br />

rights legislation and by general principles <strong>of</strong> employment law.<br />

Computer facilities,<br />

E-mail & internet<br />

106 S<br />

TAFF HANDBOOK

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!