to download a copy of the staff handbook. - Downing College
to download a copy of the staff handbook. - Downing College
to download a copy of the staff handbook. - Downing College
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Computer facilities, e-mail & <strong>the</strong> internet<br />
continued...<br />
If <strong>the</strong>re is a need <strong>to</strong> access files, <strong>the</strong> individual member <strong>of</strong> <strong>staff</strong> or Fellow<br />
will normally be asked for his or her consent; however, in certain<br />
circumstances it may exceptionally be necessary <strong>to</strong> obtain access without<br />
consent –<br />
SECTION 3.15<br />
POLICIES & PROCEDURES<br />
• If urgent access is critically required for operational purposes but <strong>the</strong><br />
individual is absent and cannot be contacted;<br />
• If <strong>the</strong>re is prima facie evidence that an individual may be misusing<br />
facilities <strong>to</strong> an extent which would be considered serious or gross<br />
misconduct, or if <strong>the</strong>re is a need <strong>to</strong> initiate an investigation and <strong>the</strong>re is a<br />
serious possibility that evidence might be destroyed.<br />
In o<strong>the</strong>r situations, <strong>the</strong> privacy <strong>of</strong> individuals will be respected, and that<br />
privacy will be protected especially in connection with individual<br />
members <strong>of</strong> <strong>staff</strong> and Fellows, <strong>the</strong>ir work, and <strong>the</strong> <strong>College</strong>, its systems and<br />
resources.<br />
As part <strong>of</strong> normal procedures, computers linked <strong>to</strong> networks may be<br />
scanned au<strong>to</strong>matically for vulnerability, and <strong>the</strong> Bursar may authorise <strong>the</strong><br />
routine moni<strong>to</strong>ring <strong>of</strong> Internet access generally, including E-mail traffic<br />
volume (but not content), within <strong>the</strong> local area network.<br />
6.<br />
MISUSE AND DISCIPLINARY ACTION<br />
The Bursar will decide in <strong>the</strong> light <strong>of</strong> <strong>the</strong> outcome <strong>of</strong> an investigation <strong>of</strong><br />
possible misuse <strong>of</strong> computing facilities whe<strong>the</strong>r disciplinary action is<br />
appropriate and, if it is judged appropriate, will instigate necessary action<br />
in accordance with <strong>the</strong> relevant disciplinary procedures.<br />
Computer facilities,<br />
E-mail & internet<br />
STAFF HANDBOOK 107