03.04.2015 Views

to download a copy of the staff handbook. - Downing College

to download a copy of the staff handbook. - Downing College

to download a copy of the staff handbook. - Downing College

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer facilities, e-mail & <strong>the</strong> internet<br />

continued...<br />

If <strong>the</strong>re is a need <strong>to</strong> access files, <strong>the</strong> individual member <strong>of</strong> <strong>staff</strong> or Fellow<br />

will normally be asked for his or her consent; however, in certain<br />

circumstances it may exceptionally be necessary <strong>to</strong> obtain access without<br />

consent –<br />

SECTION 3.15<br />

POLICIES & PROCEDURES<br />

• If urgent access is critically required for operational purposes but <strong>the</strong><br />

individual is absent and cannot be contacted;<br />

• If <strong>the</strong>re is prima facie evidence that an individual may be misusing<br />

facilities <strong>to</strong> an extent which would be considered serious or gross<br />

misconduct, or if <strong>the</strong>re is a need <strong>to</strong> initiate an investigation and <strong>the</strong>re is a<br />

serious possibility that evidence might be destroyed.<br />

In o<strong>the</strong>r situations, <strong>the</strong> privacy <strong>of</strong> individuals will be respected, and that<br />

privacy will be protected especially in connection with individual<br />

members <strong>of</strong> <strong>staff</strong> and Fellows, <strong>the</strong>ir work, and <strong>the</strong> <strong>College</strong>, its systems and<br />

resources.<br />

As part <strong>of</strong> normal procedures, computers linked <strong>to</strong> networks may be<br />

scanned au<strong>to</strong>matically for vulnerability, and <strong>the</strong> Bursar may authorise <strong>the</strong><br />

routine moni<strong>to</strong>ring <strong>of</strong> Internet access generally, including E-mail traffic<br />

volume (but not content), within <strong>the</strong> local area network.<br />

6.<br />

MISUSE AND DISCIPLINARY ACTION<br />

The Bursar will decide in <strong>the</strong> light <strong>of</strong> <strong>the</strong> outcome <strong>of</strong> an investigation <strong>of</strong><br />

possible misuse <strong>of</strong> computing facilities whe<strong>the</strong>r disciplinary action is<br />

appropriate and, if it is judged appropriate, will instigate necessary action<br />

in accordance with <strong>the</strong> relevant disciplinary procedures.<br />

Computer facilities,<br />

E-mail & internet<br />

STAFF HANDBOOK 107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!