12.07.2015 Views

IT Matters @ Cambridge - University of Cambridge Computing Service

IT Matters @ Cambridge - University of Cambridge Computing Service

IT Matters @ Cambridge - University of Cambridge Computing Service

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Rules governing the use <strong>of</strong> <strong>University</strong> computing facilities1. No person shall use <strong>IT</strong> facilities,or allow them to be used by others,without due authorization givenby the ISC or by the appropriateAuthorized Officer, who mayimpose conditions <strong>of</strong> use toensure efficient operation.2. By means <strong>of</strong> publisheddocumentation an AuthorizedOfficer may designate an <strong>IT</strong> facilityas authorized for use by specifiedclasses <strong>of</strong> persons and for specifiedpurposes. In the case <strong>of</strong> facilitiesnot so designated, resources areallocated individually; every suchallocation <strong>of</strong> <strong>IT</strong> resources shallbe used only for the designatedpurpose and only by the personto whom the allocation wasmade. Use shall not be made <strong>of</strong><strong>IT</strong> resources allocated to anotherperson or group <strong>of</strong> persons unlesssuch use has been specificallyauthorized by the ISC or by theappropriate Authorized Officer.3. No person shall by any wilful,deliberate, reckless, unlawfulact, or omission interfere withthe work <strong>of</strong> another user orjeopardize the integrity <strong>of</strong> datanetworks, computing equipment,systems programs, or other storedinformation.4. All persons authorized to use<strong>IT</strong> facilities shall be expected totreat as privileged any informationwhich may become availableto them through the use <strong>of</strong>such facilities and which is notobviously intended for unrestricteddissemination; such informationshall not be copied, modified,disseminated, or used, either inwhole or in part, without thepermission <strong>of</strong> the appropriateperson or body.5. In the case <strong>of</strong> any informationwhich is designated in a Noticeissued by or on behalf <strong>of</strong> theISC as proprietary or otherwiseconfidential, every person using<strong>IT</strong> facilities shall be required:(a) to observe any instructionsthat may be issued specifyingways in which the informationmay be used;(b) not to copy, modify,disseminate, or make use <strong>of</strong>it in any way not specified inthose instructions, without firstobtaining permission from theappropriate Authorized Officer.6. No person shall use <strong>IT</strong> facilitiesto hold or process personal dataexcept in accordance with theprovisions <strong>of</strong> relevant legislation,including the Data Protection Act1998. Any person wishing to use <strong>IT</strong>facilities for such a purpose shall berequired to inform the AuthorizedOfficer in advance and to complywith any restrictions that may beimposed concerning the manner inwhich the data may be held or theprocessing carried out.7. No person shall use <strong>IT</strong> facilitiesfor private financial gain or forcommercial purposes, includingconsultancy or any other workoutside the scope <strong>of</strong> <strong>of</strong>ficial dutiesor functions for the time being,without specific authorizationto do so.8. Any person who misuses <strong>IT</strong>facilities or who uses <strong>IT</strong> facilitiesfor private financial gain or forcommercial purposes, with orwithout specific authorizationto do so, may be charged with thecost <strong>of</strong> such use or misuse at a ratedetermined from time to time by the appropriate AuthorizedOfficer. If any person who hasbeen so charged with the cost<strong>of</strong> <strong>IT</strong> resources fails to makereimbursement, any authorizationto use <strong>IT</strong> facilities shall besuspended automatically untilreimbursement is made in full, andthe matter shall be reported by theISC to the appropriate <strong>University</strong>or College financial authority.9. No person shall use <strong>IT</strong> facilitiesfor unlawful activities.10. Any person believed to bein breach <strong>of</strong> one or more <strong>of</strong> theserules shall be reported by theAuthorized Officer to the ISCwho may at their discretion, afterconsidering the Officer’s reportand any other relevant matters,impose a penalty or penaltiesin accordance with Regulation5(g) for the ISC. The ISC may alsorecommend to the appropriate<strong>University</strong> or College authoritythat proceedings be initiatedunder either or both <strong>of</strong> the<strong>University</strong> and College disciplinaryprocedures and any appropriatelegislation.Mac OS is a trademark <strong>of</strong> Apple Inc. Windows is a registered trademark <strong>of</strong> Micros<strong>of</strong>t Corporation in the United States and/or other countries.Linux is the registered trademark <strong>of</strong> Linus Torvalds in the U.S. and other countries. © <strong>University</strong> <strong>of</strong> <strong>Cambridge</strong> 2014.This information may be available in other forms. Please telephone the InformationProvision Group coordinator on 01223 334598, or email documentation@uis.cam.ac.ukto discuss what is available, and how we can meet any special requirements you have.<strong>University</strong> Information <strong>Service</strong>s7 JJ Thomson Avenue, <strong>Cambridge</strong> CB3 0RBHelp and support:Email: service-desk@uis.cam.ac.uk<strong>Service</strong> Desk: +44 (0)1223 762999Website: www.uis.cam.ac.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!