-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathlu-acceptable-use-policy.html
executable file
·313 lines (272 loc) · 41.4 KB
/
lu-acceptable-use-policy.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!-- saved from url=(0054)http://www.lboro.ac.uk/services/it/about/policies/aup/ -->
<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>
Acceptable Use Policy | IT Services
| Loughborough University</title>
<link rel="stylesheet" type="text/css" media="screen" href="./lu-acceptable-use-policy/default-ext-screen-cms.css"><!-- LU default screen CSS -->
<link rel="stylesheet" type="text/css" media="print" href="./lu-acceptable-use-policy/default-print.css"><!-- LU default print CSS -->
<link rel="stylesheet" type="text/css" href="./lu-acceptable-use-policy/itservices-screen.css"><!-- IT screen CSS -->
<link rel="stylesheet" type="text/css" media="print" href="./lu-acceptable-use-policy/it-print.css"><!-- IT print CSS -->
<link rel="stylesheet" type="text/css" href="./lu-acceptable-use-policy/it-default.css"><!-- IT default page CSS -->
<link rel="stylesheet" type="text/css" media="screen" href="./lu-acceptable-use-policy/shadowbox.css"><!-- Shadowbox CSS -->
<script type="text/javascript" src="./lu-acceptable-use-policy/jquery-1.7-min.js"></script><style type="text/css"></style><!-- jQuery 1.7 min -->
<script type="text/javascript" src="./lu-acceptable-use-policy/it-global.js"></script><!-- IT global JS -->
<script type="text/javascript" src="./lu-acceptable-use-policy/shadowbox.js"></script><!-- Shadowbox JS -->
<script type="text/javascript">
Shadowbox.init({
language: 'en',
players: ['iframe', 'img']
});
</script>
<link rel="stylesheet" type="text/css" media="print" href="./lu-acceptable-use-policy/default-print.css"><!-- LU default print CSS -->
</head>
<body>
<div id="main">
<div id="main-title">
<h1>
IT Services
</h1>
</div>
<div id="main-breadcrumb"><p class="featurecolour2"><a href="http://www.lboro.ac.uk/">University home</a> > <a href="http://www.lboro.ac.uk/service">Services</a> > <a href="http://www.lboro.ac.uk/services/it/">IT Services</a> > <a href="http://www.lboro.ac.uk/services/it/about/">About us</a> > <a href="http://www.lboro.ac.uk/services/it/about/policies/">Policies</a> > <a href="./lu-acceptable-use-policy/Acceptable Use Policy IT Services Loughborough University.html">Acceptable Use Policy</a></p></div><!-- Breadcrumb -->
<a name="content" id="content"></a>
<div id="main-content">
<h2 class="featurecolour2">Acceptable Use Policy</h2>
<a name="d.en.25988"></a>
<div class="pagephoto"><img src="./lu-acceptable-use-policy/lab108.jpg" alt="Photo: Student being helped in computer lab." class=""></div>
<h3>IT Acceptable Use Policy</h3><a name="d.en.25989"></a>
<h4 class="trigger"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>Introduction</strong></a></h4>
<div class="toggle_container" style="display: none;">
<div class="block">
<p>The University seeks to promote and facilitate the proper and extensive use of Information Technology in the interests of learning, teaching and research, including business and community engagement partnerships. Whilst the tradition of academic freedom will be fully respected, this also requires responsible and legal use of the technologies and facilities made available to students, staff and partners of the University.</p>
<p>This Acceptable Use Policy is intended to provide a framework for such use of Loughborough University's I.T. resources. It applies to all computing, telecommunication, and networking facilities provided at the University. It should be interpreted such that it has the widest application, in particular references to I.T. Services should, where appropriate, be taken to include departmental or other system managers responsible for the provision of an I.T. Service. This policy should be interpreted so as to encompass new and developing technologies and uses, which may not be explicitly referred to.</p>
<p>This Acceptable Use Policy is taken to include the <a href="acceptable-use-policy.htm">JANET Acceptable Use Policy</a> and the <a href="security-policy.htm">JANET Security Policy</a> published by JANET (UK), the <a href="http://www.eduserv.org.uk/lns/agreements/user-obligations">Combined Higher Education Software Team (CHEST) User Obligations</a>, together with its associated Copyright Acknowledgement, and the <a href="general-terms-of-service.htm">Eduserv General Terms of Service</a><sup>1</sup>. Users of commercial broadband services provided, or facilitated by, the University must abide by any specific policies associated with those services. Members of the University and all other users of the University's facilities are bound by the provisions of these policies in addition to this Acceptable Use Policy. They are also bound by such other policies as are published via the University on the <a title="Home &raquo; Development &raquo; University home &raquo; Services &raquo; IT Services &raquo; About us &raquo; Policies" href="http://www.lboro.ac.uk/services/it/about/policies/">IT Services policies web site</a>. It is the responsibility of all users of Loughborough University's I.T. services to read and understand this policy.</p>
</div>
</div><a name="d.en.25990"></a>
<h4 class="trigger"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>1. Purpose of Use</strong></a></h4>
<div class="toggle_container" style="display: none;">
<div class="block">
<p>University I.T. resources are provided primarily to facilitate a person's essential work as an employee or student or other role within the University. HallNet facilities, in particular, are also intended to help enhance the wider experience of students attending the University. No use of any I.T. service should interfere with another person's duties or studies or any other person's use of I.T. systems, nor bring the University into disrepute<sup><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#d.en.27982">2</a></sup>, in any way.</p>
<p>Using University I.T. facilities in an office, library or laboratory, for non-work-related purposes, such as personal electronic mail or recreational use of the World Wide Web including social networking sites, are understood to enhance the overall experience of an employee or student but are not an absolute right. Priority to such University-owned facilities must always be granted to those needing facilities for academic work or other essential university business.</p>
<p>University e-mail addresses and associated University e-mail systems, including University Google Mail Provision must be used for all official University business, in order to facilitate auditability and institutional record keeping. All staff and students of the University must regularly read their University e-mail.</p>
<p>Commercial work for outside bodies, using centrally managed services, requires explicit permission from the Director of Information Technology; such use, whether or not authorised, may be liable to charge.</p>
</div>
</div><a name="d.en.25991"></a>
<h4 class="trigger active"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>2. Authorisation</strong></a></h4>
<div class="toggle_container" style="display: block;">
<div class="block">
<p>In order to use the computing facilities of Loughborough University a person must first be registered. Those not automatically registered must apply to I.T. Services. Registration to use University services implies, and is conditional upon, acceptance of this Acceptable Use Policy.</p>
<p>The registration procedure grants authorisation to use the core I.T. facilities of the University. Following registration, a username, password and e-mail address will be allocated. Authorisation for other services may be requested by application to I.T. Services or other providers of Information Technology based services.</p>
<p>Individually allocated usernames, passwords, certificates and e-mail addresses are for the exclusive use of the individual to whom they are provided. The user is personally responsible and accountable for all activities carried out under their username. The password associated with a particular personal username must not be divulged to any other person, other than, in person, to known designated members of I.T. staff for the purposes of system support. Other facilities are available for situations where staff need to share e-mail. No one may use, or attempt to use, I.T. resources allocated to another person, except when explicitly authorised by the provider of those resources, such as in those circumstances defined in this policy.</p>
<p>All users must correctly identify themselves at all times. A user must not masquerade as another, withhold their identity or tamper with audit trails. A user must take all reasonable precautions to protect their resources. In particular, passwords used must adhere to current password policy and practice. <a title="Home &raquo; Development &raquo; University home &raquo; Services &raquo; IT Services &raquo; Registration and passwords &raquo; Password Guidance" href="http://www.lboro.ac.uk/services/it/reg/guidance/">Advice on what constitutes a good password</a> may be obtained from I.T. Services web pages. This advice must be followed: failure to do so may be regarded as a breach of this policy.<br><br></p>
</div>
</div><a name="d.en.25992"></a>
<h4 class="trigger"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>3. Privacy</strong></a></h4>
<div class="toggle_container" style="display: none;">
<div class="block">
<p><a id="email" name="email"></a>It should be noted that systems staff, who have appropriate privileges, have the ability, which is occasionally required, to access all files, including electronic mail files, stored on any computer which they manage. It is also occasionally necessary to intercept network traffic. In such circumstances appropriately privileged staff will take all reasonable steps to ensure the privacy of service users. The University fully reserves the right to monitor e-mail, telephone and any other electronically-mediated communications, whether stored or in transit, in line with its rights under the <a href="regulatory-powers.pdf">Regulation of Investigatory Powers Act (2000)</a>. Reasons for such monitoring may include the need to:</p>
<ul>
<li>ensure operational effectiveness of services,</li>
<li>prevent a breach of the law, this policy, or other University policy,</li>
<li>investigate a suspected breach of the law, this policy, or other University policy,</li>
<li>monitor standards.</li>
</ul>
<p>Access to staff files, including electronic mail files, and/or individual I.T. usage information will not normally be given to another member of staff unless authorised by the Director of IT, or nominee, who will use their discretion, normally in consultation with the Director of Human Resources or other senior officer of the University where possible and appropriate, the Head of School, Department or Section, or more senior line manager, will be informed, and consulted, prior to action being taken. Procedural guidelines will be published from time to time as separate document. Such access will normally only be granted in the following circumstances:</p>
<ol>
<li>where a breach of the law or a serious breach of this or another University policy is suspected,</li>
<li>when a documented and lawful request from a law enforcement agency such as the police or security services has been received,</li>
<li>on request from the relevant Head of School, Department or Section, where the managers or co-workers of the individual require access to e-mail messages or files, which are records of a University activity, and the individual is unable, e.g. through absence, to provide them.</li>
</ol>
<p>The University sees student privacy as desirable but not as an absolute right, hence students should not expect to hold or pass information, which they would not wish to be seen by members of staff responsible for their academic work. In addition to when a breach of the law or of this policy is suspected, or when a documented and lawful request from a law enforcement agency such as the police or security services has been received, systems staff are also authorised to release the contents of a student's files, including electronic mail files, when required to by any member of staff who has a direct academic work-based reason for requiring such access.</p>
<p>The usage of computers in University-managed laboraties, and the software installed on them, is automatically logged.</p>
<p>After a student or member of staff leaves the University, files which are left behind on any computer system owned by, or managed on behalf of the University, including servers, and including electronic mail files, will be considered to be the property of the University. When leaving the University, staff should make arrangements to transfer to colleagues any e-mail or other computer-based information held under their personal account, as this will be closed on their departure. Student e-mail will be transferred to an alumni e-mail account.</p>
</div>
</div><a name="d.en.25993"></a>
<h4 class="trigger"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>4. Behaviour</strong></a></h4>
<div class="toggle_container" style="display: none;">
<div class="block">
<p>No person shall jeopardise the integrity, performance or reliability of computer equipment, software, data and other stored information. The integrity of the University's computer systems is put at risk if users do not take adequate precautions against malicious software, such as computer viruses and associated malware. All users of University I.T. services must ensure that any computer, for which they have responsibility, and which is attached to the University network, is adequately protected against viruses, through the use of <a title="Home &raquo; Development &raquo; University home &raquo; Services &raquo; IT Services &raquo; Software and downloads &raquo; Anti-virus" href="http://www.lboro.ac.uk/services/it/software/workathome/staffantivirus/">up to date antivirus software</a> (<strong>any exceptions to this must be approved explicitly by I.T. Services - <a href="mailto:IT.Services@lboro.ac.uk">IT.Services@lboro.ac.uk</a> </strong>), and has the latest tested security patches installed. Reasonable care should also be taken to ensure that resource use does not result in a denial of service to others.</p>
<p>Conventional norms of behaviour apply to I.T.-based media, just as they would apply to more traditional media. Within the University setting, this should also be taken to mean that the tradition of academic freedom will always be respected. The University, as expressed in its <a href="http://www.lboro.ac.uk/admin/personnel/policies/equaloppspolicy.html">Equal Opportunities Policy</a>, is committed to achieving an educational and working environment which provides equality of opportunity, and freedom from discrimination on the grounds of race, colour, nationality, ethnic origin, gender, gender indentity (transsexual), marital or civil partnership status, disability, including mental health difficulties, sexul orientation, religion or belief, age, social class, pregnancy or offening background. </p>
<p>Distributing material, which is offensive, obscene or abusive, may be illegal and may also contravene University codes on harassment. Users of University computer systems must make themselves familiar with, and comply with, the University <a href="http://www.lboro.ac.uk/admin/personnel/policies/harass-bullying.html">code of conduct on harassment and bullying</a>.</p>
<p>No user shall interfere or attempt to interfere in any way with information belonging to or material prepared by another user. Similarly no user shall make unauthorised copies of information belonging to another user. The same conventions of privacy should apply to electronically held information as to that held on traditional media such as paper.</p>
<p>For specific services and activities the University may provide more detailed guidelines, in addition to the policies provided in this Acceptable Use Policy. In particular, users of the HallNet service must adhere to the detailed advice provided by the <a title="Home &raquo; Development &raquo; University home &raquo; Services &raquo; IT Services &raquo; Hallnet &raquo; Acceptable Use Policy " href="http://www.lboro.ac.uk/services/it/hallnet/aup/">Hallnet Acceptable Use Policy</a>.</p>
<p>Those buying I.T. equipment must adhere to the University's current policies relating to such purchases,in particular the <a title="Home &raquo; Development &raquo; University home &raquo; Services &raquo; IT Services &raquo; About us &raquo; Policies &raquo; Desktop and Laptop Policy" href="http://www.lboro.ac.uk/services/it/about/policies/desktop/">laptop and desktop policy</a>.</p>
<p>Users of services external to the University are expected to abide by any policies, rules and codes of conduct applying to such services. Any breach of such policies, rules and codes of conduct may be regarded as a breach of this Acceptable Use Policy and be dealt with accordingly. This includes social networking sites, blog and wiki services, bookmarking services and any other externally hosted services. The use of Loughborough University credentials to gain unauthorised access to the facilities of any other organisation is similarly prohibited.</p>
</div>
</div><a name="d.en.25994"></a>
<h4 class="trigger"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>5. Definitions of Acceptable & Unacceptable Usage</strong></a></h4>
<div class="toggle_container" style="display: none;">
<div class="block">
<p>Unacceptable use of University computers and network resources may be summarised as:</p>
<ul>
<li>the retention or propagation of material that is offensive, obscene or indecent, except in the course of recognised research or teaching that is permitted under UK and international law; propagation will normally be considered to be a much more serious offence;</li>
<li>intellectual property rights infringement, including copyright, trademark, patent, design and moral rights, including use internal to the University, e.g. on Learn;</li>
<li>causing annoyance, inconvenience or needless anxiety to others, as specified in the <a href="acceptable-use-policy.htm">JANET Acceptable Use Policy</a>;</li>
<li>defamation (genuine scholarly criticism is permitted);</li>
<li>unsolicited advertising, often referred to as "spamming";</li>
<li>sending e-mails that purport to come from an individual other than the person actually sending the message using, e.g., a forged address;</li>
<li>attempts to break into or damage computer systems or data held thereon;</li>
<li>actions or inactions which intentionally, or unintentionally, aid the distribution of computer viruses or other malicious software;</li>
<li>attempts to access or actions intended to facilitate access to computers for which the individual is not authorised;</li>
<li>using the University network for unauthenticated access;</li>
<li>unauthorised resale of University or JANET services or information.</li>
<li>excessive I.T. use during working hours that significantly interferes with a staff member’s work, or that of other staff or students</li>
</ul>
<p>These restrictions should be taken to mean, for example, that the following activities will normally be considered to be a breach of this policy (potential exceptions should be discussed with I.T. Services):</p>
<ul>
<li>the downloading, uploading, distribution, or storage of music, video, film, or other material, for which you do not hold a valid licence, or other valid permission from the copyright holder;</li>
<li>the use of peer-to-peer software and related applications to illegally download and/or share music, video, film, or other material, in contravention of copyright law</li>
<li>the publication on external websites of unauthorised recordings, e.g. of lectures;</li>
<li>the distribution or storage by any means of pirated software;</li>
<li>connecting an unauthorised device to the University network, i.e. one that has not been configured to comply with this policy and any other relevant regulations and guidelines relating to security, I.T. purchasing policy, and acceptable use. This includes network hubs, switches and wireless access points not approved or managed by I.T. Services. </li>
<li>circumvention of Network Access Control;</li>
<li>monitoring or interception of network traffic, without permission;</li>
<li>probing for the security weaknesses of systems by methods such as port-scanning, without permission;</li>
<li>associating any device to network Access Points, including wireless, for which you are not authorised;</li>
<li>non-academic activities which generate heavy network traffic, especially those which interfere with others' legitimate use of I.T. services or which incur financial costs;</li>
<li>excessive use of resources such as filestore, leading to a denial of service to others, especially when compounded by not responding to requests for action;</li>
<li>frivolous use of University owned computer laboratories, especially where such activities interfere with others' legitimate use of I.T. services;</li>
<li>opening an unsolicited e-mail attachment, especially if not work or study-related;</li>
<li>the deliberate viewing and/or printing of pornographic images;</li>
<li>the passing on of electronic chain mail;</li>
<li>posting of defamatory comments about staff or students on social networking sites;</li>
<li>the creation of web based content, portraying official University business without express permission or responsibility;</li>
<li>the use of University business mailing lists for non-academic purposes;</li>
<li>the use of CDs, DVDs, and other storage devices for copying unlicensed copyright software, music, etc.;</li>
<li>the copying of other people's web site, or other, material without the express permission of the copyright holder;</li>
<li><a href="http://www.lboro.ac.uk/admin/ar/student/handbook/section11/index.htm">Plagiarism</a>, i.e. the intentional use of other people's material without attribution.</li>
</ul>
<p>Other uses may be unacceptable in certain circumstances. In particular, users of the HallNet should take account of particular conditions of use applying to that service. It should be noted that <a href="http://www.lboro.ac.uk/services/it/hallnet/">HallNet</a> users should not provide any server-based services, including, but not limited to, Web server, FTP server, IRC, Streaming Media server, or e-mail services.</p>
<p>It should be noted that individuals may be held responsible for the retention of attachment material that they have received, via e-mail that they have read. Similarly, opening an attachment, received via unsolicited e-mail, especially if clearly unrelated to work or study, which leads to widespread virus infection, may result in disciplinary action being taken. Disciplinary action may also be taken if casual or non-work related activity results in significant problems being caused for I.T. systems or services, arising for example from browsing non-work-related websites or the downloading of software containing malicious content.</p>
<p>Acceptable uses may include:</p>
<ul>
<li>personal e-mail and recreational use of Internet services, as long as these are in keeping with the framework defined in this policy document and do not interfere with one's duties, studies or the work of others;</li>
<li>advertising via electronic notice boards, intended for this purpose, or via other University approved mechanisms</li>
</ul>
<p>However such use must not be regarded as an absolute right and may be withdrawn if abused or if the user is subject to a disciplinary procedure.</p>
</div>
</div><a name="d.en.25995"></a>
<h4 class="trigger"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>6. Legal Constraints</strong></a></h4>
<div class="toggle_container" style="display: none;">
<div class="block">
<h4>Introduction</h4>
<p>Any software and / or hard copy of data or information which is not generated by the user personally and which may become available through the use of University computing or communications resources shall not be copied or used without permission of the University or the copyright owner. In particular, it is up to the user to check the terms and conditions of any licence for the use of the software or information and to abide by them. Software and / or information provided by the University may only be used as part of the user's duties as an employee or student of the University or for educational purposes. The user must abide by all the licensing agreements for software entered into by the University with other parties, noting that the right to use any such software outside the University will cease when an individual leaves the institution. Any software on a privately owned computer that has been licensed under a University agreement must then be removed from it, as well as any University-owned data, such as documents and spreadsheets. When a computer ceases to be owned by the University, all data and software must be removed from it, in accordance with the University's policies and contractual obligations, including the <a href="http://www.lboro.ac.uk/sustainability/waste/weee.html">Staff Redundant Computer Equipment Disposal Policy</a>.</p>
<p>In the case of private work and other personal use of I.T. facilities, the University will not accept any liability for loss, damage, injury or expense that may result.</p>
<p>The user must comply with all relevant legislation and legal precedent, including the provisions of the following Acts of Parliament, or any re-enactment thereof:</p>
<ul>
<li><a href="http://www.legislation.gov.uk/ukpga/1988/48/contents">Copyright, Designs and Patents Act 1988</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/1988/27/contents">Malicious Communications Act 1988</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/1990/18/contents">Computer Misuse Act 1990</a>;</li>
<li><a href="http://www.opsi.gov.uk/acts/acts1959/pdf/ukpga_19590066_en.pdf">Obscene Publications Act 1959</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/1994/33/contents">Criminal Justice and Public Order Act 1994</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/1994/26/contents">Trade Marks Act 1994</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/1998/29/contents">Data Protection Act 1998</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/1998/42/contents">Human Rights Act 1998</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/2000/23/contents">Regulation of Investigatory Powers Act 2000</a>;</li>
<li><a href="http://www.legislation.gov.uk/uksi/2000/2699/contents/made">Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/2000/36/contents">Freedom of Information Act 2000</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/2003/21/contents">Communications Act 2003</a>;</li>
<li><a href="http://www.legislation.gov.uk/ukpga/2008/4/contents">Criminal Justice and Immigration Act 2008</a>.</li>
</ul>
<p>See below for a summary of the main points. Copies of these documents are also available through the University Library. Further advice should be obtained through the Director of I.T. in the first instance.</p>
<h4>Copyright, Designs and Patents Act 1988</h4>
<p>This Act, together with a number of Statutory Instruments that have amended and extended it, controls copyright law. It makes it an offence to copy all, or a substantial part, which can be a quite small portion, of a copyright work. There are, however, certain limited user permissions, such as fair dealing, which means under certain circumstances permission is not needed to copy small amounts for non-commercial research or private study. The Act also provides for Moral Rights, whereby authors can sue if their name is not included in a work they wrote, or if the work has been amended in such a way as to impugn their reputation. Copyright covers materials in print and electronic form, and includes words, images, sound, moving images, TV broadcasts and many other media.</p>
<h4>Malicious Communications Act 1988</h4>
<p>Under this Act it is an offence to send an indecent, offensive, or threatening letter, electronic communication or other article to another person. Additionally under the Telecommunications Act 1984 it is a similar offence to send a telephone message, which is indecent, offensive, or threatening.</p>
<h4>Computer Misuse Act 1990</h4>
<p>This Act makes it an offence</p>
<ul>
<li>to erase or amend data or programs without authority;</li>
<li>to obtain unauthorised access to a computer;</li>
<li>to "eavesdrop" on a computer;</li>
<li>to make unauthorised use of computer time or facilities;</li>
<li>maliciously to corrupt or erase data or programs;</li>
<li>to deny access to authorised users.</li>
</ul>
<h4>Obscene Publications Acts 1959</h4>
<p>This act defines material as "obscene" if it has a tendency "to deprave or corrupt" those likely to be exposed to it. It is often used to help define pornography or other offensive material.</p>
<h4>Criminal Justice & Public Order Act 1994</h4>
<p>This defines a criminal offence of intentional harassment, which covers all forms of harassment, including sexual. A person is guilty of an offence if, with intent to cause a person harassment, alarm or distress, they:-</p>
<ul>
<li>use threatening, abusive or insulting words or behaviour, or disorderly behaviour; or</li>
<li>display any writing, sign or other visible representation which is threatening, abusive or insulting, thereby causing that or another person harassment, alarm or distress.</li>
</ul>
<h4>Trade Marks Act 1994</h4>
<p>This Act provides protection for Registered Trade Marks, which can be any symbol (words or images) or even shapes of objects that are associated with a particular set of goods or services. Anyone who uses a Registered Trade Mark without permission can expose themselves to litigation. This can also arise from the use of a Mark that is confusingly similar to an existing Mark.</p>
<h4>Data Protection Act 1998</h4>
<p>The University has a comprehensive <a href="data-protection.htm">Data Protection Policy</a>, of which the following statement is the summary.</p>
<p>Loughborough University is committed to a policy of protecting the rights and privacy of individuals (includes students, staff and others) in accordance with the Data Protection Act. The University needs to process certain information about its staff, students and other individuals it has dealings with for administrative purposes (e.g. to recruit and pay staff, to administer programmes of study, to record progress, to agree awards, to collect fees, and to comply with legal obligations to funding bodies and government). To comply with the law, information about individuals must be collected and used fairly, stored safely and securely and not disclosed to any third party unlawfully.</p>
<p>The policy applies to all staff and students of the University. Any breach of the Data Protection Act 1998 or the University Data Protection Policy is considered to be an offence and in that event, Loughborough University disciplinary procedures will apply. As a matter of good practice, other agencies and individuals working with the University, and who have access to personal information, will be expected to have read and comply with this policy. It is expected that departments / sections who deal with external agencies will take responsibility for ensuring that such agencies sign a contract agreeing to abide by this policy.</p>
<h4>Human Rights Act 1998</h4>
<p>This act does not set out to deal with any particular mischief or address specifically any discrete subject area within the law. It is a type of "higher law", affecting all other laws. In the context of the University, important human rights to be aware of include:</p>
<ul>
<li>the right to a fair trial</li>
<li>the right to respect for private and family life, home and correspondence</li>
<li>freedom of thought, conscience and religion</li>
<li>freedom of expression</li>
<li>freedom of assembly</li>
<li>prohibition of discrimination</li>
<li>the right to education</li>
</ul>
<p>These rights are not absolute. The University, together with all users of its I.T. services, is obliged to respect these rights and freedoms, balancing them against those rights, duties and obligations which arise from other relevant legislation.</p>
<h4>Regulation of Investigatory Powers Act 2000</h4>
<p>The Act states that it is an offence for any person to intentionally and without lawful authority intercept any communication. Monitoring or keeping a record of any form of electronic (including telephone) communications is permitted, in order to:</p>
<ul>
<li>Establish the facts;</li>
<li>Ascertain compliance with regulatory or self-regulatory practices or procedures;</li>
<li>Demonstrate standards, which are or ought to be achieved by persons using the system;</li>
<li>Investigate or detect unauthorised use of the communications system;</li>
<li>Prevent or detect crime or in the interests of national security;</li>
<li>Ensure the effective operation of the system.</li>
</ul>
<p>Monitoring but not recording is also permissible in order to:</p>
<ul>
<li>Ascertain whether the communication is business or personal;</li>
<li>Protect or support help line staff.</li>
</ul>
<p>The University reserves the right to monitor e-mail, telephone, and any other communications in line with its rights under this act. The Lawful Business Practice Regulations allow exceptions to the basic principle of non interception as stated in the RIPA, and allows interception without consent in certain instances.</p>
<h4>Freedom of Information Act 2000</h4>
<p>The Act, intended to increase openness and transparency, obliges public bodies, including Higher Education Institutions, to disclose a wide range of information, both proactively and in response to requests from the public. The types of information that may be have to be found and released are wide-ranging, for example minutes recorded at a board meeting of the institution or documentation relating to important resolutions passed. Retrieval of such a range of information places a considerable burden on an institution subject to such an information request. In addition to setting a new standard of how such bodies disseminate information relating to internal affairs, the Act sets time limits by which the information requested must be made available, and confers clearly stated rights on the public, regarding such information retrieval. Therefore all staff have a responsibility to know what information they hold and where and how to locate it. The University has adopted a comprehensive <a href="http://www.lboro.ac.uk/admin/ar/policy/foi/publication-scheme/_doc/FOI-Publication-Scheme.pdf">publication scheme</a>.</p>
<h4>Communications Act 2003</h4>
<p>This act makes it illegal to dishonestly obtain electronic communication services, such as e-mail and the World Wide Web.</p>
<h4>Criminal Justice and Immigration Act 2008</h4>
<p>This act increased the penalties for publishing an obscene article. It also introduced fines for data protection contraventions when organisations 'knew or ought to have known that there was a risk that the contravention would occur, and that such a contravention would be of a kind likely to cause substantial distress or damage, but failed to take reasonable steps to prevent the contravention.'</p>
</div>
</div><a name="d.en.25996"></a>
<h4 class="trigger"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>7 University Discipline</strong></a></h4>
<div class="toggle_container" style="display: none;">
<div class="block">
<p>Staff or students who break this Acceptable Use Policy will find themselves subject to the University's disciplinary procedures. In particular, students should familiarise themselves with the University's <a href="dicipline.htm">Ordinance XVII, Conduct and Discipline of Students</a>. The Director of I.T., as well as an individual's department or the Chief Operating Officer, may take such disciplinary action. Individuals may also be subject to criminal proceedings. The University reserves its right to take legal action against individuals who cause it to be involved in legal proceedings as a result of their violation of licensing agreements and / or other contraventions of this policy.</p>
</div>
</div><a name="d.en.25997"></a>
<h4 class="trigger"><a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#"><strong>8. Policy Supervision and Advice</strong></a></h4>
<div class="toggle_container" style="display: none;">
<div class="block">
<p>The responsibility for the supervision of this Acceptable Use Policy is delegated to I.T. Services. A senior member of I.T. Services will be designated as the person responsible for the day-to-day management of the policy's enforcement. They will liaise with the Director of I.T., the Director of Human Resources,<span style="font-family: 'Arial','sans-serif'; font-size: 12pt; mso-fareast-language: EN-US; mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-size: 10.0pt; mso-ansi-language: EN-GB; mso-bidi-language: AR-SA;"> </span>the University Librarian, the Security Manager, the Copyright Officer, the Intellectual Property Office, the Chief Operating Officer, and Heads of School, Department and Sections, as required. When a breach of the law is suspected, the Security Manager and the Chief Operating Officer will normally be consulted. Procedural guidelines will be published from time to time as a separate document.</p>
<p>Any suspected breach of this policy should be reported to a member of I.T. Services staff. The responsible senior member will then take the appropriate action within the University's disciplinary framework, in conjunction with other relevant branches of the University. I.T. Services staff will also take action when infringements are detected in the course of their normal duties. Actions will include, where relevant, immediate removal from online information systems of material that is believed to infringe the law. The University reserves the right to audit and/or suspend without notice any account pending any enquiry. Where necessary, this will include the interception of electronically mediated communications.</p>
<p>This policy is not exhaustive and inevitably new social and technical developments will lead to further uses, which are not fully covered. In the first instance, students should address questions concerning what is acceptable to their supervisor, personal tutor or Head of School or Department; staff should initially contact their departmental I.T. Acceptable Use Policy Adviser or Head of School/Department/Section. Where there is any doubt the matter should be raised with I.T. Services, whose staff will ensure that all such questions are dealt with at the appropriate level within the University.</p>
</div>
</div>
<a name="d.en.25998"></a>
<p><cite>8th edition - Approved by I.T. Committee, January 2011</cite>.</p><a name="d.en.153664"></a>
<h4>Footnotes</h4>
<a name="d.en.27982"></a>
<p><a id="ftn01" name="ftn01"></a>1. A University Information Security Policy is being developed (January 2011). This will be referenced here when it is approved.</p>
<a name="d.en.27983"></a>
<p><a id="ftn02" name="ftn02"></a>2."Bringing the University into disrepute" is defined by the University, as established via the appropriate channels. This reference to it has formed part of this policy since its original inception. Its interpretation in the context of this policy is dependent upon the agreements currently in operation. The meaning of "bringing the University into disrepute", as applied to staff, is currently (January 2011) the subject of negotiation between the staff unions and University management. The resulting definition will apply to this policy.</p><p> </p>
</div>
<div id="site-footer">
Website maintained by: <a href="mailto:IT.Services@lboro.ac.uk">IT.Services@lboro.ac.uk</a>
</div>
<div id="main-footer"></div>
</div>
<div id="main-botlinks">
<p class="left">
<span class="whitetxt">© Loughborough University</span></p>
<p class="right">
<a href="http://www.lboro.ac.uk/disclaimer.html" accesskey="8">Legal information</a> |
<a href="http://www.lboro.ac.uk/admin/ar/policy/foi/">Freedom of information</a> |
<a href="http://www.lboro.ac.uk/services/it/about/policies/aup/#top">Top of page</a> </p>
<div class="clear"></div>
</div>
<div id="sb-container"><div id="sb-overlay"></div><div id="sb-wrapper"><div id="sb-title"><div id="sb-title-inner"></div></div><div id="sb-wrapper-inner"><div id="sb-body"><div id="sb-body-inner"></div><div id="sb-loading"><div id="sb-loading-inner"><span>loading</span></div></div></div></div><div id="sb-info"><div id="sb-info-inner"><div id="sb-counter"></div><div id="sb-nav"><a id="sb-nav-close" title="Close" onclick="Shadowbox.close()"></a><a id="sb-nav-next" title="Next" onclick="Shadowbox.next()"></a><a id="sb-nav-play" title="Play" onclick="Shadowbox.play()"></a><a id="sb-nav-pause" title="Pause" onclick="Shadowbox.pause()"></a><a id="sb-nav-previous" title="Previous" onclick="Shadowbox.previous()"></a></div></div></div></div></div></body></html>