Student Network, Computing & Software Usage Regulations Version th July 2006

Similar documents
Acceptable Use Policy (AUP)

Acceptable Use Policy ("AUP")

NebraskaLink Acceptable Use Policy

Acceptable use policy for SLT idc services(ver 1.2)

Acceptable Use Policy

Acceptable Use Policy

1801 North Main Street Ste 25 Phone: Mitchell, SD Office Hours: M-F 8am-5pm Fax:

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

ACCEPTABLE USE POLICY

Magna5 reserves the right to make modifications to this policy at any time.

This Policy applies to all staff and other authorised users in St Therese School.

Acceptable Use Policy

FreedomNet Solutions Acceptable Use Policy ( )

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

Midstate Telephone & Midstate Communications. Acceptable Use Policy

ACCEPTABLE USE POLICY

region16.net Acceptable Use Policy ( AUP )

Acceptable Use Policy

NUCONNECT INTERNET ACCEPTABLE USE POLICY

PRIMUS ACCEPTABLE USE POLICY

Communication and Usage of Internet and Policy

II.C.4. Policy: Southeastern Technical College Computer Use

PTLGateway Acceptable Use Policy

You may contact The Translation Network by at You may also call The Translation Network at

Acceptable Use Policy

The AUP applies to all Snowball products and services but is in particular applicable to internet services.

Annexure-2. Acceptable User Policy

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES

Acceptable Use Policy. Effective January 2017

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

UCL Policy on Electronic Mail ( )

These terms are current as of November 8, 2018 and are subject to change from time to time. Please visit shaw.ca for the most current Terms of Use.

Acceptable Use Policy

Acceptable Use Policies

: Acceptable Use Policy

Acceptable Use Policy Updated 1/16/2018

Acceptable Use Policy Internet

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY

Acceptable Use Policy

Acceptable Use and Publishing Policy

Acceptable Use Policy

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Wave s High-Speed Internet Service Acceptable Use Policy

Internet, , and Computer Usage Policy

300 Lena Drive Aurora, Ohio P: F: Page 1 of 5

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

Cleveland State University General Policy for University Information and Technology Resources

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Acceptable Use Policy

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Breckenridge Financial Supplies Website Use Policy

amaysim NBN Broadband Fair Go Policy Valid as of May 2017

Acceptable Usage Policy

Keystone Acceptable Use Policy

Computer Use and File Sharing Policy

Acceptable Use Policy

Acceptable Use Policy

TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION

The following is the Lightning IP Acceptable Usage Policy ( AUP ) for all Users of the Lightning IP Services. In General

MANAGED HOSTING ACCEPTABLE USE POLICY

E RADAR. All Rights Reserved. Acceptable Use Policy

WAFA X3 Evolution Grade of Service. 13 October 2008

Acceptable Usage Policy Published by FirstNet March 2015

13. Acceptable Use Policy

Acceptable Use Policy

Acceptable Use Policy for EWC HousingNet Internet Service Customers

ICT Acceptable Use Policy for Students

Acceptable Use Policy

NETCOM.cm Acceptable Use Policy

ACCEPTABLE USE POLICY

Draft. Policies of Colorado State University University Policy. Category: Information Technology

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

MON-CRE TELEPHONE COOPERATIVE, INC. ACCEPTABLE USE POLICY

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

Acceptable Use Policy

Residential Acceptable Use Policy

Grades of Service at a glance

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

The Safe and Sound Services are available for individuals aged 18 years or older.

TELEPHONE AND MOBILE USE POLICY

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

Staff Information System Acceptable Use Policy

INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY

Terms and Conditions

Herkimer County Community College. Department of Information Services Computer Use Policy and Guidelines

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

COMPUTER USE POLICY Staff

2.1 Website means operated and owned by UCS Technology Services, including any page, part of element thereof;

Electronic Network Acceptable Use Policy

Terms and Conditions 01 January 2016

Broadband Internet Access Agreement

Acceptable Use Policy (AUP) For ALL Technology Items, , and Wireless Devices within Hubbard ISD

Shout! Radio Automation Terms Of Service

Use of College Electronic Communication Services

USE POLICY. iprimus.com.au

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

Transcription:

Student Network, Computing & Software Usage Regulations Version 1.0 6 th July 2006 Copyright 2006 Institute of Technology, Sligo, Ireland. 1

1.1 General Computing Facilities Computing facilities provided by the Institute are to be used by students of the college solely for work associated with research and courses of the Institute. Computers, printers and college owned software and Internet access must not be used for any other purpose. 1.2 Software Licensing No software shall be installed by any student. 1.3 Access to Computers (a) (b) Students should not leave computers logged in and unattended. Students will be held personally liable for use of computers for noncourse related activity, and for documents and images stored or downloaded from the Internet or other sources, while the computer was left logged in and unattended. Students should be aware that all files saved to college computers and network servers are date, time and User ID stamped, as are all visits to websites outside the college. Email must not be used for propagation of chain email or for the transmission of offensive images/cartoons or material which is unrelated to course work. Use of Email is governed by the Email AUP provided in section 3. The use of Internet Chat software such as ICQ or MIRC is forbidden at all times, and downloading copyright infringing MP3 or other music format files, is forbidden at all times. Students shall be personally liable for damages to the intellectual property owner. 1.4 Audit College management reserve the right to periodically and randomly audit student computers, and email/network storage areas for breaches of this policy, without warning. 1.5 Penalties Penalties for Breaches of this code of practice and or the Internet/Email Acceptable Use Policy will result in disciplinary action, up to and including suspension and/or expulsion. Copyright 2006 Institute of Technology, Sligo, Ireland. 2

It is understood that by using college provided computers, network and Internet you agree to be bound by the following Internet Acceptable Use Policies (AUP) Copyright 2006 Institute of Technology, Sligo, Ireland. 3

2. Internet Acceptable Use Policy The Institute of Technology, Sligo (ITS) Acceptable Use Policy has been formulated with the following goals in mind: 1. Ensure security, reliability and integrity of the colleges network, and the network of others. 2. Avoid situations that may cause the Institute to incur civil liability 3. Maintain the image and reputation of the Institute 4. Preserve the value of Internet resources as a conduit for free expression 5. Encourage the responsible use of network resources, discouraging practices, which degrade the usability of network resources and thus the value of Internet services 6. Preserve the privacy and security of individual users The Acceptable Use Policy below defines the actions which ITS considers to be abusive, and thus, strictly prohibited. The examples named in this list are non-exclusive, and are provided solely for guidance to ITS users. If you are unsure whether any contemplated use or action is permitted, please contact the IT Manager in writing. General Conduct Users are prohibited from uploading/downloading on or through any of ITS computers or network, any material that is, in IT Sligo's sole discretion, unlawful, threatening, abusive, libellous, pornographic, racial, hateful, or encourages conduct that would constitute a criminal offence, give rise to civil liability, or otherwise violate any national, EU or international law. ITS computer and network services may only be used for lawful purposes. Transmission, distribution, or storage of any information, data or material in violation of European Union or Irish National regulation or law, or by the common law, is prohibited. This includes, but is not limited to, material protected by copyright, trademark, trade secret, or any other statute. The provision of remote access to users is not permitted except through prior agreement with the Computing Services Department. The resale of ITS computer and network services is not permitted. Copyright 2006 Institute of Technology, Sligo, Ireland. 4

System and Network Security Users may not attempt to circumvent user authentication or security of any host, network, or account ("cracking"). This includes, but is not limited to, accessing data not intended for the User, logging into a server or account the User is not expressly authorized to access, or probing the security of other networks. Users may not attempt to interfere with service to any user, host, or network ("denial of service attacks"). This includes, but is not limited to, "flooding" of networks, deliberate attempts to overload a service, and attempts to "crash" a host. Users who violate systems or network security may incur criminal or civil liability. ITS will co-operate fully with investigations of violations of systems or network security at other sites, including co-operating with law enforcement authorities in the investigation of suspected criminal violations. USENET Postings to USENET newsgroups must comply with the written charters or FAQs for those newsgroups. Users are prohibited from posting the same or similar message to large numbers of newsgroups (excessive cross-posting or multiple-posting, also known as "USENET spam"). A User may not solicit mail for any other address other than that of the user's ITS account, with the intent to harass or collect replies after ITS network service has been terminated. IRC (Internet Relay Chat) ITS is not liable for the content of any communications made on IRC. ITS reserves the right to ban from IRC usage any user whose conduct is, in ITS's sole judgement, inappropriate or disruptive. IRC robots ("bots" or "clones") may not be run from ITS accounts, or on any ITS server. Users are prohibited from using IRC scripts or programs that interfere with or deny service to other users on any server or host. Users are also prohibited from engaging in activities, which harass other users. This includes, but is not limited to, "flooding" (rapidly entering text with the intent to fill the screens of others), "flashing" (disrupting terminal emulation), "take-overs" (forcibly seizing operator privileges), attempting to send private messages to those who do not wish to see them (via "ignore"), attempting to return to a channel after being banned from it, and other disruptive behaviours. Other Internet based Services The User is made aware that this AUP governs the use of other Internet based and/or future services not listed here. Copyright 2006 Institute of Technology, Sligo, Ireland. 5

3. Email Acceptable Use Policy Electronic mail enables Institute students to communicate promptly and efficiently with colleagues internally within the organisation and enables a prompt and efficient service from the Institute to its clients/customers/suppliers. E-mail can also be used to communicate with other individuals and organisations with whom Institute students interact with. While E-mail brings many benefits to the Institute in terms of its communications internally with members and externally it also brings risks to the organisations. For that reason it is necessary to have a code of practice which regulates its use and which sets down its specific rules for the use of e- mail and Internet. Every student has a responsibility to maintain the Institute's image, to use these electronic resources in a productive manner and to avoid placing the Institute at risk for legal liability based on their use. Use of E-mail E-mail is a personal computerised and efficient communication system which enables the sending and receiving of messages between students and between the Institute and its clients/customers/suppliers. Documents and materials can be attached to E-mails. E-mail can effectively by-pass typewritten documents, faxes and the need to post documents. There, are, however risks attached to the sending of E-mails and they are : 1. Your message may go to persons other than the intended recipient and if confidential or commercially sensitive this could be damaging to the Institute. 2. E-mail messages can carry computer viruses which are particularly dangerous to the Institute's computer operations generally. 3. Letters, files and other documents attached to E-mails may belong to others and there may be copyright implications in sending or receiving them without permission. 4. E-mail is speedy and, as, such messages written in haste or written carelessly are sent simultaneously and without the opportunity to check or rephrase. This could give rise to legal liability on the Institute's part such as claims for defamation, etc. 5. An E-mail message may legally bind the Institute contractually in certain instances without the proper authority being obtained internally. 6. It should be remembered that all personal data contained in E-mails may be accessible under Data Protection legislation and, furthermore, a substantial portion of E-mails to Government and other public bodies may be accessible under Freedom of Information legislation. Copyright 2006 Institute of Technology, Sligo, Ireland. 6

7. E-mails should be regarded as potentially public information which carry a heightened risk of legal liability for the sender, the recipient and the organisations for whom they work. Rules for E-mail use In order to avoid or reduce the risks inherent in the use of E-mail within the Institute the following rules are necessary : 1. The Institute's name is included in the heading carried with every message sent by a student member. This reflects on the Institute's image and reputation. Therefore, E-mail messages must be appropriate and professional. 2. E-mail is not for private purposes nor should E-mail be used for any purpose, other than Institute business. All E-mails issued from the Institute will carry a disclaimer saying the E-mail is intended only for IT Sligo use and if used for any other purpose a named person should be contacted immediately within the Institute. 3. Particular care should be taken when sending confidential or commercially sensitive information. If in doubt please consult your Lecturer, Head of Department/School or Function Head. 4. Great care should also be taken when attaching documents as the ease with which one can download files from the Internet or 'cut and paste' materials from electronic sources increases the risks of infringement of the rights of others particularly the intellectual property and other proprietary rights. Also attaching documents may give rise to the release of information not intended hence the importance of vetting attachments. Again if in doubt please consult your Lecturer, Head of Department/School or Function Head. 5. Extra caution needs to be taken with E-mail messages in respect of any disparaging remarks that may be contained therein. An E-mail should be regarded as a written formal letter the recipients of which may be much wider than the sender intended hence any defamatory or careless remarks can have very serious consequences as can any indirect innuendo. Avoid the use of indecent, obscene, sexist, racist or other inappropriate remarks whether in written form, in cartoon form or otherwise. 6. If you receive any offensive, unpleasant, harassing or intimidating messages via the E-mail you are requested to inform your Lecturer, Head of Department/School or Function Head, or the IT Department immediately. It is important that we trace such E-mails as quickly as possible. 7. Any important or potentially contentious communication which you have received through E-mail should be printed and a hard copy kept (e.g. confirmation of order etc.) Where important to do so you should obtain Copyright 2006 Institute of Technology, Sligo, Ireland. 7

confirmation that the recipient has received your E-mail. 8. The Institute reserves the right to review, audit, intercept, access and disclose all messages created, received or sent over the electronic mail system for any purpose. 9. The Use of Institute provided Email for the distribution of unsolicited bulk email (SPAM) is expressly forbidden at all times. Notwithstanding the Institute's right to retrieve and read any electronic mail messages, such messages should be treated as confidential by other students and accessed only by the intended recipient. Students are not authorised to retrieve or read any e-mail messages that are not sent to them. Any exception to this policy must receive prior approval from college management. However, the confidentiality of any message should not be assumed. Even when a message is erased it is still possible to retrieve and read that message. Formal Acceptance of the Code of Practice I, the undersigned, hereby declare that I have read the college Computing Code of Practice and Internet Acceptable Use Policies and agree to be bound by them, in the full knowledge that any breach of the above policies and code may lead to suspension and or expulsion. Print Name Course Name and Year User Logon ID Signature Copyright 2006 Institute of Technology, Sligo, Ireland. 8