Acceptable use policy for conference guests
The objective of this policy is to ensure that users of University computer hardware and software are compliant with the University IT Conditions of Use in particular but not limited to the Acceptable/Unacceptable Use and to protect the integrity of IT Systems within Keele University.
For full details of the university IT
Acceptable Use
Authorised Users must conduct themselves honestly, respecting other users, observing copyright rules, software licensing rules, property rights and privacy of others. All existing University policies and Legislation (Section 6 - IT Conditions of Use) apply to users conduct whilst using the IT systems, especially harassment, misuse of resources, information and data security and confidentiality.
Users may access external IT systems from the University. They must abide by the regulations governing the use of these external facilities.
All software applications must be used in accordance with the license agreement.
Users are permitted to connect approved personal equipment to the network provided it is configured as specified by the University.
Unacceptable Use
IT systems must not be used for the following:
To access, store or transmit pornographic, discriminatory, defamatory or offensive material or undertake any transmission of information that contravenes University Regulations, policies or current legislation.
Running software to provide services to other users including running a file server for use by a third party. This includes the use of filesharing or peer to peer software on University or personal equipment connected to the University network.
The disclosure of usernames and passwords which are intended for sole use of the authorised user, to gain access to university facilities.
The transmission or distribution of material such which infringes the copyright of another person or organisation including, but not limited to, computer software, music, videos, written text or images.
Deliberate activities which cause or potentially cause loss or reduction of service to other users including but not exclusively
- Corrupting or destroying data belonging to other users
- Violating the privacy of other users
- Disrupting the work of other users
- Using systems in a way that denies service to other users
- Introducing viruses, Trojan horses, worms or similar
- Circumventing the effectiveness of installed security measures
- Connecting equipment to the network that causes a deterioration of service
The transmission of unsolicited commercial or advertising material, unless the material is embedded within or is otherwise part of a service to which the user has chosen to subscribe.
Personal use which inhibits the use of facilities for University purposes by others or which interferes with the performance of duties, education or training.