Computing Use Policy Introduction Purpose

advertisement
ROYAL FREE AND UNIVERSITY COLLEGE MEDICAL SCHOOL
UCL DEPARTMENT OF MEDICAL SCHOOL ADMINISTRATION
Centre for Computing Services
Computing Use Policy
Introduction
Purpose
Communications and Information Technology (C&IT) services are funded on condition that these services are used for
legitimate, authorised purposes only. The main purpose of these local regulations is to encourage the responsible use of
facilities; to maximise the availability of resource (desktop equipment, infrastructure and staff) for legitimate purposes; and to
minimise exposure to misuse from inside or outside UCL.
UCL may be required from time to time to demonstrate to external auditing bodies that it has mechanisms in place to manage,
regulate and control its services.
Any form of electronic communication may be construed in law as a publication and UCL publishing guidelines will apply.
Users must be aware of the implications with respect to Intellectual Property Rights of publishing information in any electronic
form. For further information users should consult the UCL Guidelines on Publishing at: http://www.ucl.ac.uk/UCLInfo/Docs/Guide.html
This
document
is
subject
to
review,
http://www.ucl.ac.uk/UCL-Info/Policy/Computing/Use.
for
the
most
recent
version
please
see
Scope of the Regulations
These regulations cover the use of all (C&IT) services and facilities within UCL. The C&IT facilities are of various kinds:
1
C&IT services run by the Education & Information Support Division (EISD) - Information Systems (IS) which may be
used by any member of UCL. All users of these services must be registered with IS.
2
C&IT services run by the Management Services Division (MSD) which may be used by authorised, registered members
of UCL.
3
C&IT services run by Departments for academic research, teaching and administration. Arrangements for use of these
facilities are made through the department concerned and are normally restricted to its own staff and students.
4
C&IT services run by the Library and Administrative Divisions of UCL.
5
Personal computers owned by individual staff or students when connected to UCL communications network or using
software under an educational licence arrangement.
Authorised Use
In these regulations "authorised use" is defined as:
1
(for students) use properly associated with the UCL programme of study or course for which a student is registered;
2
(for UCLU societies) use properly associated with UCLU society activities;
3
(for employees) use in the course of or properly associated with their employment
4
(for honorary staff) use properly associated with their appointment;
5
(for users who are neither staff nor students) use restricted to those purposes specified in the case made for registration.
6
network monitoring, interception and probing carried out by UCL-CERT, persons authorised by the Director of IS or
(in the case of Departmental LANs) persons authorised by the Head of Department.
Any use that falls outside these definitions is not authorised, is prohibited and will constitute a disciplinary offence under the
appropriate staff or student disciplinary procedure and / or result in the suspension of access to the facilities.
Further information about authorised use is contained in the guidelines below.
Regulations
C&IT users must:
1.
respect the copyright of all materials and software that are made available by UCL service providers and third parties
for authorised use;
Users must abide by the CHEST Code Of Conduct For The Use Of Software Or Datasets (see
http://www.chest.ac.uk/conduct.html) and Copyright Law (Copyright Act 1956 and Copyright, Designs and Patents Act
1988). In particular users must not make, run or use unicensed copies of software or data;
2.
familiarise themselves with and comply with the requirements of the Data Protection Act. Further information is set out
in the appropriate Staff or Student Handbook. More detail can be obtained from UCL's Data Protection Officer, Mrs.
Rosamund Cummings, Records Office, Central Services; extension 7783; or email: rhc@central-services.ucl.ac.uk
UCL is registered with the UK Data Protection authorities. Data Projection laws protect individuals against the
unauthorised use or disclosure of their data. The misuse or disclosure of an individual's data outside UCL's registration
may amount to a criminal offence, UCL may regard non-observance of Data Protection Laws as a disciplinary offence.
3.
comply with the Computer Misuse Act of August 1990 which makes activities such as hacking or the deliberate
introduction of viruses a criminal offence;
Hacking is defined as unauthorised access to a computer system (locally or through a network) for the purpose of
obtaining another’s identifier and password, or using resources that have not been allocated, with intent to modify or
damage another’s files or systems files, or to obtain or alter financial or administrative records, or to facilitate the
commission of a serious crime.
4.
comply with the Criminal Justice Act 1994 amendment to the Obscene Publications Act under which it a criminal
offence to create, store, download or transmit obscene material;
5.
inform their Head of Department in writing where activities which might be subject to legislation (such as the Criminal
Justice Act 1994 amendment to the Obscene Publications Act) are carried out in pursuit of legitimate, approved
academic research.
6.
comply with local arrangements for booking public clusters and machines in public clusters.
C&IT users must not:
7.
use material or programs in such a way as to contravene the law;
8.
use the facilities in such a way as to risk or to cause loss, damage or destruction of data or breaches of confidentiality of
data;
IS undertakes to provide appropriate security measures to limit the likelihood of such occurrences on centrally
managed systems. IS cannot give any warranty or undertaking about the integrity of information.
9.
jeopardise the provision of services (for example by using resources for recreational purposes or by inappropriate use of
bulk email);
10.
use the facilities in such a way that brings or could bring UCL into disrepute;
Users will be held personally liable and may be subject to disciplinary proceedings, for example for issuing false or
libellous statements or for breaching the copyright of others.
11.
allow their account to be used by others, or disclose passwords to others, or use accounts or passwords belonging to
others;
12.
do or fail to do anything which has the result of introducing any virus, worm, Trojan Horse or other harmful program to
any computer, file or software on the system (this obligation includes doing anything to circumvent any firewall or
software designed to protect systems against harm);
13.
interfere or attempt to interfere with or destroy systems or software set up on public facilities (this obligation includes
loading or attempting to load unauthorised software on centrally and / or departmentally managed systems and servers);
14.
interfere with, disconnect, damage or remove without authority any equipment made available for use in conjunction
with any UCL C&IT facilities;
15.
smoke, eat or drink in public cluster rooms;
16.
interrupt teaching sessions when a cluster room has been booked for this purpose;
17.
use UCL equipment to carry out unauthorised actions at other institutions or organisations;
18.
set up equipment to provide services that they are not competent to administer, especially if such services result in
security vulnerability or exposure to misuse.
Procedure
1.
In the event of suspected misuse of C&IT facilities UCL reserves the right to suspend user accounts and to inspect,
copy, retain and modify users' files if necessary. UCL may also disconnect network services, including those to rooms
in Halls of Residence and prevent access to the facilities without notice while investigations proceed.
2.
Cases of misuse or abuse should be reported to, and will be taken up in the first instance by the appropriate authority
shown below.
Misuse by:
Report in the first instance to:
Students using centrally managed
IS facilities
EISD Information Systems, User Support Group Manager or IS Director
Staff using centrally managed
MSD facilities
Director of MSD
Students using Royal Free
Campus managed facilities
Head of the Centre for Computing Services
Students using locally managed
departmental facilities
Head of Department or local computer manager
Staff
Head of Department, Dean or Vice-Provost as appropriate
Anyone not included in the
categories above
EISD Information Systems, User Support Group Manager or IS Director
3.
The Head of Department and UCL authorities, including the Dean of Students where appropriate, may be informed and
will deal with the incident under the appropriate disciplinary procedures for students and staff. In some cases legal
action may be taken and the Police informed. UCL reserves the right to disclose data or information about a user's use
of UCL's computing facilities to any appropriate or authorised third party (including the police) to assist in any further
investigation.
4.
If sites containing material that may be illegal are discovered, particularly material relating to children or the
exploitation of children, UCL encourages its staff and students to make a report to the authorities named above or to the
Internet Watch Foundation (IWF) hotline (http://www.iwf.org.uk). The normal course of events is that the IWF will
request that the Internet Service Providers (ISPs) in the UK will block that site. If this does not happen the IWF will
inform the Police who may investigate the matter further.
Guidelines and Further Information
General
The enrolment form signed by students explicitly binds them to abide by UCL Regulations, of which these form a part. These
regulations also form a part of the conditions of employment for UCL staff. Users of C&IT services who are neither staff nor
students are required to complete a registration form which binds them to abide by these regulations.
In all cases the act of registering as a user of the Information Systems facilities or making use of any of the C&IT facilities
implies acceptance of the conditions of use given below and compliance with these regulations, relevant Acts of Parliament
and European Community law or directives.
Throughout this document reference is made to EISD Information Systems as the service provider. In general (and unless
stated otherwise by local regulations) similar conditions will apply to Departmental or Faculty-based C&IT services.
Since most computers in UCL are connected to and make use of the UCL network managed by EISD IS, UCL may require IS
to take action to withdraw facilities when misuse is suspected.
From time to time UCL may issue good practice guidelines and reserves the right to withdraw network services to systems or
services that are not operated in accordance with those guidelines.
UKERNA Acceptable Use Policy
The Government funds the network (known as JANET, the Joint Academic Network) that provides network connection
between Universities and Colleges and on to the Internet.
All organisations connected to JANET must comply with its Acceptable Use Policy. UCL Computing Regulations implement
this policy locally. Full details of this policy and other JANET service documents can be found at:
http://www.ja.net/documents.
The Law
There are various national and European Community laws and directives that govern the use of C&IT, others make explicit
reference to C&IT. These are mentioned in the section on regulations above. UCL has a duty to bring these to the attention of
its staff and students.
Conditions of Use
Use of UCL C&IT facilities is subject to the following conditions of use. These may vary for locally managed systems. It is the
responsibility of those managing these systems to make their users aware of the local conditions of use.
1.
The facilities (including software) are provided entirely at the risk of the user. UCL will not be liable for loss (including
any loss of software, data or other computer functionality or any economic, consequential or indirect loss), damage
(including damage to hardware, software or data) or inconvenience arising directly or indirectly from the use of the
facilities, except where statutory health or safety matters are involved.
2.
UCL reserves the right to inspect, copy, modify and/or retain user data in order to investigate operational problems or
for the detection and investigation of suspected misuse. This includes the authorised inter-ception of traffic on College
networks.
3.
UCL accepts no liability for any loss (including any loss of software, data or other computer functionality or any
economic, consequential or indirect loss), or damage (including damage to hardware, software or data or the
invalidation of any warranty agreement) to equipment not owned by UCL as a consequence of any work carried out on
such equipment by members of staff (or students acting in the capacity of members of staff), whether authorised or not.
4.
UCL accepts no liability for any loss (including any loss of software, data or other computer functionality or any
economic, consequential or indirect loss), or damage (including damage to hardware, software or data or invalidation of
any warranty agreement) to equipment not owned by UCL as a consequence of direct or indirect connection, whether
authorised or not, to UCL networks. The user shall indemnify UCL for any loss or damage, whether direct or indirect,
suffered or incurred as a consequence of the interconnection of any hardware or software not owned by or under the
control of UCL with any IT system, hardware, software or data owned or controlled by UCL.
5.
UCL reserves the right to scan for insecure and vulnerable systems and to block access to systems and/or services
(ports) which place at risk the integrity of its network and services or which are being used to attack third parties.
6.
UCL reserves the right to disconnect poorly managed equipment from the departmental LAN, or in extreme cases
disconnect the departmental LAN from the UCL network until the offending machine is disconnected or shown to be
working correctly.
This document is based on the 4th revision of the document published in October 2000 by Information Systems
www.ucl.ac.uk/is.
Download