Beruflich Dokumente
Kultur Dokumente
subject to the "university regulations for the use of computers, and voice
and data communication networks" (as listed in the calendar). the preamble
to these regulations states that
"these regulations have the status of regulations for discipline which apply
to all members of the university. any breach of these regulations will
automatically be considered a breach of discipline. in this context 'members
of the university' encompasses all staff (including those holding honorary
appointments), students and accredited visitors."
disclaimer. the explanatory comments are provided for guidance only: they
are a personal interpretation of the relevant regulations and legislation.
this interpretation might not be shared by the university authorities in the
event of disciplinary proceedings.
i. university regulations
1. background
the use of computers is regulated by three acts of parliament - the data
protection act 1984, the copyright, designs and patents act 1988 and the
computer misuse act 1990. similarly the use of the public data telephone
networks is regulated by the telecommunications act 1984.
these and several other acts (including the obscene publications act 1978 as
amended by the criminal justice act 1994) identify a number of prohibited
actions related to the use of computers which, if proven in a court of law
may lead the perpetrator to a fine or imprisonment or both, or a suit for
damages in the civil courts. the following regulations are framed to remind
all members of the university of their legal obligations under these acts of
parliament. in addition, the use of computer software may also be subject to
the terms of licence agreements in which the university has entered and
which are enforceable by the licensor in the civil courts.
these regulations have the status of regulations for discipline which apply
to all members of the university. any breach of these regulations will
automatically be considered a breach of discipline. in this context `members
of the university' encompasses all staff, students and accredited visitors.
2. data protection
members of the university are allowed only to hold, obtain, disclose or
transfer personal data (as defined by the data protection act 1984) as
permitted by the university's current registration with the data protection
registry and in accordance with data protection principles as set out in
that act. if in doubt the university's data protection officer should be
consulted before any personal data is stored in a computer system.
3. copyright
members of the university will comply with the provisions of the copyright
designs and patents act 1988 (as amended) in relation to any computer
program or data set and shall not act in any way contrary to the terms of
any licence agreement applying there to.
[this is a formal way of saying "thou shalt not use pirated software". it is
an offence under this act to use unlicensed software: staff and students
must ensure that they have complied with the licensing requirements of any
software that they mount on a university or departmental computer system.
note also that copyright extends to data, and the act covers images and
other information published on the world wide web without the permission of
the copyright owner.]
4. computer misuse
iii) computing, data and voice communications resources may only be used by
the person to whom they are granted. members of the university may not lend
or give resources to any other person unless they are explicitly authorised
to do so by the responsible computing management.
[in particular, students do not have authority to grant anyone else access
to the facilities that they have been given, and if they do so they will be
held responsible for what that other person does.]
iv) members of the university may not access, alter, erase or add to
computer material which has not been generated by them unless they are
explicitly authorised to do so by the responsible computing management.
[this is the wording that appears in the calendar. in fact, the act makes it
an offence to attempt such actions]
vi) members of the university may not use computer systems or networks in
such a way as to compromise the integrity or performance of the systems or
networks.
ii) the university will hold the individual user personally liable for any
costs or claims which may arise from any use of university computing and/or
communications facilities, whether authorised or not by the responsible
computing management.
ii. departmental supplemental regulations
1. computer accounts
all staff and students are given a departmental computer account with a
unique login name and password. to be granted an account the user must be
present in the departmental staff/student database.
guests and bona fide visitors to the department may be granted a temporary
account. to enable such an account the guest or visitor must contact a
departmental academic sponsor who, with the approval of their head of group,
then completes and submits a guest account application form to the
department manager. the department manager will add the user to the ecs
staff/student database and pass the user details to the computer systems
account manager for the account to be made. the guest must sign the request
and agree to abide by the departmental and university regulations, as well
as any further regulations on the application form. the sponsor is
considered liable for the guest's actions.
2. the account and password
the following regulations apply to all departmental accounts:
(ii) a password is assigned by the computer systems account manager when the
account is created: the user must change this immediately.
(iii) a password may be changed by its owner but the new password must
conform to security measures in force at the time.
[currently these are that the password must be at least 6 characters, that
it must not be a dictionary word, name, telephone number, car registration
number or anything likely to be associated with its owner and it should not
consist solely of lower-case letters. when choosing a password, be sure to
select something that can be typed quickly, so that onlookers can not see
what it is.]
3. account access
(i) users must take reasonable steps to protect their own accounts from
access by others: the owner will be held responsible for any improper use.
in particular you must not allow any other person to login to your account.
[if you need to share access to files and data with another user you should
use e-mail. if you wish to allow more general sharing you can set general
read permission on the file(s).]
(iii) the head of department (or his/her nominee) or systems and networks
manager may authorise a member of system support staff to examine any file
(including the mail spool) if there is reason to believe that these
regulations are being contravened in any way.
(v) large files on the student disks which appear not to be part of
coursework assignments may be deleted at short notice to recover disk space.
(vi) some accounts may be issued with a disk quota limit. this quota may be
raised on application to the computer systems account manager.
4. use of the internet and the world wide web
(i) any reasonable use of the internet is permitted, although users should
bear in mind that the load placed on the network by excessive use (e.g.
downloading large graphics, video or audio files) will degrade its
performance for other users, not only in the department but also the
university and even on a national scale.
(iii) staff and students are allowed to maintain personal home pages on the
web, hosted on departmental systems.
(iv) students may not operate web servers on computers attached to the
departmental network (except for the 'cslib' server or approved final year
student projects).
(v) the departmental firewall restricts access to web servers from outside
ecs. any research groups or individual staff members who wish to operate a
web server on the departmental network must do so subject to the following
conditions:
a)all such servers must be registered. this is done via a request to the
systems and networks manager which should include the host name, the ip
address, the port on which the server listens, and a brief statement of the
purpose of the server and a summary of the content. approved web servers
will be enabled through the firewall.
[university regulation 5(ii) is relevant here. bear in mind that any web
material appearing within the ecs.soton.ac.uk domain is liable to influence
the image of the department and the university.]
ii) users are not permitted to interfere with any element of the trunking,
cabling, network equipment or office face plate of the data network without
the expressed agreement of the systems and networks manager or a member of
the systems support team. additional network cabling and/or active network
equipment may only be fitted by a member of the systems support team.
iii) any network device believed to be causing problems for other services
or users on the departmental network or the internet as a whole may be
disconnected without notice by the systems and networks manager or a
delegated member of the systems support staff.