Council approved a revised Regulation concerning Information Technology (IT) on 18 December 2001. It applies to all staff, students and visitors. Breach of the Regulation may lead to disciplinary action.The following notes relate to the general use of IT and telephone facilities, to some of the relevant Acts of Parliament, and to the JANET Acceptable Use Policy.
The notes are meant for guidance; they do not describe the legislation in full, or amount to legal advice. Other Acts of Parliament may also be relevant to users of IT facilities and it is the responsibility of users to ensure that they are complying with the law. The College's general regulations, procedures and codes of conduct and student discipline also apply in the use of IT facilities.
General use of IT facilities
Network and monitoring
Data Protection
Copyright
Computer Misuse
JANET acceptable use policy
College Web Policy
The Regulation states that “The information technology resources provided by the College are for use in connection with the work of the College”. This includes:
Charges may apply in respect of any personal use.
The following are expressly forbidden and will, if detected, lead to disciplinary proceedings:
Staff and students should only connect to network/telephone points that have been installed and enabled for use on the authority of a Head of Department. The College routinely monitors and analyses electronic communications traffic for such purposes as improving performance of the network, predicting trends, optimising computer systems and investigating faults and anomalous functioning. Accordingly it keeps a temporary log of such communications activity within the College and between the College and external hosts. The College will act in accordance with the Regulation of Investigatory Powers Act 2000. The College will only monitor the content of this activity if prima facie evidence of a breach in the IT Regulation exists.
Similarly the College will only search the content of the data files of staff and students if a prima facie breach of the IT Regulation exists, or if necessary during the investigation of a fault or anomalous functioning of the network or computer systems. On suspicion of a breach of the Regulation the College reserves the right to remove or delete offending files, to impound a computer workstation or fileserver for investigation, and to suspend the person’s access to some or all of the IT facilities. Users should be aware that College staff have to investigate breaches of law or regulation howsoever such breaches become apparent.
Anyone processing personal data must comply with the eight enforceable principles of good practice of the Data Protection Act 1998. These require that data must be:
The College has notified the Information Commissioner of the purposes for which it holds personal data. The College's entry on the register may be seen on the web at: https://ico.org.uk. For further information about data protection contact the College's Records & Information Compliance Manager, tel. +44(0) 20 7882 7596 (or 13 7596 internal), email data-protection@qmul.ac.uk.
Members of College may only use software that is properly licensed.
Nearly all software, databases and datasets are protected by copyright and must not be altered, copied or part-copied unless there is clear permission to do so; illegal copying can constitute a criminal offence.Heads of Departments are responsible for ensuring that all software on departmental computers is properly licensed. A software audit must be carried out by departments at least annually. Some software is deemed to be 'in the public domain'. In such cases software may be copied without authorisation but great care must be exercised in adhering to the terms under which copying is permitted. Much of the information available via the Web or from other sources is copyright and should not be copied without permission.
Under the Computer Misuse Act 1990 it is a criminal offence to use a computer to access any computer systems, program or data which you are not authorised to access. ‘Hacking’ is a criminal offence and there are severe penalties for those convicted.Systems software may be copied or altered only by authorised staff of the College.Data or programs belonging to another user may not be copied or altered without permission.Use of another person’s identity or password is not permitted - even if the identity or password has been voluntarily passed on.Attempts to guess another user’s password will be interpreted as contravention of the College’s IT regulation.In College, computer accounts are to be used only by those registered to use them and authorised systems staff. It is a contravention of the Regulation to permit use by others.
JANET, the Joint Academic Network, is a network funded by the higher education funding councils that interconnects all UK higher education institutions. JANET is maintained to support teaching, learning and research. JANET may be used for any legal activity that is in furtherance of the aims and policies of the College.
The JANET acceptable use policy that is given below applies to use of JANET itself. Members of the College are also required to observe it when using the College's IT facilities and network.JANET may not be used for any of the following:
It is not permitted to provide access to JANET for third parties without the prior agreement of the College.
The College's Web Policy is published as a separate document: Web Policy [PDF 316KB].