Acceptable Use of IT Policy
Queen Margaret University provides its users with access to state-of-the-art Information and Communication Technology (ICT) equipment and a wide range of electronic resources. All users need to be aware of what constitutes the Acceptable Use of these resources to enable them to be used in a safe and secure manner. This page outlines the policies relating to both ICT and e-resources and facilities.
For all our users; staff, students, visitors and any others, using our technology infrastructure constitutes an undertaking to abide by this acceptable use policy and the legal requirements implicit and explicitly contained within.
For the purposes of this policy, designations include staff and students at collaborative partners. You are reminded that accessing 草莓社区 ICT systems and resources via the Remote Desktop service you are bound by the laws and regulations in the UK as well as any applicable laws in the country from which you are connecting.
1. Purpose
The purpose of an Acceptable Use Policy is to ensure the proper use of all the University鈥檚 ICT facilities and resources.
Access to the University鈥檚 ICT facilities and resources requires users to accept certain responsibilities and obligations. All users must be aware of and comply with the JANET Acceptable Use Policy, which covers all UK HE academic and research network activity.
Use of IT and associated resources should always be legal and ethical and reflect academic integrity and the standards of the University community.
2. Authorisation
In order to use the ICT facilities in the University you must first be authorised. For students, this will require your matriculation number and password, which are distributed at matriculation. Staff will receive a confidential mailing containing notification of their username and password. Your matriculation number/username and password is for the exclusive use of the individual to whom they are allocated. You are responsible and accountable for all activities carried out under your matriculation number/username and password.
3. Privacy
It should be noted that systems staff, who have appropriate privileges, have the ability, which is occasionally required, to access all files, including electronic mail files, stored on a computer which they manage. It is also occasionally necessary to intercept network traffic. In such circumstances, appropriately privileged staff will take all reasonable steps to ensure the privacy of service users. The University fully reserves the right to monitor e-mail, telephone and any other electronically-mediated communications, whether stored or in transit, in line with its rights under the Regulation of Investigatory Powers Act 2000. Reasons for such monitoring may include the need to:
- ensure operational effectiveness of services
- prevent a breach of the law, this policy, or other University policy
- investigate a suspected breach of the law, this policy, or other University policy
- monitor standards
Access to staff files, including electronic mail files, will not normally be given to another member of staff, unless authorised by the appropriate line manager, Head of IT Services, or nominee, who will use their discretion, in consultation with a senior officer of the University, if appropriate. In such circumstances, the Head of Division, or more senior line manager, will be informed and will normally be consulted prior to action being taken. Such access will normally only be granted in the following circumstances:
- where a breach of the law or a serious breach of this or another University policy is suspected
- when a documented and lawful request from a law enforcement agency such as the police or security services has been received
- on request from the relevant Head of Division, where the managers or co-workers of the individual require access to e-mail messages or files, which are records of a University activity and the individual is unable, e.g. through absence, to provide them
The University sees student privacy as desirable but not as an absolute right, hence students should not expect to hold or pass information, which they would not wish to be seen by members of staff responsible for their academic work. In addition to when a breach of the law or of this policy is suspected, or when a documented and lawful request from a law enforcement agency such as the police or security services has been received, systems staff are also authorised to release the contents of a student's files, including electronic mail files, when required to by any member of staff who has a direct academic work-based reason for requiring such access.
After a student or member of staff leaves the University, files which are left behind on any computer system owned by the University, including servers and including electronic mail files, will be considered to be the property of the University. When leaving the University, staff should make arrangements to transfer to colleagues any e-mail or other computer-based information held under their account, as this will be closed on their departure.
4. Acceptable Use of ICT
University ICT and electronic resources are provided to facilitate your work as a member of the University community, specifically for educational, training, research or administrative purposes. Any other uses are a privilege and not a right and must never take priority over the needs of those who require the facilities for directed academic work.
The University does not block or filter keywords or search terms, nor does it prevent you from accessing specific sites. That does not mean however, that you can access or download pornographic or other offensive or objectionable material.
You should bear the following in mind:
- You must not share your 草莓社区 username and password with anyone else. This will result in your account being disabled immediately. For students, if your account has been disabled then you must appeal for its reinstatement. This must be done in the first instance to your Dean of School. There is no automatic reinstatement. Staff should contact Assist helpdesk
- You must never use University ICT systems to alarm or inconvenience others
- You must not display anything on your screen which is likely to cause offence or upset other users. However, it is recognised that sometimes it is necessary to display material which is medical in nature, in relation to some programmes/modules
- You must respect other people鈥檚 electronic privacy. In particular, you may not use your 草莓社区 accounts to distribute spam and other chain emails
- For your own security, you should be careful who you share your 草莓社区 email and other contact details with
- You must never pass off other people鈥檚 work as your own. The University produces a guide to referencing, 鈥淲rite and Cite鈥 which is available online
- You should not use data which is confidential or not already in the public domain in your work without first consulting the author; there may be copyright or data protection implications
- You must not maliciously damage or interfere with any item of hardware
Anyone found abusing 草莓社区 ICT systems will usually be cautioned in the first instance. Continued abuse will lead to your account being disabled. This means that you will be unable to access any of the networking and communications services. In cases of serious abuse, your account will be disabled immediately. Serious abuse includes the sharing of your username and password.
5. Forms of Acceptable Activities
Unacceptable activities can take a variety of forms. Some examples of behaviour which is unacceptable are listed below:
- Transmitting or downloading obscene or offensive material
- Transmitting or downloading threatening material, or material intended to harass or frighten
- Transmitting or downloading defamatory material
- Infringing copyright (see below)
- Hacking, attempted hacking or other deliberately disruptive activities such as introducing viruses to computer equipment
Sending a bulk email to everyone in the University - Interfering with hardware or software configurations
- Installing or attempting to install unauthorised software to 草莓社区 ICT equipment
- Adding software to University computer equipment
- The use of 草莓社区 ICT services and equipment to distribute unsolicited advertising (spam), to run a business or similar activities
- Downloading or distributing pirated software or data;
- Viewing or hosting of any illegal streaming content.
- Any other activities that disrupt 草莓社区 ICT services
6. Counter Terrorism and Security Act 2015
All users are advised that the University has a statutory obligation under the Counter-Terrorism and Security Act (2015) to have 鈥榙ue regard to the need to prevent people being drawn into terrorism鈥.
The Terrorism Act (2000) makes it an offence for an individual to collect or make a record of information of a kind likely to be useful to a person committing or preparing an act of terrorism; or to possess a document or record containing information of that kind (e.g. a terrorist training manual). The Terrorism Act (2006) makes it an offence to disseminate terrorist publications in order to encourage others to engage in terrorism.
The Terrorism Act (2000) defines terrorism .
7. Use of copyright software or datasets
By accessing 草莓社区 ICT systems, you also agree to the following with regard to copyright:
That usage of any Software, Computer Readable Dataset or Courseware or other similar material, hereafter referred to as "the Product", issued or otherwise made available is subject to the following conditions:
- You will ensure that all the requirements of the agreements, contracts and licences under which the Product is held by the Institution will be maintained. (Copies of the relevant agreements, contracts and licences may be seen by application to the School or Department which made the Product available)
- You will adhere to the regulations governing the use of any service involved in the provision of access to the product whether these services are controlled by this institution or by some other organisation
You will not remove or alter the Copyright Statement on any copies of the Product used by yourself - You will ensure the Security and Confidentiality of any copy released to yourself and will not make any further copies from it or knowingly permit others to do so, unless permitted to do so under the relevant licence
- You will use the Product only for purposes defined and only on computer systems covered by the agreement, contract or licence
- You will only incorporate the Product, or part thereof, in any work, program or article produced by yourself, where this is permitted by the licence or by "Fair Dealing"
- You will only incorporate some part or version of the Product in any work produced by yourself with the express permission of the Licensor or unless this is permitted under the Agreement
- You will not reverse engineer or decompile the software products or attempt to do so, unless this is explicitly permitted within the terms of the Agreement for the use of the Product
- You will return or destroy all copies of the Product at the end of the programme/year/period of employment or when requested to do so.
8. Legal constraints
- You must adhere at all times to appropriate statutory law such as the Computer Misuse Act 1990, Defamation Act 1996 and the General Data Protection Regulations and not commit the common law crimes of theft, reset or fraud.
- You should be aware that the makes it an offence for an individual to collect or make a record of information of a kind likely to be useful to a person committing or preparing an act of terrorism; or to possess a document or record containing information of that kind (e.g. a terrorist training manual).
- You must undertake to comply with the Copyright Designs and Patents Act 1988 and the provisions of the University鈥檚 licence with the Copyright Licensing Agency and with any other applicable legislation, statutory instrument or regulation
- You should always consider the provisions of the General Data Protection Regulations when storing data on a computer. Please review the University鈥檚 Data Protection Policy 2018.
- You should be aware of the Regulation of Investigatory Powers Act 2000 when making use of ICT systems
- You must respect the intellectual property rights, copyright and moral rights of authors
You must undertake to abide by all licence agreements for software entered into by the University with other parties (see below) - You may only use software and/or information provided by the University for educational purposes as a member of the University
9. Code of Conduct when using our facilities
All users at 草莓社区 shall:
- Accept individual and collective responsibility for maintaining a healthy working, studying and living environment within the University, respecting the institution鈥檚 policies on equal opportunities and anti-harassment and ensuring that their conduct complies with these policies
- Accept individual and collective responsibility for keeping a clean and safe working and studying environment, ensuring personal guests act in an appropriate manner. Anything which you believe constitutes a health and safety hazard must be reported immediately to Reception
- Have a mutual respect for others especially with regard to differing cultures
- Have an individual and collective responsibility to contribute to a study environment that promotes scholarship and learning. All persons should be considerate of the needs of others for an appropriate study environment and share a common goal in learning
- Have an individual and collective responsibility to ensure that the safety of themselves and others is not compromised
- Ensure that their use of the computer systems and networks is always legal and ethical and reflects academic integrity and the standards of the University community
- Have an individual and collective responsibility to ensure respect for other people and property is maintained.
- Know that the use of mobile phones in lectures, seminars and computing laboratories is strictly prohibited. Mobile phones should be switched into silent mode before entering the secure area of the Learning Resource Centre.
- Know that the University will not tolerate antisocial behaviour: this includes the use of abusive language, physical abuse, obscene comments, verbal or physical harassment and comments or remarks that discriminate on the basis of sex, race or any other irrelevant distinction
10. Penalties for unacceptable use
Infringements of this Policy will be dealt with within the University鈥檚 normal disciplinary procedures 鈥 see the Student Regulations website for more information.
11. Using computers whilst on placement
Most placement organisations allow 草莓社区 users access to their ICT facilities. Make sure you know and respect their requirements on how you use their computers.
Know the rules
External organisations may have very different attitudes in the use of ICT. It is important, therefore, when you go out on a placement that you make it a priority to familiarise yourself with the local regulations. Before you go out on your placement, your academic supervisor will try to ensure that you get a copy of the organisation鈥檚 specific ICT usage regulations. When you get onsite, it is worthwhile going over these regulations with your placement supervisor. This will help you get a better understanding of what is permitted and what is not. You may also find it helpful to make contact with the local ICT support department or helpdesk. The staff there will be able to give you more help and advice.
Remember 鈥 all organisations have different regulations about what you can and cannot do with their ICT facilities. You must respect these when you are out on placement. It is your individual responsibility to familiarise yourself with the local regulations and to ensure that you do not abuse the ICT facilities offered to you when you are on placement. Any computer facilities offered to you whilst on placement will be provided for University work only, i.e. for use in learning, teaching and pursuit of studies. You must not abuse these facilities for any other purpose, e.g. to play computer games, for excessive social use of email, or for recreational internet use.
Keeping safe
If you are a Health Sciences student, your research will require internet searches based on anatomical words and phrases. This may generate unwanted links to pornographic or other objectionable websites. To be safe, read the site summary carefully before clicking on a link. If you are not sure, do not click through! Where possible, you should use specific health science related search engines.
What you should do if something unexpected happens
Even if you are careful, you may accidentally access internet sites you did not mean to. This might happen because you clicked on a misleading link, you clicked on a link by accident, or because a site has been 鈥榟ijacked鈥. You may also find that you get bombarded by unsolicited and explicit 鈥榩opup鈥 advertising. If any of these things happens whilst you are out on placement:
- Take a note of the URL (web address) of the site and the time you accessed it
- Tell someone immediately. If possible, show them what happened.
- If you are working in a public area, you may want to 鈥榣ock鈥 the PC before fetching help. (You can do this by pressing the CTRL-ALT-DEL keys at the same time, then clicking on Lock Computer. If you cannot lock the PC, then make sure you have the details of the site you accessed, then log off.)
- Tell your placement supervisor as soon as possible
- Tell local ICT staff (any alerts regarding inappropriate internet use will go to them first)
Tell your 草莓社区 supervisor to advise them of what has happened
There may be an investigation into your online activities, but if the accident was legitimate and these steps are followed, it will be resolved quickly.
12. Recording of lectures
草莓社区 recognises that from time to time students may wish to record lectures, seminars and tutorials for their own personal use to support their learning. As a matter of courtesy students should inform the lecturer prior to the commencement of the recording. If the student has not informed the lecturer, the lecturer may ask for the recording to be stopped.
However, students are reminded that:
- Distributing a recorded lecture/seminar/tutorial is an unacceptable activity. Students should always check with lecturers before distributing a recording; this includes distributing on the internet
- Editing a recorded lecture/seminar/tutorial is also an unacceptable activity. Students should always check with lecturers before changing a recording
13. Publishing to the Web
The University provides the opportunity to publish web pages within the qmu.ac.uk domain to:
- support research activity
- enhance teaching
- provide means of disseminating information about the University to its members, to potential staff and students and to the general public.
- allow individual users to provide non-academic information as part of the general process of learning through our use of Google sites and wikis
Guidelines
All information provided using our web facilities will be seen as having, in some way, the support of the University and will affect how people view the University. Therefore, no provider should publish any information in a way which could adversely affect the good name or reputation of the University, nor provide material which is inappropriate for dissemination by the University. Included in this is any material that could lead to legal action, such as alleged libel or a breach of copyright.
A disclaimer should also be included indicating that the University has no direct responsibility for the content and giving individual contact name and email address.
The information provided on this web page does not necessarily represent the views of Queen Margaret University, Edinburgh. The responsibility for all material in this page rests wholly on a personal basis with the owner of this page. The named owner of this page is responsible for liability for loss, liability for hypertext links, liability for defamation and for compliance with relevant acts of law.
The page is also subject to the University Acceptable Use Policy.
Google sites and wikis
All of the above Guidelines apply to the Google sites/wikis service, except that contributions will in this case always be at the page level with automatic attribution made to the author, such that no further use of the copyright symbol, linking to any Home Page, or disclaimer is necessary.
The service is offered to certain members of the University either as part of their learning, research or other use considered appropriate by the Head of Information and Learning Services.
All information published on our web pages is subject to our standard takedown policy whereby any report of issues with content will result in the page being removed immediately and subject to investigation.
Updated May 2018