Rules for computer use Computer Misuse



Download 205,36 Kb.
bet2/2
Sana08.01.2020
Hajmi205,36 Kb.
#32642
1   2
Bog'liq
Rules for computer use

Software Rules

The Software supplied by the Department, and computer-readable databases made available over the network, may be used subject to relevant licence agreements. The specific licences applying to individual items of software and data are available on request.



Policies agreed by the Physics department Computing committee

  • The department has developed standardised managed, desktop systems for Windows, OSX and Linux with the expectation that these will meet the needs of the vast majority of Physics staff. Use of these systems ensures users can be well supported, the network and other shared resources are protected and reliable and that systems are compliant with licensing and copyright laws. Where users can demonstrate that their needs cannot be met by these offerings they should discuss the situation with IT support who will suggest an appropriate solution. In cases where other solutions are unworkable, the user may be given the right to manage a system themselves. [PMC approved Jan 2013]

  • Users must consult a member of IT support staff before reloading their allocated desktop or laptop system.

  • Users are not allowed to manually set the network address of any system unless permission is given by a member of ITSUPPORT.

  • Users should not normally run as administrator unless required by specific applications. In particular, general web browsing as an administrator must be avoided.

  • Certain applications may be disallowed on managed desktops when it is clear that they pose a risk to the network through security problems (such as difficulty in patching poorly written applications via central procedures). Currently, real player is the only example. Alternatives will be made available.

  • The storage, duplication, sending or receiving of software which has the sole purpose to violate copyright or software licensing is forbidden. Examples of this are (but not limited to) Keygens or software cracks.

  • The storage, duplication, sending or receiving of any software or data that violates copyright or intellectual property is forbidden.

  • End users must be able to prove ownership of any software which has been purchased privately and then installed on departmental or university equipment. If software has been purchased privately, the user must keep some form of receipt or original licensing/activation information and produce on request.



Combined Higher Education Software Team (CHEST).

In general, all software and data use is subject to the Code of Conduct produced by the CHEST. The full Code of Conduct relating to the use of software or computer readable data provided through CHEST deals is available for inspection in the Help Area at CHEST.



Excerpts from the Proctors' Memorandum Computer Misuse

The University regards computer misuse as a serious matter, which may warrant disciplinary action.

Use of computing equipment and computer software owned and/or controlled by the University (including computer networks and systems accessed via the network) is permitted for bona fide purposes subjected to the necessary authorisation. Use of such equipment, which has not been authorised, explicitly or implicitly, may lead to proceedings under the University's disciplinary procedures. The University reserves the right forthwith to withdraw the permission to use such equipment pending investigation of allegations of unauthorised use.

Unauthorised use of computing equipment may also give rise to legal proceedings under the provisions of the Computer Misuse Act 1990.

Explicit authorisation will normally, in the case of multi-user facilities, involve the assignment of a username and password for the purpose in question. In the case of smaller-scale facilities, such as a departmental micro-computer system open to general use, less formal authorisation procedures will often be appropriate.

Examples of implicit authorisation include services which are advertised by the University as being freely available, e.g. currently the LIBRARY and INFO Services on the University Data Network, or usernames on password-protected systems for which the password is openly published for use within the University. Implicit authorisation to use facilities not controlled by the University should not be assumed, as responsibility for regulating the use of such facilities lies within the organisations concerned.



Data Protection Act 1998

Any member of the Department holding or intending to keep personal data of any kind on a computer must comply with the provisions of the Data Protection Act.
Download 205,36 Kb.

Do'stlaringiz bilan baham:
1   2




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©www.hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish