The acceptable use policy (AUP) stipulates constraints and practices that a user must agree to before they access the Edge Hill network. All employees or students should read the acceptable use policy before being granted access to the network.
The following provides a brief summary of the main points of the University IT Regulations and IT Acceptable Use Policy. You are expected to be familiar with the full regulations.
IT Governance – Don’t break the law, do abide by the University IT regulations and policies, and do observe the regulations of any third parties whose facilities you access. IT Identity – Don’t allow anyone else to use your IT credentials, don’t disguise your online identity and don’t attempt to obtain or use anyone else’s. IT Infrastructure – Don’t put the institution’s IT facilities at risk by introducing malware, interfering with hardware or loading unauthorised software. IT Information Safeguard personal data, respect other people’s information and don’t abuse copyright material. Remember that mobile devices may not be a secure way to handle information. IT Behaviour Don’t waste IT resources, interfere with others’ legitimate use or behave towards others in a way that would not be acceptable in the physical world.
|Document Title||Acceptable Use Policy|
|Document Owner||IT Services|
|Approved By||Information Strategy Group|
|Date of Publication||October 2018|
|Date for Review||June 2019|