IT Acceptable Use Policy

The acceptable use policy (AUP) stipulates constraints and practices that a user must agree to before they access the Edge Hill network. All employees or students should read the acceptable use policy before being granted access to the  network.

From:IT Services
Part of: Academic
Policies

Detail

The following provides a brief summary of the main points of the University IT Regulations and IT Acceptable Use Policy. You are expected to be familiar with the full regulations.

IT Governance – Don’t break the law, do abide by the University IT regulations and policies, and do observe the regulations of any third parties whose facilities you access.

IT Identity – Don’t allow anyone else to use your IT credentials, don’t disguise your online identity and don’t attempt to obtain or use anyone else’s.

IT Infrastructure – Don’t put the institution’s IT facilities at risk by introducing malware, interfering with hardware or loading unauthorised software.

IT Information – Safeguard personal data, respect other people’s information and don’t abuse copyright material. Remember that mobile devices may not be a secure way to handle information.

IT Behaviour – Don’t waste IT resources, interfere with others’ legitimate use or behave towards others in a way that would not be acceptable in the physical world.

Document TitleAcceptable Use Policy
Document Owner
Approved ByInformation Strategy Group
Date of Publication
Date for ReviewJune 2019

Updates

Expand all

6 June 2017

Review

14 October 2015

Reviewed and approved by Information Strategy Group
Posted on Last updated on Was this page helpful? Yes NoThanks for your feedback!Please tell us more:
Share