The acceptable use policy (AUP) stipulates constraints and practices that a user must agree to before they access the Edge Hill network. All employees or students should read the acceptable use policy before being granted access to the network.
From: | IT Services |
---|---|
Part of: |
Academic Policies |
Detail
The following provides a brief summary of the main points of the University IT Regulations and IT Acceptable Use Policy. You are expected to be familiar with the full regulations.
IT Governance – Don’t break the law, do abide by the University IT regulations and policies, and do observe the regulations of any third parties whose facilities you access.
IT Identity – Don’t allow anyone else to use your IT credentials, don’t disguise your online identity and don’t attempt to obtain or use anyone else’s.
IT Infrastructure – Don’t put the institution’s IT facilities at risk by introducing malware, interfering with hardware or loading unauthorised software.
IT Information – Safeguard personal data, respect other people’s information and don’t abuse copyright material. Remember that mobile devices may not be a secure way to handle information.
IT Behaviour – Don’t waste IT resources, interfere with others’ legitimate use or behave towards others in a way that would not be acceptable in the physical world.
Document Title | Acceptable Use Policy |
---|---|
Document Owner | IT Services |
Approved By | Information Strategy Group |
Date of Publication | June 2020 |
Date for Review | June 2021 |