IT Acceptable Use Policy

The acceptable use policy (AUP) stipulates constraints and practices that a user must agree to before they access the Edge Hill network. All employees or students should read the acceptable use policy before being granted access to the  network.

From:IT Services
Part of: Academic
Policies

Detail

The following provides a brief summary of the main points of the University IT Regulations and IT Acceptable Use Policy. You are expected to be familiar with the full regulations.
IT Governance – Don’t break the law, do abide by the University IT regulations and policies, and do observe the regulations of any third parties whose facilities you access. IT Identity – Don’t allow anyone else to use your IT credentials, don’t disguise your online identity and don’t attempt to obtain or use anyone else’s. IT Infrastructure – Don’t put the institution’s IT facilities at risk by introducing malware, interfering with hardware or loading unauthorised software. IT Information Safeguard personal data, respect other people’s information and don’t abuse copyright material. Remember that mobile devices may not be a secure way to handle information. IT Behaviour Don’t waste IT resources, interfere with others’ legitimate use or behave towards others in a way that would not be acceptable in the physical world.

Document TitleAcceptable Use Policy
Document Owner
Approved ByInformation Strategy Group
Date of Publication
Date for ReviewJune 2019

Updates

Expand all

6 June 2017

Review

14 October 2015

Reviewed and approved by Information Strategy Group
Posted on Last updated on Was this page helpful? Yes NoThanks for your feedback!Please tell us more:
Share