IT Acceptable Use Policy

The acceptable use policy (AUP) stipulates constraints and practices that a user must agree to before they access the Edge Hill network. All employees or students should read the acceptable use policy before being granted access to the  network.

From:IT Services
Part of: Academic
Policies

Detail

The following provides a brief summary of the main points of the University IT Regulations and IT Acceptable Use Policy. You are expected to be familiar with the full regulations.

IT Governance – Don’t break the law, do abide by the University IT regulations and policies, and do observe the regulations of any third parties whose facilities you access.

IT Identity – Don’t allow anyone else to use your IT credentials, don’t disguise your online identity and don’t attempt to obtain or use anyone else’s.

IT Infrastructure – Don’t put the institution’s IT facilities at risk by introducing malware, interfering with hardware or loading unauthorised software.

IT Information – Safeguard personal data, respect other people’s information and don’t abuse copyright material. Remember that mobile devices may not be a secure way to handle information.

IT Behaviour – Don’t waste IT resources, interfere with others’ legitimate use or behave towards others in a way that would not be acceptable in the physical world.

Document TitleAcceptable Use Policy
Document Owner
Approved ByInformation Strategy Group
Date of Publication
Date for ReviewJune 2021

Updates

Expand all

15 October 2020

6 May 2020

Reviewed and approved by Information Strategy Group

6 May 2020

Review
Posted on Last updated on Was this page helpful? Yes No Thanks for your feedback! Please tell us more:
Share