Staff Regulations for the Use of University IT Facilities
Why do you need to know about this?
When using any University IT facility you are bound by the University’s IT Regulations, which outline your responsibilities when accessing and using University IT networks, systems and services. Note that the regulations still apply when you are using your own equipment to access the internet or any online services over the University network, as well as when using University equipment.
What do you need to do?
- Use the IT facilities to carry out your academic work and other normal University activity.
- Comply with the law, and with all applicable regulations and policies (see ‘Where to next’ below).
- Comply with the terms and conditions of any licences or end user agreements for any software or services that you use.
- Take measures to ensure the security of any IT equipment that you use.
- Make sure you log-off or lock any IT equipment you are using before leaving it unattended.
- Safeguard personal or commercially valuable information.
- Act with consideration for others when using University IT Facilities.
- Report any problems or incidents promptly, including any breach of regulations.
- Take note of the conditions relating to personal use of the IT facilities, including ensuring that personal emails sent or received using the University email system are clearly identified as private (for example in the subject line or by filing such emails in a folder marked 'private').
- Use the IT Facilities for any commercial purpose without authorisation.
- Allow anyone else to use your IT credentials (username and password), or attempt to obtain or use anyone else's.
- Put the institution's IT facilities at risk, for example by:
- Deliberately misusing, corrupting or breaking any IT services, equipment or software
- Visiting websites or opening attachments likely to introduce malware
- Attempting to disable security measures.
- Allow unauthorised users to access University IT Facilities.
- Make use of copyright material without permission or infringe the intellectual property rights of others.
- Access, create, download or circulate any material which is likely to cause offence or break the law. This includes pornographic material; it also includes material which may be subject to UK counter-terrorism legislation.
- Waste IT resources.
- Interfere with others’ legitimate use of IT Facilities.
- Act in a way that is likely to bring the University into disrepute.
Please contact the IT Service Desk (firstname.lastname@example.org / 0191 3341515) if you have any questions regarding the regulations or use of University IT; or if you need to report a problem or incident.
Please note that Durham University reserves the right to monitor and record the use of its IT Facilities as specified in the regulations.
Please note that breaches of the regulations will be taken seriously and may result in disciplinary action.
Where to next?
External regulations you need to comply with
If you use Durham University IT facilities to access a third party service or resource you are bound by any end user agreement or regulations associated with that service or resource. The association can be through something as simple as using your institutional username and password.
Very often, such regulations will be presented to you the first time you use the service, but in some cases the service is an integral part of University IT provision. Two instances of which you need to be aware are:
JANET – the network that connects all UK higher education and research institutions together and to the internet. When connecting to any site outside the University via the University's network you will be subject to JANET’s acceptable use policy (this is an external link)
Eduserv - an organisation that has negotiated many deals for software and online resources on behalf of the UK higher education community, under the common banner of Chest agreements. These agreements have certain restrictions that may be summarised as: non-academic use is not permitted; copyright must be respected; privileges granted under Chest agreements must not be passed on to third parties; and users must accept the User Acknowledgement of Third Party Rights (this is an external link)
University Regulations and policies
The IT Regulations are part of the General Regulations of the University. You can read the full set here: https://www.dur.ac.uk/university.calendar/volumei/general_regulations/
Other IT policies and codes of practice are available here: https://www.dur.ac.uk/cis/policy/