Acceptable use policy for conference guests
The objective of this policy is to ensure that users of University computer hardware and software are compliant with the University's IT Conditions of Use, in particular but not limited to the Acceptable/Unacceptable Use of IT and to protect the integrity of IT Systems within Keele University.
For full details, please read the University IT Acceptable Use Policy before using University IT.
Acceptable Use
Authorised Users must conduct themselves honestly, respecting other users, observing copyright rules, software licensing rules, property rights and privacy of others. All existing University policies and Legislation apply to users' conduct whilst using the IT systems, especially harassment, misuse of resources, information and data security and confidentiality.
Users may access external IT systems from the University. They must abide by the regulations governing the use of these external facilities.
All software applications must be used in accordance with the license agreement.
Users are permitted to connect approved personal equipment to the network provided it is configured as specified by the University.
Unacceptable Use
IT systems must not be used for the following:
- To access, store, or transmit pornographic, discriminatory, defamatory, or offensive material, or undertake any transmission of information that contravenes University Regulations, policies, or current legislation.
- Running software to provide services to other users, including running a file server for use by a third party. This includes the use of filesharing or peer to peer software on University or personal equipment connected to the University network.
- The disclosure of usernames and passwords which are intended for sole use of the authorised user, to gain access to University facilities.
- The transmission or distribution of material such which infringes the copyright of another person or organisation including, but not limited to, computer software, music, videos, written text, or images.
- Deliberate activities which cause or potentially cause loss or reduction of service to other users, including but not exclusively:
- Corrupting or destroying data belonging to other users
- Violating the privacy of other users
- Disrupting the work of other users
- Using systems in a way that denies service to other users
- Introducing viruses, Trojan horses, worms, or similar
- Circumventing the effectiveness of installed security measures
- Connecting equipment to the network that causes a deterioration of service
- The transmission of unsolicited commercial or advertising material, unless the material is embedded within or is otherwise part of a service to which the user has chosen to subscribe.
- Personal use which inhibits the use of facilities for University purposes by others or which interferes with the performance of duties, education or training.