This page tells you about the rules that visitors and other temporary users must follow when using computers and/or systems owned or operated by the University of Leeds.
These rules apply to the use of computers and/or systems owned or operated by the University of Leeds by visitors and temporary users. In this document, the word system(s) means any computer or collection of computers, including printers, plotters, scanners and any equipment used to connect computers to each other or to any other network or equipment.
1. Access to University Systems
a. You may only use computing systems that have been made available to use temporarily or during your visit to the University.
b. On completion of your visit or temporary use you lose the right to use all computer systems and your username will lapse.
c. Your files will not be retained except for investigation/evidence purposes in cases of suspected misuse (see 3 below). Visitors wishing to retain data should make their own arrangements, using their own removable media.
2 Regulations & Acceptable Use
You must abide by any Codes of Practice and Guidelines relevant to the use of computers, software and networks that made available to you. Copies of these are displayed in the computer cluster. Of particular relevance to the use of networks and computer systems are the national JANET Acceptable Use Policy, the Universitys Use of Computer Systems Policy and the Universitys Code of Practice on Data Protection.
University systems must not be used in an illegal or malicious manner, including, but not exhaustively, the following activities, many of which could result in legal action or civil proceedings being mounted against the individual, the University, or both:
- the creation or transmission any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material;
- the creation or transmission of material which is designed or likely to cause annoyance, inconvenience or needless anxiety to a another;
- the creation or transmission of defamatory material or material that is libellous of any other persons or companys reputation, products or services;
- the transmission of material, including software, which infringes the copyright of another person or breaches confidentiality undertakings;
- attempting to gain deliberate access to facilities or services which you are not authorised to access;
- deliberately undertaking activities that corrupt or destroy other users' data; disrupt the work of other users, or deny network resources to them; violate the privacy of other users; waste staff effort or networked resources;
- transmitting unsolicited commercial or advertising material unless that material is part of a service to which recipients have chosen to subscribe;
- making commitments via email or the Internet on behalf of the University without full authority;
- undertaking any activities detrimental to the reputation or business interests of the University; or that further the interests of any non-University business enterprise, organisation or other non-University related cause, unless authorised by the University;
- deliberately visiting web sites or contributing to News Groups that advocate illegal activity;
- initiating or participating in the sending of chain letters, junk mail, spamming or other similar mailings.
If you inadvertently access an in appropriate Internet site must immediately use the back button on the browser to return to the previous page used or close the session.
3. Monitoring & Management of Facilities & Data
The University reserves the right to access and retrieve email or any other electronically stored or transmitted information if it is required as evidence in legal proceedings or where misuse has been reported. The University reserves the right to deploy software and systems that monitor, block and record all Internet access. Logs of computer system usage will be taken and may be scrutinised. These will be retained for periods appropriate for operational purposes.
The IT Director may immediately suspend access to the computing systems by any person suspected of contravention of any of these conditions. After enquiries, the Director ma y re-instate access or continue the suspension as appropriate.
5. Liability, Warranty and Related Matters
Whilst every reasonable endeavour is made to ensure that the computing systems are available as scheduled and function correctly, no liability whatsoever can be accepted by the University for any loss or delay as a result of any system malfunction. Whilst every reasonable endeavour is made to ensure the integrity of software products, the IT service does not offer any warranty on any software or its support and no liability can be accepted in consequence of any such product producing incorrect results or failing to work as documented. Whilst every reasonable endeavour is made to ensure the integrity and security of information held on computer media, no consequent liability can be accepted as a result of any such information being inadvertently lost, corrupted or inappropriately accessed Whilst every reasonable endeavour is made to ensure the accuracy of advice and information provided by the IT service, no liability can be accepted by the IT service for any consequential damages or losses arising from its use.
Anyone requiring an exemption from any of these conditions must request such an exemption in writing from the IT Director.