Computing Regulations (Acceptable Use Policy)
The Computing Regulations are a series of rules that define what end users may or may not do with UCL provided technology, including potential consequences of violation.
Overview
The purpose of these regulations is to define what constitutes acceptable use; to encourage the responsible use of facilities; to maximize the availability of resources (equipment, infrastructure and staff) for legitimate purposes; and to minimise the risk of misuse. These regulations incorporate the acceptable use policy of our service provider, JISC (Joint Information Systems Committee), which manages network connections between Universities and Colleges and the Internet (the JANET Network). The full text of their policy can be found at: https://community.jisc.ac.uk/library/acceptable-use-policy.
Contents include
- Authorised Use
- Reasonable personal use is defined as incidental and occasional use which does not
- Regulations
- IT users must not
- Conditions of Use
- Procedures for dealing with misuse or suspected security violations
Who should read this policy
- All staff
- Contractors
- Temporary staff
- Students
- Visitors
- Managers
- Teaching staff
- Student support staff
- Researchers
Policy
https://www.ucl.ac.uk/information-security/sites/information-security/files/regulations.pdf
Last updated: Wednesday, January 18, 2017