6 Infrastructure
9 Monitoring
• Damaging, reconfiguring or moving equipment
• The effective and efficient planning and operation
of the IT facilities
• Loading software on the University’s equipment
other than in approved circumstances
• Detection and prevention of infringement
of these regulations
• Reconfiguring or connecting equipment to the
network other than by approved methods
• Investigation of alleged misconduct
You must not do anything to jeopardise the integrity
of the IT infrastructure by, for example, doing any of
the following without approval:
• Setting up servers or services on the network
• Deliberately or recklessly introducing malware
• Attempting to disrupt or circumvent
IT security measures
7 Information
If you handle personal, confidential or sensitive
information, you must take all reasonable steps to
safeguard it and must observe Keele University’s
Data Protection and Information Security policies
and guidance, available at keele.ac.uk/dpa, particularly
with regard to removable media, cloud services, mobile
and privately owned devices.
You must not infringe copyright, or break the terms
of licences for software or other material.
You must not attempt to access, delete, modify or
disclose information belonging to other people without
their permission, or explicit approval from the Director.
You must not create, download, store or transmit
unlawful material, or material that is indecent, offensive,
threatening or discriminatory. The University has
procedures to approve and manage valid activities
involving such material available at keele.ac.uk/
researchsupport/researchethics and these must
be observed.
The University’s publication scheme is at keele.ac.uk/
paa/governance/publicationscheme. You must abide
by this scheme when publishing information.
8 Behaviour
Standards of behaviour expected in the physical
world apply online and on social networking platforms,
such as Facebook, Blogger and Twitter.
You must not cause needless offence, concern
or annoyance to others.
You should also adhere to the University’s guidelines
on social media.
You must not send spam (unsolicited bulk email).
You must not deliberately or recklessly consume
excessive IT resources such as processing power
or network bandwidth.
The University monitors and records the use
of its IT facilities for the purposes of:
The University will comply with lawful requests
for information from government and law
enforcement agencies.
You must not attempt to monitor the use of
the IT facilities without explicit authority –
see keele.ac.uk/it/policiesandprocedures
10 Infringement
Infringing these regulations may result in sanctions.
Penalties may include withdrawal of services
and/or fines.
Offending material will be taken down.
Information about infringement may be passed to
appropriate law enforcement agencies, and any other
organisations whose regulations you have breached.
Keele University reserves the right to recover from you
any costs incurred as a result of your infringement.
You must inform the Director if you become aware
of any infringement of these regulations.
11 Liability
The University has no obligation to retain a user’s IT
resources after their authorisation has ended.
The University will not accept any liability for loss or
co