IT Handbook | Page 21

6 Infrastructure 9 Monitoring • Damaging, reconfiguring or moving equipment • The effective and efficient planning and operation of the IT facilities • Loading software on the University’s equipment other than in approved circumstances • Detection and prevention of infringement of these regulations • Reconfiguring or connecting equipment to the network other than by approved methods • Investigation of alleged misconduct You must not do anything to jeopardise the integrity of the IT infrastructure by, for example, doing any of the following without approval: • Setting up servers or services on the network • Deliberately or recklessly introducing malware • Attempting to disrupt or circumvent IT security measures 7 Information If you handle personal, confidential or sensitive information, you must take all reasonable steps to safeguard it and must observe Keele University’s Data Protection and Information Security policies and guidance, available at keele.ac.uk/dpa, particularly with regard to removable media, cloud services, mobile and privately owned devices. You must not infringe copyright, or break the terms of licences for software or other material. You must not attempt to access, delete, modify or disclose information belonging to other people without their permission, or explicit approval from the Director. You must not create, download, store or transmit unlawful material, or material that is indecent, offensive, threatening or discriminatory. The University has procedures to approve and manage valid activities involving such material available at keele.ac.uk/ researchsupport/researchethics and these must be observed. The University’s publication scheme is at keele.ac.uk/ paa/governance/publicationscheme. You must abide by this scheme when publishing information. 8 Behaviour Standards of behaviour expected in the physical world apply online and on social networking platforms, such as Facebook, Blogger and Twitter. You must not cause needless offence, concern or annoyance to others. You should also adhere to the University’s guidelines on social media. You must not send spam (unsolicited bulk email). You must not deliberately or recklessly consume excessive IT resources such as processing power or network bandwidth. The University monitors and records the use of its IT facilities for the purposes of: The University will comply with lawful requests for information from government and law enforcement agencies. You must not attempt to monitor the use of the IT facilities without explicit authority – see keele.ac.uk/it/policiesandprocedures 10 Infringement Infringing these regulations may result in sanctions. Penalties may include withdrawal of services and/or fines. Offending material will be taken down. Information about infringement may be passed to appropriate law enforcement agencies, and any other organisations whose regulations you have breached. Keele University reserves the right to recover from you any costs incurred as a result of your infringement. You must inform the Director if you become aware of any infringement of these regulations. 11 Liability The University has no obligation to retain a user’s IT resources after their authorisation has ended. The University will not accept any liability for loss or co