University of Southampton's acceptable use policy.
Read the University of Southampton's acceptable use policy below.
1. Background and Definitions
The University is an organisation authorised to use JANET (as defined below) and must ensure that it and its Users comply with JANET (UK)’s Terms and Conditions for the Provision of the JANET Service which includes the JANET Acceptable Use Policy.
“JANET” is the name given both to an electronic communications network and a collection of electronic communications networking services and facilities that support the requirements of the UK higher and further education and research community. JANET is managed by JANET (UK) on behalf of the Higher Education Funding Council for England and its partner funding bodies, via their Joint Information Systems Committee (the “JISC”).
This Acceptable Use Policy together with the University Network Terms set out what the University considers to be acceptable and prohibited uses of the University Network.
2. Consequences of Breach
Any breach of this Acceptable Use Policy by a User shall be considered a material breach of this Policy and the University Network Terms. The University may in its sole discretion, terminate a User’s right to use the University Network, withdraw or remove any material uploaded by that User in contravention of this Policy, where appropriate, disclose information to law enforcement agencies and take any legal action against a User for breach of this Policy, including but not limited to claiming all costs, fees and disbursements (including but not limited to legal fees) connected therewith. In addition, where the User is also a member of the University community, the University may take such action, disciplinary or otherwise as it deems appropriate and which is in accordance with its Charter, Statute, Ordinances and Regulations.
3. Acceptable Use
A User may use the University Network for any lawful activity which furthers the aims, policies and objectives of the University.
4. Unacceptable Use
4.1 The University Network may not be used directly or indirectly by a User for the creation or transmission of:
4.1.1 any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material;
4.1.2 material with the intent to cause annoyance, inconvenience or needless anxiety;
4.1.3 material which harasses, upsets or embarrasses a third party;
4.1.4 material which promotes discrimination on the basis of race, sex, religion or belief, disability, age or sexual orientation;
4.1.5 material with the intent to defraud or which is likely to deceive a third party;
4.1.6 material which advocates or promotes any unlawful act;
4.1.7 defamatory material; or
4.1.8 material that infringes the intellectual property rights or privacy rights of a third party or that is in breach of a legal duty owed to another party.
4.2 The University Network must not be used by a User for the creation or transmission of unsolicited bulk or marketing material.
4.3 The University Network must not be deliberately used by a User for activities having, or likely to have, any of the following characteristics:
4.4 The User must not use an item of networking software or hardware which has the effect of corrupting or destroying other Users' data, disrupting the work of other Users or the correct functioning of the University Network or denying University Network Services to other Users.
4.5 Any breach of industry good practice (as represented by the standards of the London Internet Exchange) that is likely to damage the reputation of the JANET network will also be regarded prima facie as unacceptable use of the University Network. Where the University Network is being used to access another network, any abuse of the acceptable use policy of that network will be regarded as unacceptable use of the University Network.
4.6 Users shall not:
4.6.1 introduce packet-sniffing or password-detecting software;
4.6.2 seek to gain access to restricted areas of the University’s Network;
4.6.3 access or try to access data which he or she knows or ought to know is confidential;
4.6.4 carry out any hacking activities; or
4.6.5 intentionally or recklessly introduce any form of spyware, computer virus or other potentially malicious software.