Code of Conduct for IT
The College provides access to IT facilities for students both as a component of some courses and on a drop-in basis. You are expected to use the facilities in a manner that does not interfere with other users. This includes not deliberately interfering with the installed software, the files of other users or taking any action that might result in damage to hardware, software or to other users files. You are also responsible for the contents of your own home drive, which must not contain any questionable software or socially unacceptable material. Users of the Internet are required to use the facilities responsibly and not to use them for any improper purpose.
Acceptable Use:
The College provides access to IT facilities for students, both as a component of many courses and on a drop-in basis. You are expected to use the computer systems and facilities in accordance with the College's Acceptable Use Policy. This includes using the computers systems in a way that does not interfere with other users or other actions that might result in damage to computer systems, networks, hardware, installed software or files.
You must not divulge to anyone your personal network login password or allow your account to be used by any other individual.
You are responsible for the use of your account on the computer system, and also for the contents of your home drive and email storage. The college computer systems are monitored to ensure appropriate usage. Your home drive must not contain any questionable software or socially unacceptable material. Additionally, users of the Internet are required to use the facilities responsibly and not for any improper purpose. Email communications should also be used in a responsible manner. Your access to internet or email resources may be withdrawn if you misuse these systems, attempt to conceal your use of these systems or use them for inappropriate communications or purposes.
Failure to comply with the College's Acceptable Use Policy is considered a serious disciplinary matter. A full copy of the College's Acceptable Use Policy, which complements this summary, is available upon request and is also available in electronic format.
Unacceptable Use
The HENLEY College network may not be used for any of the following:
- The creation, viewing or transmission of any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material;
- The creation, viewing or transmission of material which is designed or likely to cause annoyance, inconvenience or needless anxiety;
- The creation, viewing or transmission of defamatory or offensive material;
- The transmission of material such that this infringes the copyright of another person;
- The transmission of unsolicited commercial materials or advertising;
- Deliberate unauthorised access to facilities or services accessible via The HENLEY College network;
- To examine, change, or use another person's files, output, or user name or password for which they do not have explicit authorisation.
Deliberate activities with any of the following characteristics:
- Wasting staff effort or networked resources, including time on end systems accessible via The HENLEY College network and the effort of staff involved in the support of those systems;
- Corrupting or destroying other users' data;
- Violating the privacy of other users;
- Disrupting the work of other users;
- Using The HENLEY College network in a way that denies service to other users (for example, deliberate or reckless overloading of access links or of switching off equipment);
- Continuing to use an item of software or hardware after it has been requested that use cease because it is causing disruption to the correct functioning of the network;
- Other misuse of The HENLEY College network or networked resources, such as the introduction of "viruses."
- Disguising, attempting to disguise or forging identity when sending e-mail, using network facilities or browsing the internet.
- Using College network facilities for the playing, downloading, installing or distribution of games, web-games, or materials, software or media to which is copyrighted by a third party.
- Attaching items of equipment or peripherals that do not belong to the College, to College computers, networks or systems without explicit authorization from the IT Services team.
Where The HENLEY College network is being used to access another network, any abuse of the acceptable use policy of that network will be regarded as unacceptable use of The HENLEY College network.