York Local Acceptable Use Policy

This document provides a context for users wishing to transmit information over the University’s computer network. This document is an adjunct to the JANET Acceptable Use Policy which currently applies to the transmission of information between the University and other networks.

1. Background and Definitions

1.1 "University" refers to the University of York

1.2 "University network" refers to active computer systems, services and facilities provided within the "york.ac.uk" ( domain.

1.3 "University user community" includes anyone who is authorised to use the University network.

1.4 "Users" includes members of the University user community and users of any other network.

1.5 "JANET" is the name given to the collection of networking services and facilities which currently support the communication requirements of the UK education and research community.

1.6 "User Organization" is any organization authorized to use Janet. JANET is maintained to support teaching, learning and research. Only organizations whose predominant use of JANET falls into these categories, or whose use is approved by the JISC, will be permitted to make a connection to JANET, whether directly or via another organization itself connected to JANET.

1.7 The University is an authorised JANET User Organisation. As such it has the responsibility to ensure that members of its own user community use JANET services in an acceptable manner and in accordance with current legislation.

1.8 As a consequence of being an authorised JANET User Organisation all members of the University user community are subject to the JANET Acceptable Use Policy.

1.9 In addition all members of the University user community are subject to the York Local Acceptable Use Policy which is an adjunct to the Janet Acceptable Use Policy and which is specified in this document.

1.10 Breaches of either the Janet Acceptable Use Policy or the York Local Acceptable Use Policy will be regarded as disciplinary offences and dealt with under the University disciplinary procedures.

2. Acceptable Use

2.1 Subject to the following paragraphs, the University network may be used for any legal activity that is in furtherance of the purpose, aims and policies of the University, and that is used subject to the University Regulations for the Use of Computing Facilities.

3. Unacceptable Use

3.1 The University network may not be used for any of the following:

3.1.1 the creation or transmission (other than for properly supervised and lawful research purposes) of any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material;

3.1.2 the creation or transmission of material which is designed or likely to cause annoyance, inconvenience or needless anxiety;

3.1.3 the creation or transmission of defamatory material;

3.1.4 the transmission of material such that this infringes the copyright and intellectual property rights of another person;

3.1.5 the unauthorised transmission of unsolicited commercial or advertising material either to other User Organisations, or to organisations connected to other networks;

3.1.6 deliberate unauthorised access to facilities or services accessible via the University network;

3.1.7 deliberate activities with any of the following characteristics:

  • wasting staff effort or networked resources, including time on end systems accessible via the University network and the effort of staff involved in the support of those systems;
  • corrupting or destroying other users' data;
  • violating the privacy of other users;
  • disrupting the work of other users;
  • using the University network in a way that denies service to other users (for example, deliberate or reckless overloading of access links or of switching equipment);
  • continuing to use an item of networking software or hardware after the University has requested that use cease because it is causing disruption to the correct functioning of the University network
  • other misuse of the University network or its networked resources, such as the introduction of "viruses".

3.1.8 the creation or transmission of any material which could bring the University into disrepute;

3.1.9 use of the University Visual Identity in personal web pages.

3.2 Where the University network is being used to access any other network including the JANET, the acceptable use policy of that network must be upheld.