Skip to main content

Regulations & acceptable use policies

When using the university’s wireless services you must obey various regulations and acceptable use policies. These broadly fall into the two categories below:

  • The Law – Use of the university’s wireless services is subject to applicable law
  • The policies and regulations of the university – Use of the university’s wireless services and wireless equipment at the university is subject to the policies and regulations of the university. These include:

Wireless service regulations

  1. Acceptance of responsibility: A user will be held responsible for any breach of regulations carried out using a connection authenticated with their username. This includes action taken by others.
  2. Identification: You must not attempt to authenticate yourself using another person’s or organisation’s credentials.
  3. Network security: The University reserves the right to conduct scans of the network in order to determine what computers are connected to it and what services they are operating. You may not configure your computer to use any network address other than those allocated to you.
  4. Computer security: You must ensure that your computer has up-to-date anti-virus software and that all operating system updates and other security updates are installed. You must remove any malware found on your computer.
  5. Service operation: You must not do anything that interferes with the operation of the wireless service. This includes using an unfair or excessive share of the available network bandwidth.
  6. Copyright: It is illegal and against Janet AUP to copy or share movies, music, software and other copyrighted material without permission from the copyright holder. You must not do this, whether intentionally or as a failure to correctly configure a file-sharing program on your computer.
  7. eduroam extra policies: When using the eduroam service, you must also obey the JRS usage policy and any policies of the organisation providing the eduroam access.
  8. Data protection: Personal data can only be processed under strictly limited circumstances, and never on computers not owned by the University.

Penalties

  1. Withdrawal of facilities: IT Services may withdraw or restrict your access to the wireless service or other IT Services.
  2. Disciplinary action: Any breach of regulations may be reported to your Faculty Dean or Head of Department. In more serious or repeated minor cases, a breach of University regulations may be reported to the Vice–Chancellor to be dealt with under the University’s disciplinary procedures.
  3. Fines: IT Services may request that a user be charged for extra work that has arisen as the result of computer misuse.
  4. Police action: When required to do so, or when the University deems necessary, the University may inform the police.