Information Security


Computing Regulations (Acceptable Use Policy)

The Computing Regulations are a series of rules that define what end users may or may not do with UCL provided technology, including potential consequences of violation.


The purpose of these regulations is to define what constitutes acceptable use; to encourage the responsible use of facilities; to maximize the availability of resources (equipment, infrastructure and staff) for legitimate purposes; and to minimise the risk of misuse. These regulations incorporate the acceptable use policy of our service provider, JISC (Joint Information Systems Committee), which manages network connections between Universities and Colleges and the Internet (the JANET Network). The full text of their policy can be found at: https://community.jisc.ac.uk/library/acceptable-use-policy

Contents include

  • Authorised Use
  • Reasonable personal use is defined as incidental and occasional use which does not
  • Regulations
  • IT users must not
  • Conditions of Use
  • Procedures for dealing with misuse or suspected security violations

Who should read this policy

  • All staff
  • Contractors
  • Temporary staff
  • Students
  • Visitors
  • Managers
  • Teaching staff
  • Student support staff
  • Researchers



Last updated: Wednesday, January 18, 2017