XClose

Information Security

Home
Menu

Computing Regulations (Acceptable Use Policy)

The Computing Regulations are a series of rules that define what end users may or may not do with UCL provided technology, including potential consequences of violation.

Overview

The purpose of these regulations is to define what constitutes acceptable use; to encourage the responsible use of facilities; to maximize the availability of resources (equipment, infrastructure and staff) for legitimate purposes; and to minimise the risk of misuse. These regulations incorporate the acceptable use policy of our service provider, JISC (Joint Information Systems Committee), which manages network connections between Universities and Colleges and the Internet (the JANET Network). The full text of their policy can be found at: https://community.jisc.ac.uk/library/acceptable-use-policy

Contents include

  • Authorised Use
  • Reasonable personal use is defined as incidental and occasional use which does not
  • Regulations
  • IT users must not
  • Conditions of Use
  • Procedures for dealing with misuse or suspected security violations

Who should read this policy

  • All staff
  • Contractors
  • Temporary staff
  • Students
  • Visitors
  • Managers
  • Teaching staff
  • Student support staff
  • Researchers

Policy

https://www.ucl.ac.uk/information-security/sites/information-security/files/regulations.pdf

Last updated: Wednesday, January 18, 2017