Computing Facilities - conditions of use
LJMU Computing Facilities
1) User Registration
All University staff, researchers and students are entitled to register as users of the University Computing Services. No person shall use the computing services without first becoming a registered user.
The University staff or student identity card shall represent authorization to use the facilities. Any person using the Computing Services shall be deemed to have accepted these Conditions of Use and be bound by them. Authorization to use the Computing Services shall normally continue throughout the user's period of membership of the University, subject to compliance with these conditions.
2) Use of Computing Resources
Access to, and use of, computing resources by the user is at the discretion of the Director of Planning and Information (PLN) or his representative as determined by operational considerations and the policies of the University.
A user may use the Computing Services for bona fide University use only. For a member of staff, "University use" is that arising from his or her contractual duties to the University. For a researcher, "University use" is that use arising from the pursuit of his or her research topic. For a student, "University use" is that use arising from the courses of study he or she is undertaking at the University. A user wishing to use the Computing Services for purposes other than University use must obtain the prior permission of the Director of PLN. The user will be required to reimburse the University for the cost of the resources used, as determined by the Director of PLN.
A user must take all reasonable precautions to prevent the use of his or her computing resources by other persons. The Planning and Information Department will, on request, advise a user on what reasonable precautions can be taken. In particular, a user must ensure that their password remains confidential. It is a disciplinary offence to use another users computing resources.
A computer account which goes unused for a period longer than eighteen months, may be deleted without notice.
3) External Funding
A user applying to a Research Council for an award which involves the use of the Computing Services must obtain prior confirmation from the Director of Planning and Information that the necessary computing resources will be available. A user who is otherwise funded for undertaking work which involves the use of Computing Services or the expertise of the Planning and Information Department will ascertain, from the Director of PLN, the cost of the resources to be used, and will ensure that the University is reimbursed for the cost of those resources.
4) External Services, Internet and LJMU Web site
Use of the LJMU web site is governed by the Conditions of Use of the LJMU Website. A user who, by means of the Computing Service, makes use of externally provided facilities, including communication networks such as Janet/Internet, must abide by any conditions imposed by the providers of such facilities and networks, including the Janet Acceptable Use Policy as published by the JISC (Joint Information Systems Committee). Any such conditions are additional to, and in no way replace, these Conditions of Use. A user will be responsible for payment of any charges arising from the use of externally provided facilities.
5) EMail and Discussion Boards/ Usage Monitoring.
Email and discussion board facilities are provided for responsible usage only. The abuse of email as outlined in the Planning and Information Disciplinary Procedures is strictly prohibited. Abuse of discussion boards or online conferences, whether through offensive, antisocial, or inappropriate postings, is similarly regarded.
In accordance with the Regulation of Investigatory Powers Act 2000, the Director of Planning and Information has the power, where abuse is suspected, to require any computer usage to be monitored, including access to email and files that are stored on the University's computer network.
6) Privacy of Information
A user shall treat as confidential any information which is the property of another person and which becomes available as a result of using the Computing Services. The user shall not copy, modify, disseminate or in any way use such information without the permission of the owner. If the Planning and Information Department designates information as proprietary, or otherwise confidential, then all users must observe the guidelines stipulated by the Director of Planning and Information concerning the way in which it can be used.
7) Software Licensing
All software used in the University shall be legally licensed. Software provided for use on University computer systems may not be copied for use elsewhere (unless specifically permitted under the relevant licences). Use of software supplied under the terms of the Eduserve licencing agreement and is subject to the conditions of the Eduserve Code of Conduct as ratified by all Higher Education institutions. This Code of Conduct embodies principles which apply to all software held within the University.
8) Copyright, Designs and Patents Act (1988)
A user must not breach the legislation embodied in the Copyright, Design and Patents Act and its Amendments. Failure to abide by the Act is a criminal offence subject to fines and/or imprisonment. The University will not offer support or indemnity for any person against whom an action for breach of copyright is brought, even if the infringement was committed in the course of University use. The Planning and Information department will, on request, advise a user of the copyright of materials under its control and will, if necessary, refer the user to the University Copyright Adviser.
9) Data Protection Act (1998)
A user must comply with the legal obligations stipulated in the Data Protection Act (1998). Failure to comply with the Act is a criminal offence subject to an unlimited fine. All members of staff or researchers who process personal data should determine whether their use falls under the scope of the Act and, if so, make sure that their system is registered.
Students are strongly advised not to store personal data on computer systems; if they have a requirement to do so, they should do it under the direct supervision of a member of staff. The Planning and Information Department will provide advice to any user who may need to register and will, if necessary, direct him/her to the University's Data Protection Officer. The Planning and Information department will take all reasonable steps to ensure that all information entrusted to its care is kept confidential and will, on request, advise a user of appropriate safeguards to be adopted.
10) Acceptable Use Under English Law
All computer usage is subject to English law. Attention is drawn specifically to the Computer Misuse Act (1990) which identifies three offences:- unauthorised access, unauthorised access with intent to commit another offence, and unauthorised modification. Failure to abide by the Act is a criminal offence and may result in fines and/or imprisonment. Planning and Information will, on request, advise a user of what conduct constitutes an offence under the Act. Users' attention is also drawn to the Defamation Act (1996) and the Obscene Publication Act. Abuse of computer systems as outlined in the Disciplinary Procedures is a disciplinary offence which is subject to the procedures and if necessary to due process of law.
11) Property Ownership
All materials produced or developed by an employee of the University which involves the use of Computing Services under the terms of University use, as defined in Section 2 of these Conditions of Use, are the property of the University. The employee will, if required, make all such materials available in source form to the University.
12) Operating Rules
A user must abide by any rules or guidelines that the Director of Planning and Information or his representative stipulate which concern the operation and use of the Computing Services.
13) Wilful Damage
A user shall not, by any wilful or deliberate act, jeopardise the integrity of the Computing Services, computing equipment, systems programs or any other stored information accessed through use of the Computing Services.
14) Complaints Procedure
A user who has a complaint about any aspect of the Computing Services must, in the first instance, make the complaint to the Director of Planning and Information or his representative. If the user is not satisfied with the outcome of the complaint, then he/she may invoke the University Complaints Procedure.
15) Breach of Conditions
A user in breach of these Conditions of Use will be subject to the Disciplinary Procedures of the University.
If the Director of Planning and Information has reason to believe that a user is in breach of the Conditions of Use, then he may suspend access to any or all of the Computing Services available to the user.
Where a breach of these conditions has had an effect external to the University, thereby bringing the University into disrepute, this will be regarded more seriously in determining what disciplinary sanction should be applied.
Last Updated: 06 October 2011