Policy on Use of IT Facilities
-
Purpose
The University provides IT facilities for use by students and staff for the purpose of their studies and/or employment.
-
What is covered by the policy?
This policy applies to all use of University-provided IT facilities, including, but not limited to, University-managed hardware, software, and network resources. This includes computers, mobile devices, cloud storage, collaboration platforms (e.g., Office 365, Teams), internet access, data storage systems, licensed software, and personal devices connected to the University network.
-
Who does the policy apply to?
This policy applies to all staff (including emeritus staff) and registered students of the University and to visitors to the University who are authorised to use the facilities.
-
Roles and responsibilities
-
- Director of IT - Responsible for overseeing IT policy implementation and ensuring alignment with University strategy.
- Heads of Department/Units - Promote policy awareness within their departments and escalate concerns to IT Services.
- Users (Staff, Students, Visitors) - Responsible for familiarising themselves with this policy and their use of IT facilities is compliant.
- Student Services and People Services - Responsible for any investigations and subsequent action taken to address non-compliance.
-
Policy
- Each user of University computing systems is personally assigned a login name and email address. It is the user's responsibility to keep their login credentials secure, and their password must not be shared with any other person.
- Users must not use the resources in such a way that the work of other users, the integrity of the computing equipment or any stored programs or data may be jeopardised.
- At its sole discretion, the University normally permits personal use of these facilities subject to the terms of this policy. Such personal use must not:
- Each user of University computing systems is personally assigned a login name and email address. It is the user's responsibility to keep their login credentials secure, and their password must not be shared with any other person.
-
-
- Incur significant cost, nor consume significant amounts of time.
- Interfere with the legitimate use of the facilities by others.
- Infringe any law, nor any other University policy or rules.
- Use of social media should be in line with corporate guidelines. See Social Media Policy within People Services Policies.
- Newcastle University takes its responsibility under the Counter-Terrorism and Security Act 2015 extremely seriously. You must not deliberately create, download, store or transmit unlawful material, or material that is indecent, offensive, defamatory, threatening, discriminatory or extremist, except where required for academic purposes and for which prior ethical approval has been obtained.
- Other than as provided in law:
- The University accepts no responsibility for the malfunctioning of any equipment or software, nor failure in security or integrity of any stored program or data.
- No claim shall be made against the University, its employees or agents in respect of any loss alleged to have been caused whether by defect in the resources or by act or neglect of the University, its employees or agents.
-
-
Related regulations, statutes, and policies
This policy is supplemental to the general practice and regulations of the University.
-
Procedure to implement the policy
- The University monitors and logs usage of its IT facilities (including email and voicemail) for the purposes of:
-
-
- Efficient operation and management of those facilities;
- Ensuring compliance with its statutory obligations; and
- Ensuring that the rules and policies governing use are adhered to.
- The University will comply with lawful requests for information from law enforcement and government agencies for the purposes of detecting, investigating or preventing crime, and ensuring national security.
- This policy is supported by the University’s Statement of Internet Use published within People Services Policies.
-
-
Monitoring and reporting on compliance
What will be monitored? |
Frequency |
Method |
Who by |
Reported to |
Use of IT Services as per Section 7 |
Ongoing |
As appropriate (Breach dependent) |
NUIT |
Line Management (as appropriate) |
-
Failure to comply
- Failure to abide by this policy may result in suspension of login facilities, without warning.
- A breach of this policy may be investigated under the appropriate University disciplinary policy and procedures.
- Where an alleged offence has occurred under relevant law, it will be reported to the appropriate authority. Breach of any applicable law will be regarded as a breach of this policy.
- Failure to abide by this policy may result in suspension of login facilities, without warning.
Approval |
|
Approved by: Executive Board |
Date: 24/06/2025 |
Effective from: 26/10/2016 |
|
Review due: 12/06/2029 |
Policy on Use of IT Facilities PDF 63Kb
Policy on Use of IT Facilities.