Computer Misuse
These rules apply to all use of the computing and network facilities in ²ÝÁñÊÓƵ and concern what is considered to be unacceptable behaviour and misuse, as well as what may infringe licence terms or may be otherwise illegal. Note that all use is permitted for bona fide purposes only, and is subject to proper authorisation (which may be provided either explicitly or implicitly - see below).
The ²ÝÁñÊÓƵ regards computer misuse as a serious matter, which may warrant disciplinary proceedings, and offenders will be prevented from using the ²ÝÁñÊÓƵ computing facilities for a period of time dependant on the severity of the misuse.
Explicit authorisation will normally involve the assignment of a ‘username’ and password for the purpose in question.
Implicit authorisation can normally be assumed for services that are advertised as being available without prior registration, for example the Library OPAC services and Networked CD-ROMs accessed from public terminals in the Library. Any facility which is not controlled by the ²ÝÁñÊÓƵ is subject to regulations determined by the organisation concerned, so authorisation to use such facilities should not be assumed, even though they may be accessible from or connected to the ²ÝÁñÊÓƵ facilities.
Misuse of computing and network facilities and unacceptable behaviour include (but are not limited to) the following:
- Attempting to gain unauthorised access to a facility;
- Using someone else’s username, with or without their consent
- Disregarding the privacy of other people’s files;
- Giving your password to someone else, or being otherwise careless with it;
- Generating messages which appear to originate with someone else, or otherwise attempting to impersonate someone else;
- Sending messages which are abusive or a nuisance or otherwise distressing;
- Displaying offensive material in a public place;
- Trying to interfere with someone else’s use of the facilities;
- Disregard for ’computer etiquette’;
- Sending chain email and hoax virus alerts;
- Being wasteful of resources (i.e. wasting bandwidth);
- Software piracy (including infringement of software licences or copyright provisions);
- Using the facilities for commercial gain without explicit authorisation;
- Physically damaging or otherwise interfering with the facilities, including wilfully changing hardware, firmware and software set-ups.
Concerning hardware
- No network socket may be used without the knowledge of the ICT Department.
- Only the assigned IP number may be used.
- No equipment other than a single network card in a personal computer may be connected to the network socket.
- The use of all wireless LANs or wireless equipment is banned, except connection to the college Wireless systems, Eduroam or OWL Wireless Services.
- No hardware or software may be used which compromises the security of the network or the privacy of users.
The state and status of computers
- It is mandatory that users MUST install a virus checker and keep it up to date monthly (a free virus checker is available from the University), this includes Apple Mac operating systems.
- It is mandatory that users MUST keep their operating system up to date with security patches (e.g. Windows update, free over the network). Microsoft Windows 10 & Mac OS Versions including and prior to 11 will not be allowed on the network. Please ensure you have an up-to-date operating system installed.
- Users with computers in their rooms are responsible for the content of their computer and to any use to which their computer has been put.
- Users who share their computer resources are not recognised as System Administrators and may not act in that privileged position in respect of the University Security and Privacy Policy.
- ²ÝÁñÊÓƵ will not recognise any obligations made to outside parties concerning the use of a computer attached to the ²ÝÁñÊÓƵ network.
- The network may not be used for commercial purposes.
Peer-to-peer programs and file sharing
- The use of iTunes to share music (not video), which does not infringe copyright, across ²ÝÁñÊÓƵ is permitted provided that the iTunes shares are password protected. The rules concerning peer-to-peer (P2P) software do not apply to iTunes.
- The unauthorised use of peer-to-peer resource-sharing software on machines connected the Oxford University network is prohibited.
- Users must REMOVE all programs from their computers which involve peer-to-peer file sharing.
- Users may NOT have open shares on their computers; all shares must be password protected. iTunes (music) shares must be password protected.
- Users may NOT download or exchange music or movies, including those from legitimate subscription services, using the ²ÝÁñÊÓƵ or University network. Internet radio are permitted but may be curtailed if necessary because of significant traffic.
Network services
Users may NOT run:
- mail servers (e.g. imapd, smtp)
- network support services (e.g. DNS, DHCP, BOOTP servers)
- games servers without the permission of the IT Manager
- web servers (e.g. http, https) without authorisation from the IT Manager
- their own wireless networks. Devices that are found to be transmitting a wireless signal will be disallowed from the network
A reasonably comprehensive list of forbidden P2P programs includes
rrent ABC Acquisition Adagio Alliance AllPeers Amicima aMule ANts P2P ApexDC++ Applejuice Ares Ares Galaxy Audiogalaxy Avalanche Azureus BCDC++ BearShare BitComet BitLord BitSpirit BitTornado BITTORRENT Blubster Burst! Cabos CAKE Caribou Chord CoolStreaming Coral Cybersky-TV DC++ Dijjer Direct Connect EarthStation 5 |
eDonkey eDonkey2000 eMule eMule Plus Entropy expressLoad FastTrack Filecroc FileScope FileTopia FlashGet FreeCast Freenet FrostWire G3 Torrent giFT Gnucleus GNUnet GNUnet-gtk Gnutella Gnutella2 Grokster Groove gtk-gnutella Halite Hamachi Hydranode IceShare iFolder iMesh iMesh Light IRC Joost Jubster JXTA Kad network |
Kazaa Kazaa Lite KCeasy Key network Kiwi Alpha KoffeePhoto konspire2b KONTIKI (Sky) Krawler[x] KTorrent LIMEWIRE lMule Lphant Madster/Aimster Mammoth MLDonkey mlMac Mnet MojoNation Morpheus MUTE Napigator Napshare NEO Network NeoModus Direct Connect Octoshape Omemo OpenFT OpenNap Opera Overnet PeerCast Peersites PeerStream Perfect Dark |
P-Grid Poisoned UTorrent |
If in doubt, ask the IT Department.
Computer Suite Rules
- Authorised users (see above) have access to the workspace and printer for the purposes of study.
- Non-authorised persons are not permitted to use the facilities or enter the suite.
- Smoking, eating or drinking are not permitted in the suite at any time.
- The IT Officer has formal charge of the suite and may take any reasonable action he considers necessary to safeguard the ²ÝÁñÊÓƵ property or the well-being of other users.
- Children admitted to the suite must be under the control of an adult and must not cause a nuisance to users.
- Pets and other animals may not be brought into the suite.
- Printing: All printing will be charged for at a rate per sheet as advertised.
Software Rules
The software and any datasets supplied by the ²ÝÁñÊÓƵ may be used subject to the relevant supplier’s licence agreements.
In general, all software and dataset use is subject to the Code of Conduct produced by the Combined Higher Education Software Team (CHEST).
Please note also the ²ÝÁñÊÓƵ Statement on Illegal Software.
Information Security and Privacy Policies
Policies can be downloaded from our Policy Documents' page.
Other Rules
The ²ÝÁñÊÓƵ issues the rules contained in these pages in addition to the following other requirements relating to use of computing facilities in the University:
Discover more about ²ÝÁñÊÓƵ