Computer Misuse

These rules apply to all use of the computing and network facilities in ²ÝÁñÊÓƵ and concern what is considered to be unacceptable behaviour and misuse, as well as what may infringe licence terms or may be otherwise illegal. Note that all use is permitted for bona fide purposes only, and is subject to proper authorisation (which may be provided either explicitly or implicitly - see below).

The ²ÝÁñÊÓƵ regards computer misuse as a serious matter, which may warrant disciplinary proceedings, and offenders will be prevented from using the ²ÝÁñÊÓƵ computing facilities for a period of time dependant on the severity of the misuse.

Explicit authorisation will normally involve the assignment of a ‘username’ and password for the purpose in question.

Implicit authorisation can normally be assumed for services that are advertised as being available without prior registration, for example the Library OPAC services and Networked CD-ROMs accessed from public terminals in the Library. Any facility which is not controlled by the ²ÝÁñÊÓƵ is subject to regulations determined by the organisation concerned, so authorisation to use such facilities should not be assumed, even though they may be accessible from or connected to the ²ÝÁñÊÓƵ facilities.

Misuse of computing and network facilities and unacceptable behaviour include (but are not limited to) the following:

  • Attempting to gain unauthorised access to a facility;
  • Using someone else’s username, with or without their consent
  • Disregarding the privacy of other people’s files;
  • Giving your password to someone else, or being otherwise careless with it;
  • Generating messages which appear to originate with someone else, or otherwise attempting to impersonate someone else;
  • Sending messages which are abusive or a nuisance or otherwise distressing;
  • Displaying offensive material in a public place;
  • Trying to interfere with someone else’s use of the facilities;
  • Disregard for ’computer etiquette’;
  • Sending chain email and hoax virus alerts;
  • Being wasteful of resources (i.e. wasting bandwidth);
  • Software piracy (including infringement of software licences or copyright provisions);
  • Using the facilities for commercial gain without explicit authorisation;
  • Physically damaging or otherwise interfering with the facilities, including wilfully changing hardware, firmware and software set-ups.

Concerning hardware

  • No network socket may be used without the knowledge of the ICT Department.
  • Only the assigned IP number may be used.
  • No equipment other than a single network card in a personal computer may be connected to the network socket.
  • The use of all wireless LANs or wireless equipment is banned, except connection to the college Wireless systems, Eduroam or OWL Wireless Services.
  • No hardware or software may be used which compromises the security of the network or the privacy of users.

The state and status of computers

  • It is mandatory that users MUST install a virus checker and keep it up to date monthly (a free virus checker is available from the University), this includes Apple Mac operating systems.  
  • It is mandatory that users MUST keep their operating system up to date with security patches (e.g. Windows update, free over the network).   Microsoft Windows 10 & Mac OS Versions including and prior to 11 will not be allowed on the network.  Please ensure you have an up-to-date operating system installed.
  • Users with computers in their rooms are responsible for the content of their computer and to any use to which their computer has been put.
  • Users who share their computer resources are not recognised as System Administrators and may not act in that privileged position in respect of the University Security and Privacy Policy.
  • ²ÝÁñÊÓƵ will not recognise any obligations made to outside parties concerning the use of a computer attached to the ²ÝÁñÊÓƵ network.
  • The network may not be used for commercial purposes.

Peer-to-peer programs and file sharing

  • The use of iTunes to share music (not video), which does not infringe copyright, across ²ÝÁñÊÓƵ is permitted provided that the iTunes shares are password protected. The rules concerning peer-to-peer (P2P) software do not apply to iTunes.
  • The unauthorised use of peer-to-peer resource-sharing software on machines connected the Oxford University network is prohibited.
  • Users must REMOVE all programs from their computers which involve peer-to-peer file sharing.
  • Users may NOT have open shares on their computers; all shares must be password protected. iTunes (music) shares must be password protected.
  • Users may NOT download or exchange music or movies, including those from legitimate subscription services, using the ²ÝÁñÊÓƵ or University network. Internet radio are permitted but may be curtailed if necessary because of significant traffic.

Network services

Users may NOT run:

  • mail servers (e.g. imapd, smtp)
  • network support services (e.g. DNS, DHCP, BOOTP servers)
  • games servers without the permission of the IT Manager
  • web servers (e.g. http, https) without authorisation from the IT Manager
  • their own wireless networks.  Devices that are found to be transmitting a wireless signal will be disallowed from the network

A reasonably comprehensive list of forbidden P2P programs includes

rrent
ABC
Acquisition
Adagio
Alliance
AllPeers
Amicima
aMule
ANts P2P
ApexDC++
Applejuice
Ares
Ares Galaxy
Audiogalaxy
Avalanche
Azureus
BCDC++
BearShare
BitComet
BitLord
BitSpirit
BitTornado
BITTORRENT
Blubster
Burst!
Cabos
CAKE
Caribou
Chord
CoolStreaming
Coral
Cybersky-TV
DC++
Dijjer
Direct Connect
EarthStation 5
eDonkey
eDonkey2000
eMule
eMule Plus
Entropy
expressLoad
FastTrack
Filecroc
FileScope
FileTopia
FlashGet
FreeCast
Freenet
FrostWire
G3 Torrent
giFT
Gnucleus
GNUnet
GNUnet-gtk
Gnutella
Gnutella2
Grokster
Groove
gtk-gnutella
Halite
Hamachi
Hydranode
IceShare
iFolder
iMesh
iMesh Light
IRC
Joost
Jubster
JXTA
Kad network
Kazaa
Kazaa Lite
KCeasy
Key network
Kiwi Alpha
KoffeePhoto
konspire2b
KONTIKI (Sky)
Krawler[x]
KTorrent
LIMEWIRE
lMule
Lphant
Madster/Aimster
Mammoth
MLDonkey
mlMac
Mnet
MojoNation
Morpheus
MUTE
Napigator
Napshare
NEO Network
NeoModus Direct Connect
Octoshape
Omemo
OpenFT
OpenNap
Opera
Overnet
PeerCast
Peersites
PeerStream
Perfect Dark

P-Grid
Phex
Piolet

Poisoned
PPLive
Pruna
QTorrent
Rawflow
Retroshare
rtorrent
Scour
Shareaza
Solipsis
soribada
Soulseek
SPIN
StrongDC++
Swapper
Swarmcast
The Circle
Transmission
Tribler
TrustyFiles
TVants
TVUPlayer

UTorrent
Warez P2P
WASTE
WinMX
Winny
xMule
XoloX
ZEPP
Zultrax

If in doubt, ask the IT Department. 

Computer Suite Rules

  • Authorised users (see above) have access to the workspace and printer for the purposes of study.
  • Non-authorised persons are not permitted to use the facilities or enter the suite.
  • Smoking, eating or drinking are not permitted in the suite at any time.
  • The IT Officer has formal charge of the suite and may take any reasonable action he considers necessary to safeguard the ²ÝÁñÊÓƵ property or the well-being of other users.
  • Children admitted to the suite must be under the control of an adult and must not cause a nuisance to users.
  • Pets and other animals may not be brought into the suite.
  • Printing: All printing will be charged for at a rate per sheet as advertised.

Software Rules

The software and any datasets supplied by the ²ÝÁñÊÓƵ may be used subject to the relevant supplier’s licence agreements. 

In general, all software and dataset use is subject to the Code of Conduct produced by the Combined Higher Education Software Team (CHEST).

Please note also the ²ÝÁñÊÓƵ Statement on Illegal Software.

Information Security and Privacy Policies

Policies can be downloaded from our Policy Documents' page. 

Other Rules

The ²ÝÁñÊÓƵ issues the rules contained in these pages in addition to the following other requirements relating to use of computing facilities in the University:

Explore further

Discover more about ²ÝÁñÊÓƵ