Statement on Internet Use

This statement sets out the University's policy on the use of Internet facilities by students. A corresponding policy on internet use [PDF file] is also available for staff.

Scope

The University provides many facilities for use by students in the course of their academic coursework or research. One of these facilities is access to the Internet (including, but not limited to, web browser, e-mail packages, Usenet news). This policy covers all access to the Internet by students, in any way and at any time, when University facilities, equipment or connections are involved, including access from any part of the campus network (including Halls of Residence) or from off-campus, if routing via University facilities.

The policy applies to all students, including visiting and short-term students.

Use of Internet Facilities

  1. These facilities are provided for use by students in undertaking their academic coursework or research. At its sole discretion, the University normally permits students to use the facilities for personal use subject to the following conditions:
    1. Such use does not incur significant cost, nor consume significant amounts of time;
    2. Such use does not interfere with the legitimate use of the facilities by others;
    3. Such use does not infringe any legislation, nor any other University policy or rules;
    4. the user accepts that the University monitors usage of its facilities to an extent necessary for the efficient operation and management of those facilities, to ensure compliance with its statutory obligations, and to ensure that the rules and policies governing use are adhered to.
  2. This discretion is exercised jointly by the Heads of Department, Student Progress Office and by Information Systems and Services (ISS) and may be withdrawn if any of the above conditions are violated. Serious or repeated violation will lead to disciplinary proceedings being initiated, and may lead to disciplinary action under the terms of the relevant disciplinary procedure. Such disciplinary actions can include withdrawal of their access to computing facilities, and even suspension or expulsion from University when there has been a serious or repeated breach.
  3. Relevant legislation includes:
    1. The Computer Misuse Act 1990, particularly in attempting to secure unauthorised access to or in damaging information held on a computer;
    2. The Data Protection Act 1998, particularly in relation to holding, disclosing or transmitting personal data;
    3. The Obscene Publications Acts, as amended by the Criminal Justice and Public Order Acts 1994, under which it is a criminal offence to publish an article whose effect, taken as a whole, would tend to deprave or corrupt those likely to read, see or hear it.
    4. The Protection of Children Act, as amended by the Criminal Justice and Public Order Acts 1994, particularly in relation to indecent images of a child;
    5. The Telecommunications Act, as amended by the Criminal Justice and Public Order Acts 1994, particularly in relation to the transmission of grossly obscene or offensive messages and messages designed to cause annoyance, inconvenience or needless anxiety. Also regarding fraudulent use of a telecommunications system;
    6. The Regulation of Investigatory Powers Act 2000, particularly in intercepting or disclosing messages except in the cause of duty.
    7. The Copyright, Designs and Patents Act 1988, particularly in copying programmes or data, publishing works of art or performances of music and/or video images;
    8. The Sex Discrimination Act 1975 and Race Relations Act 2000, in relation to publishing or receiving material which is discriminatory or encourages unlawful discrimination;
    9. The Protection from Harassment Act 1997, in relation to unlawful harassment, including the use of electronic media such as e-mail;
    10. Laws of Defamation, in relation to any statement, comment or innuendo about another individual or organisation which cannot be justified.
  4. Relevant University policies include:
    1. The Procedure for Assessment Irregularities which covers the use of improper means by candidates in the assessment process, including plagiarism of material drawn from the Internet.
    2. Policies on equal opportunities, and sexual and racial harassment. Arising from these policies, it is not acceptable for students to access, download, retain, distribute or disseminate any images, text, materials or software which
      1. Are or might be considered to be indecent or obscene or
      2. Are or might be offensive or abusive in that its content is or may be considered to be a personal attack, rude or personally critical, sexist, racist or personally harassing or which could bring the University into disrepute.
  5. The content of any e-mail messages sent must be lawful, and not include defamatory or libellous statements. Care should be taken to ensure that it is clear whether the views expressed are those of the university, or whether the author is representing his/her personal views, where this could have implications for the university.
  6. Severe breaches of this policy, for example by downloading material of a pornographic or unlawful nature, may be treated as gross misconduct which could lead to suspension or exclusion from the University and could result in criminal proceedings. In the event of any uncertainty, or where students may be working with material covered by the above descriptions, they are advised to consult with their Head of Department, the Student Progress Office (tel. 0191 222 6587 or e-mail student.office@ncl.ac.uk ) and ISS.
  7. Students are also advised that use of these facilities is also governed by the Rules Of Use issued by the University Computing Service and by the Computer Users Agreement, also issued by the University Computing Service. Use of the Joint Academic Network (JANET) is also governed by the JANET Acceptable Use Policies. In addition, the University Computing Service issue a range of guidance notes on Responsible Use of IT facilities which provides helpful advice on the use of Internet facilities.
  8. The University monitors usage of its Internet facilities to an extent necessary for the efficient operation and management of those facilities, to ensure compliance with its statutory obligations, and to ensure that the rules and policies governing use are adhered to. Such monitoring will normally concern data volumes and traffic; content will only be monitored where a breach of the above policies is suspected.
    You should also be aware that system support staff may unavoidably see the contents of files or e-mail while performing actions that are an inherent part of the effective operation of the system, e.g. file or system recovery.
  9. It should also be remembered that e-mail should not be regarded as a confidential medium of communication; care should therefore be taken regarding the content of e-mails, and its use generally as a means of exchanging private or confidential information.