Email & Internet

The University provides email and Internet to support your University work.

Remember:

  • Use these facilities in a lawful, ethical and considerate way.
  • Do not engage in activity that would impact the quality of these services for other users.
  • Do not send other peoples personal information, or any commercially sensitive information, via email or the Internet unless encrypted. We can advise on suitable encryption products.
  • Before sending an email, always double check the email address of the person you are sending to.
  • If sending an email to multiple recipients, and those recipients do not need to know each other's email address, use Blind Carbon Copy (BCC) instead of Carbon Copy (CC).
  • Stay alert for scam emails.

Cloud computing

The cloud is made up of web-based services that you can use to store and process your work. These services include file-storage, web-mail, office applications, social networking, social media, and special purpose web-applications.

Remember:

  • Never upload other peoples personal data to a cloud-based service.
  • Always check the terms and conditions before using a cloud-based service.
  • You may no longer have exclusive control over your work after it has been uploaded.
  • Your work may be unavailable or non-recoverable if the cloud-based service ceases trading or experiences a technical problem.
  • You may not be able to remove your work after it has been uploaded.
  • The cloud-based service may be based in a country that has no laws to protect your data.
  • Before you upload your work to the cloud, back it up to the University filestore.
  • Use a different password for each cloud-based service.

Copyright materials

Do not illegally download or share copyright materials such as music, movies and computer games.

Remember:

  • Copyright holders have ways of detecting illegal activity.
  • Copyright holders will notify the IT Service of illegal activity traced to devices connected to the University’s network.

Monitoring and logging

In compliance with University ICT policy, the IT Service legally monitors and logs activity that occurs on the University’s network.

Leave Feedback