Email & Internet

The University provides email and Internet to support your University work.

Remember:

  • Use these facilities in a lawful, ethical and considerate way.
  • Do not engage in activity that would impact the quality of these services for other users.
  • Do not send other peoples personal information, or any commercially sensitive information, via email or the Internet unless encrypted. We can advise on suitable encryption products.
  • Before sending an email, always double check the email address of the recipient.
  • If sending an email to multiple recipients, and those recipients do not need to know each other's email address, use Blind Carbon Copy (BCC) instead of Carbon Copy (CC).
  • Stay alert for scam emails.

Cloud services

The University provides access to Office365, which includes file storage, webmail, office applications, social networking, and other special purpose web-applications.

Always take care when using other cloud services that have not been provided by the University:

  • Always check the terms and conditions before using a cloud-based service.
  • You may no longer have exclusive control over your work after it has been uploaded.
  • Your work may be unavailable or non-recoverable if the cloud-based service ceases trading or experiences a technical problem.
  • You may not be able to remove your work after it has been uploaded.
  • The cloud-based service may be based in a country that has no laws to protect your data.
  • Before you upload your work to the cloud, back it up to the University filestore.
  • Use a different password for each cloud-based service.

Copyright materials

Do not illegally download or share copyright materials such as journals, movies and computer games.

Remember:

  • Copyright holders have ways of detecting illegal activity.
  • Copyright holders will notify the IT Service of illegal activity traced to devices connected to the University’s IT systems.

Monitoring and logging

In compliance with University ICT policy, the IT Service legally monitors and logs activity that occurs on the University’s network.