Acceptable Use Policy - Manchester Metropolitan University

IT Services
ACCEPTABLE USE OF UNIVERSITY IT SERVICES
Revision No: 3.0 August 2015
Review Date: January 2017
1
Introduction
1.1
Purpose of Policy
The aim of this document is to define the Manchester Metropolitan
University's policy for acceptable use of Information Technology (IT)
resources and systems.
1.2
Scope
This policy applies to all users of MMU’s IT services, systems, software and
devices. For clarity, users using their own, personal devices which they
connect to the University network are bound by this policy.
1.3
Roles & Responsibilities
This policy is implemented by IT Services and defines the responsibilities of
all users of MMU IT resources.
1.4
Associated policies
This policy should be interpreted in a manner consistent with all other University
policies, particularly the Information Security Policy and the Acceptable Use of
Social Media Policy. The current versions of the University’s IT policies can be
found at: www.mmu.ac.uk/itservices/policy/
While all areas of the University are beholden to this policy, it should be used as a
foundation by which additional regulations and guidance may be introduced,
where there is a need for additional, specific or specialist regulations for groups of
users using University IT.
2
Definitions
The following definitions apply throughout this document:
2.1 “IT resources” includes any IT services, systems, software and devices
that are:

The property of the University
Revision No: 3.0
Aug 2015
Review Date: Aug 2016
IT Services

Leased/rented or on loan to the University

The property of third parties affiliated to MMU, located on campus

Connected to a University network, device or system (including personal
devices)

Used to handle or store University data

Licensed to the University, for example, software, library catalogues
and database services

“Devices” includes any technology which is used to handle
information on behalf of or belonging to the University. From desktop
PCs, Macs and laptops, to mobile devices like smartphones and
tablets, but also storage devices such as memory sticks, cards, discs
or drives.
2.2 “the University” and “MMU” refer to Manchester Metropolitan
University, including all of its campuses and subsidiaries.
2.3 “users” refers to anybody who accesses the University’s IT resources in any
way. This includes, but is not limited to, all members of staff, contractors, students
(both full and part time), associates, guests and temporary users.
2.4
Acceptable Use
Acceptable use of the Manchester Metropolitan University’s IT resources is
defined as any use:


2.5
in support of the University’s teaching, learning, research, consultancy
and administrative activities;
which does not come under the category of prohibited use.
Prohibited Use
Prohibited use of the University’s IT resources is defined as their use:

in contravention of any laws, policies or regulations

to intentionally access, create, store or transmit material which the
University may deem to be offensive, indecent or obscene (other
than in the course of academic research where this aspect of the
research has the prior, explicit approval of the University’s official
processes for dealing with academic ethical issues)

to create, download, store or transmit unlawful material, or material
that is indecent, offensive, defamatory, threatening, discriminatory
or extremist.
Revision No: 3.0
Aug 2015
Review Date: Aug 2016
IT Services

to send threatening, defamatory, abusive, obscene or otherwise
offensive messages

in a way which may, or is likely to cause harm or needless annoyance to
anyone else

to cause harm to the University’s reputation, or that of its staff or
students

to commit the University to any contractual obligations without
obtaining the appropriate authority
in a manner which interferes with those activities covered within the
definition of Acceptable Use

3

for unauthorised, personal commercial gain

which otherwise acts against the aims and purposes of the
University as specified in its governing documents or in rules,
regulations and procedures adopted from time to time.
Applicable Laws and Regulations
Users are bound by the laws of England and Wales when using the
University’s IT resources. In addition, when using MMU devices or
accessing the University’s network from abroad, users must adhere to the
laws of that country too
4

It is the user’s responsibility to ensure his or her activities comply
with these laws

The use of University IT resources is subject to all relevant University
regulations

When making use of the internet, the acceptable use policies of the
carriers apply, in particular, the Joint Academic Network
(JANET).(See https://community.ja.net/library/acceptable-use-policy
for the JANET Acceptable Use Policy).

The University has a statutory duty, under the Counter Terrorism
and Security Act 2015, to aid the process of preventing people being
drawn into terrorism.
Personal Use

While the University’s IT resources are made available principally to
support the furtherance of an individual’s employment or course of
study with the University, it is recognised that users may
Revision No: 3.0
Aug 2015
Review Date: Aug 2016
IT Services
occasionally want to use these resources for their own purposes
5

Provided that such personal use is not prohibited or excessive and
does not detract from or interfere with the acceptable use of
University IT resources, it will normally be tolerated

While IT resources may be used for personal use it is not
recommended that users store or share sensitive or personal data
as the University cannot guarantee privacy for personal use

The University reserves the right to withdraw access to IT resources
for personal use at any time and may remove or modify information
(including personal data) held on its IT resources.
Monitoring & Access
The University does not routinely engage in systematic monitoring or filtering
activities, but reserves the right to do so, (in accordance with any relevant
legislation) for the following purposes:





to ascertain compliance with UK law and MMU regulations/procedures
in the interests of national security
to prevent/detect crime
to investigate or detect prohibited use of resources
to safeguard the security or effective operation of the University’s IT
systems.
The University retains a right of access to all information held on University
computing facilities and to all user accounts (including email, files and data)
where there is a clear business need.
6
The University’s Disciplinary Procedure
The University’s policy on the prevention of prohibited use is:

to make all staff and students aware of this acceptable use policy

to educate staff and students in matters relating to acceptable use

to take swift and effective action within existing disciplinary and/or
legislative frameworks to address any user found to be using the
University’s IT services in a prohibited manner.
Where prohibited use of IT resources has been identified, the matter will be
the subject of investigation in accordance with the appropriate disciplinary
procedure.
Any prohibited use which is deemed to be in contravention of the law and/or
Revision No: 3.0
Aug 2015
Review Date: Aug 2016
IT Services
which involves the intentional access, creation, storage or transmission of
material which may be considered indecent or obscene will be regarded as
an act of gross misconduct on the part of staff. This would also qualify as an
act for which students may be expelled under the student disciplinary
procedure.
The only exception to this is under special circumstances, where, in the
course of academic research, there is an element of the research that
requires this access. In this case it would require prior, explicit approval
through the University’s official processes for dealing with academic, ethical
issues.
7
The University’s Exit Procedures
Upon leaving the University it is expected that users:





will promptly return all University IT equipment in reasonable working
condition
should not delete any data which belongs to the University and which the
University may need in future
should ensure any data which may be needed by the University is transferred
to an appropriate colleague prior to their departure
should ensure any of their own data that they wish to keep is removed from
the University’s resources, as they will not be entitled to access this (and the
University will not retrieve it for them) once they leave
review and conform to any other procedures set out by the University in
relation to your departure. Line managers and student support services are
best placed to advise on this.
Version Number and Approval Dates
Version
3.0
Approved August
Date
2015
Date for
Review:
Author Name & Job
Title
Brendon Kenny
IT Marketing
Communications Manager
Approved by:
(Board/Committee)
August 2016
This policy is subject to regular review to reflect the changing
nature of IT services.
Revision No: 3.0
Aug 2015
Review Date: Aug 2016