Rules and Regulations
These rules apply to all use of the computing and network facilities in New College and concern what is considered to be unacceptable behaviour and misuse, as well as what may infringe licence terms or may be otherwise illegal. Note that all use is permitted for bona fide purposes only, and is subject to proper authorisation (which may be provided either explicitly or implicitly - see below).
The College regards computer misuse as a serious matter, which may warrant disciplinary proceedings, and offenders will be prevented from using the College computing facilities for a period of time dependant on the severity of the misuse.
Explicit authorisation will normally involve the assignment of a ‘username’ and password for the purpose in question.
Implicit authorisation can normally be assumed for services that are advertised as being available without prior registration, for example the Library OPAC services and Networked CD-ROMs accessed from public terminals in the Library. Any facility which is not controlled by the College is subject to regulations determined by the organisation concerned, so authorisation to use such facilities should not be assumed, even though they may be accessible from or connected to the College facilities.
Misuse of computing and network facilities and unacceptable behaviour include (but are not limited to) the following:
- Attempting to gain unauthorised access to a facility;
- Using someone else’s username, with or without their consent
- Disregarding the privacy of other people’s files;
- Giving your password to someone else, or being otherwise careless with it;
- Generating messages which appear to originate with someone else, or otherwise attempting to impersonate someone else;
- Sending messages which are abusive or a nuisance or otherwise distressing;
- Displaying offensive material in a public place;
- Trying to interfere with someone else’s use of the facilities;
- Disregard for ’computer etiquette’;
- Sending chain email and hoax virus alerts;
- Being wasteful of resources (i.e. wasting bandwidth);
- Software piracy (including infringement of software licences or copyright provisions);
- Using the facilities for commercial gain without explicit authorisation;
- Physically damaging or otherwise interfering with the facilities, including wilfully changing hardware, firmware and software set-ups.
- No network socket may be used without the knowledge of the ICT Department.
- Only the assigned IP number may be used.
- No equipment other than a single network card in a personal computer may be connected to the network socket.
- The use of all wireless LANs or wireless equipment is banned, except connection to the college Wireless systems, Eduroam or OWL Wireless Services.
- No hardware or software may be used which compromises the security of the network or the privacy of users.
The state and status of computers
- It is mandatory that users MUST install a virus checker and keep it up to date monthly (a free virus checker is available from the University), this includes Apple Mac operating systems.
- It is mandatory that users MUST keep their operating system up to date with security patches (e.g. Windows update, free over the network). Microsoft Windows XP & Mac OS Versions including and prior to 10.5 will not be allowed on the network. Please ensure you have an up-to-date operating system installed.
- Users with computers in their rooms are responsible for the content of their computer and to any use to which their computer has been put.
- College will not recognise any obligations made to outside parties concerning the use of a computer attached to the College network.
- The network may not be used for commercial purposes.
Peer-to-peer programs and file sharing
- The use of iTunes to share music (not video), which does not infringe copyright, across College is permitted provided that the iTunes shares are password protected. The rules concerning peer-to-peer (P2P) software do not apply to iTunes.
- The unauthorised use of peer-to-peer resource-sharing software on machines connected the Oxford University network is prohibited.
- Users must REMOVE all programs from their computers which involve peer-to-peer file sharing.
- Users may NOT have open shares on their computers; all shares must be password protected. iTunes (music) shares must be password protected.
- Users may NOT download or exchange music or movies, including those from legitimate subscription services, using the College or University network. iTunes™ (music) and Internet radio are permitted but may be curtailed if necessary because of significant traffic.
Users may NOT run:
- mail servers (e.g. imapd, smtp)
- network support services (e.g. DNS, DHCP, BOOTP servers)
- games servers without the permission of the IT Manager
- web servers (e.g. http, https) without authorisation from the IT Manager
- their own wireless networks. Devices that are found to be transmitting a wireless signal will be disallowed from the network
A reasonably comprehensive list of forbidden P2P programs includes
If in doubt, ask the IT Department.
Computer Suite Rules
- Authorised users (see above) have access to the suite for the purposes of using the computers and other facilities, or for consulting members of staff.
- Non-authorised persons are not permitted to use the facilities or enter the suite.
- Smoking, eating or drinking are not permitted in the suite at any time.
- The IT Officer has formal charge of the suite and may take any reasonable action he considers necessary to safeguard the College property or the well-being of other users.
- Children admitted to the suite must be under the control of an adult and must not cause a nuisance to users.
- Pets and other animals may not be brought into the suite.
- Printing: All printing by laser printer will be charged for at a rate per sheet as advertised.
The software and any datasets supplied by the College may be used subject to the relevant supplier’s licence agreements. Software should not be copied from the network, nor should any other software be installed on any of the workstations or networks without the prior consent of the IT Officer.
In general, all software and dataset use is subject to the Code of Conduct produced by the Combined Higher Education Software Team (CHEST).
Please note also the College Statement on Illegal Software.
Information Security Policy
The College issues the rules contained in these pages in addition to the following other requirements relating to use of computing facilities in the University: