Conditions of Use of Information Technology (IT) Facilities at Imperial College

This is a local copy of a college security policy document.

The User agrees and accepts that:

  1. Use of College IT facilities, and their use to access non-College IT facilities, must be for the purpose of University research, teaching, coursework, associated administration or other authorised use. No 'private/commercial' work is permitted without prior authorisation. College IT facilities include the network, the virtual private network (VPN), computers, printers and the associated services e.g. software, data, email, Web, E-journals, bulletin boards, data bases but do not exclude any other part of the College IT facilities.

    Occasional personal use of the Desk top computer, e-mail and web access is permitted provided such use does not disrupt the conduct of College business or other Users.

  2. When using College IT facilities the user must comply with the College Information Systems Security Policy and all relevant statutory and other provisions, regulations, rules and codes of practice. Specifically, but not exclusively, the User must:

  3. All data/programs created/owned/stored by the user on or connected to College IT facilities may, in the instance of suspected wrong doing, be subjected to inspection by College or by statutory authorities. Should the data/programs be encrypted the User shall be required to provide the decryption key to facilitate decryption of the data/programs.

  4. Other than any statutory obligation, the College will not be liable for any loss, damage or inconvenience arising directly or indirectly from the use of, or prevention of use of, any IT facility provided and/or managed by the College.

  5. Whilst the College takes appropriate security measures against unauthorised access to, alteration, disclosure, destruction or accidental loss of personal and other data it cannot and does not give any warranties or undertakings to the USER about security, confidentiality or integrity of data, personal or other. The same applies to other IT material submitted to or processed on facilities provided or managed by the College or otherwise deposited at or left on its premises.

  6. His/her name, address, photograph, status, e-mail name, login name, alias, College Identifier (CID) and other related information will be stored in computerised form for use for administrative and other purposes e.g. monitoring system usage.

  7. As provided by the Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000, made under the Regulation of Investigatory Powers Act 2000 the College will intercept and monitor electronic communications for the purposes permitted under those Regulations in accordance with the Code of Practice on Monitoring Electronic communications in the College Information Systems Security Policy.

  8. These conditions apply to non-College owned equipment e.g. personal Laptops, home PCs when connected to the College network, directly and/or via the VPN, for the duration that the equipment is using the College network.
Breach of these conditions may lead to College disciplinary procedures being invoked, with penalties which could include suspension from the use of all College computing facilities for extended periods and/or fines. Serious cases may lead to expulsion or dismissal from the College and may involve civil or criminal action being taken against the User.

If you need advice or have any queries on the above please contact CSG.