IT and Information Security. 11.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include the University’s "Use of Computers Policy" and "Information Security Policy" which are available on the University’s website, and any IT or computer policy of the College in force from time to time (as set out on the College’s website). 11.2 With regard to the University’s Policy, use of all IT equipment and its connection to the University's IT network must comply with the "appropriate use of services" element of the Policy. The Policy prohibits the use of computing devices and the University's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. The University may monitor the use (including any personal use) of its network and systems (including telephone, e-mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations. 11.3 By connecting to the IT network of the College or the University, you are accepting all of the associated risks. This includes when you connect to the network with any of your own devices. Neither the College nor the University will be liable for any damage that is caused by your use of IT equipment and/or connection to the network of the College or the University, except in the case of any foreseeable damage resulting directly from negligence or a failure to comply with this contract on the part of the College or the University (as the case may be).
Appears in 3 contracts
Samples: Student Contract, Student Contract, Student Contract
IT and Information Security. 11.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include the University’s "Use of Computers Policy" and "Information Security Policy" which are available on the University’s website, and any IT or computer policy of the College in force from time to time (as set out on the College’s website).
11.2 With regard to the University’s Policy, use of all IT equipment and its connection to the University's IT network must comply with the "appropriate use of services" element of the Policy. The Policy prohibits the use of computing devices and the University's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. The University may monitor the use (including any personal use) of its network and systems (including telephone, e-e- mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations.
11.3 By connecting to the IT network of the College or the University, you are accepting all of the associated risks. This includes when you connect to the network with any of your own devices. Neither the College nor the University will be liable for any damage that is caused by your use of IT equipment and/or connection to the network of the College or the University, except in the case of any foreseeable damage resulting directly from negligence or a failure to comply with this contract on the part of the College or the University (as the case may be).
Appears in 2 contracts
Samples: Student Contract, Student Contract
IT and Information Security. 11.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include the University’s "Use of Computers Policy" and "Information Security Policy" which are available on the University’s website, and any IT or computer policy of the College in force from time to time (as set out on the College’s websitewebsite or Moodle VLE).
11.2 With regard to the University’s Policy, use of all IT equipment and its connection to the University's IT network must comply with the "appropriate use of services" element of the Policy. The Policy prohibits the use of computing devices and the University's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. The University may monitor the use (including any personal use) of its network and systems (including telephone, e-mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations.
11.3 By connecting to the IT network of the College or the University, you are accepting all of the associated risks. This includes when you connect to the network with any of your own devices. Neither the College nor the University will be liable for any damage that is caused by your use of IT equipment and/or connection to the network of the College or the University, except in the case of any foreseeable damage resulting directly from negligence or a failure to comply with this contract on the part of the College or the University (as the case may be).
Appears in 1 contract
Samples: Student Contract
IT and Information Security. 11.1 You must comply with all policies, rules and regulations in relation to the use of IT during the course of your studies. These include the University’s "Use of Computers Policy" and "Information Security Policy" which are available on the University’s website, and any IT or computer policy of the College in force from time to time (as set out on the College’s websitetime).
11.2 With regard to the University’s Policy, use of all IT equipment and its connection to the University's IT network must comply with the "appropriate use of services" element of the Policy. The Policy prohibits the use of computing devices and the University's network for, amongst other things, any illegal activity, the creation or transmission of offensive or obscene material, and the creation or transmission of any material which infringes the IP rights of another person. The University may monitor the use (including any personal use) of its network and systems (including telephone, e-mail, voicemail, internet, other communications, and computer systems) and review or restrict information transmitted using them as reasonably necessary to ensure the appropriate use of its services and to comply with its legal obligations.
11.3 By connecting to the IT network of the College or the University, you are accepting all of the associated risks. This includes when you connect to the network with any of your own devices. Neither the College nor the University will be liable for any damage that is caused by your use of IT equipment and/or connection to the network of the College or the University, except in the case of any foreseeable damage resulting directly from negligence or a failure to comply with this contract on the part of the College or the University (as the case may be).
Appears in 1 contract
Samples: Student Contract