skip to primary navigationskip to content
 

Using your UIS accounts

General information about your University-provided computing accounts, acceptable use policy for IT services, and the University's software policy. 

How long will I have my accounts for?

  • Students
    Your accounts will be cancelled at the end of your student career unless we know that you are continuing to another course or becoming a member of staff. You will be given warning of the cancellation of your accounts. If you are continuing your studies in Cambridge, or becoming a member of staff, you will keep the same username (CRSid) and email address.
    Students leaving the University


  • University and College Staff
    Your accounts will be valid as long as you are a member of staff of the University. If you are leaving the University, please inform Information Services by letter, or by sending an e-mail to , so that your accounts can be cancelled.
    Staff leaving the University


  • Academic visitors
    Your accounts will be cancelled on the finishing date that you specified on your application form unless you send an e-mail to prior to this date to advise us of a revised date.

Are there any charges?

There is no charge for the principal UIS services – Desktop Services (PC and Mac systems and the filestore), Hermes (email) or Raven (web authentication service) – nor for attending IT training courses run by UIS.

All printing to UIS printers is charged, as are ancillary services such as disc copying and recovery.

The University is charged for its connection to the Internet. Colleges and departments contribute to the cost depending on the total volume of traffic between JANET and the Institution and this charge may or may not be passed on to the end user.

Acceptable use of computing resources

The rules made by the Information Services Committee (ISC) apply to most computer systems and networks in the University, and when you use University computer resources you are bound by these rules. Please read the rules and guidelines: ignorance of them is not an acceptable defence.

There is a recognised disciplinary procedure for breaches of the ISC rules which can result in a user being fined and/or deprived of any or all of his or her accounts, whether or not these are required for the user's course or employment.

The Cambridge University Data Network (CUDN) connects all college and departmental networks. The CUDN, in turn, is connected to JANET (the Joint Academic Network which connects all UK universities and other educational and research institutions) and hence to the Internet. The CUDN and JANET are provided for a specific community and for academic use only; they are not Internet Service Providers (ISPs) in the normal commercial sense.

When you use a computer in the University or in a college, including your own computer when it is attached to a college or department network, you are bound by the Authorised Use Policy (AUP) of the network to which you are immediately connected (the college or departmental network), the Authorised Use Policy of the CUDN and the JANET Acceptable Use Policy.

University computing resources are given to you for your use while you are at the University. You do not own your accounts, but they are provided for your exclusive use for your academic work. Good behaviour and common sense should prevail at all times. If an activity is not specifically prohibited, this does not mean that it is allowed. If you are in doubt as to whether an activity is permitted, you should seek advice rather than experiment.

The following should be specifically noted:

  • Any form of hacking, probing or portscanning of other machines on the internet, whether in Cambridge or beyond, is strictly forbidden.
  • University resources, including the network, may not be used for any illegal purpose. This includes the downloading or storage of copyright material and offensive material including pornography (whether technically legal or not).
  • You may not use University resources in connection with any paid employment or for any commercial purpose.
  • You may not use university accounts assigned to anyone else whether at this University or at another. You may not allow your accounts to be used by anyone else, no matter whether that person has an account on the same computer or how trustworthy you believe that person to be.
  • Excessive network use for games playing or any recreational activity is not permitted.
  • Users who send junk mail (also known as 'spam'), chain mail, unsolicited bulk mail, forged mail, harassing mail and other types of nuisance mail are likely to have their accounts suspended or cancelled.
  • Use of newsgroups and bulletin boards from a University account should be in accordance with the stated purpose of the group and users should ensure that their comments are not libellous or otherwise offensive.
  • Machines that emit large volumes of traffic or otherwise jeopardise the smooth running of the CUDN may be disconnected without notice.
  • If you wish to run an internet service, such as a web server, on a machine connected to an Institutional network, you should first obtain permission from your college or departmental Computer Officer. Please see the section in the ISC Guidelines on the confidentiality of accounts.

Note that, as required by the Regulation of Investigatory Powers Act 2000 & Lawful Business Practice Regulations, 4UIS draws the attention of all users of the Cambridge University Data Network (CUDN) to the fact that their communications may be intercepted as permitted by legislation. In particular, but without limitation, users should be aware that their communications may be intercepted, as provided for by the Lawful Business Practice Regulations, in order to investigate or detect unauthorised use of the CUDN or networks to which the CUDN is directly or indirectly connected.

Details of network traffic use are made available to Institutions via the web. This data includes local host, protocol (port number) and volume of traffic.

The University Software Policy

The use of illegal copies of software is contrary to University policy and all members of the University are expected to comply with the University's Software Policy.