skip to content

IT Help and Support

University Information Services
 

1. Authority

1.1 This document is published by the Director of the University Information Service (UIS) as the Authorised Officer for services under the supervision of the Information Services Committee (ISC) and specifies the designated use of the UniOfCam-Guest wifi network (‘Guest Network’) for the purposes of the Rules made by the ISC.
 

2. Definition of user

2.1 This document applies to any institution, organisation or person authorised to use the Guest Network, whether by section 3 below or by specific authorisation by the Director of the UIS. Such institution, organisation or person is hereinafter referred to as the User.
 

3. Specified classes of persons authorised for use of the Guest Network

3.1 Short-term guests, visitors to the University and members of the public are authorised to use the Guest Network. The Guest network is not intended for those who are current members of the University or an affiliated institution who are entitled to internet access via the UDN.
 

4. Provision of third-party access

4.1 A User shall not otherwise, without the prior agreement of the University, provide any individual, institution, or organisation who is not a User with direct or indirect access to the Guest Network.
 

5. Use of other networks connected to the Guest Network

5.1 When the Guest Network is being used to access another network, abuse of the acceptable use policies of that other network is contrary to the Authorisation for Use of the Guest Network. 

5.2 Users warrant that they shall comply with these Terms and Conditions, as well as any terms and conditions, policies or procedures of any partner network listed on the University’s website from time to time, including without limitation; the ISC Rules; the CUDN Terms of Use; and Vodafone.
 

6. Specified purposes for use of the Guest Network

6.1 The Guest Network shall be used only in accordance with the Aims of the University, the Rules made by the UIS, each as promulgated from time to time, and subject to the conditions of this clause 6.1

6.2 The Guest Network shall be used only in accordance with all applicable legislation currently in force.

6.3 The Guest Network shall not be used for the transmission or deliberate reception of defamatory material.2

6.4 The Guest Network shall not be used for the transmission of unsolicited commercial or advertising material.

6.5 The User should be aware that the Guest Network is part of the Internet which is an open network across which information is, in general, transferred without encryption or other means of obscuring the transmitted material. The content of communications may therefore become accessible to those other than the intended recipient(s). Moreover, other information relating to the transmission of a communication, such as means of identifying the source and destination, is routinely available to those who operate the Guest Network and the other networks which make up the Internet.

6.6 Music, video, pictures, text and other content on the Internet are copyright works and Users shall not download, alter, email or otherwise use such content unless certain that the owner of such works has authorised its use by that User.

6.7 If the User becomes aware of information, other than information which is intended to be publicly available, for which the User is not the intended recipient, the User shall keep that information confidential and may, at the User's discretion, forward the information to the intended recipient, advise the sender of the unintended reception, or destroy the information. Save that, if the information appears to refer to the misuse of a computer system or network or to any criminal activity, the User may disclose the information to a relevant authority which may include the UIS management and/or the Police.

6.8 The University shall have the right to record and/or analyse data relating to the transmission of information on the Guest Network for investigating network problems (including, but not limited to, performance), the misuse of computers connected to the Guest Network or elsewhere, or use of the network which is not in accordance with relevant acceptable use policies; in each case the problem or offence may be actual or, with reasonable grounds, suspected. This data may also be recorded for the purposes of accounting and/or statistical analysis, whether for the production of historical reports or for load prediction relating to the network or to local or remote network services. The conditions in 6.7 above shall also apply to members of staff of the UIS except in so far as disclosure is essential for the execution of their duty.

6.9 In cases when the recording and/or analysis of data (in 6.8 above) relates to the information contained in high-level protocol data units (for example the user's data in an electronic mail message), the investigation of each case shall be individually authorised by the Director of the UIS or the Director's nominated deputy.

6.10 It is the responsibility of the institution, organisation or individual person for whom the Guest Network connection is provided to take reasonable steps to ensure compliance with these Terms and Conditions and to ensure that unacceptable use of the Guest Network does not occur. The discharge of this responsibility must include making the documents referenced at clause 5.2 known to those who use that Guest Network connection.

6.11 Users and staff responsible for equipment connected to the Guest Network will keep the operating and associated software up to date and will allow automatic updating where practical and appropriate. 

6.12 Users and staff responsible for equipment connected to the Guest Network will install and keep anti-malware and anti-virus software up to date and will allow automatic updating where practical and appropriate.

6.13 Users and staff responsible for equipment connected to the Guest Network will ensure that such equipment is connected and used in accordance with any instructions, safety and security procedures applicable to the use of that equipment and/or the standards indicated by the University. Users and staff responsible shall also ensure that any such equipment is compliant with any relevant legislation.

6.14 Users shall not use the Guest Network to distribute Internet Viruses, Trojan Horses or other destructive software. 

6.15 Users shall not use the Guest Network in any activity which constitutes or may be capable of constituting a criminal offence in the United Kingdom. 

6.16 Users agree and acknowledge that the University may be required to provide assistance and information to law enforcement, governmental agencies and other authorities. 

6.17 Users agree and acknowledge that the University may monitor Users’ activity while they use the service and keep a log of the Internal Protocol (“IP”) addresses or MAC addresses of any devices which access the Guest Network, the times when they have accessed the Guest Network and the activity associated with that IP address and/or MAC address.

6.18 Users agree that the University is entitled to cooperate with law enforcement authorities and rights-holders in the investigation of any suspected or alleged illegal activity by said User which may include without limitation, disclosure of such information the University has and is entitled to provide by law to law enforcement authorities or rights-holders.

6.19 The University shall have the right of access to any equipment connected to the Guest Network to determine whether and how that equipment or network may be interfering with the proper operation of the Guest Network or any networks to which the Guest Network is connected.

6.20 The University shall have the right to perform tests over the Guest Network to investigate network performance, reliability and security. In particular, these tests may investigate the vulnerability of computers connected to the Guest Network.

6.21 From time to time the University may:

  • 6.21.1 change access codes, usernames, passwords or other security information necessary to access the Guest Network;
  • 6.21.2 issue instructions to Users, which the University believes are necessary for reasons of health, safety, security or the quality of any telecommunications service provided by the University. Users shall comply with any such instructions that the University issues to them; 
  • 6.21.3 temporarily suspend the Guest Network because of an emergency or for operational maintenance or improvements or for the purpose of ensuring network or information security. In such cases, the University shall aim to restore the Guest Network as soon as reasonably practical; or
  • 6.21.4. prevent any User from continuing to use the Guest Network if that User has used the Guest Network in a way that is likely to adversely interfere with the proper operation of the Guest Network or any network to which the Guest Network is connected; and/or in violation of these Terms and Conditions or applicable law.

6.22 The University does not guarantee that products or services or any websites accessible via the Guest Network are error or virus free, and dealings that any User may have with promotions, services or merchants via the Guest Network are solely between that User and the person with whom they are dealing.

6.23 The University does not warrant or guarantee the performance of the internet or that the transmission of information over the internet will be secure or that the internet will be accessible at all times or at the speeds indicated by The University.

6.24 The University may filter access to its Guest Network for child protection or other purposes.

6.25 If a User believes that the UIS is behaving unreasonably in the exercise of the rights of this Clause 6, they may report this to the Chairman of the ISC who may appoint one or more persons to investigate the actions of the UIS in this respect and to report their findings to the ISC.

6.26 The University has the right to revise and amend these terms and conditions from time to time without notice at any time at its discretion.

6.27 The University has the right to suspend, withdraw or discontinue the Guest Network at any time without notice at any time at its discretion.
 

7. Data protection

The Guest Network privacy policy shall apply to these terms and conditions.
 

8. Liability

8.1 To the maximum extent permitted by law, the University expressly disclaims any and all warranties, express or implied, regarding the Guest Network and these Terms and Conditions. The University does not warrant that the Guest Network will meet any User’s requirements or that the operation of the service will be uninterrupted or error free.

8.2 The University, its Colleges and affiliated institutions, their agents and servants shall not be held responsible for loss or damage, direct or indirect, arising from use of the Guest Network or any of the networks to which it is connected, whether directly or indirectly.

8.3 To the maximum extent permitted by law, in no event will the University be liable for damages of any kind (including but not limited to, special, incidental or consequential damages, lost profits or lost data, regardless of the foreseeability of those damages) arising out of or in connection with the use of the Guest Network or any other material or services provided to Users by the University.

8.4 Users agree to indemnify the University, its Colleges and affiliated institutions, their agents and servants against any and all losses suffered by the University as a result of the User’s use of the Guest Network in breach of these Terms and Conditions.
 

9. Governing law

9.1 These Terms and Conditions and all matters arising from or in connection with them shall be governed by and construed in accordance with English law and all Users irrevocably submit to the exclusive jurisdiction of the courts of England and Wales.
 


 

1 The document Use and Misuse of Computing Facilities gives more details of allowable use in accordance with these Terms and Conditions and the Rules made by the Information Services Committee.

2 Criminal libel can occur whether the defamatory statements are true or false and whether or not the statements are made available only to one other person, but the material must be likely to cause serious damage to a person's reputation or a disturbance of the peace. Civil libel does not require serious damage but it is a defence to show that the words were true in fact or substance. This footnote is too small to contain the full legal details relating to libel and similar actions.