UCISA WLF / UKOLN Workshop: Acceptable Use Policy


The document contains a draft copy of an Acceptable Use Policy for the UCISA/UKOLN workshop on Beyond Email: Strategies for Collaborative Working and Learning in the 21st Century which will be held at Weetwood Hall, University of Leeds on 22nd November 2004.

Acceptable Use Policy

About The Workshop

The workshop will provide an opportunity for delegates to learn about the potential of mobile devices and emerging networked technologies to support the aims of higher and further educational institutions. The workshop will provide an opportunity for delegates to address both technical and non-technical issues associated with the successful implementation and deployment of such technologies.

General Principles

Use of mobile device and networked technologies to support the aims of the workshop with be encouraged.

Limitations

The use of mobile device and networked technologies should not be disruptive to other delegates, infringe rights of privacy or breach copyright or cause degradation to the network which would aversely affect others.

Implementation

You can take photographs and sound and video-recording:

You can use mobile phones for SMS/MMS texting and for taking recordings and photographs (subject to comments given elsewhere). However you should ensure that ring tones are switched off and you should not make or receive voice calls during the workshop.

You can engage in instant messaging discussions, create Blog entries, update Wiki pages, etc.:

You must inform the organisers and any speakers if you intend to publish sound or video of the speakers in real-time and obtain their permission to do this.

You must health and safety issues and respond to requests from the workshop and local organisers. This may cover, for example, power cables for laptops which could present a safety hazard.

Remote users may be able to listen to, read about or more actively contribute to the event by accessing technologies such as instant messaging channels, audio or video feeds, etc. However:

Explanatory Notes

Security Of Your PC

Please note that neither the workshop organisers nor venue are responsible for the security of any equipment you bring to the workshop. This includes both physical security of laptops, PDAs, mobile phones, etc. and security against attacks by viruses, etc. over the network. Delegates must ensure that they take appropriate protection; for example installation of personal firewalls such as ZoneAlarm.

Trust and Identification

Participants should not give false or misleading identification for their IDs or aliases in tools such as IM clients.

Participants should be aware that it is possible to masquerade as others and should be careful if divulging confidential information.

About The AUP For This Event

This AUP has been prepared specifically for the UCISA/WLF workshop. The importance of AUPs prior to the deployment of new technologies will be addressed at the workshop. Please note, however, that this particular AUP is not intended as a model AUP.