Code of Conduct

The codes of conduct are a guide to the students expected behaviour while using the universities facilities. These codes have been put in place to ensure each student has the required working environment they need to study comfortably without distraction. Please follow the guide lines set out below and show some consideration for your fellow students.

To view a more detailed explanation of the rules click here, otherwise click on each rule listed below to view its full explanation.  You may view the Codes of Conduct on the schools intranet using the link at the bottom of the page. There you will also find links to the universities IT policies (ITS Links) and JANET regulations.

Do Don’t

 

Special notes for Networking, Network Security and CyberSecurity students..

 

Disciplinary Action

Any breach of any of the these  constitutes non-academic misconduct, how the university deals with non-academic misconduct and possible penalties can be found at www.rgu.ac.uk/about/academic-affairs/quality-assurance-and-regulations/academic-regulations

Students must also be aware that:

  • Any use of the network for activities, which may be in violation of the Data Protection Act or the Computer Misuse Act may be subject to criminal prosecution.
  • Inappropriate use of RGU IT facilities that brings the University into disrepute will have serious consequences, which could even extend to criminal prosecution by offended third parties.

Regulations

To ensure that activities within the school conform to the university and national regulations, as well as local requirements, we expect students to follow the code of conduct set out below.

National Regulations (Joint Academic NETwork)
JANET is a private, government-funded network for education and research. The Robert Gordon University connects to the internet via JANET and is therefore bound by their policy and regulations. The JANET Acceptable Use Policy is available at https://community.jisc.ac.uk/library/acceptable-use-policy

Back to Top

University Regulations

The University has its own IT policy available at http://www.rgu.ac.uk/its/policies. This explains the University’s IT policy and regulations. It also provides links to the JANET regulations.

Back to Top

School of Computing Regulations

The computing labs are for the use of all members of the School of Computing for educational purposes only. We expect students to conduct themselves in a mature and professional manner.

Students should be aware that network activity will be monitored by staff on a regular basis without prior warning, and that access details of all web sites visited are logged. Remote monitoring is used on the system. All incidents of misconduct are logged.

All students must sign an acknowledgement indicating agreement to abide by the Code of Conduct.

Back to Top

Use of the Computer Labs and Student Accounts

Your Account

  • Each student has a unique account.
  • Allowing other people access to your account is not permitted under any circumstances. Consequently, logging in to, or making use of someone else’s account is also not permitted
  • Change your password on a regular basis.
  • Keep your home area (H:\ drive) organised and tidy, with work sorted into folders.
  • The downloading of audio and video is not permitted for personal usage.
  • Ensure other logins, e.g. your Intranet account, work properly before they are required.
  • Information relating to your course will be posted to this account so check your Outlook email account regularly. If you believe you are not receiving mail, please contact the support staff.
  • Do not send any offensive or inappropriate emails.
  • The sending of multiple junk emails (spam) is forbidden.
  • Do not send emails advertising items for sale or advertising non-school activities.
  • Virus check all attachments on emails especially those from unknown sources.

Back to Top

Your Email Account

  • Information relating to your course may be posted to this account so check your Outlook email account regularly. If you believe
  •  If you are not receiving mail, please contact the support staff.
  • Do not send any offensive or inappropriate emails.
  • The sending of multiple junk emails (spam) is forbidden.
  • Do not send emails advertising items for sale or advertising non-school activities.
  • Virus check all attachments on emails especially those from unknown sources.

Back to Top

Internet Use

Internet access is provided to allow students to undertake their studies. The following activities are not permitted and any violation of these rules will result in disciplinary action.

  • Accessing of internet sites deemed illegal, inappropriate or offensive.
  • Downloading/Uploading of any illegal, inappropriate or offensive material.
  • Playing games (unless during an authorised supervised event).
  • Using chat sites before 6.00 pm.

Back to Top

Security

Only students/staff of the School of Computing may use the lab machines.

  • Do not allow unauthorised users into the labs or log them onto the lab PCs.
  • Never tell anyone your password. No one, not even the support team, needs to know it.
  • Do not download or install software of any type. All software installed on the system is checked to ensure that the various packages work together. The installation of untested software could lead to problems. There is also the danger of unauthorised software introducing a Virus or Trojan.
  • Users must not write, compile or execute any program or process which deliberately consumes unreasonable amounts of computer resource, such as programs with infinite loops. If this happens accidentally users must seek advice on how to stop such a process.
  • Users must not write, compile or execute any program which attempts to gain access to other users’ directories or files, or which attempts to capture or reveal other users’ passwords, or which causes any user to compromise the security of files or other system resources. Such activities are illegal.

Back to Top

Essential Housekeeping

With the large numbers of students and staff using the labs we would ask that you keep the workstations and labs tidy in the following manner.

  • Do not consume any food or drink in the labs.
  • Collect printouts from printers as soon as possible, they are deleted after 3 days..
  • Dispose of any unwanted paper in the recycled paper bins.
  • Dispose of all rubbish in a bin – do not leave it on the floor or desks.
  • Report all faults and problems in the labs to the support staff in N425, SIWB.

Back to Top

Courtesy to Other lab users

Every student has a right to a quiet, peaceful environment in which to work. Please do not disrupt the work of other lab users.

  • Switch mobile phones off when in the labs. If you have to make a call please leave the lab.
  • Do not disturb, annoy or harass other lab users.
  • Do not play music or video items at high volume – please use headphones.
  • When in conversation with other uses please do so quietly.
  • Ensure that you leave the workstation in the condition you found it. Report any damaged or non-working equipment to the IT support team in N425
  • Students should respond politely and promptly to any request by RGU staff to leave the premises prior to closing

Back to Top

Reservation of Lab machines

No student has a right to a specific machine. Please observe the following rules to ensure that best use is made of the available machines.

  • When a scheduled class is taking place in a laboratory, vacant places may only be used with the permission of the lecturer responsible for the class. Students using such places must be prepared to leave at any time if asked and in any case must not distract the other students.
  • Machines may only be locked for a maximum of 10 minutes to allow for a “comfort break”.
  • Always log off from a PC and turn off the monitor when leaving a lab.
  • Never log into more than one PC at any one time.
  • Never store any files on the local machine unless you have been given instructions to do so or administrative access in a project lab.

Back to Top

Use of Electrical points

The electrical points in the IT labs are for powering the equipment in the room.

  • Never disconnect any equipment for the power for anything other than health and safety reasons.
  • Using spare power points to charge personal equipment is permitted but should only be done safely (ie no cables trailing across walkways etc.) and without disconnecting existing equipment.

Back to Top

Network & CyberSecurity

Some students who are undertaking study of CyberSecurity, Network Management or Network Security will gain access to tools that could cause harm to others if misused. Please observe the following rules

  • Activities making use of network scanning, penetration testing software, potentially exploiting network traffic or other PC’s/Server are only permitted during class times in the lab that has been assigned for the work. Any unauthorised use of these tools outside these assigned times or the networking lab will be subject to disciplinary action.
  • The installation of network scanning or penetration testing software is allowed on personal laptops but the use of these tools outside the permitted time and/or then networking lab will be subject to disciplinary action.
  • Denying service to other users (for example, by overloading of access links or switching equipment, of Janet services, or of services or end systems on another Organisation’s network) will be subject to disciplinary action.
  • In the event that private network traffic or private data is captured in error, the student will be expected to stop the activity immediately and is obligated to destroy the data. Any attempt to do this maliciously will result in disciplinary action.

Back to Top