Terms and conditions for use of UCN's IT systems
Your responsibilities
As a student or course participant at UCN, you must follow the rules and guidelines issued by UCN IT and Digi-talisation Office on the safe use of UCN's IT systems. This is vital to ensure that all data and systems run as intended and are protected against unwanted incidents.
Monitoring of activities on UCN's systems
UCN logs and stores your digital activities when you use UCN's IT systems. We do this to secure operations, protect systems and to allow us to react quickly to any technical or security issues.
We may use logged data in the following scenarios:
- Technical error detection
- UCN uses logged data to detect and correct technical issues in the IT systems
- Security breaches
- In the event of a security breach, real or suspected, logged data may be used to investigate what hap-pened and to safeguard UCN's data in the best possible way
- Security alerts
- If UCN's security systems identify a threat – such as compromised login credentials, data or systems – logged data will be used to investigate and counteract any risk
- Use of networks
- When you are on UCN's networks, you may not download or distribute copyright-protected material with-out the appropriate permissions. Obviously, hacking and distribution of virus or malware is also strictly prohibited
To use UCN's IT systems, you must accept the above rules which were laid down to protect you as well as UCN's IT systems.
If you experience, witness or suspect security breaches, please contact the Service Centre on campus or log a case with UCN HelpDesk, and they will guide you on what to do.