Skip to main content

Trinity College Dublin, The University of Dublin

Trinity Menu Trinity Search

You are here Policies > IT Policies

IT and Network Code of Conduct

On this page:

1. Code of Conduct

  • College computing resources are provided to facilitate a person's work as a member of staff or student of Trinity College and/or for educational, training, or research purposes. Computing or network resources must not be used for any commercial or significant personal use.
  • Software and/or information provided by Trinity College may only be used as part of the user's duties as a member of Trinity College or for educational purposes.
  • The user agrees to abide by all the licensing agreements for software entered into by the College with other parties.
  • In order to use the computing facilities of Trinity College a person must first be authorised. Registration grants authorisation to use some or all of the computing and networking facilities of Trinity College. During registration, a username and password will be allocated. These are for the exclusive use of the person applying for use of computing facilities. Unauthorised use must not be attempted, or made, of computing or network resources allocated to another person.
  • The user is responsible and accountable for all activities carried out under their username. The password associated with a particular personal username must not be divulged to another person.
  • Passwords used must adhere to accepted good password practice.
  • Attempts to access or use any username which is not authorised to the user are prohibited. Such attempts may be in breach of the Criminal Damage Act (1991).
  • No person shall jeopardise the integrity, performance or reliability of College computer equipment, software and other stored information. In this context, "software" is taken to comprise programs, routines, procedures and their associated documentation which can be implemented on a computer system, including personal computers and workstations. The integrity of Trinity College's computer systems is jeopardised if users do not take adequate precautions against malicious software ( virus programs).
  • Existing norms of behaviour apply to computer based information technology just as they would apply to more traditional media. The ability to undertake a particular action does not imply that it is acceptable. Examination of any files on the computer of a colleague is equivalent to examining their filing cabinet. Seeking to find unprotected files on a multi-user system falls into a similar category. Whilst it is possible to send via the computer communications which may be offensive, obscene or abusive, such behaviour is not acceptable. For specific services Trinity College may provide more detailed guidelines.
  • The user undertakes not to use any Trinity College computing or network resources to make use of or publish material that is obscene, libellous or defamatory or in violation of any right of any third party.
  • If e-mails are being sent to express personal as opposed to College views, users should put in a disclaimer to that effect in their message.
  • No user shall interfere or attempt to interfere in any way with information belonging to another user. Similarly no user shall make unauthorised copies of information belonging to another user.
  • Any software, data or information which is not provided or generated by the user personally and which may become available through the use of computing or communications resources shall not be copied or used without permission of Trinity College, or the owner of the software, data or information.
  • The user undertakes not to infringe any copyright of documentation or software.
  • The user undertakes to comply with the provisions of the Data Protection Act 2018, European Communities (Electronic Communications Networks and Services) (Privacy and Electronic Communications) Regulations 2011 , General Data Protection Regulation (GDPR) and other relevant legislation.
  • The user must not undertake any actions that bring the name of Trinity College into disrepute.
  • The user may use approved Trinity College links to other computing facilities which they are authorised to use. When using external facilities the user must also abide by their rules or code of conduct.
  • Persons who break this code of conduct may find themselves subject to Trinity College's disciplinary and/or criminal procedures.

2. Relevant Legislation: