Contents of this section:

[Note. An asterisk denotes a reference to a previously published or recurrent entry.]

Return to Contents Page of this issue


Approval has been given for the implementation at Oxford of an increase in clinical academic and related salaries in line with the salary awards for 2002 decided by the Doctors' and Dentists' Review Body.

The new rates provide for a 3.6 per cent increase with effect from 1 April 2002 on all salaries and scale points. Payment will be made in the April payroll.

Return to List of Contents of this section


From time to time the attention of the University is drawn to individual cases of financial hardship among widows or widowers of former members of the Federated Superannuation System for Universities (FSSU) and the University of Oxford Employees Pension Scheme (EPS). Limited resources are available to alleviate proven cases of hardship and any enquiry should be addressed to the Superannuation Officer, University Offices, Wellington Square, Oxford OX1 2JD. All cases are dealt with in the strictest confidence.

Return to List of Contents of this section


McDonnell Visiting Fellowships

The McDonnell Centre for Cognitive Neuroscience is closely integrated with the Medical Research Council Centre for Cognitive Neuroscience at Oxford and supports work on many aspects of brain research relevant to human cognition in several departments at Oxford University as well as at other institutions.

The McDonnell Centre encourages work in all areas of cognitive neuroscience across all relevant disciplines and embraces research on experimental, theoretical, and clinical studies of perceptual analysis, memory, language, and motor control, including philosophical approaches to cognition. Current and fuller information on the Centre is available on the Web at

The Centre offers several forms of support including Visiting Fellowships for distinguished researchers from overseas or elsewhere in Britain who wish to work within the Oxford Centre for periods between a week and several months. A Visiting Fellowship can include a modest grant to help with costs of travel and accommodation (but not a stipend), and to pay a bench fee to the host department.

Applications for Visiting Fellowships may be submitted either by a member of the Oxford Centre, or by the intended visitor. There is no special form for applications but they should include the following information: name, address, and status of applicant (in the form of a very brief curriculum vitae); names and addresses of collaborators in Oxford; a brief description (a page or two) of the proposed research; a list of any publications that have already resulted from the area of research; an outline plan of visit/s and expenditure, with total estimated budget, other sources of funding and the amount requested

Applications can be submitted at any time (e-mail is acceptable) to Sally Harte (Administrative Secretary), McDonnell Centre for Cognitive Neuroscience, University Laboratory of Physiology, Parks Road, Oxford OX1 3PT (telephone: Oxford (2)72497, fax: (2)72488, e-mail:

Return to List of Contents of this section


Annual Report 2000–1

The Annual Report for 2000–1 of the Visitors of the Oxford University Museum of Natural History has recently been published, and a copy may be obtained by any member of Congregation on request to the Administrator at the Museum, Parks Road.

Return to List of Contents of this section


Call for Cantonese speakers to learn Mandarin Chinese

The Institute for Chinese Studies is looking for Cantonese-speaking volunteers from within the University with no knowledge of Mandarin Chinese to participate in the final session of a language skills training project. The aim of this session is to teach Mandarin to Cantonese speakers, and it will run for twelve weeks in total, beginning on Monday, 22 April, and finishing on Friday, 12 July.

Participants will be required to commit themselves to a total of ninety contact hours over the twelve weeks, involving one-and-a-half hours a day, five days a week. The classes will take place at 5 p.m. every weekday at the Institute for Chinese Studies, Walton Street. Cantonese-speaking members of the University who wish to learn Mandarin are welcome to participate in the project. Numbers will be limited to fifteen participants.

Those interested should contact Mr Shio-yun Kan at the Centre for Teaching Chinese as a Foreign Language, Institute for Chinese Studies, Walton Street, Oxford OX1 2HG (telephone: Oxford (2)80393/(2)80387, e-mail:

Return to List of Contents of this section


The following policy statement, rules, and guidelines on the use of the University's IT facilities are published by the ICT Committee with the approval of Council. They incorporate a change to the phrasing of rule 10(e) made in Hilary Term 2002. They may also be found at

Policy Statement on Computer Use, Monitoring, and Surveillance

University IT and network facilities are provided for use in accordance with the following policy set by Council. `The University provides computer facilities and access to its computer networks only for purposes directly connected with the work of the University and the colleges and with the normal academic activities of their members. Individuals have no right to use University facilities for any other purpose. The University reserves the right to exercise control over all activities employing its computer facilities, including examining the content of users' data, such as e-mail, where that is necessary:

(a) for the proper regulation of the University's facilities;

(b) in connection with properly authorised investigations in relation to breaches or alleged breaches of provisions in the University's statutes, decrees, and regulations, and the rules on computer use published by the Information and Communications Technology (ICT) Committee from time to time; or

(c) to meet legal requirements. Such action will only be undertaken in accordance with guidelines laid down and published from time to time by the ICT Committee.'

Rules Governing IT Use

The following rules govern all use of university IT and network facilities, whether accessed by university property or otherwise.

(1) Use is subject at all times to such monitoring as may be necessary for the proper management of the network, or as may be specifically authorised in accordance with rules laid down from time to time by the ICT Committee for the purpose of investigation of allegations of activity in breach of the law, or of the University's statutes, decrees, and regulations.

(2) Persons may only make use of university facilities with proper authorisation. Proper authorisation in this context means prior authorisation by the appropriate officer, who shall be the Director of OUCS or his or her nominated deputy, in the case of services under the supervision of OUCS, or the nominated college or departmental officer in the case of services provided by a college or department. Any authorisation is subject to compliance with these rules, and with the University's statutes, decrees, and regulations, and will be considered to be terminated by any breach or attempted breach of these rules.

(3) Authorisation will be specific to an individual. Any password, authorisation code, etc given to a user will be for his or her use only, and must be kept secure and not disclosed to or used by any other person.

(4) Users are not permitted to use university IT or network facilities for any of the following:

(a) any unlawful activity;

(b) the creation, transmission, storage, downloading or display of any offensive, obscene, indecent, or menacing images, data or other material, or any data capable of being resolved into such images or material[1];

(c) the creation or transmission of material which is designed or likely to cause annoyance, inconvenience or needless anxiety, or to harass another person;

(d) the creation or transmission of defamatory material about any individual or organisation;

(e) the sending of any e-mail that does not correctly identify the sender of that e-mail or attempts to disguise the identity of the computer from which it was sent;

(f) the sending of any message appearing to originate from another person, or otherwise attempting to impersonate another person;

(g) the transmission, without proper authorisation, of e-mail to a large number of recipients, unless those recipients have indicated an interest in receiving such e-mail, or the sending or forwarding of e-mail which is intended to encourage the propagation of copies of itself;

( h) the creation, access or transmission of material in such a way as to infringe a copyright, moral right, trade mark or other intellectual property right;

(i) private profit, except to the extent authorised under the user's conditions of employment or other agreement with the University or a college; or commercial purposes without specific authorisation;

(j) gaining or attempting to gain unauthorised access to any facility or service within or outside the University, or making any attempt to disrupt or impair such a service;

(k) the deliberate or reckless undertaking of activities such as may result in the following:

(i) the waste of staff effort or network resources, including time on any system accessible via the University's network;

(ii) the corruption or disruption of other users' data;

(iii) the violation of the privacy of other users;

(iv) the disruption of the work of other users;

(v) the introduction or transmission of a virus into the network.

(l) activities not directly connected with employment, study or research in the University or the colleges (excluding reasonable and limited use for social and recreational purposes where not in breach of these rules or otherwise forbidden) without proper authorisation.

(5) Software and computer-readable datasets made available on the university network may only be used subject to the relevant licensing conditions, and, where applicable, to the Code of Conduct published by the Combined Higher Education Software Team (CHEST).

(6) Users shall treat as confidential any information which may become available to them through the use of such facilities and which is not on the face of it intended for unrestricted dissemination; such information shall not be copied, modified, disseminated, or used either in whole or in part without the permission of the person or body entitled to give it;

(7) No user may use IT facilities to hold or process data relating to a living individual save in accordance with the provisions of current data protection legislation (which in most cases will require the prior consent of the individual or individuals whose data is to be processed). Any person wishing to use IT facilities for such processing is required to inform the University Data Protection Officer in advance and to comply with any guidance given concerning the manner in which the processing may be carried out.

(8) Any person responsible for the administration of any university or college computer or network system, or otherwise having access to data on such a system, shall comply with the provisions of the `Statement of IT Security and Privacy Policy', as published by the ICT Committee from time to time.

(9) Users shall at all times endeavour to comply with guidance issued from time to time by OUCS to assist with the management and efficient use of the network.

(10) Connection of computers, whether college, departmental or privately owned, to the university network is subject to the following additional regulations:

(a) Computers connected to the university network may only use network identifiers which follow the University's naming convention, and are registered with OUCS. In particular all such names must be within the domain Any exception to this must be authorised by the Director of OUCS, and may be subject to payment of a licence fee.

(b) The administrators of computers connected to the university network are responsible for ensuring their security against unauthorised access, participation in `denial of service' attacks, etc. The University may temporarily bar access to any computer or sub-network that appears to pose a danger to the security or integrity of any system or network, either within or outside Oxford, or which, through a security breach, may bring disrepute to the University.

(c) Providers of any service must take all reasonable steps to ensure that that service does not cause an excessive amount of traffic on the University's internal network or its external network links. The University may bar access at any time to computers which appear to cause unreasonable consumption of network resources.

(d) Hosting Web pages on computers connected to the university network is permitted subject to the knowledge and consent of the department or college responsible for the local resources, but providers of these Web pages must endeavour to comply with guidelines published by OUCS or other relevant authorities. It is not permitted to offer commercial services through Web pages supported through the university network, or to provide `home-page' facilities for any commercial organisation, except with the permission of the Director of OUCS. This permission may require the payment of a licence fee.

(e) Participation in distributed file-sharing networks is not permitted.[1]

(f) No computer connected to the university network may be used to give any person who is not a member or employee of the University or its colleges access to any network services outside the department or college where that computer is situated. Certain exceptions may be made, for example members of other UK universities, official visitors to a department or college, or for those paying a licence fee. Areas of doubt should be discussed with the Registration Manager at OUCS.

(11) In the event that a user is thought to be in breach of one or more of these rules or of university statutes, decrees, or regulations he or she shall be reported to the appropriate officer who may recommend to the appropriate university or college authority that proceedings be instituted under either or both university or college disciplinary procedures. Access to facilities may be withdrawn pending a determination, or may be made subject to such conditions as the appropriate officer shall think proper in the circumstances.

Guidelines for Examining Users' Data

(1) All staff of an IT facility who are given privileged access to information available through that facility must respect the privacy and security of any information not intended for public dissemination, that becomes known to them by any means, deliberate or accidental.

(2) System Administrators (i.e. those responsible for the management, operation or maintenance of computer systems) have the right to access users' files and examine network traffic, but only if necessary in pursuit of their role as System Administrators. They must endeavour to avoid explicitly examining the contents of users' files without proper authorisation.

(3) If it is necessary for a System Administrator to inspect the contents of a user's files, the following procedure must be followed. Normally, the user's permission should be sought. Should such access be necessary without seeking the user's permission, it should, wherever possible, be approved by an appropriate authority prior to inspection. If it has not been possible to obtain prior permission, any access should be reported to the user or to an appropriate authority as soon as possible.

(4) For the purposes of these guidelines appropriate authority is defined as follows:

(a) in the case of any University-owned system, whether central or departmental: if the files belong to a student, the Proctors; if the files belong to a Senior Member, the Registrar or his or her nominee; or, if the files belong to an employee who is not a Senior Member, the Head of the Department, House or other unit to which the employee is responsible, or his or her delegated representative; (b) in the case of a departmental system, either those named in (a), or, in all circumstances, the Head of Department or his or her delegated representative;

(c) in the case of a college system, the Head of House or his or her delegated representative.


[1] This rule is not intended to prevent the use of the facilities for properly supervised research purposes, provided that the use is lawful and that the user has obtained prior authority for the particular activity in the manner set out from time to time by the ICT Committee.
Return to text

Return to List of Contents of this section


Magdalen College

Organ recitals

Organ recitals will be given at 5.25 p.m. on Saturdays in the chapel, Magdalen College. Admission is free.

4 May: Magnus Williamson (Lecturer in Music, University of Newcastle).

11 May: Jonathan Hardy (Organ Scholar, Magdalen College).

18 May: George Parsons (Organ Scholar, Queen's College).

25 May: Julian McNamara (Director of Music, St Edward's School).

1 June: Duncan Ferguson (Organ Scholar, Magdalen College).

8 June: Peter Ward-Jones (Music Librarian, Bodleian Library).

15 June: Benjamin Nicholas (Director of Music, Tewkesbury Abbey).

Return to List of Contents of this section

Queen's College

Organ recitals

Organ recitals will be given at 1.10 p.m. on Wednesdays in the chapel, Queen's College. Admission is free (retiring collection).

24 Apr.: Katharine Pardee (New College).

1 May: David Maw (Oriel College).

8 May: Daniel Turner (Queen's College).

15 May: David Bednall (Gloucester Cathedral).

22 May: Christopher Bucknall (Lincoln College).

29 May: George Parsons (Queen's College).

5 June: Cameron Burns (New College).

12 June: Robert Woolley (Royal College of Music).

Queen's College Choir: concert

The Queen's College Choir Concert will give a concert of music by Henry Purcell, followed by madrigals and part-songs, at 7.30 p.m. on Thursday, 6 June, in the Fellows' Garden, Queen's College. Admission will be by programme (£7, £5 concessions, including wine) at the door. Seats may be reserved by e-mail:

Return to List of Contents of this section



Wine-tastings will be held at 5.45 p.m. on Wednesdays in the University Club. Members and their guests are welcome, the cost of admission being £2.50 per person.

1 May: white Burgundies.

29 May: wines for summer drinking.

Return to List of Contents of this section