Contents of this section:

[Note. An asterisk denotes a reference to a previously published or recurrent entry.]

Return to Contents Page of this issue


Arrangements concerning representations on any matter currently before Congregation are set out in `University Agenda' above. Notices to which a response is invited may also be found under `General Notices' below.


Notice of Proposed Consent to the Amendments to the Statutes of St Hilda's College

The Committee on Statutes before the Privy Council, acting under authority delegated to it by Council, is minded to give consent on behalf of the University to the amendments to Statutes II and IV of St Hilda's College, as approved by the Governing Body on 30 April 2003, in so far as such consent is required by Section 7 (2) of the Universities of Oxford and Cambridge Act, 1923. This consent will be effective unless written notice of a resolution, signed by at least twenty members of Congregation, calling upon Council to withhold that consent, has been given to the Registrar by noon on Monday, 3 November. The effects of the amendments are to update provisions in relation to the election of a new Principal and the remuneration of other officers of the college.

Return to List of Contents of this section



Sheldonian Theatre, 21 November

The Curators of the Sheldonian Theatre propose to allocate seats for this ceremony, subject to availability, to members of the University and their guests on application to the Head Clerk at the University Offices.

It should be noted that those who propose to take part in the procession to the Sheldonian Theatre (i.e. Pro-Vice-Chancellors, Heads of Houses, holders of the Oxford Degrees of Doctor of Divinity, Civil Law, Medicine, Letters, Science, and Music, the Proctors, the Assessor, the Public Orator, the Professor of Poetry, the Registrar, and the President and Officers of OUSU) do not need tickets for themselves, but may wish to apply for guest tickets.

Applications for tickets, stating the name and standing in the University of each person for whom a ticket is requested, should be made in writing or by e-mail, and should reach the Head Clerk, University Offices (e-mail: no later than Friday, 14 November.

All members of the University attending this ceremony are expected to wear full academic dress, including subfusc.

Return to List of Contents of this section


The Senior Proctor has nominated JOHN PHILIP DOMINIC COOPER, MA, D.PHIL., Fellow of Lincoln College, as a Pro-Proctor for the remainder of the current proctorial year, vice Dr Matthew Grimley. Dr Cooper was admitted to office by the Vice-Chancellor on 7 October.

Return to List of Contents of this section


Call for proposals, winter 2003

The Academic Computing Development Team invites proposals from Oxford University staff for the development of IT-based teaching or research projects. The ACDT is part of the OUCS Learning Technologies Group, and has been developing projects for five years. The Development Team has a multidisciplinary remit, and proposals are invited from staff members within any division for projects to be developed during the year 2004--5. The ACDT encourages applicants who wish to begin projects with a start date of April 2004 or November 2004.

Projects may be based in any subject area and can have either a teaching or research focus. Examples of the types of projects which might be considered appropriate are: Web-based teaching and learning materials; dissemination of rare or difficult to access materials; innovative methods of using IT to support traditional teaching; and the design and development of software. Projects may range in size from provision of advice on planning an IT project to the design and development of a whole system. They may involve more than one partner including academic, library, museum, and support staff. The ACDT has already developed a number of successful projects, details of which can be found on the `About our projects' section of the Web site.

Further details, guidance on how to propose a project, and an application forms may be obtained from Questions should be directed to Sophie Clarke, ACDT Project Manager, OUCS, 13 Banbury Road (telephone: Oxford (2)83428, e-mail:

The closing date for proposals is Friday, 19 December.

Note: if the project will involve the use of substantial amounts of material held in Oxford libraries, the organisers are strongly encouraged to contact the Oxford Digital Library Development Fund (telephone: Oxford (2)80045, e-mail: The ACDT will be working collaboratively with ODL but chiefly on the development of interfaces and learning environments that utilise ODL materials.

Return to List of Contents of this section


Technology Transfer

Ewert House, Ewert Place, Summertown, Oxford OX2 7SG

Isis Innovation Ltd is the technology transfer company of the University of Oxford, commercialising the research generated within and owned by the University. Established in 1988, Isis is a wholly-owned subsidiary of the University, founded to evaluate, protect, and market the University's intellectual property (where there are no pre-existing exploitation arrangements). In 2002, Oxford University Consulting became part of Isis, matching business consulting needs with University researchers. Isis provides researchers with commercial advice, funds patent applications and legal costs, negotiates exploitation and spin-out company agreements, and identifies and manages consultancy opportunities for University researchers. Isis works on projects from all areas of the University's research activities including the life sciences, physical sciences, humanities, and social sciences. Isis welcomes contact from any researcher interested in technology transfer and consultancy opportunities. Visit to learn more about Isis' activities, including its portfolio of technologies and spin-out companies, and to see the `Information for Oxford Researchers' resource.

For more information contact one of Isis' Group Heads: Linda Naylor, Life Sciences (telephone: (2)80910, e-mail:; David Baghurst, Physical Sciences (telephone: (2)80858, e-mail:; or Mark Taylor, Business Innovation and Consulting (telephone: (2)80824, e-mail:

Return to List of Contents of this section


Queen's College

Organ recitals

The following organ recitals will be given at 1.10 p.m. on the following Wednesdays in the chapel, Queen's College. Admission is free, with a retiring collection.

Further details may be found on the college Web site,

29 Oct.: James Lloyd Thomas, St Mary's, Eastbourne.

5 Nov.: Joshua Getzler and Francis Knights.

12 Nov.: Nicholas Wearne, New College.

19 Nov.: David Gibbs, Carlisle Cathedral.

26 Nov.: Matthew O'Donovan, London.

3 Dec.: Malcolm Archer and David Bednall, Wells Cathedral (duet recital).

Return to List of Contents of this section

Maison Française

ANDREW LACK (violin), JOHN BLEACH (horn), and JOHN EILBECK (piano) will perform works by Brahms, Duvernoy, and Franck, at 8 p.m. on Friday, 24 October, in the Maison Française.

Return to List of Contents of this section


The following regulations relating to the use of the University's IT facilities are made by the ICT Committee with the approval of Council. They may also be found at

ICTC Regulations 1 of 2002


Made by the ICTC on 6 June 2002

Approved by Council on 24 July 2002, and as

amended with effect from 17 October 2003

1. In these regulations, unless the context requires otherwise, `college' means any college, society, or Permanent Private Hall or any other institution designated by Council by regulation as being permitted to present candidates for matriculation.

2. University IT and network facilities are provided for use in accordance with the following policy set by Council:

(1) The University provides computer facilities and access to its computer networks only for purposes directly connected with the work of the University and the colleges and with the normal academic activities of their members.

(2) Individuals have no right to use university facilities for any other purpose.

(3) The University reserves the right to exercise control over all activities employing its computer facilities, including examining the content of users' data, such as e-mail, where that is necessary:

(a) for the proper regulation of the University's facilities;

(b) in connection with properly authorised investigations in relation to breaches or alleged breaches of provisions in the University's statutes and regulations, including these regulations; or

(c) to meet legal requirements.

(4) Such action will be undertaken only in accordance with these regulations.

3. These regulations govern all use of university IT and network facilities, whether accessed by university property or otherwise.

4. Use is subject at all times to such monitoring as may be necessary for the proper management of the network, or as may be specifically authorised in accordance with these regulations.

5. (1) Persons may make use of university facilities only with proper authorisation.

(2) `Proper authorisation' in this context means prior authorisation by the appropriate officer, who shall be the Director of Oxford University Computing Services (`OUCS') or his or her nominated deputy in the case of services under the supervision of OUCS, or the nominated college or departmental officer in the case of services provided by a college or department.

(3) Any authorisation is subject to compliance with the University's statutes and regulations, including these regulations, and will be considered to be terminated by any breach or attempted breach of these regulations.

6. (1) Authorisation will be specific to an individual.

(2) Any password, authorisation code, etc. given to a user will be for his or her use only, and must be kept secure and not disclosed to or used by any other person.

7. Users are not permitted to use university IT or network facilities for any of the following:

(1) any unlawful activity;

(2) the creation, transmission, storage, downloading, or display of any offensive, obscene, indecent, or menacing images, data, or other material, or any data capable of being resolved into such images or material, except in the case of the use of the facilities for properly supervised research purposes when that use is lawful and when the user has obtained prior written authority for the particular activity from the head of his or her department or the chairman of his or her faculty board (or, if the user is the head of a department or the chairman of a faculty board, from the head of his or her division);

(3) the creation, transmission, or display of material which is designed or likely to harass another person in breach of the University's Code of Practice on Harassment;

(4) the creation or transmission of defamatory material about any individual or organisation;

(5) the sending of any e-mail that does not correctly identify the sender of that e-mail or attempts to disguise the identity of the computer from which it was sent;

(6) the sending of any message appearing to originate from another person, or otherwise attempting to impersonate another person;

(7) the transmission, without proper authorisation, of e-mail to a large number of recipients, unless those recipients have indicated an interest in receiving such e-mail, or the sending or forwarding of e-mail which is intended to encourage the propagation of copies of itself;

(8) the creation or transmission of or access to material in such a way as to infringe a copyright, moral right, trade mark, or other intellectual property right;

(9) private profit, except to the extent authorised under the user's conditions of employment or other agreement with the University or a college; or commercial purposes without specific authorisation;

(10) gaining or attempting to gain unauthorised access to any facility or service within or outside the University, or making any attempt to disrupt or impair such a service;

(11) the deliberate or reckless undertaking of activities such as may result in any of the following:

(a) the waste of staff effort or network resources, including time on any system accessible via the university network;

(b) the corruption or disruption of other users' data;

(c) the violation of the privacy of other users;

(d) the disruption of the work of other users;

(e) the introduction or transmission of a virus into the network;

(12) activities not directly connected with employment, study, or research in the University or the colleges (excluding reasonable and limited use for social and recreational purposes where not in breach of these regulations or otherwise forbidden) without proper authorisation.

8. Software and computer-readable datasets made available on the university network may be used only subject to the relevant licensing conditions, and, where applicable, to the Code of Conduct published by the Combined Higher Education Software Team (`CHEST').

9. Users shall treat as confidential any information which may become available to them through the use of such facilities and which is not clearly intended for unrestricted dissemination; such information shall not be copied, modified, disseminated, or used either in whole or in part without the permission of the person or body entitled to give it.

10. (1) No user may use IT facilities to hold or process data relating to a living individual save in accordance with the provisions of current data protection legislation (which in most cases will require the prior consent of the individual or individuals whose data are to be processed).

(2) Any person wishing to use IT facilities for such processing is required to inform the University Data Protection Officer in advance and to comply with any guidance given concerning the manner in which the processing may be carried out.

11. Any person responsible for the administration of any university or college computer or network system, or otherwise having access to data on such a system, shall comply with the provisions of the `Statement of IT Security and Privacy Policy', as published by the ICT Committee from time to time.

12. Users shall at all times endeavour to comply with guidance issued from time to time by OUCS to assist with the management and efficient use of the network.

13. Connection of computers, whether college, departmental, or privately owned, to the university network is subject to the following additional conditions:

(1) (a) Computers connected to the university network may use only network identifiers which follow the University's naming convention, and are registered with OUCS.

(b) In particular all such names must be within the domain

(c) Any exception to this must be authorised by the Director of OUCS, and may be subject to payment of a licence fee.

(2) (a) The administrators of computers connected to the university network are responsible for ensuring their security against unauthorised access, participation in `denial of service' attacks, etc.

(b) The University may temporarily bar access to any computer or sub-network that appears to pose a danger to the security or integrity of any system or network, either within or outside Oxford, or which, through a security breach, may bring disrepute to the University.

(3) (a) Providers of any service must take all reasonable steps to ensure that that service does not cause an excessive amount of traffic on the University's internal network or its external network links.

(b) The University may bar access at any time to computers which appear to cause unreasonable consumption of network resources.

(4) (a) Hosting Web pages on computers connected to the university network is permitted subject to the knowledge and consent of the department or college responsible for the local resources, but providers of any such Web pages must endeavour to comply with guidelines published by OUCS or other relevant authorities.

(b) It is not permitted to offer commercial services through Web pages supported through the university network, or to provide `home-page' facilities for any commercial organisation, except with the permission of the Director of OUCS; this permission may require the payment of a licence fee.

(5) Participation in distributed file-sharing networks is not permitted, except in the case of the use of the facilities for properly authorised academic purposes when that use is lawful and when the user:

(a) in the case of services under the supervision of OUCS, has demonstrated to the satisfaction of the Director of OUCS or his or her nominated deputy that the user has obtained prior written authority for the particular activity from the head of his or her department or the chairman of his or her faculty board; or

(b) in the case of services provided by a college or department, has demonstrated to the satisfaction of the nominated college or departmental officer that the user has obtained prior written authority for the particular activity from the head of that college or department.

(6) (a) No computer connected to the university network may be used to give any person who is not a member or employee of the University or its colleges access to any network services outside the department or college where that computer is situated.

(b) Certain exceptions may be made, for example, for members of other UK universities, official visitors to a department or college, or those paying a licence fee.

(c) Areas of doubt should be discussed with the Registration Manager at OUCS.

14. (1) If a user is thought to be in breach of any of the University's statutes or regulations, including these regulations, he or she shall be reported to the appropriate officer who may recommend to the appropriate university or college authority that proceedings be instituted under either or both of university and college disciplinary procedures.

(2) Access to facilities may be withdrawn under section 46 of Statute XI pending a determination, or may be made subject to such conditions as the Proctors or the Registrar (as the case may be) shall think proper in the circumstances.

Examining Users' Data

15. All staff of an IT facility who are given privileged access to information available through that facility must respect the privacy and security of any information, not clearly intended for unrestricted dissemination, that becomes known to them by any means, deliberate or accidental.

16. (1) System Administrators (i.e. those responsible for the management, operation, or maintenance of computer systems) have the right to access users' files and examine network traffic, but only if necessary in pursuit of their role as System Administrators.

(2) They must endeavour to avoid specifically examining the contents of users' files without proper authorisation.

17. (1) If it is necessary for a System Administrator to inspect the contents of a user's files, the procedure set out in paragraphs (2)--(5) below must be followed.

(2) Normally, the user's permission should be sought.

(3) Should such access be necessary without seeking the user's permission, it should, wherever possible, be approved by an appropriate authority prior to inspection.

(4) If it has not been possible to obtain prior permission, any access should be reported to the user or to an appropriate authority as soon as possible.

(5) For the purposes of these regulations `appropriate authority' is defined as follows:

(a) in the case of any university-owned system, whether central or departmental: if the files belong to a student member, the Proctors; if the files belong to any member of the University other than a student member, the Registrar or his or her nominee; or, if the files belong to an employee who is not a member of the University, the head of the department, college, or other unit to which the employee is responsible, or the head's delegated representative;

(b) in the case of a departmental system, either those named in (a) above, or, in all circumstances, the head of department or his or her delegated representative;

(c) in the case of a college system, the head of the college or his or her delegated representative.

Return to List of Contents of this section


The composition of the electoral boards to the posts below, proceedings to fill which are currently in progress, is as follows.


                                          Appointed by
The Principal of 
  Somerville                              Mr Vice-Chancellor [1]
The Master of Pembroke                    ex officio
Professor G. Smith                        Council
Professor J.I. Bell                       Council
Professor E. Sim                          Medical Sciences Board
Professor J. Meakins                      Medical Sciences Board
Professor H. Watkins                      Medical Sciences Board
Professor M. Cahalan                      Medical Sciences Board
Dr J. Morris                              ORHT
Professor D. Mason                        Pembroke College 


                                          Appointed by

The Principal of Jesus                    Mr Vice-Chancellor [1]
The Warden of Keble                       ex officio
Professor E. Noam                         Council
Professor L. Lessig                       Council
Professor C. Hood                         Social Sciences Board
Professor D. Zinberg                      OII Management Committee
Professor W.H. Dutton                     OII Management Committee
Dr M.J. Spence                            OII Management Committee
Mr E. Peel                                Keble College

The revised composition of the electoral board to the post below, proceedings to fill which are currently in progress, is as follows.

                                          Appointed by

Mr Vice-Chancellor                        ex officio
The President of 
  St John's                               ex officio
Professor J. Rees                         Council
Professor A.J. Scott                      Council
Professor R. Munton                       Life and Environmental Sciences                  
Professor G.L. Clark                      Life and Environmental Sciences                  
Professor P.C. Newell                     Life and Environmental Sciences                  
Dr A. Rogers                              Life and Environmental Sciences                  
Dr J. Langton                             St John's College

[1] Appointed by Mr Vice-Chancellor under the provisions of Sects. 10 and 11 of Statute IX (Supplement (1) to Gazette No. 4633, 9 October 2002, Vol. 133, p. 108).

Return to List of Contents of this section