University Gazette, 3 June 2010: University Acts
COUNCIL OF THE UNIVERSITY
1 Approval of nomination of external member of Council
Under regulation 9.3 of Congregation Regulations 2 of 2002 (Supplement (1) to Gazette No. 4633, 9 October 2002, p. 160, as amended on 12 October 2004, 7 March 2006 and 14 October 2008, Gazette, Vol. 135, p. 214; Vol. 136, p. 669, 16 February 2006; Vol. 139, pp. 5–8, 25 September 2008), the nomination below shall be deemed to be approved unless not later than 4 p.m. on Thursday, 17 June the Registrar has received from not fewer than twenty members of Congregation a written request for a postal ballot to be taken in respect of that nomination.
Approval of nomination of Ms Alice Perkins as an external member of Council
The nomination by Council, under the provisions of section 4 (7)–(10) of Statute VI (Supplement (1) to Gazette No. 4633, 9 October 2002, as amended on 8 May 2003, 7 February 2007, 27 May 2008, 16 December 2008, 8 April 2009 and 10 February 2010, Gazette, Vol. 133, pp. 183, 270, 1335, 29 May 2003; Vol. 137, pp. 1109–10, 788, 22 February 2007; Vol. 138, pp. 991–2, 1 May 2008, date of effect 1 October 2008; Vol. 139, p. 458, 11 December 2008; Vol. 139, p. 932, 23 April 2009; Vol. 140, p. 748, 18 March 2010), of ALICE PERKINS, CB, as a member of Council for four years from Michaelmas Term 2010, is submitted for approval.
Notes on the nominated external member of Council
Alice Perkins, CB, graduated in Modern History (St Anne's, 1971) and went straight into the Civil Service fast stream. Her career spanned policy and operations in the Departments of Health and Social Security, public spending in HM Treasury and Civil Service reform in the Cabinet Office. In her last job, she reported to the Cabinet Secretary and was responsible for Civil Service-wide policies on human resource management, training and development, and reform. She left the Civil Service in 2005 and has since taken on a number of part-time roles, including non-executive director roles on the boards of BAA and TaylorNelsonSofres. Among other things she is currently on the Saïd Business School's Business Advisory Council. She is also a part-time executive coach at the JCA Group. Ms Perkins has been a member of Council since MT 2006. She is Chairman of the Nominations Committee and a member of the Finance Committee (and has been a member of the Planning and Resource Allocation Committee and the Task Force on Academic Employment).
2 Changes in Regulations
Council has made the following changes in regulations, to come into effect on 18 June.
Use of Information Technology Facilities
These changes, made on the recommendation of the ICT Subcommittee of the Planning and Resource Allocation Committee, (i) amend the regulations with regard to the use of peer-to-peer technology and (ii) make other minor amendments to the regulations for the purposes of clarification or updating.
Text of Regulations
1 In ICTC Regulations 1 of 2002, concerning the use of Information Technology Facilities (Supplement (2) to Gazette No. 4630, 24 July 2002, as amended on 2 October 2003, 16 February 2006 and 1 June 2006 with effect from 1 October 2006, Gazette Vol. 134, p. 62, Vol. 136, pp. 668 and 1154), delete regulations 5–6 and substitute (new text underlined, deleted text scored through):
'5. (1) Persons may make use of university facilities only with proper authorisation.
(2) 'Proper authorisation' in this context means prior
authorisation by the appropriate officer, who shall be the
(3) Any authorisation is subject to compliance with the University's statutes and regulations, including these regulations, and will be considered to be terminated by any breach or attempted breach of these regulations.
6. (1) Authorisation will be specific to an individual.
(2) Any password, authorisation code, etc. given to a user will be for his or her use only, and must be kept secure and not disclosed to or used by any other person. Exceptions may be made for accounts set up specifically to carry out business functions of the University or a unit within it, but authorisation must be given by the head of the unit.'
2 Ibid., delete regulation 7 (9)–(11) and substitute:
'(9) private profit, except to the extent authorised under the user's conditions of employment or other agreement with the University or a college; or commercial purposes (including advertising commercial services) without specific authorisation;
(10) gaining or attempting to gain unauthorised access to any facility or service within or outside the University, or making any attempt to disrupt or impair such a service;
(11) the deliberate or reckless undertaking of activities such as may result in any of the following:
(a) the waste of staff effort or network resources, including time on any system accessible via the university network;
(b) the corruption or disruption of other users' data;
(c) the unauthorised access, transmission or negligent loss of data;
3 Ibid., delete regulations 11–13 (2) and substitute:
11. Any person responsible for the
administration of any university or college computer or
network system, or otherwise having access to data on such a
system, shall comply with the provisions of the 'Statement of
shall at all times endeavour to comply with policies
and guidance issued
13. Connection of
(1) (a) Computers connected to the university
network may use only network identifiers which follow the
University's naming convention, and are registered with OUCS.
(b) In particular all such names must be within the domain.ox.ac.uk.
(b) The University's Trade Mark and Domain Name Policy specifies, inter alia, that all university activities (other than those within OUP's remit) should be presented within the ox.ac.uk domain. Any exception to this requires authorisation as defined in that Policy.
(2) (a) Owners and administrators of computers
connected to the university network are responsible for
ensuring their security against unauthorised access,
participation in 'denial of service' attacks, etc. In
particular they are responsible for ensuring that anti-virus
software is installed and regularly updated, and that rules
and guidelines on security and anti-virus policy, as issued
from time to time by the
(b) The University may temporarily bar access to any computer or sub-network that appears to pose a danger to the security or integrity of any system or network, either within or outside Oxford, or which, through a security breach, may bring disrepute to the University.'
4 Ibid., delete regulation 13 (4)–(7) and substitute:
'(4) (a) Hosting Web pages on computers connected to the university network is permitted subject to the knowledge and consent of the department or college responsible for the local resources, but providers of any such Web pages must endeavour to comply with guidelines published by OUCS or other relevant authorities.
(b) It is not permitted to offer commercial
services through Web pages supported through the university
network, or to provide 'home-page' facilities for any
commercial organisation, except with the permission of the
(5) Participation in distributed file-sharing networks is not permitted, except in the case of the use of the facilities for properly authorised academic purposes when that use is lawful and when the user:
(a) in the case of services under the supervision of OUCS, has demonstrated to the satisfaction of the Director of OUCS or his or her nominated deputy that the user has obtained prior written authority for the particular activity from the head of his or her department or the chairman of his or her faculty board; or
(b) in the case of services provided by a college or department, has demonstrated to the satisfaction of the nominated college or departmental officer that the user has obtained prior written authority for the particular activity from the head of that college or department.
(5) Use of file-sharing technology and participation in distributed file-sharing networks may be subject to additional regulation and restriction in order to prevent excessive use of university network resources, or the use of those resources for purposes unconnected with the University. If a user has any reason to suppose that an application employs peer-to-peer (p2p) or other file-sharing technology, they should seek the advice of the IT officer responsible for the college or departmental network on which they propose to use the software.
(6) (a) No computer connected to the university network may be used to give any person who is not a member or employee of the University or its colleges access to any network services outside the department or college where that computer is situated.
(b) Certain exceptions may be made, for example, for members of other UK universities, official visitors to a department or college, or those paying a licence fee.
(c) Areas of doubt should be discussed with the
(7) Providing external access to University network
resources for use as part of any shared activity or project
is permitted only if authorised by the
5 Ibid., delete regulation 17 (5)(a) and substitute:
'(a) in the case of any university-owned system, whether central or departmental: if the files belong to a student member, the Proctors; if the files belong to any member of the University other than a student member, the Registrar or his or her nominee; or, if the files belong to an employee who is not a member of the University, or to a visitor to the University, the head of the department, college, or other unit to which the employee or visitor is responsible, or the head's delegated representative;'.
COUNCIL OF THE UNIVERSITY
Register of Congregation
Mr Vice-Chancellor reports that the following names have been added to the Register of Congregation:
Cooksey, R.M., Wellcome Trust Centre for Human Genetics
Lawson, S.J., National Perinatal Epidemiology Unit
McKiernan, C., Humanities Division
DIVISIONAL BOARDS AND BOARDS OF FACULTIES
For changes in regulations for examinations, to come into effect on 18 June, see 'Examinations and Boards' below.