1In these regulations, unless the context requires otherwise, 'college' means any college, society, or Permanent Private Hall or any other institution designated by Council by regulation as being permitted to present candidates for matriculation.
(1) The University provides computer facilities and access to its computer networks only for purposes directly connected with the work of the University and the colleges and with the normal academic activities of their members.
(3) The University reserves the right to exercise control over all activities employing its computer facilities, including examining the content of users' data, such as e-mail, where that is necessary:
(2) Any password, authorisation code, etc. given to a user will be for his or her use only, and must be kept secure and not disclosed to or used by any other individual. Exceptions may be made for accounts set up specifically to carry out business functions of the University or a unit within it, but authorisation must be given by the head of the unit.
(2) the creation, transmission, storage, downloading, or display of any offensive, obscene, indecent, or menacing images, data, or other material, or any data capable of being resolved into such images or material, except in the case of the use of the facilities for properly supervised research purposes when that use is lawful and when the user has obtained prior written authority for the particular activity from the head of his or her department or the chair of his or her faculty board (or, if the user is the head of a department or the chair of a faculty board, from the head of his or her division);
(6) the sending of any e-mail that does not correctly identify the sender of that e-mail or any message appearing to originate from another individual, or otherwise attempting to impersonate another individual;
(8) the transmission, without proper authorisation, of e-mail to a large number of recipients, unless those recipients have indicated an interest in receiving such e-mail, or the sending or forwarding of e-mail which is intended to encourage the propagation of copies of itself;
(13) activities not directly connected with employment, study, or research in the University or the colleges (excluding reasonable and limited use for social and recreational purposes where not in breach of these regulations or otherwise forbidden) without proper authorisation.
9. Users shall treat as confidential any information which may become available to them through the use of such facilities and which is not clearly intended for unrestricted dissemination; such information shall not be copied, modified, disseminated, or used either in whole or in part without the permission of the individual or body entitled to give it.
10. No user may redirect email automatically and indiscriminately from a University email account (@
ox.ac.uk) to an external email account. An exception to this rule may only be granted in exceptional circumstances and by application to the Chief Information Officer.
11. (1) No user may use IT facilities to hold or process data relating to a living individual save in accordance with the provisions of current data protection legislation (which in most cases will require the prior consent of the individual or individuals whose data are to be processed).
(2) Any individual wishing to use IT facilities for such processing is required to inform the University Data Protection Officer in advance and to comply with any guidance given concerning the manner in which the processing may be carried out.
12. Any individual responsible for the administration of any university or college computer or network system, or otherwise having access to data on such a system, shall comply with the provisions of the Information Security Policy and Data Protection Policy.
(b) The University's Trade Mark and Domain Name Policy specifies, inter alia, that all university activities (other than those within OUP's remit) should be presented within the
ox.ac.uk domain. Any exception to this requires authorisation as defined in that Policy.
(b) The University may temporarily bar access to any computer or sub-network that appears to pose a danger to the security or integrity of any system or network, either within or outside Oxford, or which, through a security breach, may bring disrepute to the University.
(4) (a) Hosting Web pages or other network-accessible media on computers connected to the university network is permitted subject to the knowledge and consent of the department or college responsible for the local resources, but providers of any such Web pages or other media must endeavour to comply with guidelines published by IT Services or other relevant authorities.
(b) It is not permitted to offer commercial services through systems connected to the university network, or to provide other IT facilities for any commercial organisation, except with the permission of the Chief Information Officer (IT Services); this permission may require the payment of a licence fee.
(5) Use of file-sharing technology and participation in distributed file-sharing networks may be subject to additional regulation and restriction in order to prevent excessive use of university network resources, or the use of those resources for purposes unconnected with the University. If a user has any reason to suppose that an application employs peer-to-peer (p2p) or other file-sharing technology, they should seek the advice of the IT officer responsible for the college or departmental network on which they propose to use the software.
(6) (a) No computer connected to the university network may be used to give any individual who is not a member or employee of the University or its colleges access to any network services outside the department or college where that computer is situated.
(7) Providing external access to University network resources for use as part of any shared activity or project is permitted only if authorised by the IT Committee (ITC), and will be subject to any conditions that it may specify.
(8) If any computer connected to the network or a sub-network does not comply with the requirements of this section, it may be disconnected immediately by the Network Administrator or any other member of staff duly authorised by the head of college, section or department concerned.
15. (1) If a user is thought to be in breach of any of the University's statutes or regulations, including these regulations, he or she shall be reported to the appropriate officer who may recommend to the appropriate university or college authority that proceedings be instituted under either or both of university and college disciplinary procedures.
(2) Access to facilities may be withdrawn under section 48 or 49 of Statute XI pending a determination, or may be made subject to such conditions as the Proctors or the Registrar or other decision-maker (as the case may be) shall think proper in the circumstances.
16. All staff of an IT facility who are given privileged access to information available through that facility must respect the privacy and security of any information, not clearly intended for unrestricted dissemination, that becomes known to them by any means, deliberate or accidental.
17. (1) System Administrators (i.e. those responsible for the management, operation, or maintenance of computer systems) have the right to access users' files and examine network traffic, but only if necessary in pursuit of their role as System Administrators.
(a) in the case of any university-owned system, whether central or departmental: if the files belong to a student member, the Proctors; if the files belong to any member of the University other than a student member, the Registrar or his or her nominee; or, if the files belong to an employee who is not a member of the University, or to a visitor to the University, the head of the department, college, or other unit to which the employee or visitor is responsible, or the head's delegated representative;
In Year 3 you have the opportunity of a work placement, with a wide range of organizations. Many graduates go on to work for their placement employers. Students from Oxford Brookes University have obtained placements at the following companies, among many others;
Choose country Bahrain Bangladesh Brazil Brunei Canada China Cyprus Egypt Estonia France Ghana Hong Kong India Indonesia Iran Iraq Italy Japan Jordan Kazakhstan Kenya Kuwait Laos Latvia Lebanon Lithuania Malaysia Morocco Nigeria Norway Oman Pakistan Qatar Russia Saudi Arabia Singapore South Africa South Korea Sri Lanka Taiwan Thailand Turkey Uganda United Arab Emirates United States of America Vietnam Zimbabwe Other countries Go
If you need a student visa to enter the UK you will need to meet the UK Visas and Immigration minimum language requirements as well as the University's requirements. Find out more about English language requirements.
If you do not meet the entry requirements for this degree, or if you would like more preparation before you start, you can take an international foundation course. Once you enrol, you will have a guaranteed pathway to this degree if you pass your foundation course with the required grades.
If you only need to meet the language requirements, you can take our pre-sessional English course. You will develop key language and study skills for academic success and you will not need to take an external language test to progress to your degree.
Please note, tuition fees for Home students may increase in subsequent years both for new and continuing students in line with an inflationary amount determined by government. Oxford Brookes University intends to maintain its fees for new and returning Home students at the maximum permitted level.
The following factors will be taken into account by the University when it is setting the annual fees: inflationary measures such as the retail price indices, projected increases in University costs, changes in the level of funding received from Government sources, admissions statistics and access considerations including the availability of student support.
3a8082e126