(Translated by https://www.hiragana.jp/)
Non Standard I.T. User Registration and E-mail Addresses
The Wayback Machine - https://web.archive.org/web/20070424182022/http://www.lboro.ac.uk:80/computing/policies/generic-registration.html
Address.
Computing Services.

Policies

Skip navigation.
Photograph: Lady at Computer.

Non Standard I.T. User Registration and E-mail Addresses

Introduction and Summary

This document describes the options available for setting up I.T. user registration and associated e-mail addresses that are not directly linked to individual people. Such registrations are the exception rather than the norm as they demand additional resources and generate extra risks. Clear justification is needed to set them up, and those requesting them are required to ensure they are used securely and in accordance with University policies.

Background

In most cases user registration for use of I.T. facilities is personal, i.e. each staff member and student is allocated a personal username and associated e-mail address and these are identifiably linked to the person's name, and generated in a standard format. All Computing Services automated I.T. registration systems are set up using this model. The vast majority of University work will be done under such personal user accounts. As explicitly stated under the University's I.T. Acceptable Use Policy, individuals are responsible for any actions taken under their personal account.

However there are occasions when an account is needed that is not directly linked to a person's name and / or is not generated and maintained automatically. This can be achieved in a number of ways, depending upon the requirement, but in all cases it is imperative that there is a known individual who is responsible for all activity carried out under that account. The responsible person must be an individually registered user, normally a member of staff of the University, with their own personal registration and e-mail address. This individual must undertake to:

  • State the purpose of the registration and ensure it is only used for that purpose.

  • Take full responsibility at all times for any activities carried out under the account.

  • Maintain a record of the people to whom the username and associated password has been given.

  • Ensure that the password is changed when these people's roles change such that they no longer need access, whether or not an individual remains at the University.

  • By maintaining records or setting up procedures be able to say who was using the account at any particular time in the recent past.

  • Inform Computing Services when the account is no longer required.

  • Inform Computing Services when they are no longer the nominated responsible individual, and provide the name of the new person responsible.

  • Ensure that any e-mail received by the associated e-mail address is dealt with and that e-mail and file deletion is managed.

Authorisation

As there is an administrative cost to Computing Services in setting up and maintaining these arrangements, we ask for an explanation to justify the request and for the Head of Department or Section to countersign all such applications.

Charges

Individual registrations for staff of University departments funded under COMA are not charged. Other organisations, including wholly owned companies of the University, are charged £250 per person per annum for registration. Any individuals using any of the forms of non standard registration must be individually registered as users. There is no additional charge per annum for the additional, non standard registration.

The work associated with setting up and modifying these non standard registrations is undertaken free of charge for University departments funded under COMA. Others, including wholly owned companies of the University, are charged £50 per hour for staff time involved in the work with a minimum charge of £50. Several requests can normally be actioned in an hour, and we encourage submission in batches.

If you require a non standard registration, please consult the various scenarios (www.lboro.ac.uk/computing/policies/generic-scenarios.html) to see which most closely matches your need, then complete the registration form as appropriate (http://census.lboro.ac.uk/cgi-bin/regform5.pl).

Scenarios for non standard registration

We describe a number of common scenarios (see links below www.lboro.ac.uk/computing/policies/generic-scenarios.html) where additional registration is required, along with some related situations where the desired outcome is achieved in other ways. Please use the registration form provided (http://census.lboro.ac.uk/cgi-bin/regform5.pl) to ask for these arrangements to be set up. The scenarios are not exhaustive - if your requirements are different, please contact the Computing Services Help Desk Computing.Services@lboro.ac.uk, ext 2320 for assistance.

  1. Reception Desk.

  2. Regular casual staffing.

  3. Automated Login.

  4. I.T. Administrators.

  5. E-mail Address for Enquiries.

  6. Reception of Incoming E-mail.

  7. Supervised Access for Visitors.

  8. Permanent Supervised Visitor Access.

  9. Role Based Registration, history needed.

  10. Role Based Registration, history not needed.

  11. Change of individual e-mail address.

  12. Extra e-mail address for an individual.

  13. Manager / Secretary working and Confidential e-mail address.