- iPhones, iPads, Smartphones and PDA use
- Cardiff Campus Manager
- The University Wireless Service
- The IT Clinic and IT Shop
- Unsolicited email and subsequent spam
- "Peer to peer" applications and copyright infringement
iPhones, iPads, Smartphone and PDA use
Presently, wireless is not available in University Residences. As such, you will not be able to use a wireless device from these locations - only a wired connection is present in each room.
However, most of the University does have wireless coverage - a list of locations is available.
If you register your laptop from your room, it will automatically be registered for the wireless service. Should you wish to register a mobile device (such as an iPhone, iPad etc), you will need to visit the Julian Hodge Study Centre.
Cardiff Campus Manager
Students in University Residences connect to RESLAN using a registration system called Cardiff Campus Manager. A computer running a fully licensed operating system, with approved anti-virus software installed and configured to accept all security and anti-virus updates will be able to connect to RESLAN quickly, smoothly and easily; within 1 hour of switching on the computer, it should be registered and ready to go for use on the RESLAN network.
The University Wireless Service
As part of your registration for Cardiff Campus Manager, your wireless card will also be registered for use with the University's Wireless Network.
Most buildings are already wireless enabled - list of wireless coverage
Please Note: There is no University Wireless service available from any University residence.
The IT Clinic
The RESLAN Team operate a daily drop-in clinic for impartial, friendly advice for your laptop or network connection.
The team are available from 1pm-3pm, Monday-Friday during term time at the IT clinic which is located on the first floor of the Students' Union building, opposite the IT Shop.
Unsolicited email and subsequent spam
Information Services has received a number of complaints from staff and students who have received unsolicited email originating from third party 'e-cards', 'birthday clubs' or texting services, and subsequently been subjected to an unacceptable volume of spam, virus or hacker attacks.
The sending or instigating of unsolicited email, unless directly related to the academic or administrative activities of the University, is strictly prohibited under regulation 5.3.2 of the Acceptable Use Policy, and breach of this regulation is subject to disciplinary action. Regulation 6.2.5 also provides the University with the authority to suspend access to the internet or the Cardiff University network, whilst complaints are investigated.
To protect the integrity of the Cardiff University network, Information Services will have no hesitation in invoking this regulation and suspending internet access for those instigating unsolicited email in this manner.
"Peer to peer" applications and copyright infringement.
It has been reported by the BBC, that British record companies are to start suing people who share music illegally on the internet.
In March the British Phonographic Industry (BPI) sent out warnings to those who share music illegally telling them that they are being watched and legal action would be taken against them.
All computer users connected to the University network are reminded that it is a breach of UK Copyright Law and University copyright regulations to download, share or distribute copyright material without appropriate authority from the copyright holder.
Most of the violations in question are by means of Peer to Peer (P2P) applications, examples given below, however please note that distribution of copyright materials via any another method (i.e. Ftp, Web, email, etc.) is also considered a breach of copyright legislation.
If you are using any of these Peer to Peer applications you should remove them from your system. If you choose not to remove these applications, you must IMMEDIATELY ensure that your system is set to prevent the application from acting as a provider of unlicensed materials to other users.
In the event of a copyright infringement, Internet access of the system(s) involved will be denied until the material that infringes the copyright has verifiably been removed.
The following are examples of P2P applications:
Note: This list is not intended to be exhaustive.