CINXE.COM
JISCMail
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta name="google-site-verification" content="bYQAwjn9i1QJW6jl4cgzM_8iX1vz7c16UErSv9q6RNI" /> <meta name="google-site-verification" content="jdJ6Dx-3IDfZyG0Jg1jjzX97Z0xUs0qeSSFur0JsLg8" /><!--JM--> <meta name="google-site-verification" content="PQyHqVQf0HFhIM99W4MjNhIjp39xHob_WV5UqdDxfH8" /><!--MS--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <title>JISCMail</title> <!--[if IE]> <link href="/css/style_ie.css" rel="stylesheet" type="text/css"/> <![endif]--> <link rel="stylesheet" href="/css/blueprint/screen.css" type="text/css" media="screen, projection"/> <link rel="stylesheet" href="/css/blueprint/print.css" type="text/css" media="print"/> <!--[if lt IE 8]><link rel="stylesheet" href="/css/blueprint/ie.css" type="text/css" media="screen, projection"/><![endif]--> <link href="/css/style.css" rel="stylesheet" type="text/css"/> <link href="/css/tagcloud.css" rel="stylesheet" type="text/css"/> <script language="JavaScript" type="text/javascript" src="/js/jquery/jquery-1.4.2.js"></script> <script type="text/javascript" src="/js/tools.scrollable-1.1.2.min.js"></script> <script language="JavaScript" type="text/javascript" src="/scripts/effects.js"></script> <script language="JavaScript" type="text/javascript" src="/scripts/jquery.showcase.2.0.js"></script> <script language="Javascript" type="text/javascript" src="/scripts/jquery.odometer.js"></script> <link rel="stylesheet" type="text/css" href="/css/mygroups.css" /> <link rel="stylesheet" type="text/css" href="/css/banner.css" /> <link href="/css/dropdown/dropdown.linear.columnar.css" media="screen" rel="stylesheet" type="text/css" /> <link href="/css/dropdown/themes/lwis.celebrity/default.advanced.css" media="screen" rel="stylesheet" type="text/css" /> <!--[if lte IE 7]> <script type="text/javascript" src="/js/jquery/jquery.dropdown.js"></script> <![endif]--> <script language="javascript" type="text/javascript"><!-- function goto_URL(object) { window.location.href = object.options[object.selectedIndex].value; } function subform() { document.forms[0].submit() } //--></script> </head> <body> <!-- THIS IS THE NEW SERVER --> <!-- Jisc Banner start --> <div class="jiscbanner"> <div class="jiscbanner-Container"> <p class="jiscbanner-Title">Jisc banner</p> <a class="jiscbanner-Logo" href="https://www.jisc.ac.uk/"> <img class="jiscbanner-Logo_Img" src="/images/jisc-logo.svg" alt="Jisc"> </a> </div> </div> <!-- Jisc Banner end --> <div class="container"> <div class="span-24 last"> <div class="span-6"> <a href="/"><img src="/images/JISCMail_trans.jpg" height="63px" border="0px" alt="Image of JISCMail logo w/ link to homepage"/></a> </div> <div class="span-18 last"> <div align="right"> <form method="get" action="/search.html"> <p> <a href="/cgi-bin/webadmin?OWNER">Login</a> | <a href="https://www.jiscmail.ac.uk/secure">Institutional log on</a> | <a href="#skipnav" accesskey="2">Skip to Content</a> | <a href="/advancedsearch.html" accesskey="s">Advanced Search</a><br /> <label for="query">Search:</label> <input type="text" id="query" name="q" value=""/> <input type="submit" value="Go>" /><br /> <!-- <input type="radio" name="searchtype" id="lists" value="lists" /> <label for="lists">Groups</label> <input type="radio" name="searchtype" id="jmweb" value="jmweb" checked="checked" /> <label for="jmweb">JISCMail Help</label></p> --> </p> </form> </div> </div> <div class="span-24 last"> <div id="strapline">Email discussion lists for the UK Education and Research communities</div> </div> <!-- <div class="span-24 last"> <div id="surveylink" style="float:right;"><a href="https://jisc.researchfeedback.net/wh/s.asp?k=149424860464&u=jiscmail" target="_blank" title="Please complete our JiscMail survey"><img src="/images/Jisc-logo-2013.png" style="vertical-align: middle; padding-right: 0.75em" height="24"/><span>Please complete our JiscMail survey</span></div> </div> --> <div class="span-24 last linksbar"> <ul id="nav" class="dropdown dropdown-linear dropdown-columnar"> <li class="dir"><a href="/" accesskey="1" style="color: #3366CC" >Home</a> </li> <li class="dir"><a href="/about/" accesskey="a" style="color: #3366CC" >About<img src="/images/nav-arrow-down.png" alt="drop down menu icon"/></a> <ul> <li class="dir">About <ul> <li><a href="/about/whatisjiscmail.html">What is JiscMail?</a></li> <li><a href="/about/gettingstarted.html">Getting started with JiscMail</a></li> <li><a href="/help/contacts.html">Contact us</a></li> <!--<li><a href="http://www.jiscmail.ac.uk/jiscmail-newsletter">JiscMail News</a></li>--> </ul> </li> </ul> </li> <li class="dir"><a href="/groups/" accesskey="g" style="color: #3366CC" >Mailing Lists<img src="/images/nav-arrow-down.png" alt="drop down menu icon"/></a> <ul> <li class="dir">Start a Mailing List <ul> <li><a href="/groups/startagroup/grouprequestform.html">Mailing List Request Form and Criteria</a></li> <li><a href="/groups/startagroup/categories.html">Categories</a></li> </ul> </li> <li class="dir">Find a Mailing List <ul> <li><a href="/advancedsearch.html">Find and join a mailing list</a></li> <li><a href="/mailinglists/a-z/index.html">A - Z Lists</a></li> <li><a href="/mailinglists/recentlists.html">Recently Created</a></li> <li><a href="/cgi-bin/webadmin?REPORT&z=4">Search and join JiscMail lists with public email archives</a></li> </ul> </li> <li class="dir">Edit/Delete a Mailing List <ul> <li><a href="/help/listowners.html#5">Renaming or Deleting a Mailing List</a><li> </ul> </li> </ul> </li> <li class="dir"><a href="/policyandsecurity/" accesskey="p" style="color: #3366CC" >Service Policies<img src="/images/nav-arrow-down.png" alt="drop down menu icon"/></a> <ul> <li class="dir">Service Policies <ul> <li><a href="/policyandsecurity/index.html#1">Introduction</a></li> <li><a href="/policyandsecurity/index.html#2">Using JiscMail</a></li> <li><a href="/policyandsecurity/index.html#3">Ethics</a></li> <li><a href="/policyandsecurity/index.html#4">Role of List Owners</a></li> <li><a href="/policyandsecurity/index.html#5">Mailing List Privacy Notice</a></li> <li><a href="/policyandsecurity/index.html#6">Content of Messages</a></li> <li><a href="/policyandsecurity/index.html#7">Mailing List Archives</a></li> <li><a href="/policyandsecurity/index.html#8">Mailing List Etiquette</a></li> <li><a href="/policyandsecurity/index.html#9">Limitations</a></li> <li><a href="/policyandsecurity/index.html#10">Data Protection</a></li> <li><a href="/policyandsecurity/index.html#11">Violating this policy</a></li> <li><a href="/policyandsecurity/index.html#12">Data Protection Schedule</a></li> <li><a href="/policyandsecurity/index.html#13">Amendments</a></li> </ul> </li> </ul> </li> <li class="dir"><a href="/help/" accesskey="h" style="color: #3366CC" >Help<img src="/images/nav-arrow-down.png" alt="drop down menu icon"/></a> <ul> <li class="dir">JiscMail user help documentation (subscribers) <ul> <li> <a href="/help/subscribers.html">JiscMail user help documentation</a></li> <li><a href="/help/subscribers.html#1">Introduction</a></li> <li><a href="/help/subscribers.html#2">Subscribers Corner</a></li> <li><a href="/help/subscribers.html#3">Register Password</a></li> <li><a href="/help/subscribers.html#4">Change Your Email Address</a></li> <li><a href="/help/subscribers.html#5">Institutional Log On</a></li> <li><a href="/help/subscribers.html#6">Mailing List Subscriptions</a></li> <li><a href="/help/subscribers.html#7">Advanced Search</a></li> <li><a href="/help/subscribers.html#8">Posting to a Mailing List</a></li> <li><a href="/help/subscribers.html#9">Contact mailing List Owner</a></li> <li><a href="/help/subscribers.html#10">Archives</a></li> <li><a href="/help/subscribers.html#11">FAQ</a></li> <li><a href="/help/subscribers.html#12">LISTSERV</a></li> <li><a href="/help/subscribers.html#13">Subscriber Commands</a></li> <li><a href="/help/contacts.html">Help & support using JiscMail</a></li> </ul> </li> <li class="dir">List owner help <ul> <li> <a href="/help/listowners.html">List owner help</a></li> <ul> <li> <a href="/help/listowners.html#1">Introduction</a></li> <li><a href="/help/listowners.html#2">2. Creating a Mailing List</a></li> <li><a href="/help/listowners.html#3">3. Getting started with your new mailing list - JiscMail website tools</a></li> <li><a href="/help/listowners.html#4">4. Getting started with your new mailing list - Email commands</a></li> <li><a href="/help/listowners.html#5">5. Moderation</a></li> <li><a href="/help/listowners.html#6">6. Renaming or Deleting a Mailing List</a></li> <li><a href="/help/listowners.html#7">7. Error Messages</a></li> <li><a href="/help/listowners.html#8">8. What to do about unwanted messages</a></li> <li><a href="/help/listowners.html#9">9. Message Customisation</a></li> <li><a href="/help/listowners.html#10">10. File Area</a></li> <li><a href="/help/listowners.html#11">11. Training</a></li> <li><a href="/help/listowners.html#12">12. Frequently asked questions - in development</a></li> </ul> </li> </li> </ul> </li> </ul> </div> <a name="skipnav"> </a> </div> <div class="span-24"> <p> <a name="top"></a></p> <h2>Service Policies</h2> <div class="box"> <h3>Contents</h3> <ul> <li><a href="#1">1. Introduction</a></li> <li><a href="#2">2. Using JiscMail</a></li> <li><a href="#3">3. Ethics</a></li> <li><a href="#4">4. Role of List Owners</a></li> <li><a href="#5">5. Mailing List Privacy Notice</a></li> <li><a href="#6">6. Content of Messages</a></li> <li><a href="#7">7. Mailing List Archives</a></li> <li><a href="#8">8. Mailing List Etiquette</a></li> <li><a href="#9">9. Limitations</a></li> <li><a href="#10">10. Data Protection</a></li> <li><a href="#11">11. Violating this policy</a></li> <li><a href="#12">12. Data Protection Schedule</a></li> <li><a href="#13">13. Amendments</a></li> </ul> </div> <h3><a name="1"></a>1. Introduction</h3> <p>JiscMail supports communication, collaboration and the free-flowing exchange of ideas through email lists primarily for the benefit of UK further and higher education and research communities.</p> <p>Your use of the service is subject to Janet's Acceptable Use Policy, available at: <a href="https://community.jisc.ac.uk/library/acceptable-use-policy">https://community.jisc.ac.uk/library/acceptable-use-policy</a> and to UK laws. JiscMail reserves the right to remove any message, user or list that, in our opinion, violates any section of this policy.</p> <p>Subject to compliance with the Data Protection Act 1998 we may also disclose information necessary to operate our systems, run the service, comply with the law, or protect the service and its users.</p> <p>We routinely review this policy to ensure it reflects our services, funding and the needs of the wider educational community, and changes to it will be communicated on our website.</p> <p>By using JiscMail you accept these conditions so please read them carefully.</p> <p><a href="#top">[Return to Top]</a></p> <h3><a name="2"></a>2. Using JiscMail</h3> <ul> <li>To use JiscMail you have to provide your name and a valid email address see <a href="#5">Section: 5 Mailing List Privacy Notice</a>.</li> <li>To access some features of the website you will also need to associate a password with your email address.</li> <li>All contact information you submit must be true, complete and kept up to date; you can do this yourself, or by contacting the JiscMail Helpline, <a href="mailto:help@jisc.ac.uk">help@jisc.ac.uk</a>. </li> <li>Changes to your information will only be made when we receive a request from you, and in some cases, you may be required to provide additional information to confirm that your identity.</li> <li>You are responsible for maintaining the security of your account, passwords and files.</li> <li>If you use the Institutional Login to register for the service your Institutional Login will be mapped to your email address as well. This will uniquely identify you to JiscMail, but does not contain details of your identity, and is unique to our service.</li> <li>You accept that another person may be able to retrieve your email address, based on list subscription options and the unique configuration for that list.</li> <li>If you leave JiscMail - your name, email address and, Institutional Login will be removed from our database. However, any message(s) you posted to a list, along with your details, will remain in the archives.</li> <li><a href="mailto:help@jisc.ac.uk">JiscMail Helpline</a> is available to all JiscMail users and can be contacted by email or telephone during service hours. Helpline staff will treat you in a fair and consistent way and expect you to treat them with respect and courtesy.</li> </ul> <p><a href="#top">[Return to Top]</a></p> <h3><a name="3"></a>3. Ethics</h3> <p>We endeavour to operate JiscMail to the highest standards and our relationship with you is based on trust. We expect your conduct when using JiscMail to be legal and honest and we will take action against anyone whose activities are found to violate this request.</p> <p>When using JiscMail you are not permitted to:</p> <ul> <li>Add subscribers to our mailing lists without their consent. Subscribers may only be added by others with the subscriber鈥檚 consent and agreement to the conditions of use.</li> <li>Collect information about others (such as email addresses) without their consent.</li> <li>Use the service for commercial exchange such as charging to post messages to their list, selling of email addresses.</li> <li>Deliberately cause JiscMail systems, services or subscriber accounts to be interrupted.</li> <li>Create liability for us as service provider.</li> </ul> <b><p>JiscMail does not control or bear any liability for the content of messages you or others post to lists, it acts as a conduit for messages and we are not liable for the conduct of any other JiscMail user. JiscMail neither moderates nor edits messages before they are posted to the list.</p></b> <p><a href="#top">[Return to Top]</a></p> <h3><a name="4"></a>4. Role of List Owners</h3> <p>Each JiscMail list is managed and owned by one or more individuals, referred to as "List Owners". At least one owner of each list <strong>must</strong> work within the UK academic and research community. List Owners are expected to manage their lists fairly and for the benefit of the majority of their list鈥檚 subscribers.</p> <p>For the purpose of satisfying Data Protection requirements, as detailed in the UK Data Protection Act 2018, each List Owner is the <strong>Controller</strong> of the personal data held within their respective lists. Jisc's obligations as a <strong>Processor</strong> of this data can be found in <a href="#12">Section 12: Data Protection Schedule</a>.</p> <p>In addition to the above, List Owners are specifically responsible for:</p> <ul> <li>Setting the configuration of their list appropriately, understanding how the configuration works and how it may affect their subscribers. <i>This includes subscription settings, reply settings, privacy settings and moderation settings.</i></li> <li>Communicating any amendments made to the list鈥檚 configuration to their subscribers.</li> <li>Establishing discussion parameters for the list, including stating if posts promoting events, services, job advertisements etc. are permitted. <i>This information can be added to the list鈥檚 <strong>Files Area</strong> by the list鈥檚 owner(s) so that it is available to subscribers. If required, a brief outline can also be added to both the list鈥檚 homepage (description section) and the email that is sent to new subscribers on subscription. Contact <a href="mailto:help@jisc.ac.uk">help@jisc.ac.uk</a> if you wish detail added to these.</i></li> <li>Monitoring messages posted to ensure that they are appropriate and taking action if necessary. <i>We recommend that owners have a policy in place to manage this, as well as any subscriber disputes/complaints that may arise during the life of the list. Again, this information can be added to the list鈥檚 <strong>Files Area</strong> by the list鈥檚 owner(s) so that it is available to subscribers. If required, text advising the location of the policy can be added to the list鈥檚 homepage and the email that is sent to new subscribers on subscription. Contact <a href="mailto:help@jisc.ac.uk">help@jisc.ac.uk</a> if you wish for this to be added.</i></li> <li>Promoting their list and managing subscriptions: adding new subscribers (see <a href="#3">Section 3: Ethics</a>), removing subscribers if they request and removing invalid email addresses.</li> <li>Responding promptly to requests from subscribers, potential subscribers and the JiscMail support team. </li> <li>Supporting all subscribers to their list, particularly if they are experiencing difficulties using the list. <i>Problems may include posting, replying, unsubscribing, removing posts from the list鈥檚 archive etc. Requests will usually be received via the listname-request@jiscmail.ac.uk email address (as advised in <a href="/help/subscribers.html#9">Subscriber Help - Section 9: Contact List Owners</a>).</i></li> <li>Cascading relevant information from posts received from the OWNERS-ANNOUNCE list.</li> <li>Keeping the list active by regularly posting messages to encourage new discussions. Alternatively, taking the decision to close the list if it is no longer required. <i>Please note that new mailing lists are expected to be used within six months of creation.</i></li> <li>Notifying the JiscMail support team (<a href="mailto:help@jisc.ac.uk">help@jisc.ac.uk</a>) if they are no longer able to manage their list.</li> </ul> <p>The <a href="mailto:help@jisc.ac.uk">JiscMail Helpline</a> is always available to assist or provide guidance on any of these tasks.</p> <p><a href="#top">[Return to Top]</a></p> <h3><a name="5"></a>5. Mailing List Privacy Notice</h3> <p>Every new mailing list has a default Privacy Notice, the notice explains how information (provided by subscribers, when joining a mailing list or using a mailing list) is used, stored and (in some cases) shared, and how it can be removed.</p> <p>The notice reads:</p> <ul><i> <li>By using this mailing list your personal data (email address, name) may be used by the List Owner to manage your membership, support you in using this mailing list, to identify problems or to make the mailing list better.</li> <li>If you post messages to this mailing list, be aware that any personal data you share within your email (email address, name and signature information) may be visible to others.</li> <li>It is your responsibility as a subscriber to find out how the list archives are managed <strong>before</strong> you post any messages to this mailing list.</li> <li>The List Owner or <a href="mailto:help@jisc.ac.uk">help@jisc.ac.uk</a> can tell you how the archives are stored.</li> <li>Details of how archives may be managed can be found on this website: <a href="https://www.jiscmail.ac.uk/policyandsecurity/#7">https://www.jiscmail.ac.uk/policyandsecurity/#7</a></li> <li>Your email address will continue to be subscribed to the mailing list until you ask the List Owner, or <a href="mailto:help@jisc.ac.uk">help@jisc.ac.uk</a> to remove your details.</li> <li>Any email messages you post to the mailing list will remain in the mailing list web-accessible archives, until you ask the List Owner, or JiscMail helpline help@jisc.ac.uk to remove these details.</li> <li>Your use of JiscMail is subject to JiscMail's service policies: <a href="https://www.jiscmail.ac.uk/policyandsecurity/">https://www.jiscmail.ac.uk/policyandsecurity/</a></li> </i> </ul> <p>To update the wording of the policy on your mailing list contact <a href="mailto:help@jisc.ac.uk">help@jisc.ac.uk</a>. <p><a href="#top">[Return to Top]</a></p> <h3><a name="6"></a>6. Content of Messages</h3> <p>Sending messages to JiscMail lists is a matter of common sense, use your own sense of what is appropriate to guide your conduct without engaging in unreasonable behaviour or disrupting the general flow of discussion on a list (see <a href="#3">Section 3: Ethics</a>).</p> <p>You are responsible for the content of the message(s) you post to JiscMail lists, they should be courteous and relevant to the list topic. Private (off-list) correspondence should not be posted to lists, without first seeking permission from each correspondent involved.</p> <b><p>JiscMail cannot assume any responsibility for the content of any messages sent to lists other than those from JiscMail themselves and we do not review, screen or edit the content.</p></b> <p>List Owners may also provide their own guidelines for acceptable use and list etiquette and we expect list members to abide by these.</p> <h4>Security</h4> <p>The security of messages sent to JiscMail cannot be guaranteed due to the nature of the internet; you should bear this in mind when posting confidential information to a list, even when access to the list is restricted.</p> <h4>Anti-Spam Measures</h4> <p>Promotional messages should only be sent to a list if it is related to the subject or purpose of that list or of potential interest to list members, such as: new releases of software packages, publications, training courses, websites, job vacancies, conferences, etc. If in doubt always check with the List Owner (See <a href="#4">Section 4: Role of List Owners</a>).</p> <p>JiscMail does not allow subscribers to post spam, junk mail, chain letters or other unsolicited bulk email, to lists.</p> <p>Avoid posting the same message to several lists at the same time as this can be misinterpreted as spam, which will result in your messages being rejected and your account being blocked for 48 hours.</p> <p>We cannot guarantee to block all spam, but the following are used to protect against spam on JiscMail:</p> <ul> <li>Anyone who joins JiscMail must confirm their subscription.</li> <li>JiscMail's service providers, use spam-blocking software to safeguard against much of the junk email (spam) which is posted to lists.</li> </ul> <h4>Copyright</h4> <ul> <li>Posting messages to JiscMail lists does not affect copyright. The author (or their employer) will usually be the copyright owner, except for third-party material included in the post.</li> <li>You retain your moral right to be identified as the author of the work, and your moral right against derogatory treatment.</li> <li>When you post to a list you do not lose copyright, but you agree that your message may be archived, forwarded to other lists, and quoted by others.</li> <li>Copyright law provides control over what other people can do with your original work - this includes email messages.</li> <li>Messages sent to a list must not be quoted out of context or mis-attributed.</li> </ul> <p>Further information on copyright is available from the Jisc website, <a href="http://www.jisc.ac.uk/guides/copyright-law">Guide to Copyright Law </a> or visit <a href="http://www.cla.co.uk">The UK Copyright Licensing Agency</a>.</p> <p><a href="#top">[Return to Top]</a></p> <h3><a name="7"></a>7. Mailing List Archives</h3> <p>Messages you post to JiscMail lists may be archived by the list (visible on the JiscMail website) and also by individual list subscribers (stored in subscriber email accounts).</p> <p>The confidentiality and privacy of JiscMail archives is determined by the List Owner (not JiscMail). The default welcome message, which is sent to new subscribers, describes the privacy setting on the mailing list archive.</p> The different archive setting are: <ul> <li>PRIVATE: The archives of a private list are only accessible to subscribers of the list.</li> <li>PUBLIC: The archives of a public list can be accessed by anyone, and are indexed by search engines.</li> <li>OWNER: The archives of the list are only accessible to List Owners.</li> <li>NOTEBOOK=No: There are no archives kept for the list.</li> </ul> <p>To protect the rights of current and previous subscribers a list is not permitted to change the archive privacy settings from private to public.</p> <p><strong>It is your responsibility as a subscriber to find out how the list archives are managed before you post to a list</strong>.</p> <p><a href="#top">[Return to Top]</a></p> <h3><a name="8"></a>8. Mailing List Etiquette</h3> <p>Our simple guidelines for getting started with JiscMail mailing lists, If in doubt check with the List Owner (See <a href="#2">Section 4: Role of List Owners</a>).</p> <ul> <li>Check the privacy settings on the list: Who can see the messages you post? Some JiscMail lists have public archives and can be found by anyone through search engines. </li> <li>If you reply to a message posted to a list, check the recipient of your message. Do you really want it to be posted back to the list and seen by everyone or just to the originator? </li> <li>Ensure messages are on-topic and appropriate for the list.</li> <li>Be nice (See <a href="#3">Section 3: Ethics</a>).</li> <li>Use a meaningful subject line - it increases the chances of your message being read and found in the list archives.</li> <li>Keep messages short and to the point.</li> <li>Before sending attachments, check (with the List Owner) that they are permitted, and if so, avoid sending large attachments.</li> <li>Complain to the List Owner - not the list.</li> <li>When forwarding messages be respectful, comply with copyright and data protection, don't give out private email addresses or contact details of others (if in doubt check with the author).</li> <li>Think before cross-posting to multiple lists - some people belong to more than one list.</li> <li>Check that you are posting your message to the list from the same email account that is registered in JiscMail, otherwise your message will be rejected.</li> </ul> <p>Further information on mailing list etiquette is available from <a href="http://www.bbc.co.uk/webwise/guides/about-netiquette">the BBC</a>.</p> <p><a href="#top">[Return to Top]</a></p> <h3><a name="9"></a>9. Limitations</h3> <p>JiscMail cannot make guarantees about the speed or proportion of emails sent that will be delivered, or that HTML messages will display properly when viewed by all subscribers.</p> <p>Delivery of emails is dependent upon accurate and up to date email addresses, suitable internet availability and connectivity, anti-spam and junk mail policies adopted by the recipients email service providers as well as restrictions regarding the content, wording and graphics of an email.</p> <p>JiscMail does not control or bear any liability for the content of messages you or others post to lists, it acts as a conduit for messages and we are not liable for the conduct of any other JiscMail user. JiscMail neither moderates nor edits messages before they are posted to the list.</p> <p>JiscMail cannot assume any responsibility for the content of any messages sent to lists other than those from JiscMail themselves and we do not review, screen or edit the content.</p> <h4>Service Limitations</h4> <p>Our service providers, L-Soft, host JiscMail servers and provide communication services. We will use all reasonable endeavours to ensure L-Soft provides its services at or above industry standards. L-Soft does not guarantee that JiscMail will be uninterrupted, error, bug or virus free or that the delivery or emails will be without delay. It may be necessary to temporarily suspend JiscMail services to carry out maintenance; such suspensions will be limited and will take place as much as possible outside core working hours. We may also be suspended (in whole or part) where L-Soft is obliged to comply with an order, instruction or request of government, a court or other competent administrative authority or an emergency service organisation.</p> <h4>Service Performance</h4> <p>From time to time we may need to take the service offline, to carry out essential upgrades, and changes to make the service even better. We inform List Owners of planned downtime through our OWNERS-ANNOUNCE mailing list.</p> <p>If, at any time, we notice any issues with the performance of the service, we endeavour to notify users as quickly as possible. We do this using our Service Status (traffic lights) on our website homepage, <a href="https:/www.jiscmail.ac.uk">https://www.jiscmail.ac.uk</a> and post updates to our social media accounts, <a href="https://www.facebook.com/JiscMail">Facebook</a> and <a href="https://www.twitter.com/JiscmailHelp">Twitter</a>.</p> <p><a href="#top">[Return to Top]</a></p> <h3><a name="10"></a>10. Data Protection</h3> <p>JiscMail is operated by Jisc and is registered for compliance under the Data Protection Legislation (as described in <a href="#12">Section 12: Data Protection Schedule</a>)</p> <p>The Data Protection Schedule sets out JiscMail's obligations to each List Owner (the data Controller) with regard to any Personal Data it processes on behalf of the List Owner. In the event of any conflict between the Data Protection Schedule and any other provision of these service policies, the relevant provision of the Data Protection Policy shall take precedence. <ul> <li>When you subscribe to JiscMail your name and email address will be used for the purpose of sending and receiving email messages from JiscMail lists (see <a href="#5">Section 5: Mailing List Privacy Notice</a>. You should understand that these details could be retrieved by any member of the same list and that this information plus any messages you post to JiscMail may be found in the public domain depending on the configuration of the list (see <a href="#4">Section 4: Role of List Owners</a> and <a href="#7">Section 7: Mailing List Archives</a>).</li> <li>If you use Shibboleth to authenticate your ID your Shibboleth Targeted_ID will be mapped to your email address as well. This will uniquely identify you to JiscMail, but does not contain details of your identity, and is unique to our service.</li> <li>If you leave JiscMail your name, email address and, if relevant, Shibboleth Targeted_ID will be removed from our database. </li> <li>If you leave JiscMail you should understand that your details and any message(s) you have previously posted to any JiscMail list(s) will remain in the archives (see <a href="#7">Section 7: Mailing List Archives</a>).</li> <li>JiscMail and our service providers L-Soft will never sell email addresses or any other personal information to another organisation.</li> <li>JiscMail may disclose information if we believe it necessary to operate our systems, to run the service, to comply with the law, or to protect the service or others.</li> <li>When contacting the JiscMail Helpline we collect your name, organisation, email address and if provided the list name. For List Owners (or new List Owners) we record your organisation address and telephone number. All JiscMail Helpline enquiries are assigned a unique enquiry number and enquiry type. The information we collect is used to carry out your request(s) and to report on service activity.</li> <li>The JiscMail Helpline records all enquiries in the Jisc Customer Relationship Management (CRM) system which is used by Jisc and its services. This data will be managed according to <a href="https://www.jisc.ac.uk/website/privacy-notice"> Jisc's Privacy notice </a>. </li> </ul> <p><a href="#top">[Return to Top]</a></p> <h3><a name="11"></a>11. Violating this policy</h3> <p>If you suspect that a JiscMail user has violated this policy - contact the JiscMail helpline as soon as possible by emailing <a href="mailto:help@jisc.ac.uk">help@jisc.ac.uk</a> or telephoning <strong>0300 300 2212</strong>.</p> <p>The decision on what action to take will be made by JiscMail on a case by case basis and will often depend on whether the infringement was innocent, inadvertent or intentional. The decision whether to take action, and if so, which action, is at JiscMail鈥檚 discretion.</p> <p>Abusive or threatening messages sent to any JiscMail list, or to JiscMail Helpline staff will be treated as a violation of this policy.</p> <p>We may take any of the following actions as deemed appropriate:</p> <ul> <li>Contact the person responsible to discuss the problem.</li> <li>Contact the List Owner.</li> <li>Remove inappropriate messages from the JiscMail archives.</li> <li>Restrict email from certain sites or addresses.</li> <li>Remove the subscriber from the service, contact their hosting site, institution, or service provider.</li> <li>Make a public announcement to those affected.</li> </ul> <p>Disagreements between members of a list regarding list management should be taken up with the List Owner.</p> <p><a href="#top">[Return to Top]</a></p> <h3><a name="12"></a>12. Data Protection Schedule</h3> <p>As each List Owner is the Controller of any personal data that is made available by a user via a list they own, then JiscMail acts as the Processor, processing this data on behalf of the List Owner. As such, current Data Protection Legislation requires that there be a written agreement between the Controller (List Owner) and Processor (JiscMail) that sets out the Processor obligations with regard to this Processing. This schedule describes the Processor obligations. <h4>DEFINITIONS</h4> <p>1 The following definition apply to this Data Protection Schedule</p> <style> table, th, td { border: 0.5px Solid Gainsboro; } </style> <table> <col width="60"> <col width="300"> <tr> <td><p><strong>Agreement</strong></p> </td> <td><p> means the agreement between Jisc and the Customer for the provision of the service;</p> </td> </tr> <td><p><strong>Applicable EU Law</strong></p> </td> <td><p>any law of the European Union (or the law of one of the Member States of the European Union);</p> </td> </tr> <td><p><strong>Controller, Processor and Data Subject</strong></p> </td> <td><p>Shall have the meaning given to those terms in the UK Data Protection Act 2018;</p> </td> </tr> <td><p><strong>Data Protection Legislation</strong></p> </td> <td><p> means (a) any law, statute, declaration, decree, directive, legislative enactment, order, ordinance, regulation, rule or other binding restriction (as amended, consolidated or re-enacted from time to time) which relates to the protection of individuals with regards to the processing of data to which a Party is subject, including, primarily, the UK Data Protection Act 2018 and the Privacy and Electronic Communications Regulations 2003 (PECR), but also the GDPR where data concerns EU citizens; and (b) any code of practice or guidance published by the Regulator from time to time;</p> </td> </tr> <tr> <td><p><strong>Data Protection Particulars</strong></p> </td> <td><p>means, in relation to any Processing under this Agreement:</p> <p style="padding-left: 30px;"> (a) the subject matter and duration of the Processing;</p> <p style="padding-left: 30px;"> (b) the nature and purpose of the Processing;</p> <p style="padding-left: 30px;"> (c) the type of Personal Data being Processed; and</p> <p style="padding-left: 30px;"> (d) the categories of Data Subjects.</p> </td> </tr> <tr> <td><p><strong>Data Subject Request</strong></p> </td> <td><p>means an actual or purported subject access request or notice or complaint from (or on behalf of) a Data Subject exercising his/her rights under the Data Protection Legislation;</p> </td> </tr> <tr> <td><p><strong>Data Transfer</strong></p> </td> <td><p>means transferring the Personal Data to, and/or accessing the Personal Data from and/or Processing the Personal Data within, a jurisdiction or territory that is a Restricted Country;</p> </td> </tr> <tr> <td><p><strong>GDPR</strong></p> </td> <td><p>means Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and repealing Directive 95/46/EC (General Data Protection Regulation) OJ L 119/1, 4.5.2016;</p> </td> </tr> <tr> <td><p><strong>Permitted Purpose</strong><p> </td> <td><p>means the purpose of the Processing as specified in the Data Processing Particulars;</p> </td> </tr> <tr> <td> <p><strong>Personal Data</strong></p> </td> <td><p>has the meaning given to it in the GDPR and for the purposes of this Agreement includes Sensitive Personal Data;</p> </td> </tr> <tr> <td><p><strong>Personal Data Breach</strong></p> </td> <td><p>has the meaning given to it in the GDPR and, for the avoidance of doubt, includes a breach of Clause 4.1.3;</p> </td> </tr> <tr> <td> <p><strong>Personnel</strong></p> </td> <td><p>means all persons engaged or employed from time to time by Jisc in connection with this Agreement, including employees, consultants, contractors and permitted agents;</p> </td> </tr> <tr> <td><p><strong>Processing</strong></p> </td> <td> <p>has the meaning given to it in the GDPR (and "Process" and "Processed" shall be construed accordingly);</p> </td> </tr> <tr> <td><p><strong>Regulator</strong></p> </td> <td><p>means the UK Information Commissioner's Office (including any successor or replacement body);</p> </td> </tr> <tr> <td><p><strong>Regulator Correspondence</strong></p> </td> <td><p>means any correspondence or communication (whether written or verbal) from the Regulator in relation to the Processing of Personal Data;</p> </td> </tr> <tr> <td><p><strong>Restricted Country</strong></p> </td> <td><p>means a country, territory or jurisdiction outside of the European Economic Area which the EU Commission has not deemed to provide adequate protection in accordance with Article 25(2) of the DP Directive and/or Article 45(1) of the GDPR (as applicable):</p> </td> </tr> <tr> <td><p><strong>Security Requirements</strong></p> </td> <td> <p>means the requirements regarding the security of the Personal Data, as set out in the Data Protection Legislation (including, in particular, the seventh data protection principle of the DPA and/or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;</p> </td> </tr> <tr> <td><p><strong>Sensitive Personal Data</strong></p> </td> <td><p>means Personal Data that incorporates such categories of data as are listed in Article 9(1) of the GDPR;</p> </td> </tr> <tr> <td><p><strong>Service</strong></p> </td> <td><p>means the JiscMail service;</p> </td> </tr> <tr> <td><p><strong>Schedule</strong></p> </td> <td><p>means this schedule which forms part of the Agreement.</p> </td> </tr> <tr> <td> <p><strong>Third Party Request</strong></p> <td><p>means a written request from any third party for disclosure of Personal Data where compliance with such request is required or purported to be required by law or regulation;</p> </td> </tr> </table> <h4>2. ARRANGEMENT BETWEEN THE PARTIES</h4> <p>2.1 The Parties shall each Process the Personal Data in accordance with the terms of this Schedule. The Parties acknowledge that the factual arrangement between them dictates the classification of each Party in respect of the Data Protection Legislation. Notwithstanding the foregoing, the Parties anticipate and agree that the List Owner shall act as Controller and Jisc shall act as Processor, as follows:</p> <p>2.1.1 The List Owner shall be a Controller where it is Processing the Personal Data in relation to the services being supplied by Jisc; and</p> <p>2.1.2 Jisc shall be a Processor where it is Processing the Personal Data in relation to the Permitted Purpose in connection with the performance of its obligations under these service terms</p> <p>2.2 Each of the Parties acknowledges and agrees that the following table sets out an accurate description of the Data Protection Particulars;</p> <style> table, th, td { border: 0.5px Solid Gainsboro; } </style> <table> <col width="130"> <col width="300"> <tr> <td> <p><strong>The subject matter and duration of the Processing</strong></p> </td> <td><p>JiscMail, the national academic mailing list service, provides email discussion and announcement lists which enable groups of individuals to communicate and collaborate on a local, national or international level using dedicated email discussion and announcement lists.</p> <p>The duration of the Processing will be for the term of the Service agreement between the List Owner and Jisc. </p> </td> </tr> <tr> <td><p><strong>The nature and purpose of the Processing</strong></p> </td> <td><p>The Personal Data will be Processed in order to provide the Service ordered by the List Owner.</p> </td> </tr> <td><p><strong>The categories of Data Subjects</strong></p> </td> <td><p>The Data Subjects are the users of JiscMail</p> </td> </tr> </table> <h4>3. CONTROLLER OBLIGATIONS</h4> <p>3.1 As the Controller in respect of the Processing of the Personal Data, the List Owner shall ensure that:</p> <p>3.1.1 It is not subject to any prohibition or restriction which would prevent or restrict it from disclosing or transferring the Personal Data to Jisc in accordance with the terms of this Schedule; and</p> <p>3.1.2 all fair processing notices have been given (and/or, as applicable, consents obtained) and are sufficient in scope to allow the List Owner to disclose the Personal Data (including any Sensitive Personal Data) to Jisc for the delivery of the Service in accordance with the Data Protection Legislation.</p> <h4>4. PROCESSOR OBLIGATIONS</h4> <p>4.1 Jisc (as a Processor in relation to any Personal Data Processed by (or on behalf of) the List Owner pursuant to the Agreement) undertakes to the List Owner that it shall:</p> <p>4.1.1 Process the Personal Data for and on behalf of the List Owner in connection with the performance of the Service only and for no other purpose in accordance with the terms of this Agreement and any instructions from the List Owner;</p> <p>4.1.2 unless prohibited by law, promptly notify the List Owner (and in any event within forty-eight (48) hours of becoming aware of the same) if it considers, in its opinion (acting reasonably) that it is required by Applicable EU Law to act other than in accordance with the instructions of the List Owner, including where it believes that any of the List Owner's instructions under Clause 4.1.1 infringes any of the Data Protection Legislation;</p> <p>4.1.3 implement and maintain appropriate technical and organisational security measures to comply with at least the obligations imposed on a Controller by the Security Requirements. If requested by the List Owner, Jisc will provide a description of the technical and organisational security measures that Jisc will implement and maintain;</p> <p>4.1.4 take all reasonable steps to ensure the reliability and integrity of any of the Personnel who shall have access to the Personal Data, and ensure that each member of Personnel shall have entered into appropriate contractually-binding confidentiality undertakings;</p> <p>4.1.5 notify the List Owner promptly, and in any event within forty-eight (48) hours, upon becoming aware of any actual or suspected, threatened or 'near miss' Personal Data Breach, and:</p> <p style="padding-left: 30px;"> a. implement any measures necessary to restore the security of compromised Personal Data;</p> <p style="padding-left: 30px;"> b. assist the List Owner to make any notifications to the Regulator and affected Data Subjects;</p> <p>4.1.6 notify the List Owner promptly (and in any event within ninety-six (96) hours) following its receipt of any Data Subject Request or Regulator Correspondence and shall:</p> <p style="padding-left: 30px;"> a. not disclose any Personal Data in response to any Data Subject Request or Regulator Correspondence without the List Owner's prior written consent; and</p> <p style="padding-left: 30px;"> b. provide the List Owner with all reasonable co-operation and assistance required by the List Owner in relation to any such Data Subject Request or Regulator Correspondence;</p> <p>4.1.7 not disclose Personal Data to a third party in any circumstances without the List Owner's prior written consent, other than:</p> <p style="padding-left: 30px;"> a. in relation to Third Party Requests where Jisc is required by law to make such a disclosure, in which case it shall use reasonable endeavours to advise the List Owner in advance of such disclosure and in any event as soon as practicable thereafter, unless prohibited by law or regulation from notifying the List Owner;</p> <p style="padding-left: 30px;"> b. to Jisc's employees, officers, representatives and advisers who need to know such information for the purposes of Jisc performing its obligations under this Agreement and in this respect Jisc shall ensure that its employees, officers, representatives and advisers to whom it discloses the Personal Data are made aware of their obligations with regard to the use and security of Personal Data under this Agreement; and</p> <p style="padding-left: 30px;"> c. to a sub-contractor appointed in accordance with Clause 5. <p>4.1.8 not make (nor instruct or permit a third party to make) a Data Transfer without putting in place measures to ensure the List Owner's compliance with Data Protection Legislation;</p> <p>4.1.9 on the written request of the List Owner, and with reasonable notice, allow representatives of the List Owner to audit Jisc to ascertain compliance with the terms of this Clause</p> <p style="padding-left: 30px;"> a. the List Owner shall only be permitted to exercise its rights under this Clause 1.9 no more frequently than once per year (other than where an audit is being undertaken by a List Owner in connection with an actual or 'near miss' Personal Data Breach, in which case, an additional audit may be undertaken each year by the List Owner within thirty (30) days of the List Owner having been notified of actual or 'near miss' Personal Data Breach):</p> <p style="padding-left: 30px;"> b. each such audit shall be performed at the sole expense of the List Owner;</p> <p style="padding-left: 30px;"> c. the List Owner shall not, in its performance of each such audit, unreasonably disrupt the business operations of Jisc;</p> <p style="padding-left: 30px;"> d. the List Owner shall comply with Jisc's health and safety, security, conduct and other rules, procedures and requirements in relation to Jisc's property and systems which have been notified by Jisc to the List Owner in advance; and</P> <p style="padding-left: 30px;"> e. in no case shall the List Owner be permitted to access any data, information or records relating to any other List Owner of Jisc.</p> <p>4.1.10 except to the extent required by Applicable EU Law, on the earlier of:</p> <p style="padding-left: 30px;"> a. the date of termination or expiry of the Agreement (as applicable); and/or</p> <p style="padding-left: 30px;"> b. the date on which the Personal Data is no longer relevant to, or necessary for, the performance of the Service,</p> <p>cease Processing any of the Personal Data and, within sixty (60) days of the date being applicable under this Clause 4.1.10, return or destroy (as directed, in writing, by the List Owner) the Personal Data belonging to, or under the control of, the List Owner and ensure that all such data is securely and permanently deleted from its systems, provided that Jisc shall be entitled to retain copies of the Personal Data for evidential purposes and to comply with legal and/or regulatory requirements;</p> <p>4.1.11 comply with the obligations imposed upon a Processor under the Data Protection Legislation; and</p> <p>4.1.12 assist the List Owner in ensuring compliance with the obligations pursuant to Articles 32 to 36 of the GDPR taking into account the nature of Processing and the information available to Jisc, provided that Jisc shall be entitled to charge a fee to the List Owner (on a time and materials basis and at such rate notified by Jisc to the List Owner from time to time) in respect of providing any such assistance to the List Owner.</p> <p>4.2 Notwithstanding anything in this Agreement to the contrary, this Clause 4 shall continue in full force and effect for so long as Jisc Processes any Personal Data on behalf of the List Owner.</p> <h4>5. SUB-CONTRACTORS</h4> <p>5.1 Jisc may from time to time use sub-contractors to perform all or any part of its obligations under this schedule. Jisc shall notify the List Owner prior to appointing a sub-contractor. The List Owner may object to the appointment of any sub-contractor and Jisc shall reasonably take into account the views of the List Owner in appointing any such sub-contractor, but for the avoidance of doubt the appointment of any sub-contractor shall be at Jisc's absolute discretion and Jisc shall have no obligation to act in accordance with any objection raised by the List Owner. Information regarding the sub-contractors Jisc uses from time to time in connection with the performance of the Service can be found on the Service website.</p> <p>5.2 Jisc may from time to time disclose Personal Data to its sub-contractors (or allow its sub-contractors to access Personal Data) for Processing solely in connection with the fulfilment of the Permitted Purpose.</p> <p>5.3 Where Jisc uses a sub-contractor to Process Personal Data for or on its behalf, it will ensure that the sub-contractor contract (as it relates to the Processing of Personal Data) is on terms which are substantially the same as, and in any case no less onerous than, the terms set out in Clause 4 of this schedule. <p>5.4 Jisc shall remain liable to the List Owner for the acts, errors and omissions of any of its sub-contractors to whom it discloses Personal Data, and shall be responsible to the Customer for the acts, errors and omissions of such sub-contractor as if they were Jisc's own acts, errors and omissions to the extent that Jisc would be liable to the List Owner under this Agreement for those acts and omissions.</p> <p><a href="#top">[Return to Top]</a></p> <h3><a name="13"></a>13. Amendments</h3> <p>JiscMail reserves the right to amend these Service Policies at any time without notice. If the policy is amended then all List Owners will be informed and they may distribute the information to list members.</p> <p>This policy was last updated on <strong>11 October 2021</strong> - The role of list owners (<a href="#4">Section 4: Role of List Owners</a>) has been amended, for clarity, and applicable legislation has been amended in the Data Protection Schedule <a href="#12">Section 12: Data Protection Schedule</a>. </p> <p><a href="#top">[Return to Top]</a></p> </div> <div class="span-24 last footer"> <br /> <hr/> <div class="span-7 colborder"> <address> JiscMail<br/> Jisc<br/> 4 Portwall Lane<br/> Bristol<br/> BS1 6NB </address> <br/> </div> <div class="span-8 colborder"> <p align="center"> <i><b>Email:</b> <a href="mailto:help@jisc.ac.uk" accesskey="9">help@jisc.ac.uk</a><br /> <b>Tel:</b> 0300 300 2212 <br/> <br /> </i> </div> <div class="span-7 last"> <p align="right"> <a href="https://www.jiscmail.ac.uk/news/rss-service.xml"><img src="/images/social_icons/32x32/rss.png" class="bookmarks" alt="rss" /></a> <!--<a href="http://www.twitter.com/jiscmailhelp"><img src="/images/social_icons/32x32/twitter.png" class="bookmarks" alt="twitter" /></a> <a href="http://www.facebook.com/jiscmail"><img src="/images/social_icons/32x32/facebook.png" class="bookmarks" alt="facebook" /></a>--> <br /><br /> <a href="http://www.jisc.ac.uk"><img src="/images/Jisc-logo-2013.png" alt="Jisc" style="border: 0px"/></a> </p> </div> <div class="span-24 last"> <div class="span-6"> <p>Copyright © JISCMail 2000-2024</p> </div> <div class="span-18 last"> <p align="right"><a href="/sitemap.html">Site Map</a> | <a href="/policyandsecurity/index.html">Service Usage Policies</a> | <a href="https://www.jisc.ac.uk/website/privacy-notice">Privacy notice </a> | <a href="https://www.jiscmail.ac.uk/cookies.html">Cookies</a> | <a href="https://www.jiscmail.ac.uk/about/websiteaccessibility.html">Accessibility</a> </p> </div> </div> </div> </div> <script type="text/javascript"> var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www."); document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E")); </script> <script type="text/javascript"> try { var pageTracker = _gat._getTracker("UA-10860653-1"); pageTracker._trackPageview(); } catch(err) {}</script> <!--script language="Javascript" type="text/javascript" src="//uwp-jb.jisc.ac.uk/client.js?site=XWwoX"></script--> <!-- Jisc banner --> </body> </html>