Guest Network Credentials
Issued to name
Username username@guest
Password password
Expiry date 2021-03-05 00:00:00
Your guest network credentials
These credentials will allow Internet access via the WiFi (UoR-Guest or eduroam), as well as public PC facilities at all University of Reading campuses. Logging in to any University IT system using these credentials denotes acceptance of the Acceptable Use Policy. Please note that your username, password, the WiFi network names, and WiFi security key are all case sensitive. The network key for the UoR-Guest network is WMChilds1903. For further information on how to connect to the University Wi-Fi and eduroam connection Wizards for various devices, please visit wifi.reading.ac.uk.
Reporting faults or connection problems
To report a fault or get assistance with using the guest networks or communal PC facilities, please contact the DTS Service Desk, either by telephone at 0118 378 6262, or by email at [email protected]. The telephone service is open Monday to Friday, 08:00 - 18:00.
Acceptable use policy
  1. The University reserves the right to exercise control over all activities on its IT facilities and networks, including monitoring of systems and electronic communications and access to external electronic resources to the extent permitted by the Regulation of Investigatory Powers Act 2000 and the Telecommunications (Lawful Business Practice)(Interception of Communications) Regulations 2000. This Acceptable Use Policy consititues formal notice that communications may be intercepted for reasons allowed within these Acts.
  2. Computing accounts and passwords are granted to individuals. You must not use, or attempt to gain access to, the computing account belonging to another individual or group of individuals. You must not disclose your password to any other person nor allow another person to use your account. If you lose these credentials or another person discovers your password, you should inform IT immediately.
  3. You may use the guest networks for purposes related to University work or study, and for a limited and reasonable amount of personal use. Such use is a privilege and not a right and must not interfere with use by others for University purposes.
  4. You must not use the guest networks to engage in any unlawful activity, or to infringe University Regulations.
  5. You must not deliberately or recklessly act in a way which directly or indirectly causes disruption to others' use of guest networks, or so use guest networks to disrupt the use of IT facilities elsewhere.
  6. You must not knowingly download, transmit, store, generate or use any program, tool or virus designed to damage or disrupt or in any other way interfere with the functioning of IT facilities, and you must take sufficient care to minimise the risk of doing this inadvertently. If you suspect you have a virus then you must take action to eliminate it.
  7. In order to ensure effective running of IT services, or to manage costs, the University from time to time imposes controls on the use of systems. An example is the use of firewalls in some areas of the University. You must not attempt to circumvent such controls.
  8. You must not use the guest networks to create, transmit, store, download or display any offensive, obscene, indecent or menacing images, data or other material, or any data capable of being resolved into such material.
  9. You must not use the guest networks to defame, harass, offend or hinder another person, by creation, transmission, storage, download or display of materials, or by other means.
  10. You must not send an email or message that does not correctly identify you as the sender, or which appears to originate from another person, or otherwise attempt to impersonate another person. You must not send unsolicited emails to a large number of recipients, without proper authorisation to do so, or unless the recipients have indicated an interest in or consented to receiving such email.
  11. You must not use the guest networks to create, access, store or transmit material in a way which infringes a copyright, trade mark, or other intellectual property right.
  12. You must comply with all relevent external guidelines and law which affect your use of guest networks, including (but not limited to) the JANET Acceptable Use Policy, Computer Misuse Act 1990, and Data Protection Act 1998.
Issued on 2021-03-05 11:32:53