On Air Now

Test Transmissions

Midnight - 11:55pm

Revolution Radio IT Acceptable Use Policy

Please read this acceptable use policy ("policy", “AUP”) carefully before using any service/ system operated by Revolution Radio Limited ("us", 'we", “our”, “The Station”).

Services provided by Revolution Radio may only be used for lawful purposes. You agree to comply with all applicable laws, rules, and regulations in connection with your use of the services. Any material or conduct that in our judgment violates this policy in any manner may result in suspension or termination of the services or removal of user’s account with or without notice.


It is the responsibility of all users of Revolution Radio’s systems and services to read and understand this policy. This policy may be updated from time to time, in order to comply with legal and policy requirements.

1.1 Purpose

This Acceptable Use Policy is intended to provide a framework for such use of Revolution Radio resources. It should be interpreted such that it has the widest application and so as to include new and developing technologies and uses, which may not be explicitly referred to.

1.2 Policy

Revolution Radio also has a statutory duty, under Section 26 of the Counter Terrorism and Security Act 2015, termed “PREVENT”. The purpose of this duty is to aid the process of preventing people from being drawn into terrorism.

1.3 Scope

Everybody at Revolution Radio (staff, contractors and others) are bound by the provisions of its policies in addition to this Acceptable Use Policy. Revolution Radio seeks to promote and facilitate the positive and extensive use of Information Technology in the interests of supporting the delivery of production to the highest possible standards. This also requires appropriate and legal use of the technologies and facilities made available to Employees, Contractors and Visitors.

2 Unacceptable Use

a) Revolution Radio Network may not be used directly or indirectly by a User for the download, creation, manipulation, transmission or storage of:

  1. any offensive, obscene or indecent images, data or other material, or any data capable of being resolved into obscene or indecent images or material;
  2. unlawful material or material that is defamatory, threatening, discriminatory, extremist or which has the potential to radicalise themselves or others;
  3. unsolicited “nuisance” emails;
  4. material which is subsequently used to facilitate harassment, bullying and/or victimisation of a member of the University or a third party;
  5. material which promotes discrimination on the basis of race, gender, religion or belief, disability, age or sexual orientation;
  6. material with the intent to defraud or which is likely to deceive a third party;
  7. material which advocates or promotes any unlawful act;
  8. material that infringes the intellectual property rights or privacy rights of a third party, or that is in breach of a legal duty owed to another party; or
  9. material that brings Revolution Radio into disrepute.

b) Revolution Radio’s network must not be deliberately used by a User for activities having, or likely to have, any of the following characteristics:

  1. intentionally wasting staff effort or other resources;
  2. corrupting, altering or destroying another User’s data without their consent;
  3. disrupting the work of other Users or the correct functioning of Revolution Radio’s Network; or
  4. denying access to Revolution Radio’s Network and its services to other users.
  5. pursuance of commercial activities (even if in support of radio business).

c) Any breach of industry good practice that is likely to damage the reputation of the Revolution Radio will also be regarded prima facie as unacceptable use of the stations Network.

d) Where Revolution Radio’s Network is being used to access another network, any abuse of the acceptable use policy of that network will be regarded as unacceptable use of the stations Network.

e) Users shall not:

  1. introduce data-interception, password-detecting or similar software or devices to the station’s Network;
  2. seek to gain unauthorised access to restricted areas of the station’s Network;
  3. access or try to access data where the user knows or ought to know that they should have no access;
  4. carry out any hacking activities; or
  5. intentionally or recklessly introduce any form of spyware, computer virus or other potentially malicious software.

3 Consequences of Breach

In the event of a breach of this Acceptable Use Policy by a User the station may in its sole discretion:

a) restrict or terminate a User’s right to use the stations Network;

b) withdraw or remove any material uploaded by that User in contravention of this Policy; or

c) where appropriate, disclose information to law enforcement agencies and take any legal action against a User for breach of this Policy, including but not limited to claiming all costs, fees and disbursements (including but not limited to legal fees) connected therewith

Reporting violations

To report a violation of this policy, please contact us.

We reserve the right to change this policy at any given time, of which you will be promptly updated.