Acceptable Use of ICT Resources Policy
Acceptable Use of ICT Resources Policy
1 Purpose
To outline the acceptable use of University Information and Communication Technology
Resources (hereafter referred to as ICT Resources) by all Users.
This Policy will be reviewed on an annual basis and evaluated in line with changes to business
processes and planning requirements.
2 Scope
This Policy applies equally to all Users of University ICT Resources.
3 Policy Statement
The University has identified the pivotal role of Information and Communication Technology
(ICT) to enhance the academic program, research initiatives and support services available to
Users.
This Policy sets out the University's stance on the acceptable use of ICT Resources in respect
to the provision of these resources, access to resources, responsible ethical and legal use of
resources, security and privacy, compliance, penalties and discipline.
4 Principles
The University will ensure that appropriate management controls are implemented in relation to
the acceptable use of ICT Resources. These will include:
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
The University does not permit its ICT Resources to be used for unauthorised activities. Should
any User become aware of any action by another individual which could be considered to
breach this Policy, they are requested to take appropriate action to ensure it is brought to the
attention of ICT management.
The University accepts no responsibility for loss or damage, consequential loss or damage, or
loss of data arising from the use of its ICT Resources or the maintenance of its ICT Resources.
4.2 Privacy
Users who have authorised access to private information about Employees or Students, or
confidential information of the University must respect the privacy of others and maintain the
Confidentiality of the information to which they have access in accordance with privacy laws and
any University Policies.
Users should exercise caution when storing any confidential information in electronic format as
the privacy of such information cannot be guaranteed.
4.3 Monitoring
Whilst the University respects the privacy of Users of ICT Resources, the University reserves
the right to monitor User activity and take appropriate action if misuse of resources is identified.
Monitoring for misuse of University ICT Resources must be authorised by the Chief Information
Officer. The University reserves the right to inspect all University owned ICT devices, together
with all files, Employee email accounts and message, and logs contained on those devices.
Awareness of these provisions shall be included as a mandatory component of all new
Employee inductions.
The University reserves the right to examine files and directories where it is necessary to
determine the ownership or recipient of lost or misdirected files, and also where the University
has information or evidence that:
Security is compromised
The system is being used for purposes which are prohibited under this Policy
By connecting a privately owned ICT device (including wireless or remote connection) to the
University network, any User acknowledges that:
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
they will be bound by, and comply with, the terms and conditions of use of the University
ICT Resources, as established in this Policy and the ICT Information Management and
Security Policy
the network traffic generated by a privately owned ICT device is generated in pursuit of
University business only and that - while the traffic is traversing University networks - it is
subject to the same right of inspection as traffic originating from University owned ICT
devices.
ICT Services routinely monitor traffic on networks. Logs obtained from monitoring operations are
used for capacity planning, performance measurement, security, accountability, and evidentiary
purposes.
4.4 Software
The University requires that Users use and install software in compliance of the respective
licence terms and conditions.
Installation of privately purchased and owned software on University ICT Resources is not
recommended. In all cases, ICT Employees will request proof of purchase (consisting of the
licence certificate and original media, or invoice) before any software will be installed on a
University ICT Resource.
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
4.8 Access
Access to Information through ICT Resources will only be provided if there is a legitimate
requirement.
Users must refrain from seeking to gain unauthorised access to ICT Resources or enabling
unauthorised access. Any attempt to gain unauthorised access to a system or to another
person's information is a violation of University Policy and may also violate applicable law which
may result in either civil and/or criminal proceedings. However, authorised ICT Service system
administrators may access ICT Resources, but only for a legitimate operational purpose and
only the minimum access required to accomplish this legitimate operational purpose. Users are
required to use Multi-Factor Authentication (MFA) to ensure an additional layer of security when
accessing ICT resources.
Users must not intentionally seek, access or provide information or passwords or other
digital materials belonging to other Users, without the specific permission of those other
Users.
Users of University ICT Resources must not access computers, computer software,
computer data or information, or computer networks without proper authorisation, or
intentionally enable others to do so, regardless of whether the computer, software, data,
information, or network in question is owned by the University.
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
interests of the University.
Limited Personal Use - It is acknowledged that reasonable limited personal use will
occur. 'Limited personal use' means private use that is infrequent, brief and kept to a
minimum. University ICT Resources should not be used for activities unrelated to
appropriate University functions. The University accepts no liability for any loss or
damages suffered by Users as a result of personal use.
Illicit Material - Users must not send, view, download or store illicit, fraudulent, obscene
or pornographic material that are a violation of applicable law or University Policy.
Defamation, Harassment and Other Abusive Behaviour - No User will, under any
circumstances take any action which would or might lead to the University's ICT
Resources being used for the purpose of defaming or slandering any individual or
organisation or use an ICT system in any way such that a reasonable individual may
consider this action to be viewed as harassing, abusive or obscene behaviour.
Copyright, Licences and Related Obligations - Users must not violate copyright law and
must respect licences to copyrighted materials. Users must ensure confidentiality and re-
use obligations are observed.
Social Media - Users must respect the purpose of and abide by the terms and conditions
of use of online forums, including social media networking websites, mailing lists, chat
rooms, wikis and blogs.
Commercial Use - University ICT Resources should not be used for commercial
purposes, including advertisements, solicitations, promotions or other commercial
messages, except as permitted under University Policy.
Family and Domestic Violence - Users must not use University property or resources to
engage in any actions resulting in Family and Domestic Violence.
4.11 Indemnity
The University is not responsible for the content of any material prepared, received, or
transmitted by Users. As a condition of using the University's ICT Resources, Users will not
violate any Commonwealth or State civil or criminal laws, and Users will comply with all
Commonwealth, State and international copyright and other intellectual property laws and
agreements and other Commonwealth and State laws. Furthermore, Users agree to indemnify,
exonerate and protect the University (and its representatives) from any claim, damage, or cost
related to the Users use of the University's ICT Resources.
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
and will support effective, practical and appropriate measures that assist the University and
clients manage internet use.
their Supervisor
The Chief Information Officer is responsible in the first instance for handling and investigating
potential breaches. Penalties and discipline are outlined in the ICT Information Management
and Security Policy.
The University has obligations relating to copyright, intellectual property, privacy, right to
information, sexual harassment, and racial discrimination as defined by law, and in its own
policies. The University expects that Users of its ICT Resources will also exercise their
responsibilities in this area. Users should familiarise themselves with University policies and
documentation on the following matters:
Copyright
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
Employee Diversity and Inclusion Policy.
The University has certain contractual obligations relating to the use of its ICT Resources which
constrain the way facilities may be used. The University may take disciplinary action against
anyone whose use of facilities violates the terms of such agreements. In addition to observing
Australian laws, related University Policies and procedures, and this Policy, Users should
familiarise themselves with any published acceptable use Policy associated with each service.
5 References
Universities and Colleges Information Systems Association (UCISA) Information Security
Management Toolkit Edition 1.0 Volume 1 Retrieved 17 March 2015, from
https://www.ucisa.ac.uk/Resources/ISMT
6 Schedules
This policy must be read in conjunction with its subordinate schedules as provided in the table
below.
7 Policy Information
Subordinate
Schedules
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
Crimes Act 1914 (Cth)
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
Intellectual Property Policy
Policy Framework
Privacy Policy
Procurement Policy
Related forms,
publications and
websites
Employee
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
Policy
Student
University Members
Availability
Confidentiality
ICT Resources
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.
provided for the purpose of University work or associated activities, or
any connection to the University's network, or use of any part of the
University's network to access other networks.
Integrity
Supervisor
User
Keywords
Record No 13/230PL
Failure to comply with this Policy or Policy Instrument may be considered as misconduct and the provisions of the relevant Policy or Procedure
applied. A hard copy of this electronic document is uncontrolled and may not be current as UniSQ the University regularly reviews and updates
its Policies and Policy Instruments. The latest controlled version can be found in the UniSQ’s Policy and Procedure Library.