IT Acceptable Use and Security Policy
Overview:
This Policy sets out the principles applicable to the use of University IT and expresses the commitment of the University to providing and maintaining secure, effective and reliable IT infrastructure and services to support the University's operations in research, teaching, learning, and administration. By observing the acceptable use and security requirements, University IT users and custodians can help to prevent service disruptions and data breaches caused by cyberattacks and other threats.
Note
The Provost may exercise some of the Vice-Chancellor's authorities in this policy - see D2024/647279.
-
Related Procedures, Forms
-
Administration, Approval and Review
RMO File No. 2021/8007 Policy custodian Chief Operating Officer Responsible policy officer Chief Information Officer, Information Technology and Digital Services Endorsed by Vice-Chancellors Executive on 6 April 2022 Approved by Vice-Chancellor and President on 10 May 2022 Related Policies IT Acceptable Use Procedures IT Security Procedures
Information Classification and Handling Guideline
Third Party Hosting Security Guideline
Code of Conduct Policy
Behaviour and Conduct Policy
Student Misconduct Rules
Copyright Policy
Information Management Policy
Privacy Policy
Related legislation Criminal Code Act 1995 (Cth) Spam Act 2003 (Cth)
Copyright Act 1968 (Cth)
Telecommunications (Interception and Access) Act 1979 (Cth)
Security of Critical Infrastructure Act 2018 (Cth)
Teritary Education Quality Standards Agency Act 2011 (Cth) (TEQSA Act) ss 114A and 114B
Effective from 10 May 2022 Review Date 9 May 2025 Contact for queries about the policy ITS Helpdesk, telephone 8313 3000
Please refer to the Policy Directory for the latest version.
To link to this policy:
Please use the following URL instead of linking to individual documents:
/policies/2783
/policies/2783