IT Acceptable Use and Security Policy
Overview:
This Policy sets out the principles applicable to the use of University IT and expresses the commitment of the University to providing and maintaining secure, effective and reliable IT infrastructure and services to support the University's operations in research, teaching, learning, and administration. By observing the acceptable use and security requirements, University IT users and custodians can help to prevent service disruptions and data breaches caused by cyberattacks and other threats.
Note
The Provost may exercise some of the Vice-Chancellor's authorities in this policy - see D2024/647279.
-
Related Procedures, Forms
Title Version IT Acceptable Use and Security Policy D2024/169615 IT Acceptable Use Procedures D2024/1103111 IT Security Procedures D2024/169666 -
Administration, Approval and Review
RMO File No. 2021/8007 Policy custodian Chief Operating Officer Responsible policy officer Chief Information Officer, Information Technology and Digital Services Endorsed by Vice-Chancellors Executive on 6 April 2022 Approved by Vice-Chancellor and President on 10 May 2022 Related Policies IT Acceptable Use Procedures IT Security Procedures
Information Classification and Handling Guideline
Third Party Hosting Security Guideline
Code of Conduct Policy
Behaviour and Conduct Policy
Student Misconduct Rules <