Policy Feedback
Step 1 of 4: Enter your comments on individual clauses
In step 1 provide your comments on specific content. Select (comment icon ) to open a comment box to type your feedback then click "save comment" to close the comment box. In step 2 you will provide general comments.
Important tips to avoid losing your comments or corrupting your entries:
- AVOID jump between web pages or applications while commenting – open a new browser window if you need to to switch
- ONLY log comments for one policy at a time.
- DON'T leave your submission half way through. If you need to take a break, submit your current set of comments. You can go back in and start a new comments , just jump to where you left off.
(1) The University provides Information and Communication Technology (ICT) facilities and services to (2) While being aware of the positive outcome of this support, the University is committed to ensuring that its ICT infrastructure is secure and is managed consistently and in accordance with relevant legislation and UNE rules, policies and procedures. (3) This Rule applies to all (4) University ICT infrastructure encompasses : (5) The University's Technology and Digital Services is responsible for: (6) All relevant legislation, standards and University rules, policies and procedures must be complied with for: (7) The Vice-Chancellor and Chief Executive Officer, pursuant to Section 29 of the (8) (9) The Rule Administrator is the Chief Information Officer who is authorised to make procedures and guidelines for the operation of this University Rule. The procedures and guidelines must be compatible with the provisions of this Rule. (10) This Rule operates as and from the (11) Previous policy on Information and Communications Infrastructure and related documents are replaced and have no further operation from the (12) Notwithstanding the other provisions of this University Rule, the Vice-Chancellor and Chief Executive Officer may approve an exception to this Rule where the Vice-Chancellor and Chief Executive Officer determines the application of the Rule would otherwise lead to an unfair, unreasonable or absurd outcome. Approvals by the Vice-Chancellor and Chief Executive Officer under this clause must be documented in writing and must state the reason for the exception. (13) Authentication system means a system that verifies the identity of a user, process or device as a prerequisite to allowing access to resources in systems. (14) End user devices means desktop computers, laptops, tablets and mobile devices.Information and Communications Infrastructure Rule
Section 1 - Overview
Section 2 - Scope
Top of PageSection 3 - Rule
Authority and Compliance
Section 4 - Definitions