Comments

Policy Feedback

Step 1 of 4: Enter your comments on individual clauses

In step 1  provide your comments on specific content.  Select  Protected Document (comment icon ) to open a comment box  to type your feedback  then click "save comment" to close the comment box.  In step 2 you will provide general comments.


Important tips to avoid losing your comments or corrupting your entries:

  • AVOID jump between web pages or applications while commenting – open a new browser window if you need to to switch
  • ONLY log comments for one policy at a time. 
  • DON'T leave your submission half way through. If you need to take a break, submit your current set of comments. You can go back in and start a new comments , just jump to where you left off.

Information and Communications Infrastructure Rule

Section 1 - Overview

(1) The University provides Information and Communication Technology (ICT) facilities and services to UNE Representatives, Students and Approved Users and Entities to support their work and study.

(2) While being aware of the positive outcome of this support, the University is committed to ensuring that its ICT infrastructure is secure and is managed consistently and in accordance with relevant legislation and UNE rules, policies and procedures.

Top of Page

Section 2 - Scope

(3) This Rule applies to all UNE Representatives, Students and Approved Users and Entities and includes UNE owned and non-UNE owned equipment used to access UNE ICT infrastructure.

(4) University ICT infrastructure encompasses :

  1. optic fibre cable and patch leads;
  2. copper cable and associated jumpering (connections);
  3. UTP cable and patch leads;
  4. patch panels, racks, cabinets and distribution frames;
  5. switches;
  6. routers;
  7. servers;
  8. storage devices;
  9. firewalls;
  10. wireless access points;
  11. microwave links;
  12. printers, faxes and multifunction devices; and
  13. end-user devices.
Top of Page

Section 3 - Rule

(5) The University's Technology and Digital Services is responsible for:

  1. network design, configuration, security and management;
  2. maintaining control over who and what is accessing the University's ICT infrastructure;
  3. preventing duplication of the University's ICT infrastructure;
  4. establishing an enterprise-grade platform for implementing the University's complex and diverse ICT applications;
  5. optimising the University's investment in its ICT infrastructure;
  6. ensuring flexibility and supportability of current and future ICT infrastructure; and
  7. ensuring compliance with legislated requirements.

(6) All relevant legislation, standards and University rules, policies and procedures must be complied with for:

  1. accessing and using the University's ICT infrastructure:
    1. TDS central authentication systems must be used to access the University's ICT infrastructure.
  2. all network cabling and its installation; and
  3. all equipment and/or devices connected to the University's ICT infrastructure.

Authority and Compliance

(7) The Vice-Chancellor and Chief Executive Officer, pursuant to Section 29 of the UNE Act, makes this University Rule.

(8) UNE Representatives, Students and Approved Users and Entities must observe it in relation to University matters.

(9) The Rule Administrator is the Chief Information Officer who is authorised to make procedures and guidelines for the operation of this University Rule. The procedures and guidelines must be compatible with the provisions of this Rule.

(10) This Rule operates as and from the Effective Date.

(11) Previous policy on Information and Communications Infrastructure and related documents are replaced and have no further operation from the Effective Date of this new Rule.

(12) Notwithstanding the other provisions of this University Rule, the Vice-Chancellor and Chief Executive Officer may approve an exception to this Rule where the Vice-Chancellor and Chief Executive Officer determines the application of the Rule would otherwise lead to an unfair, unreasonable or absurd outcome. Approvals by the Vice-Chancellor and Chief Executive Officer under this clause must be documented in writing and must state the reason for the exception.

Top of Page

Section 4 - Definitions

For the purposes of this document the following definitions apply.

(13) Authentication system means a system that verifies the identity of a user, process or device as a prerequisite to allowing access to resources in systems.

(14) End user devices means desktop computers, laptops, tablets and mobile devices.

 

All comments provided are made available the Policy Owner and must comply with the UNE Code of Conduct.