Comments

Policy Feedback

Step 1 of 4: Enter your comments on individual clauses

In step 1  provide your comments on specific content.  Select  Protected Document (comment icon ) to open a comment box  to type your feedback  then click "save comment" to close the comment box.  In step 2 you will provide general comments.


Important tips to avoid losing your comments or corrupting your entries:

  • AVOID jump between web pages or applications while commenting – open a new browser window if you need to to switch
  • ONLY log comments for one policy at a time. 
  • DON'T leave your submission half way through. If you need to take a break, submit your current set of comments. You can go back in and start a new comments , just jump to where you left off.

Information and Communication Technology Facilities and Services Rule

Section 1 - Overview

(1) UNE provides Information and Communication Technology (ICT) facilities and services to UNE Representatives, Students and Approved Users and Entities to support their work and study. While being aware of the positive outcome of this support, it is also committed to preventing the misappropriation of its ICT facilities and services.

(2) In locations and circumstances under the direct control of UNE, and where UNE provides access to electronic communication services and information to its Students and UNE Representatives with valid authorised access, UNE is committed to the services and information being secure and continuously available (notwithstanding reasonable outages for maintenance).

(3) Users of UNE's ICT facilities and services must understand their responsibilities associated with their access and be accountable for the way they use these facilities and services. This Rule sets out the principles that guide the user and their access to these services. It does not seek to identify common or statutory law requirements and reference must be made to associated legislation and UNE rules, policies, protocols and procedures for guidance.

Top of Page

Section 2 - Scope

(4) This Rule applies to all UNE Representatives, Students and Guests and includes UNE owned and non-UNE owned equipment used to access UNE ICT facilities and services.

Top of Page

Section 3 - Rule

Principles

(5) Users of UNE ICT facilities and services must only use them for the purpose for which they have been authorised. Users are responsible and accountable for the information they access and the activities they undertake while using UNE ICT facilities and services.

(6) The provision of a UNE username is the University's means of providing a digital identity for UNE Representatives, Students and Guests. The username enables the University to assign appropriate user privileges to the identity. This identity and access management allows the University to ensure the right individuals access the right resources at the right times for the right reasons and prevents repudiation.

(7) In order to ensure integrity is maintained and accountability is contained, the following tenets apply:

  1. UNE username and password:
    1. not using someone else's user name and password;
    2. not sharing your password with others;
    3. not using your username and password to allow someone else to access UNE ICT facilities and services; and
    4. keeping your password secure.
  2. ensuring that you:
    1. only use UNE ICT facilities and services for:
      1. which access has been authorised; and
      2. their intended purpose.
    2. comply with applicable legislation and UNE rules, policies, protocols and procedures.
    3. do not use UNE ICT facilities and services:
      1. for any unlawful purpose;
      2. to breach software license agreements, contracts or UNE rules, policies or protocols;
      3. to harass, stalk, menace, defame, libel, vilify or discriminate against any other person, group or organisation within or external to UNE;
      4. to upload, download, distribute or possess pirated software or movies or other unlicensed digital media;
      5. to access, store or transmit pornographic material other than for research purposes for which specific prior written approval from the Deputy Vice-Chancellor Research has been received;
      6. to access, collect, use or disclose personal information in ways that breach the Privacy Management Rule;
      7. for personal or commercial gain or for the gain of a third party without the prior written authorisation from the Chief Information Officer; and
      8. to infringe copyright.

(8) UNE is committed to establishing and maintaining a state of security to manage the integrity, confidentiality and availability of its information resources and assets. Users contribute to this obligation by:

  1. not subverting or attempting to subvert security measures in any way; and
  2. not allowing UNE ICT facilities and services to be compromised by their actions.

(9) UNE complies with privacy, workplace surveillance and surveillance legislation as it applies to the use of UNE ICT facilities and services:

  1. UNE ICT facilities and services usage information is stored and may be inspected and or disclosed under the following conditions:
    1. where it is required by law;
    2. where UNE believes that an infringement of the law or breach of UNE rules, policy, protocols or procedure has occurred;
    3. to enable internal investigations into alleged misconduct; and
    4. to respond to access applications for information made under the Government Information (Public Access) Act 2009.
  2. UNE manages the availability of its ICT facilities and services by monitoring the use of these services. Monitoring is carried out on a continuing basis and includes:
    1. server performance;
    2. network performance; and
    3. log files:
      1. internet;
      2. email;
      3. phone; and
      4. mobile devices.

(10) UNE manages breaches by assessing the risk and impact of the breach. Dependent upon the breach, any or all of the following measures may be taken:

  1. investigate the alleged activity;
  2. isolate the user and device/s from the UNE network;
  3. withdraw UNE ICT facilities and services;
  4. instigate appropriate misconduct procedures; and
  5. referral to relevant law enforcement agency/ies.

Authority and Compliance

(11) The Vice-Chancellor and Chief Executive Officer, pursuant to Section 29 of the UNE Act, makes this University Rule.

(12) UNE Representatives and Students must observe it in relation to University matters.

(13) The Rule Administrator is the Chief Information Officer who is authorised to make policies and associated information for the operation of this University Rule. The policies and associated information must be compatible with the provisions of this Rule.

(14) This Rule operates as and from the Effective Date.

(15) Previous Rules for the Use of Information and Communications Facilities and Services and related documents are replaced and have no further operation from the Effective Date of this new Rule.

(16) Notwithstanding the other provisions of this University Rule, the Vice-Chancellor and Chief Executive Officer may approve an exception to this Rule where the Vice-Chancellor and Chief Executive Officer determines the application of the Rule would otherwise lead to an unfair, unreasonable or absurd outcome. Approvals by the Vice-Chancellor and Chief Executive Officer under this clause must be documented in writing and must state the reason for the exception.

Top of Page

Section 4 - Definitions

For the purposes of this document the following definitions apply.

(17) Intended purpose means the provision of UNE ICT facilities and services for lawful purposes related to teaching, learning and administration.

(18) Unlawful means forbidden by law.

(19) User means a UNE Representative, Student or Approved Users and Entities who has been granted a digital identity with specified privileges to access UNE ICT facilities and services for a specified period of time.

 

All comments provided are made available the Policy Owner and must comply with the UNE Code of Conduct.