(1) The University of Western Sydney provides computing, networking, information and communication resources to the University community to support teaching and research, student learning, and efficient administrative processes. Access to Information Technology (IT) resources is granted to members of the University community who are enrolled students, employees or formal affiliates or associates of the University. The University is responsible for protecting its significant investment in IT resources, and must also meet its legal obligations. It will not jeopardise these through the improper actions of any group or individual. Nothing in this policy requires the university to provide dial-in or computer laboratory facilities to the University Community. (2) The following definitions apply for the purpose of this policy: (3) All users of University IT resources are responsible for ensuring that they use them in efficient, ethical, and lawful ways. (4) Only authorised users are permitted access to University IT resources (see Section 2 for definition). (5) Authorised users of University IT resources may use them only to discharge the responsibilities of their positions as employees, to further their studies/instruction as students, to conduct their official business with the University, or in other activities sanctioned by the University. All usage must be efficient, ethical and lawful. Questions concerning usage should be referred to Director IT. (6) Passwords and personal account codes are provided for the sole use of the authorised user. They should be treated as private and confidential, and must not be divulged or distributed. (7) Only the authorised owner or the IT or authorised support staff may read, change (including remove) or copy any data, programs, files or directories on any University computer or other computers accessed using the University network. (8) A user must not attempt to interfere with IT resources or attempt to subvert the security of any University IT resource. This includes the following: (9) University IT resources must not be used to copy software, upload or download material that is licensed or protected under copyright or trademark laws unless such activities fall within current licensing conditions and/or copyright legislation. (10) University IT resources must not be used for preparing, storing, receiving, displaying, transmitting or communicating information, material or messages (11) University IT resources must not be used for commercial or private gain or the gain of a third party, except where there is an established relationship to the University (e.g. a commercial entity of the University). (12) All University IT resources must be treated with care, irrespective of location. No person shall deliberately damage, help to damage or tamper with facilities, resources or services. No University or leased IT resource is to be removed off-site without appropriate permission. (13) University IT resources are not to be used to gain unauthorised access to other computers/networks/systems/files/data, regardless of the intention. (14) Users are responsible for the security, privacy and confidentiality of data of a private or personal nature, held or transmitted using IT resources. Users should become familiar with the UWS Privacy Policy Guideline and the Privacy and Personal Information Act 1998 so they are aware of their responsibilities for the collection, use and storage of personal information. (15) Any attempt (successful or otherwise) to invade the privacy of others using IT resources will be regarded as a breach of this policy. (16) The University works to ensure that it manages and uses its IT resources efficiently and effectively. To protect the interests of the University and to ensure compliance with this Policy, the IT retains the right to examine any data or files and to monitor computer usage, and to intervene when necessary. (17) Breaches of this Policy will be reported immediately to the Director IT. Complaints in relation to breaches may also be forwarded to the Director IT and the Director Equity and Diversity, for action. In these circumstances confidentiality will be maintained. (18) If the Director IT, believes that unethical or illegal activities, or activities inconsistent with the University's purpose or mission, have occurred, these processes will be followed: (19) All University IT resource usage may be audited. Usage and activity records belong to the University, not to the individual user. In most cases, these are admissible as evidence and are subject to relevant State and Federal Laws. (20) The University is responsible for ensuring the services and resources it provides to its community are used in efficient, lawful, proper and ethical ways. (21) The Director IT (or nominee/s) has the responsibility to: (22) The Director /Manager/Team Leader/Head of School / Executive Dean has the responsibility to do the following: (23) Staff, students, and affiliates/associates are responsible for ensuring their usage complies with this Policy, for paying any relevant charges incurred, and for informing the Information Technology when they cease their association with the University. (24) These are provided to help those responsible for certifying and sponsoring/recommending applications for access to IT resources (internally or remotely). With respect to Internet access, the "AARNet Policy on Allowed Access to the Internet via AARNet Members" provides guidelines on allowable access and conditions of access. (25) These should also be considered in respect to applications for Internet services by individuals or groups affiliated/associated with the University. (26) For the purposes of this Policy, a staff member is a person employed as a Higher Education Worker or Academic. Employment may be full-time, part-time or casual. Some types of access are provided routinely to staff to enable them to fulfil their duties. Access to other IT resources may be considered on the following grounds: (27) For the purposes of this Policy, a student is a person enrolled in a course of study or subject units offered by the University. Enrolled students are provided with access to the computing laboratories and network services. (28) Access to IT resources requires an application supported by the Director/Dean/Manager of the area or association, and agreement of the Director Information Technology or nominee. Access to systems and services will expire at the end of the specified period or contract/term of appointment. Affiliates must agree to abide by this and other related policies, including paying for any loss or damage the University may sustain, should they improperly use University IT resources. This category may comprise, but is not limited to the following: (29) Within this category, where access levels/types permitted are unclear, clarification should be obtained from the Director IT. (30) Nil. (31) In managing its operations, including those in IT, the University is required to take all reasonable steps to ensure compliance with relevant legislation. The following legislation has helped form this Policy. Users of IT resources at UWS do so subject to all applicable laws and University policies. Relevant legislation (which helped form this policy) and Unversity policies can be located on the Associated Information page.IT Acceptable Use of Resources Policy
Section 1 - Purpose and Context
Section 2 - Definitions
Top of PageSection 3 - Policy Statement
Section 4 - Procedures
Part A - Code of Practice
Part B - Privacy
Part C - Breaches and Penalties
Part D - Audits
Part E - Responsibilities
Part F - Categories of Users: Guidelines
Staff members
Students
Individuals or Groups affiliated/associated with the University
Section 5 - Guidelines
Section 6 - References
View Current
This is not a current document. To view the current version, click the link in the document's navigation bar.