Browse A-Z


Browse A - Z

Return to TopI (View Documents A-Z)

  • Information Security - Internet Filtering ProcedureThe purpose of this Procedure is to:
    a. Ensure that all University use of the Internet is legal, and complies with Victoria University values and policies.
    b. Ensure staff and students have access to web sites and Internet services legitimately needed for their University work.
  • Information Security - IT Security Audit Authorities ProcedureThe IT Security Audit Procedure outlines Information Technology staff having an authority to conduct a security audit on any system at Victoria University and supports the Information Security Policy.
  • Information Security - User Access Management ProcedureThis Procedure defines the procedures in place for granting, modifying, removing, and reviewing user access privileges to VU systems and applications in order to protect the privacy, security, and confidentiality of University information assets and systems.
  • Information Security - User Authentication ProcedureA new User Authentication procedure has been established to provide guidelines for user authentication within the University’s information security practices. The procedure is designed to support compliance requirements for authentication services, user account management and password hygiene to protect University information assets from unauthorised access.
  • Information Security - Virus Protection ProcedureThe purpose of the Virus Protection Procedure is to ensure the effective and efficient prevention, containment or minimisation of damage to the organisation from computer viruses and supports the Information Technology Security Policy.
  • Information Security PolicyThe Information Security Policy has been updated to ensure that VU policy addresses technical advancements and the changing security landscape. Updates reflect compliance requirements; current organisational structure, roles and responsibilities; detailed risk management requirements; enhanced security measures; and more comprehensive measures for incident response and business continuity.
  • Intellectual Property Regulations 2013The objective of this Regulations is to make further provision about intellectual property, in accordance with the Governance, Academic and Student Affairs Statute 2013.
  • International Student Transfer PolicyThe Policy and Procedure has been reviewed to improve clarity, confirm compliance with ESOS and ensure alignment between the VU operational groups responsible for managing the end-to-end process.
  • International Student Transfer ProcedureThe Procedure has been reviewed to improve clarity, confirm compliance with ESOS and ensure alignment between the VU operational groups responsible for managing the end-to-end process.
  • Investment PolicyThis Policy establishes a framework within which the funds are available for investment to the Victoria University, (VU) and investing, monitoring and evaluating of VU’s investment funds.
  • Investment ProcedureMinor changes have been made to the Procedure to align with changes to the Policy, approved by Council in October 2022.
  • IT Appropriate Use - Email ProcedureThe Email Procedure replaces Email Guidelines and has been updated to reflect current processes for the use of University email services.
  • IT Appropriate Use - Internal Mailing Lists ProcedureThis Procedure outlines using internal mailing lists as an effective way of sending bulk email communications to Victoria University staff and/or students and supports the IT Appropriate Use Policy.
  • IT Appropriate Use - Mobile Phone Usage Reimbursement ProcedureThis Procedure ensures the of IT Appropriate Use policy and defines the process for the reimbursement of costs and charges as a result of excessive personal use of Victoria University issued mobile phones and devices.
  • IT Appropriate Use - Use of Personal Devices ProcedureThe Bring Your Own Device (BYOD) Procedure defines the obligations of authorised users connecting to the University environment through a personally owned device.
  • IT Appropriate Use PolicyThe IT Appropriate Use Policy has been updated following a review to provide more clarity for the provision and use of Information Technology assets.
  • IT Asset - Business Application ProcedureThis Procedure replaces the IT Hardware and Software - Cloud and Management Services Procedure and IT Hardware and Software - Software Application Procedure and supports the University’s preferred position to adopt a cloud-first approach when implementing new applications and systems through the use of cloud computing services
  • IT Asset - Cloud Storage ProcedureThe purpose of this Procedure is to define Victoria University’s position on the use of cloud storage and similar services for the storing and sharing of VU data and information.
  • IT Asset PolicyThe IT Asset Policy and Procedure provides the framework for the management of University IT hardware and software from procurement to disposal. The IT Asset Policy is a re-write of the existing IT Hardware and Software Policy and with the associated procedure, provides clarity in relation to the return, redeployment, transfer and sale of IT assets and supports the single IT asset rule and standard peripherals.
  • IT Asset ProcedureThe IT Asset Policy and Procedure provides the framework for the management of University IT hardware and software from procurement to disposal. The IT Asset Policy is a re-write of the existing IT Hardware and Software Policy and with the associated procedure, provides clarity in relation to the return, redeployment, transfer and sale of IT assets and supports the single IT asset rule and standard peripherals.