Comments

Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

 

IT Appropriate Use - Email Procedure

Section 1 - Summary

(1) The purpose of this Procedure is to provide information and advice on the proper use of the University's email service and to inform users of the University's required standard for email use.

Top of Page

Section 2 - TEQSA/ASQA/ESOS Alignment

(2) HESF: Standard 2.1 Facilities and Infrastructure, 7.3 Information Management

Top of Page

Section 3 - Scope

(3) This Procedure applies to VU employees, students and other authorised users on both onshore and offshore locations with access to a University email account.

Top of Page

Section 4 - Definitions

(4) Nil

Top of Page

Section 5 - Policy/Regulation

(5) IT Appropriate Use Policy

Top of Page

Section 6 - Procedures

Part A - Summary of Roles and Responsibilities

Roles Responsibilities
Employees, students and authorised users VU email services must be used in responsible, professional, effective and lawful manner.

(6) All email accounts maintained on the University's email systems are the property of VU.

(7) The use of University email services including the sending and forwarding of emails must comply with this Procedure, the IT Appropriate Use Policy and other relevant University rules, policies and procedures, including:

  1. the Information Security Policy and Information Security - User Access Management Procedure;
  2. the Appropriate Workplace Behaviour Policy and Student Charter Policy; and
  3. the Bullying Prevention and Management Policy, Sexual Assault Response Policy, Sexual Harassment Response Policy, and the Discrimination and Harassment Prevention and Management Policy; and
  4. the Copyright Policy.

Part B - Email Procedures

(8) VU email accounts should be used for sending all University-related email communications both internally and to external organisations.

(9) The University uses email as the primary method of communication with employees and students including urgent and time-critical information and announcements. Employees and students are required to check their VU email account on a frequent and consistent basis and respond to calls to action in a timely manner.

(10) All emails sent from University staff email accounts must be classified according to the Information and Asset Classification Framework based on information contained within the email body and/or attachments. See confidential and restricted emails section for more additional information. 

(11) A disclaimer will be automatically attached to all outgoing emails sent from University email accounts. This disclaimer must not be altered or interfered with in any way.

(12) Employees leaving the University will not have access to their email account after end of employment. It is the employee’s responsibility to ensure any necessary information to maintain business operations is handed over to their managers or teams prior to departure.

(13) Requests to setup a new shared mailbox or access an existing shared mailbox can be made through the VU Support Hub and requires appropriate approval.

(14) Requests for delegate access to another employee’s mailbox can be made through the VU Support Hub and requires appropriate approval from the mailbox owner.

(15) Requests to delegate mailbox access to another employee when leaving the University requires approval from the mailbox owner and their supervisor or manager.

(16) Emails can be sent on behalf of another user as long as the user has given the appropriate approval and permissions.

(17) Emails sent from VU email accounts must not contain customised backgrounds. Backgrounds should remain as a default that is provided by the email applications.

(18) Employees should follow Best Practice Email Guidelines when sending and replying to emails using their VU email account.

Part C - Unauthorised Actions

(19) The following actions are not allowed by law when sending or forwarding emails:

  1. Using material which constitutes an infringement of copyright. Refer to the University's ' Copyright Policy in determining what third party material can be used.
  2. Defaming an individual, organisation, association, company or business.
  3. Communications that are obscene, offensive or involve the use of illegal material, including the use or transfer of material of a sexual nature.
  4. Breaching a university policy, procedure, statute or regulation.
  5. Directly or indirectly interfering with or conflicting with lawful University business.
  6. Intentionally bringing the University or its officers into disrepute.
  7. Sending unsolicited and unauthorised global or commercial email messages.
  8. Forging or attempting to forge email messages.

Part D - Personal Use

(20) VU email accounts are provided for the purpose of academic and University related business operations. The University allows the reasonable use of email for personal use under the following conditions:

  1. Personal use of email should not interfere with work responsibilities.
  2. Personal use of email does not interfere with performance of University network services.
  3. Personal emails must adhere to the IT Appropriate Use Policy and associated procedures.
  4. Must not be used to run a private business whether for profit or not for-profit.

(21) The forwarding of nuisance emails such as chain letters, junk mail, jokes and frivolous attachments is strongly discouraged.

(22) Forwarding University emails to personal email accounts, where permitted, is subject to delivery issues and should be avoided.

Part E - Email Spam and Phishing

(23) Employees, students and other authorised users of VU’s email service should make themselves aware of educational activities and resources provided by the University to help to identify potential cybersecurity threats and how to prevent them.

(24) An external email tag is inserted at the top of all emails that are sent to a VU employee email account from an email account outside of VU.

(25) Emails received that contain suspicious content, unexpected attachments or web links should not be opened and should be reported using the Report email button within Microsoft Outlook.

(26) The University will never ask for account details or passwords in an email or ask users to validate their password through email links (phishing).

(27) Sharing passwords with others is prohibited and individual users may be held responsible for all actions including any infringement carried out by a third party given access to their accounts.

(28) Employees or students who believe they may have responded to a phishing email must immediately phone ITS Service Desk on +61 3 9919 2777 (option 1).

(29) Sending or forwarding a phishing email or an attachment or link that contains a virus is prohibited. Employee and students at VU undertaking research or awareness campaigns may send emails containing such materials provided that it demonstrably refers to their area of research and is done so in a responsible manner and in accordance with any legislative requirements.

(30) The sending of unauthorised and unsolicited global or commercial email transmissions (spam) is not allowed. Mass electronic communications should only be sent in accordance with the IT Appropriate Use - Internal Mailing Lists Procedure.

Part F - Confidential and Restricted Emails

(31) Emails containing confidential or restricted information or attachments must be classified appropriately according to the Information and Asset Classification Framework.

(32) When sending or forwarding emails containing information or attachments classified as confidential or restricted to external organisations, the email should be signed and encrypted using an approved encryption method. These can include Microsoft Office password protect, and the encryption feature in WinZip. Passwords should be provided to the recipient using another form of communication such as phone or text message.

Part G - Monitoring and Audits

(33) Emails may be monitored for the operational integrity of the University Infrastructure and/or to comply with legal or regulatory requirements. See the Information Security Policy.

(34) VU has the right to access and conduct audits on emails sent and received from University email accounts as well as email records retained in University archive systems as part of the Information Security Policy and Information Security - IT Security Audit Authorities Procedure.

(35) If there is evidence that a student or employee is not adhering to University policies or procedures, the University reserves the right to take disciplinary action, including termination of access to University systems and services and/or legal action.

Part H - Retention of Emails

(36) All email records from University email accounts will be retained for ten (10) years. All of the Vice-Chancellor's email records will be retained indefinitely.

(37) Any exemption to the email retention period must be approved by the Chief Digital Officer and Executive Director Campus Services and Manager, Records and Archives Services.

Top of Page

Section 7 -  Supporting Documents and Information

(38) Online Safety and Security

(39) Information and Asset Classification Framework

(40) Best Practice Email Guidelines