(1) The purpose of this Policy is to provide a framework for the appropriate use of Information Technology (IT) computing facilities and services provided to authorised users by Victoria University (VU). (2) This Policy aims to inform employees, students, contractors, visitors and other authorised users of their obligations, restrictions and responsibilities when utilising IT computing facilities and services and to protect VU information assets and minimise the risk of disruption to teaching, research and University business. (3) HESF: Standard 2.1 Facilities and Infrastructure, 7.3 Information Management (4) This Policy applies to: (5) (6) User – VU employees, students, contractors, visitors and third-party providers using IT computing facilities, systems, networks and accounts. (7) Information Asset – Any information that is of value to the organisation. This term also includes the underlying supporting infrastructure such as business processes, hardware, networks, storage, applications, third-party providers and storage amongst others. (8) All employees, students, contractors, visitors and other users of IT facilities and services are expected to use these facilities and services in an appropriate and responsible manner. (9) It is the responsibility of employees, students, contractors and visitors to make themselves aware of VU policies, procedures and guidelines related to Information Technology Services and conduct their activities accordingly. (10) Users may be exempt from aspects of this Policy where it is required for their role, studies or research and approval from the head of the relevant organisational unit and the Chief Digital Officer and Executive Director Campus Services has been obtained. (11) The use of IT facilities and services must comply with this Policy, the Information Security Policy, the Information Security - User Access Management Procedure, IT Security Standards and other relevant University rules, policies and procedures, including the: (12) The procurement and support of IT software and hardware including computers, laptops, desktop phones, mobile and hand-held devices must comply with the IT Asset Policy. (13) Access to IT facilities and services must comply with the Information Security Policy, Information Security - User Access Management Procedure and other associated procedures and IT Security Standards unless otherwise exempt by other University policies. (14) Users must take all reasonable precautions for the safety and protection of VU data and information assets from unauthorised access or disclosure in order to minimise risk to the University by adhering to the handling requirements and security controls based on its classification and the policies of the University, including the Information Security Policy and the Privacy Policy. (15) Desktop and laptop computers must not be the sole repository of corporate, teaching or research data. Corporate, teaching or research data should be stored on University approved storage and protected based on their classification and sensitivity in accordance with the Information Security Policy. (16) Users are responsible for the protection of their individual account and password and must not share passwords with anyone or allow others to use their account. Users will be held responsible for all actions including any infringement carried out by a third-party given access to their accounts. (17) Computers and devices connecting to or accessing IT systems and services should implement session and screen locking mechanisms to prevent unauthorised access to the user’s account or University data and information. (18) All computers and devices connected to the University network including computers and devices not owned or managed by the University, must have the current operating system patches applied to them and be equipped with the latest antivirus software, either by automated download or manual update. (19) Physical security measures and controls are to be used to protect computer systems, personnel, and data and communications systems located in secure locations. Access to such areas must be restricted to those who have an approved need to be there. (20) University members are expected to comply with any local rules governing the use of shared IT resource spaces such as computer laboratories or laptop docking areas. (21) The IT Appropriate Use – Email Procedure should be followed for all emails sent from University email accounts. (22) Personal profile images uploaded to VU systems must be appropriate and consistent with representing the University. Employees should follow the Staff Profile Image Guidelines. (23) Members of the University allocated a mobile phone or hand-held device are responsible for its proper use, care, maintenance and safekeeping. Negligence in this matter may result in the recovery of costs from the individual member concerned. (24) Access to the internet is through Australia’s academic and research network, AARNET, and is bound by AARNET’s Access Policy (https://www.aarnet.edu.au/about-us/policies). (25) IT facilities and services are provided for the purpose of academic and University related business operations. All employees, students, contractors and visitors are to use these facilities and services for their authorised and intended purpose, however, a small amount of personal use is permitted. (26) Users are responsible for exercising good judgement regarding reasonable personal use in line with their duties and responsibilities with guidance from Teaching staff and Student Services for students; and individual departmental managers and Directors/Executive Deans for employees and other users. (27) Costs incurred by the University through excessive personal use may be recovered directly from the individual concerned, and may lead to further disciplinary/legal actions. (28) Mobile phone costs incurred that exceed the personal use limit set by the individual cost centre or the VU recommended limit, are to be reimbursed by the employee in accordance with the IT Appropriate Use - Mobile Phone Usage Reimbursement Procedure. (29) VU employees travelling on official University business are permitted to use their University allocated mobile phone for making personal calls to home if approved by their department and provided that such calls are made as brief as possible. (30) Where individual contracts of employment allow personal use of mobile phones or hand held devices, this will take precedence over this Policy; however employees must strictly comply with the conditions of employment and the Appropriate Workplace Behaviour Policy when using their VU mobile phone. (31) The following is inappropriate and prohibited when accessing, connecting to or using IT facilities and services: (32) All information and data created on University IT systems, including communications systems, computers and devices remains the property of VU. This includes but is not limited to emails sent and received from University employee and student email accounts, emails retained in central archive, voicemail, text messages and instant messages. (33) In order to protect the University's network, servers and data and/or to comply with legal or regulatory requirements, VU has the right to intercept, search, inspect, review, or otherwise capture data created or received by individual users of IT facilities and services in accordance with the Information Security - IT Security Audit Authorities Procedure. (34) All breaches of this Policy will be treated seriously. (35) The outcome of a substantiated breach of this Policy may include, is not limited to the following: (36) IT Appropriate Use - Internal Mailing Lists Procedure (37) IT Appropriate Use - Mobile Phone Usage Reimbursement Procedure (38) IT Appropriate Use - Email Procedure (39) IT Appropriate Use - Use of Personal Devices ProcedureIT Appropriate Use Policy
Section 1 - Summary
Section 2 - HESF/ASQA/ESOS Alignment
Section 3 - Scope
Top of PageSection 4 - Definitions
Section 5 - Policy Statement
Part A - Provision and Use of IT
Personal Use
Unacceptable Use
Monitoring and Auditing
Breaches of the Policy
Top of PageSection 6 - Procedures
Section 7 - Supporting Documents and Information
View Document
This is the current version of this document. To view historic versions, click on the 'Historic Versions' tab above.