The University will not tolerate its ICT Resources being used
in a manner that is harassing, discriminatory, abusive, rude,
insulting, threatening, obscene or otherwise inappropriate.
It is illegal to use any ICT Resource to harass, menace, defame, libel, vilify,or
discriminate against any other person within or beyond the University. It
is important to understand that in matters of discrimination and harassment
it is the reasonable perception of the recipient and not the intention of
the sender that is significant.
may be individually liable if they aid and abet others who
discriminate against, harass or vilify colleagues or any member
of the public. Users who adversely affect the reputation of
another person may be sued for defamation by that aggrieved
Users must not use the University’s ICT Resources to
collect, use or disclose personal information in ways that
Users must respect and protect the privacy of others.
Users are forbidden to use ICT Resources to access, store or
transmit pornographic material of any sort other than with
specific written approval from an authorised University Officer
for research related purposes.
The use of ICT Resources for gambling purposes is forbidden.
The University forbids the use of its ICT resources in a manner
that constitutes an infringement of copyright. The law permits
copying and/or printing only with the permission of the copyright
owner, with a few very limited exceptions such as fair use
for study or research purposes (this exception itself is subject
to numerous provisos and conditions in the Copyright Act).
Users must not download and/or store copyright material, post
copyright material to University websites, transfer copyright
material to others or burn copyright material to CD ROMs or
other storage devices using ICT Resources, unless the copyright
material is appropriately licensed. Copyright material includes
software, files containing picture images, artistic works,
live pictures or graphics, computer games, films and music
(including MP3s) and video files.
g) ICT Resources must not be used to cause embarrassment or loss of reputation
to the University.
h) The University does not permit the use of its ICT Resources for unauthorised
profit making or commercial activities. Academic staff are referred to the
University’s Outside Earnings Policy with regard to the use of University
Resources for private professional practice. General staff are referred to
the University's Code of Conduct.
All internet content made available on the University’s
ICT Resources must comply with the University’s policy
on Internet Content.
Users must not use ICT Resources in inappropriate ways, which
are likely to corrupt, damage or destroy data, software or
hardware, either belonging to the University or to anyone else,
whether inside or outside the network. They may only delete
and alter data as required by their authorised University activities.
This does not apply to specially authorised University computing
staff who may be required to secure, remove or delete data
and software, and dispose of obsolete or redundant ICT Resources
as part of their ICT Resource management duties.
Users must not attempt to repair or interfere with, or add
any devices (whether hardware or components) to, any ICT Resource,
unless they are authorised and competent to do so. All faults
or suspected faults must be reported to either the relevant
departmental computer services officer or IT Services Helpdesk.
ICT Resources must not be used to distribute unsolicited advertising
material from organisations having no connection with the University
or involvement in its activities.
Users of University issued accounts must identify themselves
and not use a false identity.
n) University email lists generated for formal University communications
must not be used for other than University business.
o) Unless via a personally paid account, files may only be accessed or downloaded
if they are work or study related. In any case, files may only be downloaded
if it is legal to do so and steps have been taken to ensure that the files
are free from viruses and other destructive codes.
Files may only be attached to email messages if the sender
believes they are free from viruses and has taken steps to
ensure that they do not contain viruses or other destructive
Users must not attempt to gain unauthorised access to any computer
service. The use of another person's login, password or any
other security device (e.g. SecurID, digital signature or biometric
identification) is not permitted. Nor must Users exploit any
vulnerabilities in systems or (except authorised staff when
checking security of systems as part of their duties)
use any technology designed to locate such vulnerabilities or circumvent
security systems. Such behaviour is likely to be a breach of Part 6 of the
NSW Crimes Act 1900 and if proven would potentially be considered serious
misconduct and accordingly may be dealt with under relevant disciplinary
provisions. The matter may also be referred to the police and/or the
Independent Commission Against Corruption.
Users must not use ICT Resources for the purposes of subscribing
to and accessing fee based services that are for personal use
only, unless the subscription or access is from a personally
paid account and the Users personally pay the fees for the
services and the services are legal.
Users must not facilitate or permit the use of the University’s
ICT Resources by persons not authorised by the University e.g.
Users must not set up a wireless relay base station from their
Local members of associations (including authorised delegates
of unions which are parties to the University’s Enterprise
Agreements) may make reasonable use of the University’s
ICT Resources for communicating with the University and for
internal union(s) communications relating to enterprise bargaining,
other related local negotiations or for matters affecting an
individual staff member.
Limited minor and incidental personal use may be allowed, but
it is a privilege and must not interfere with the operation
of ICT resources, burden the University with incremental costs,
interfere with the User’s employment or other obligations
to the University and is subject to compliance with University
policies. Users should be aware that personal use of the University’s
ICT Resources may result in the University holding personal
information about the User and/or others which may then be
accessed and used by the University to ensure compliance with
this, and other policies.
Use of ICT Resources is not considered private. Users of ICT
Resources should be aware that they do not have the same rights
as they would using personally owned equipment through commercial
The University's electronic communication systems generate
detailed logs of all transactions and use. All Users should
be aware that the University has the ability to access these
records and any backups. In addition, system administrators
have the ability to access the content of electronic communications
and files sent and stored using the University's equipment.
The University charges telephone calls and Internet charges
back to schools/departments. This means that managers are regularly
advised of postal expenditure, the costs of all telephone calls
from each extension and Internet traffic costs associated with
each network connection/computer. Users should be aware that
details of telephone numbers called are
recorded and can be accessed.
(d) The University reserves the right to audit regularly and monitor the
use of its ICT Resources to ensure compliance
with this policy.
The University also reserves the right to look at and copy
any information, data or files (including non-University material)
created, sent or received by Users using, or while connected
to, the University’s ICT Resources in the event of a
suspected breach of this or other policies.
Response to Breaches
The University reserves the right to withdraw, restrict or
limit any User’s access to its ICT Resources if a breach
of these conditions is suspected. Any such suspected breach
may also be investigated under other University processes,
and may result in disciplinary action being taken against the
offender in accordance with those processes. This may include
a request to reimburse costs (e.g. for unreasonable personal
use), disciplinary action (including termination of employment/suspension
of candidature) and /or criminal prosecution.
Further the University reserves the right to remove or restrict
access to any material within the University domain. Such decisions
will be communicated to the appropriate supervisor and account
Security, Confidentiality and Privacy
Matters of a confidential nature should only be conveyed or
stored in an electronic format when adequate security measures
have been taken.
While the University communications systems are electronically
safeguarded and maintained in accordance with current best
guarantee can be given regarding the protection confidentiality, privacy
or security of any information.
Email and other records stored in ICT Resources may be the
subject of a subpoena, search warrant, discovery order or application
under the NSW Freedom of Information Act 1989. Disclosure outside
the University of any personal information, irrespective of
its format, will be in accordance with the NSW Privacy and
Personal Information Protection Act 1998, the Health Records
and Information Protection Act 2002, the University's Privacy
Policy and its Privacy Management Plan.
While the NSW Privacy and Personal Information Protection Act,
and the NSW Health Records and Information Protection Act 2002
regulate the collection, management, use, security and disclosure
of personal information, the Act and the Policy do not confer
an automatic right of privacy for Users accessing ICT Resources.
The University may collect and receive personal information
of Users and others in the course of managing the operation
and use of its ICT Resources and that information can be used
in connection with efforts to ensure that Users comply with
all relevant laws and University policies.
Communications on University business in any format or media
are official records, subject to statutory record keeping requirements
and the University Recordkeeping Policy. This includes email
sent and received by staff members on any University related
matter. Staff need to be conscious of the need to preserve
official communications in accordance with the relevant University
guidelines on the management of electronic records. Care should
be taken before deleting any electronic communication that
it is not required to be kept as evidence of a decision, authorisation
Sending an email on an official University matter is similar
to sending a letter on University letterhead. Such email transactions
should be handled with the normal courtesy, discretion and
formality of all other University communications. Users should
not write anything in an email that they would not sign off
in a memorandum.