IT Acceptable Use and Security Policy


This Policy sets out the principles applicable to the use of University IT and expresses the commitment of the University to providing and maintaining secure, effective and reliable IT infrastructure and services to support the University's operations in research, teaching, learning, and administration. By observing the acceptable use and security requirements, University IT users and custodians can help to prevent service disruptions and data breaches caused by cyberattacks and other threats.


The Provost may exercise some of the Vice-Chancellor's authorities in this policy - see D2024/647279.

  • Related Procedures, Forms

  • Administration, Approval and Review

    RMO File No. 2021/8007
    Policy custodian Chief Operating Officer
    Responsible policy officer Chief Information Officer, Information Technology and Digital Services
    Endorsed by Vice-Chancellors Executive on 6 April 2022
    Approved by Vice-Chancellor and President on 10 May 2022
    Related Policies IT Acceptable Use Procedures

    IT Security Procedures

    Information Classification and Handling Guideline

    Third Party Hosting Security Guideline

    Code of Conduct Policy

    Behaviour and Conduct Policy

    Student Misconduct Rules

    Copyright Policy

    Information Management Policy

    Privacy Policy

    Related legislation Criminal Code Act 1995 (Cth)

    Spam Act 2003 (Cth)

    Copyright Act 1968 (Cth)

    Telecommunications (Interception and Access) Act 1979 (Cth)

    Security of Critical Infrastructure Act 2018 (Cth)

    Teritary Education Quality Standards Agency Act 2011 (Cth) (TEQSA Act) ss 114A and 114B

    Effective from 10 May 2022
    Review Date 9 May 2025
    Contact for queries about the policy ITS Helpdesk, telephone 8313 3000

Please refer to the Policy Directory for the latest version.