IT Acceptable Use and Security Policy

Overview:

The University of Adelaide seeks to provide its staff, students, titleholders and visitors with secure and timely access to IT equipment and the online services and resources necessary for undertaking their work and study. Consequently the University is highly reliant on information that is gathered, stored, processed and delivered by computers and their associated communications facilities. The purpose of this Policy is to give a clear statement to all users of University IT facilities and services of their responsibilities, including what constitutes acceptable and unacceptable use; to manage the provision and modification of access to online services; and to express the commitment of the University to providing and maintaining a secure, effective and reliable IT infrastructure to support the University's operations.


Title Version Date uploaded
IT Acceptable Use and Security Policy D2016/11600 15 Aug 2017
IT Acceptable Use Procedures d2016/11606 29 Feb 2016
IT Security Procedures d2016/11610 29 Feb 2016

RMO File No. 2015/1960
Policy custodian Chief Operating Officer
Responsible policy officer Chief Information Officer, Technology Services
Approved by Vice-Chancellor and President on 5 February 2016
Related Policies IT Acceptable Use Procedures

IT Security Procedures

Information Classification and Handling Guideline

Third Party Hosting Security Guideline

Code of Conduct Policy

Behaviour and Conduct Policy

Student Misconduct Rules

Copyright Policy

University Records Policy

Privacy Policy

Related legislation Criminal Code Act 1995 (Cth)

Spam Act 2003 (Cth)

Copyright Act 1968 (Cth)

Telecommunications (Interception and Access) Act 1979 (Cth)

Effective from 5 February 2016
Review Date 31 December 2018
Contact for queries about the policy ITS Helpdesk, telephone 8313 3000

Printed copies of these documents may not be up to date. Please refer to the University Policy and Procedures website for the latest version.