Code of Product2
Code of Product2
Code of Product2
This policy applies to all users of Griffith University Information Technology resources regardless of your relationship with the University and irrespective of whether those resources are accessed on or off-campus.
Rationale
Information Technology resources are essential for accomplishing Griffith University's mission of pursuing excellence in teaching and learning, research and community service. Members of the University community are granted shared access to these resources, which must be used and managed responsibly to ensure their integrity, security and availability for appropriate educational and business activities. This IT Code of Practice provides guidance to authorised users for the appropriate use of the University's Information Technology resources.
Statement
Within this IT Code of Practice, Information Technology resources include but are not limited to all standalone or networked computers, hand held devices, all forms of communication equipment, and software owned or leased by the University, including, but not limited to externally hosted applications, for example, email, blogs and social networking sites. This IT Code of Practice is intended to operate within, and be consistent with, existing State and Commonwealth Law, and University law and policies in areas such as sexual harassment, discrimination, equal opportunity, freedom of information, copyright, defamation, discipline and misconduct. It is intended to encourage responsible action and good judgement and to protect privacy. Sanctions will be enforced if you act irresponsibly and disregard your obligations to other users, or to the University as the provider of Information Technology resources. Inappropriate use of University provided Information Technology resources may also result in suspension, expulsion, termination of employment, legal action, or other disciplinary action.
Procedures
Determination of responsibilities
It is your responsibility to become familiar with the rules governing use of the University's Information Technology resources. Users who are authorised to permit other persons to use the University's Information Technology resources must ensure that those persons are made aware of the rules governing use of the
University's Information Technology resources and have them sign or otherwise acknowledge that they will carry out their responsibilities under these rules. Users learning of any violation of any of this IT Code of Practice must bring this matter to the attention of an appropriate officer (e.g. head of element, supervisor, lecturer, and Information Services staff) within the University without delay.
Authorised access
Use of equipment, software and access to the Internet via the University IT resources is provisioned conditionally to those with proper authorisation. University staff and authorised associated persons may be provided with Internet Access for University purposes upon authorisation from relevant faculty or Business Unit (e.g., Head of School/Office Director or nominee). Students receive authorisation upon enrolment at Griffith University. Responsibility and accountability for IT security is the shared responsibility of all users. You will be held responsible for all activities which originate from your account. It is your responsibility to ensure that your passwords, accounts, software and data are adequately secured. If you know or suspect that another person has gained unauthorised access to your account, you must immediately notify the Division of Information Services on 3735 5555. You must not use any means, electronic, social engineering or otherwise, to discover others' passwords.
Appropriate Use
Griffith University technology resources and infrastructure including, but not limited to, desktop computers, laptops, tablets, smartphones, intranet, internet access, wireless network, telephone system, web services, instant messaging, social media and email services may only be used for University purposes and limited personal use, as outlined below.
Statutory Requirements
You must not use the University IT resources to violate or breach any Local, State, Commonwealth or International Law. All information, data or files created, downloaded or stored by users while employed or enrolled at the University can be monitored and subject to investigation. All electronic messages are official documents, subject to the same laws as any other form of correspondence. They are subject to statutory record keeping requirements and can be subpoenaed during legal processes.
Limited personal use is the use of University IT resources to support activities that do not directly relate to University employment or studies. Examples of limited personal use include researching holidays, checking personal emails or social media. Limited personal use must not require substantial expenditure of time, adversely affect University IT resources or breach the Universitys Code of Conduct. Where personal use adversely affects University business, the user may be asked to minimise their personal use.
Prohibited Activities
The University allows its staff to use IT resources for limited extracurricular or non-work-related activities. These activities must not be illegal or potentially bring the University into disrepute, and they must not negatively impact the University's IT infrastructure. Activities which are prohibited include, but are not limited to, the use of Griffith IT resources to do the following:
support or promote political campaigns, candidates, legislation or ballot issues; send mass messages of a commercial, political, lobbying or fundraising nature; forward electronic "petitions", or to ask recipients to forward messages; send anonymous messages; solicit support (financial or otherwise) for charity, or special causes not connected with a Griffith University effort; send unverified public service announcements (such as virus alerts, unsafe products, lost and found, etc.). access websites, peer-to-peer services, bit torrent services, drop-box services, FTP servers etc to send/upload or receive/download for printing and/or distribution any copyrighted materials including with limitation, music, movies, photographs, printed materials, or any other proprietary or protected information. any activities for private business, personal gain or profit.
sites that are illegal or hold illegal content; sites that are pornographic or contain inappropriate sexual material;
The University regularly audits such sites and reserves the right to remove / remove access to, such material from its resources without notice.
Malicious Activities
You must not use University resources to engage in attempts to subvert University or external security provisions. This includes but is not limited to:
intentionally seeking information on / obtaining copies of /viewing / corrupting or modifying files, data storage media, passwords or any type of data belonging to other users unless specifically authorised to do so; intentionally disrupting or damaging the academic, research, administrative, or related pursuits of others; knowingly creating or propagating a virus, worm or any other form of malicious software; attempting to email "spoof" i.e., construct electronic communication so it appears to be from someone else; altering, or disrupting the operations of any other information system; attempting to capture to otherwise obtain user credentials, encryption keys, or any other token or access control mechanism that could permit unauthorised access; tampering with hardware components or hardware configurations without the express permission of the person/s responsible for that particular item of equipment. This includes: o workstation, monitor, keyboard and mouse; o printers and other peripherals; o network outlets, cabling and other components o phones o any part of a lab or other installation used by the general population of the University.
Under no circumstance are you allowed to connect any network device to the Griffith network unless prior permission is obtained from the Director, ICTS or designate. Network devices include but are not limited to; hubs, switches, routers, wireless access points, network appliances of any function and any devices performing network monitoring.
Privacy
The University IT resources, systems and facilities are the property of the University. Anything sent or received using the network, systems and facilities of the University will therefore be transmitted and stored on University property (or on third party property on behalf of the University). Accordingly it is likely to be reviewed by the University. This applies whether you use the University IT resources at a University site, at home, or any other location, including but not limited to externally hosted applications.
The University's email system may involve the storage of emails outside of Australia. To the extent that any of your emails contain any confidential or Personal Information (as that term is defined in the Privacy Act 1988 (Cth)), you acknowledge that data may be stored overseas. While the University has entered into confidentiality arrangements to protect the privacy of such data (including adherence to the US-EU Safe Harbour Program), you acknowledge that any data stored outside Australia may be subject to compulsory access through process of law, under the relevant jurisdiction in which it is stored. The University therefore reserves the right to monitor both usage and content of email messages, instant messages, discussion forums and visits to Internet sites using University resources to: o identify inappropriate use; o protect system security; o maintain system performance; o protect the rights and property of the University; o determine compliance with policy and state and Commonwealth laws. The University also monitors and records network traffic including:
o o o o o
email and internet sites accessed; usage data such as account names, source and destination accounts and sites; dates and times of transmission or access; size of transmitted material; other usage related data.
This information is used for accounting purposes, troubleshooting, systems management and meeting compliance.
The University reserves the right to inspect, copy, store and disclose the contents of the electronic communications of its employees and other authorised users (e.g. students), to: o identify inappropriate use; o respond to a complaint; o respond to an investigation request; o verify an allegation of misuse
This can be done upon authorisation from appropriate University managers, the Police or other Law enforcement agencies to assist in the investigation of an offence. The contents of electronic communications, properly obtained for legitimate business purposes, may be disclosed without permission of the employee or authorised user.
Monitoring and inspection can apply to personal and business use of intranet or internet services and personal and business related electronic communications. You should always assume that everything you send by e-mail, instant messaging, post to a newsgroup or LISTSERV or post via a web site is totally public and might be read by people other than expected recipients. To ensure that critical personal data such as passwords are protected from being intercepted, misaddressed or misrouted, they must never be sent by email. All login pages must use secure protocols such as HTTPS and SSL encrypted LDAP. Any email messages or instant messages whether personal or business, may be accessed as documents under the Right to Information Act and may also be tendered in court as evidence You should always assume that any web site you visit will at least know the Internet address you are coming from and that the same is true for email that you send.
Copyright Compliance
The Copyright Act sets out the exclusive rights of copyright owners and the rights of users. In addition, certain uses may be covered by licence agreements to which the University is party. Full information is available in the Griffith Copyright Guide. Software programs are protected by the Copyright Act. You do not have the right to make and distribute copies of programs without specific permission of the copyright holder, except for the purposes of back-up, making interoperable products, correcting errors or security testing.