Acceptable use of Technology
The purpose of this policy is to advise staff, students and affiliates about CHC’s expectations about the acceptable use of technology where there is an identifiable connection with CHC.
All CHC employees and students.
This policy sets out CHC’s behavioural expectations for the use of its IT resources. The use of all IT resources is monitored, and any unacceptable use will be investigated.
CHC provides information technology (IT) resources to support its functions and activities and is committed to ensuring that these resources are used in a transparent and accountable manner. All members of the CHC community have a responsibility to use its IT resources consistent with this commitment. Unacceptable use of the CHC’s IT resources may
• be detrimental to other students, staff and workplace culture
• undermine CHC’s reputation
• be unlawful or illegal
• expose CHC to vicarious liability for a person’s actions
• have a negative effect on productivity
• be detrimental or pose a security threat to the CHC’s systems.
Information technology (IT) resources means any IT resource or facility provided by CHC to assist or support learning and teaching, research, administrative and business activities, and includes:
• computers and computer networks, including wireless networks
• IT communication equipment, software and data
• electronic mail and internet services
• telecommunications equipment including mobile devices and services
• any work area or physical space designated for teaching, study or research, including computer laboratories, technology-equipped classrooms and library study rooms.
Unacceptable material includes material in any format that is one or more of the following:
• unlawful, including breaches of federal or state legislation
• copyright material that is not obtained and/or used under an applicable licence or permission from the copyright owner
• sexually explicit or pornographic
• violent, as judged against accepted community standards for material on public display in a workplace or learning environment
• defamatory, harassing or abusive, including personal observations using unacceptable or offensive language
• spreading or inciting hatred
• offensive, as judged against accepted community standards for material on public display in a workplace or learning environment.
3. Roles and responsibilities
All users of the CHC’s IT resources have a responsibility to only use those resources in accordance with the requirements of this policy.
IT is responsible for
• promoting awareness of this policy to CHC users
• monitoring the quality of information on computer networks
• monitoring unacceptable use of IT resources by staff and students
• investigating alleged breaches and, as appropriate, initiating disciplinary action depending upon the nature of the breach of this policy.
4. Acceptable use of IT resources
CHC provides IT resources to support its teaching and learning, research, administrative and business activities, and expects that these resources will only be utilised for the appropriate and legitimate performance of these activities. Acceptable use of the college’s IT resources will:
• be consistent with Commonwealth or State laws
• be consistent with the University’s behavioural expectations as defined in the CHC Staff Code of Conduct and CHC Student Code of Conduct.
• be within any quota or cost limit imposed by CHC
• maintain the security of CHC’s IT resources and facilities.
5. Unacceptable use of IT resources
Any of the following activities constitute unacceptable use of CHC’s IT resources:
• breaching any Queensland State or Commonwealth law
• breaching the CHC’s behavioural expectations, including not complying with the CHC Staff Code of Conduct and the CHC Student Code of Conduct
• disobeying a lawful direction given by an authorised staff member
• receiving, accessing, downloading, displaying, transmitting and/or making available unacceptable material via any media, including personal storage devices connected to a CHC network
• overloading or monopolising IT resources in a manner which adversely affects other users including unauthorised sending of electronic messaging to a large number of recipients that may initiate an IT service disruption
• breaching CHC’s expectations regarding personal responsibility for a user’s CHC access account acting in a manner that compromises the security, confidentiality, integrity and availability of IT resources
• excessive personal use
6. Inadvertent unacceptable use
Users who inadvertently receive or access unacceptable material must take immediate action to either delete such material or cease such access. Advice should be sought from the user’s supervisor or from the IT Helpdesk if unacceptable material continues to be received.
7. CHC access
A user is responsible for any activity, transaction or publication of information which originates from their CHC Office365 account. A user must accept responsibility for the use of their CHC account. A user must not do any act which prejudices the security of their CHC Office365 account including disclosing their password to any other person or allowing any other person to use their account.
8. Incidental Personal Use
CHC recognises that IT resources may be used for incidental personal use. Incidental personal use must be infrequent and minor, and must not breach this policy or interfere with CHC business operations or, in the case of staff users, with the performance of that staff member’s duties. Incidental personal use of the CHC’s IT resources does not include any of the following:
• maintaining or supporting a personal private business
• recruitment of members to, or soliciting donations for, political parties or religious groups
• the transmission, viewing or publication of unacceptable material
• publication of internet sites or pages unrelated to CHC activities
• personal observations using inappropriate or offensive language
• a malicious or unlawful purpose.
9. Use of IT resources for approved activities
CHC acknowledges that staff and students may use IT resources to access unacceptable material as a result of approved activities arising out of their employment or studies. Students and staff must ensure approval for such activities is, in the first instance, given by their dean prior to access or use occurring.
10. Monitoring and detection
CHC routinely logs network activity and scans CHC connected storage devices and may use this information to investigate faults, security breaches, unlawful or illegal activity and unacceptable use in accordance with this policy and other information resources policies.
Allegations that unacceptable use of the CHC’s IT resources has occurred may be reported to a staff member’s supervisor or the IT department.
11. Failure to comply
Students and staff who fail to comply with this policy will face disciplinary action in accordance with the relevant policy (eg Student Code of Conduct, Staff Code of Conduct).
Other members of CHC’s community (honorary appointments, contractors and visitors) who do not comply with this policy may have their association with CHC terminated, or may have their rights of access to CHC’s IT resources, services, facilities or infrastructure revoked.
Some breaches of this policy may also have consequences for users under criminal or civil provisions of the general law (for example, if the breach contravenes the Criminal Code (Qld), the Crimes Act 1914 (Cth) or other laws). In certain situations, CHC may be legally required to disclose information about unacceptable use of IT resources to law enforcement agencies or other statutory authorities.
The reporting of use of IT resources involving illegal actions or material to the appropriate law enforcement agency or other statutory authority is the responsibility of Vice President, Operations. In cases requiring urgent action with law enforcement agencies, initial contact with them may be made by IT staff and/or Vice President Academic or appointed nominee, with notification as soon as practicable to the Vice President, Operations.
|POLICY FURTHER INFORMATION|
|Relevant Commonwealth/State Legislation||Commonwealth Legislation|
Queensland State Legislation
|Implementation:||Vice President, Operations|
|Compliance:||Vice President, Operations|
|Monitoring and Evaluation:||Vice President, Operations|
|Development/Review:||Vice President, Operations|
|Interpretation & Advice:||Vice President Operations|
|WHO SHOULD KNOW THIS POLICY?|
|All staff, students and|
|Definitions and Acronyms:|
|APPROVAL – section maintained by the Registrar|
|Reference No.||Approved||Date||Committee/Board||Resolution No. / Minute Ref.|
|REVISION HISTORY – section maintained by the Registrar|
|Revision Reference No.||Approved/Rescinded||Date||Committee/Board||Resolution No. / Minute Ref.|