Comments

Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will receive a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

 

Information Technology Conditions of Use Policy

Section 1 - Purpose and Scope

(1) The purpose of this Policy is to specify the conditions of use in relation to Technology Resources.

(2) This Policy applies to all Users of Technology Resources.

Top of Page

Section 2 - Definitions

(3) For the purposes of this Policy, the following definitions apply:

  1. Digital Communications means any form of electronic communication managed by the University including voice, video, email, instant messaging, social media, conference calls (voice and video), chat, file transfer and application and data sharing.
  2. Technology Resource means any hardware, software, device, network or other technology provided by the University for the purposes of teaching, learning, administration or other University-related business. This includes all forms of digital communications.
  3. User means any staff member, student, or visitor to the University that uses any form of University Technology Resource.
  4. Unauthorised Software means any software that has not been reviewed by Technology Services prior to installation on a University device. This includes, but is not limited to, games and peer-to-peer file sharing programs.
Top of Page

Section 3 - Policy Statement

(4) The University provides Technology Resources to support teaching, learning, research and administration based activities. The use of, and access to, Technology Resources is subject to relevant state and federal laws and all relevant University Policies, Procedures and Codes of Conduct.

(5) All Users are responsible for using Technology Resources in accordance with their intended and authorised purposes.

(6) All Users must exercise responsible, lawful, ethical and appropriate behaviour when accessing Technology Resources. Inappropriate use of these services may be deemed misconduct and dealt with accordingly, including loss of access to services.

(7) The Chief Information Officer is responsible for ensuring this Policy is up to date and enforced.

(8) In conjunction with Technology Services, Heads of Work Units are responsible for providing education and awareness to ensure their staff and students comply with this Policy.

Top of Page

Section 4 - Conditions of Use

General Use

(9) Users are responsible for:

  1. respecting the privacy of others at all times;
  2. reporting all faults and suspected faults to the Service Desk as soon as practicable;
  3. ensuring they comply with the Social Media Policy and Social Media Procedures.

(10) Users are not permitted to do the following:

  1. add an individual to an email distribution group without their consent, except where it pertains to official University business;
  2. circumvent security systems or controls, exploit system vulnerabilities, or use any technology designed to locate such vulnerabilities except where authorised by the Chief Information Officer;
  3. delete or alter data except as required by their authorised University activities;
  4. install or intentionally download Unauthorised Software on University computers;
  5. use or share software for purposes outside the specific terms and conditions or license agreement;
  6. intentionally download or make available videos, music or pictures that breach the Copyright Policy or any copyright legislation;
  7. interfere with or connect non-University networking or telecommunications equipment (eg. server hardware or peripherals, telecommunication services or devices, or data cabling) to the University network, except where authorised by the Chief Information Officer.
  8. repair or interfere with, including by adding any devices such as hardware or components, telecommunication services, or data cabling, to any University Technology Resources except where authorised by the Chief Information Officer;
  9. use another person's login or password, share your login or password with any other person or entity, attempt to gain unauthorised access to any computer service, or use a false identity to gain access to Technology Resources;
  10. use University email distribution groups for anything other than University business.
  11. use Technology Resources:
    1. for advertising, sponsorship, profit making, commercial activities except where it is clearly related to University purposes and authorised by the Head of Work Unit;
    2. for gambling;
    3. in ways which are likely to corrupt, damage or destroy data, software or hardware, whether inside or outside the network, and whether belonging to the University or not;
    4. to access, store or transmit pornographic material or sexually explicit material, images, text or other offensive material unless authorised to do so by the Head of Work Unit and only where such data is in connection with teaching or research;
    5. to cause embarrassment or loss of reputation to the University;
    6. to collect, use or disclose personal information in ways that breach relevant state or federal legislation, or the University's Privacy Management Plan;
    7. to harass, abuse, discriminate, or vilify any other person within or beyond the University; and
    8. to intentionally create, transmit, distribute or store any offensive information, data or material that breaches any State or Commonwealth law.

(11) The University reserves the right to audit and remove any illegal material from University Technology Resources without notice.

Internet Usage

(12) Internet usage must comply with this policy and other relevant University policies and procedures.

(13) Internet access is provided to all staff and students for the primary purpose of study, research and fulfillment of work-related functions. Internet may be used for incidental personal use, subject to compliance with this Policy.

(14) Internet usage levels will be periodically checked, and any users found to have excessively high usage not associated with intended or authorised use may be investigated and disciplinary action may be taken.

Privacy and Data Collection

(15) Access controls will be used to limit User access to systems or information to ensure that the confidentiality, integrity and availability of Technology Resources are maintained.

(16) The University creates and monitors logs of all activity undertaken on Technology Resources. This monitoring may reveal information such as which Internet servers have been accessed by employees, and the email addresses of those with whom they have communicated. This information will be managed in accordance with the University's Privacy Management Plan.

(17) Digital Communications are records of the University and may be accessible under the Government Information (Public Access) Act 2009 or relevant privacy legislation. The University may also be required to retain Digital Communications for a set period of time in accordance with the State Records Act 1998.

Cybersecurity

(18) Information and data transmitted over the internet or via email is capable of being intercepted, traced or recorded by others. The University cannot guarantee the confidentiality of any information stored on any University computer or transmitted through its network. Users should exercise caution with confidential information.

(19) All Users must take reasonable steps in relation to cybersecurity, including:

  1. ensuring passwords are kept confidential and not disclosed or shared;
  2. ensuring passwords are strong, for example using at least eight characters, the use of at least one upper case alpha, one numeric and one special character;
  3. updating passwords when they expire periodically;
  4. enabling passcodes on mobile devices;
  5. exercising caution regarding phishing and malware by avoiding opening attachments or clicking on web links in emails unless the source and destination link is known and trusted ;
  6. ensuring anti-virus software is installed;
  7. ensuring the most recent version and updates have been installed;
  8. ensuring data is stored appropriately (cloud drives);
  9. Backing up data regularly and before traveling; and
  10. Refraining from using free or gifted USB or similar devices unless from a trusted source.

(20) The University will never ask Users to reveal or confirm their passwords.

(21) If a User becomes aware of, or suspects that a security breach has occurred, they must immediately report the incident to the Service Desk.

(22) The University will report data breaches as required by law, or where deemed appropriate by the Chief Information Officer in consultation with the University Legal Office.

(23) When traveling, Users must take additional steps to protect Technology Resources and information stored on them. Users should:

  1. only take Technology Resources that are required when traveling;
  2. refrain from engaging in sensitive or confidential work on public computers, non-trusted networks and free or public Wi-Fi; and
  3. be mindful of politically sensitive or potentially illegal information depending on destination.

Phishing and Spam

(24) Phishing emails are designed to lure in unsuspecting victims and these emails can steal your identity, infect your computer and result in ransomware. Ransomware encrypts all of the files on your computer including any files on connected drives you have access to. These files cannot be unencrypted and so rely on the integrity of restoring from backups.

(25) Users must apply the following general principles to avoid damage to Technology Resources:

  1. never click a link in an email or open an attachment unless it is from a trusted source.
  2. be aware that Technology Services will not send an email request to confirm an account or password details.
  3. contact the service desk to report suspect emails.

(26) The University will take steps to reduce the prevalence of unwanted or unsolicited email (spam), including by applying automatic filters and rules.

Technology Purchasing

(27) All procurement of Technology Resources (including software hosted on site or in the cloud, software as a service, software subscriptions and hardware) must be reviewed by the Chief Information Officer prior to being purchased. In consultation with the relevant work unit, the Chief Information Officer will consider data, security, contractual, financial, solution viability and legal implications of the intended purchase and consumption.

(28) Any purchase of Technology Resources must be made and comply with the University's Procurement Policy and Procurement Procedures.

(29) Technology Services will not provide any support for Technology Resources that were not reviewed and approved by the Chief Information Officer prior to procurement.

(30) The physical security of computer equipment is the responsibility of the relevant Work Unit. Each Work Unit should take adequate steps to ensure equipment is secure from loss or theft.

(31) Technology Services will maintain a Software Asset Register of all software purchased by Technology Services.

(32) The purchasing Work Unit must retain the license agreement for audit and compliance purposes.

(33) Technology Services will audit Technology Resources and where required, remove any Unauthorised Software.

(34) Technology Services provides support for all software listed as part of the University's Standard Operating Environment.

Top of Page

Section 5 - Digital Communications

Email

Student Email Accounts

(35) The University will provide all enrolled students with a University email account for the period of their enrolment.

(36) The University will use a student's University email account as the primary form of communication with students.

(37) Students are responsible for regularly accessing and reviewing University email.

Staff Email Accounts

(38) The University will provide all staff with a University email account for the period of their employment.

Non-Standard Email Accounts

(39) The University may also provide a University email account to:

  1. members of the University Council;
  2. adjunct and emeritus staff;
  3. trainee staff;
  4. contractors; and
  5. industry partners.

(40) Staff may request a Non-Standard Email Account by sending a request to the Service Desk. The request must be authorised by the relevant Head of Work Unit or Executive member.

Generic Accounts and Aliases

(41) Staff may request the creation of a generic email address (e.g. policies@scu.edu.au ) where it is necessary for business process and workflow purposes. Staff must submit a request for a Non-Standard Account to the Service Desk. The request must be authorised by the relevant Head of Work Unit or Executive member.

Bulk Email Groups

(42) The University utilises a number of bulk email groups for the broadcast and dissemination of information to staff and students.

(43) Technology Services automatically subscribes staff and student email accounts to the relevant bulk email groups.

(44) Technology Services, or another nominated Work Unit, will moderate messages sent to bulk email groups.

Staff and Student Email Discussion Forums

(45) The University provides email discussion forums for matters that fall outside the purposes of the University's bulk email groups. Discussion forums may only be used by current staff or students of the University.

(46) All University Rules, Policies and Procedures and Codes of Conduct, apply to the use of, and participation in, University email discussion forums.

(47) Language or content that is considered to be threatening, defamatory, abusive or discriminatory is in breach of the University's Code of Conduct, and is not permitted on University discussion forums and will be dealt with accordingly. Harassment and bullying will not be tolerated.

(48) Commercial advertising is not permitted on any University discussion forum.

(49) Users should report any offensive materials they find through the University Complaints Management Framework.

Representation

(50) Users must be aware that Digital Communications using a University email account may be construed to be representative of the University's position. Where Users do not have the authority or are not aware of the University's position or where their personal views may vary from that of the University, such correspondence must clearly state that the opinion expressed is that of the writer, and not necessarily that of the University.

(51) Where a staff member is representing the views of the University, then a notation must be included in the email identifying the individual and the position held within the University.

Access to Emails

(52) Within their relevant Work Unit, Heads of Work Units may request access to data and information stored on University computers or databases by sending a request to the Service Desk, subject to approval from Chief Information Officer.

(53) The University will not grant access to a University email to any person other than the original sender or intended recipient, except where:

  1. Access is required for a staff member to undertake their duties;
  2. as required by law;
  3. where there is substantial reason to believe that breaches of the University's policies have taken place; or
  4. by an authorised delegate for the purpose of dealing with an application under the Government Information (Public Access) Act 2009.

(54) University system administrators will, as part of their role, have full access to the University email and other network systems. System administrators will only access email and network systems in accordance with their employment duties and applicable legislation.

(55) The University will retain archived or backup copies of all Digital Communications.

(56) Heads of Work Unit may request out of office or other notifications be put in place on behalf of absent or unavailable staff.

Top of Page

Section 6 - Breaches of this Policy

(57) Users must report breaches or suspected breaches of this Policy to their supervisor, lecturer, teacher or Head of Work Unit as soon as possible.

Staff

(58) A breach of this Policy by a Staff member may be treated as misconduct depending on the nature of the breach. Breaches shall be dealt with as provided for under the relevant section of the University's Enterprise Agreement, or in accordance with University Policies and Procedures.

Students

(59) At the discretion of the University any breach of this Policy may be treated as non-academic misconduct which will be dealt with under the Rules - Student Academic and Non-Academic Misconduct Rule.

Top of Page

Section 7 - Service Desk

(60) Users may request advice, support and general assistance regarding this policy via the Service Desk by:

  1. emailing servicedesk@scu.edu.au; or
  2. phoning (02) 6620 3698 during business hours; or
  3. visiting the online Service Desk.

(61) The Service Desk can provide limited support in relation to basic configuration and advice in relation to personal devices. The University takes no responsibility and will not be held liable for any actual or perceived damage, misconfiguration or hardware issues regarding personal equipment arising from advice provided by the Service Desk.