Bulletin Board - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this
to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment".
3. Do not open more than one comment box at the same time.
4. When you have finished making comments click on the "Continue to Step 2" button at the very bottom of this page.
Important Information
Your connection may time out due to inactivity. To avoid losing your comments, we suggest:
-
Do not jump between web pages/applications or log comments for more than one document at a time.
-
Do not leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
Do not exit until you have completed all three stages of the submission process. Your feedback will not be saved until you prove you are human.
(1) Charles Darwin University (‘the University’, ‘CDU’) provides information and Communication Technology (ICT) to support its functions and activities and is committed to ensuring those resources are used in a transparent and accountable manner. All members of the University community have a responsibility to use University ICT resources in a manner consistent with this commitment. Failure to meet this commitment may result in the introduction of threats that may impact the productivity, security and reputation of the University. (2) This policy articulates the expectations for the acceptable use of the University’s ICT systems. (3) This policy applies to all people granted access to the University’s ICT systems, including staff, students, and other members of the University community, including honorary appointees, visitors, and volunteers. (4) This policy also applies to all users of ICT equipment under the management or control of the University, and all equipment connected to the University’s data and voice networks. (5) Users are responsible for any activity, transaction or publication of information which originates from their University account. A user must not perform any act that prejudices the security of their University user account, including disclosing their password to any other person or allowing another person to use their account. (6) Users who inadvertently receive or access unacceptable material must take immediate action to cease such access and make a report to DTS. (7) The University provides ICT resources to support education, research and work purposes and expects that these resources will only be utilised for the appropriate and legitimate performance of these activities. Acceptable use of the University’s ICT resources is any use that: (8) Unacceptable use of the University ICT resources is any use that: (9) Access to a University email account is provided for the purpose of sending and receiving emails related to the performance the user’s work, studies or university responsibilities. Emails may constitute University records and must be managed in accordance with University recordkeeping requirements. (10) Users of University email services are expected to respect the standards of courtesy and professionalism that apply to all University communications and to avoid aggressive or abusive messages, messages that could reasonably be viewed by others as offensive or objectionable, or messages containing content that is obscene. (11) The University recognises that ICT resources may be used for incidental personal use. Incidental use must be infrequent, minimal, and must not interfere with University operations, employee performance, or study. Incidental personal use does not include the following: (12) The University acknowledges that, as part of their employment or studies, staff and students may be required to use ICT resources to access unacceptable materials. Users must ensure approval for such activities is provided by the relevant Pro Vice-Chancellor or head of division and subsequently registered with DTS prior to access or use occurring. (13) The University may capture and inspect data stored or transmitted on ICT facilities for the purpose of maintaining system security, integrity, and investigating potential security incidents. This data is used to maintain system security and integrity and to prevent, detect or minimise unacceptable behaviour and may include information relating to user activity, including email and internet usage, file operations and content stored on connected storage devices. (14) Non-compliance with (15) Complaints may be raised in accordance with the Complaints and Grievance Policy and Procedure - Employees and Complaints Policy - Students. (16) All staff members have an individual responsibility to raise any suspicion, allegation or report of fraud or corruption in accordance with the Fraud and Corruption Control Policy and Whistleblower Reporting (Improper Conduct) Procedure.Information and Communication Technologies Acceptable Use Policy
Section 1 - Preamble
Section 2 - Purpose
Section 3 - Scope
Section 4 - Policy
University user account responsibilities
Use of information and communication technology (ICT) resources
Acceptable use of electronic mail
Incidental personal use
Use of ICT resources for approved activities
Monitoring and detection
Section 5 - Non-Compliance