Bulletin Board - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this
to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment".
3. Do not open more than one comment box at the same time.
4. When you have finished making comments click on the "Continue to Step 2" button at the very bottom of this page.
Important Information
Your connection may time out due to inactivity. To avoid losing your comments, we suggest:
-
Do not jump between web pages/applications or log comments for more than one document at a time.
-
Do not leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
Do not exit until you have completed all three stages of the submission process. Your feedback will not be saved until you prove you are human.
(1) Charles Darwin University (‘the University’, ‘CDU’) has an obligation to ensure appropriate security for all information and communication technology (ICT) data, equipment, and processes in its domain of ownership and control so that information can be protected to a level commensurate with its value to the organisation, while still being made available to those who need it. (2) The University routinely gathers, stores, maintains, processes, transmits and disposes of records containing information that must be protected. This information plays a vital role in supporting the University’s business processes and customer services, by contributing to operational and strategic business decisions and in conforming to legal and statutory requirements. (3) This procedure provides instruction on the investigations of possible breaches of the Information and Communication Technologies Acceptable Use Policy. This procedure enacts the principles of the Information Security and Access Policy. (4) This procedure applies to all staff members and students, to all University associates and members of the University community with access to CDU ICT equipment and resources, and to all clients of ICT equipment owned or leased by the University. (5) This procedure also applies to all information assets encompassing facilities, data, software, paper documents and personnel, and to all equipment connected to the University’s data and voice networks. (6) The Chief Information and Digital Officer (CIDO) is responsible for authorising and overseeing all monitoring of CDU ICT systems and all investigations of suspected unacceptable use of ICT. (7) Unacceptable use of ICT systems is defined in the Information and Communication Technologies Acceptable Use Policy. (8) All information, files, records and data accessed by authorised Digital Technology Solutions (DTS) staff must be treated as confidential and may only disclosed to relevant third parties as required, in line with the Privacy Policy. (9) The DTS team and authorised external parties will perform regular monitoring of the University’s information and communication technologies and report any suspected unacceptable use of ICT to the CIDO. (10) All ICT users are required to report suspected unacceptable use of ICT and breaches of the Information Security and Access Policy to their supervisor, lecturer, manager or directly to DTS. (11) All reports of suspected unacceptable use of ICT will be forwarded to the CIDO, who will determine whether an investigation is warranted. (12) If unacceptable use of ICT is suspected or identified during of regular ICT monitoring, or after receiving a report of or a request for investigation into suspected unacceptable use of the ICT, the CIDO will a direct specified staff member or request an authorised external party to monitor the suspected user and their accounts. (13) A specified staff member is a member of the DTS team authorised by the CIDO to investigate cases of suspected unacceptable use. The specified staff member may undertake specific actions (for example, accessing personal files or monitoring internet use) against specified users within the scope and for the duration of the investigation. The specified staff member may not undertake further actions or investigate other users without the approval of the CIDO, and all such actions must cease once the investigation is concluded. (14) The specified staff member or external party will investigate all relevant ICT assets, including but not limited to computer systems, applications, log data, usage history, and cache files, and provide all relevant data to the CIDO for review and assessment. (15) If the CIDO determines that unacceptable use has occurred, they will produce a report for the relevant member of the Vice-Chancellor's Advisory Committee regarding the nature and severity of the incident. (16) In certain circumstances, such as finding evidence of criminal activity, the CIDO is required to notify relevant statutory authorities. In these circumstances, notifying the statutory authorities takes precedence over notifying and reporting to the University. (17) The CIDO will make recommendations on responding to the incident to the relevant Member of the Vice-Chancellor’s Advisory Committee or statutory authority, who will determine what further actions, if any, are to be taken. This may include, but is not limited to: (18) Responses to incidents will be proportional to the degree of non-compliance, and consideration will include matters such as whether the incident was intentional, whether the incident was illegal, and the degree of risk and/or damage caused by the incident. (19) Consideration of responses to an incident will involve all relevant executives and responsible officers, and may include representatives or executives of People and Culture, Student Success and Educational Excellence, (20) Where a user’s actions pose an immediate threat to the security of the University through its ICT systems the CIDO will: (21) The University must keep a record of: (22) Records are to be maintained in accordance with the Records and Information Management Policy and Procedure and associated procedures. (23) Non-compliance with (24) Complaints may be raised in accordance with the Complaints and Grievance Policy and Procedure - Employees and Complaints Policy - Students. (25) All staff members have an individual responsibility to raise any suspicion, allegation or report of fraud or corruption in accordance with the Fraud and Corruption Control Policy and Whistleblower Reporting (Improper Conduct) Procedure.Investigating Unacceptable Use of ICT Procedure
Section 1 - Preamble
Section 2 - Purpose
Section 3 - Scope
Section 4 - Procedures
Detection
Suspected infringement
Immediate threat
Record keeping
Section 5 - Non-Compliance