(1) Charles Darwin University (‘the University’, ‘CDU’) has an obligation to ensure appropriate security for all Information and Communication Technology (ICT) data, equipment, and processes in its domain of ownership and control so that information can be protected to a level commensurate with its value to the organisation, while still being made available to those who need it. (2) CDU routinely gathers, stores, maintains, processes, transmits and disposes of records containing information that must be protected. This information plays a vital role in supporting the University’s business processes and customer services, by contributing to operational and strategic business decisions and in conforming to legal and statutory requirements. (3) This procedure provides definitive instruction on the investigations of possible breaches of the Information and Communication Technologies Acceptable Use Policy. This procedure enacts the principles of the Information Security and Access Policy. (4) This procedure applies to all staff members and students, to all University associates and members of the University community with access to CDU ICT equipment and resources, and to all clients of ICT equipment owned or leased by the University. (5) This procedure also applies to all information assets encompassing facilities, data, software, paper documents and personnel, and to all equipment connected to the University’s data and voice networks. (6) The Chief Information Officer/Chief Information Security Officer (CIO/CISO) is responsible for authorising and overseeing all monitoring of CDU ICT systems and all investigations of suspected unacceptable use of ICT. (7) Unacceptable use of ICT systems is defined in the Information and Communication Technologies Acceptable Use Policy. (8) All information, files, records and data accessed by authorised ITMS staff must be treated as confidential and may only disclosed to relevant third parties as required, in line with CDU’s Privacy Policy. (9) The Information Technology Management System (ITMS) team and authorised external parties will perform regular monitoring of the University’s information and communication technologies and report any suspected unacceptable use of ICT to the CIO/CISO. (10) All ICT users are required to report suspected unacceptable use of ICT and breaches of the Information Security and Access Policy to their supervisor, lecturer, manager or directly to ITMS. (11) All reports of suspected unacceptable use of ICT will be forwarded to the CIO/CISO, who will determine whether an investigation is warranted. (12) If unacceptable use of ICT is suspected or identified during of regular ICT monitoring, or after receiving a report of or a request for investigation into suspected unacceptable use of the ICT, the CIO/CISO will direct specific staff member or request an authorised external party to monitor the suspected user and their accounts. (13) A specific staff member is a member of the ITMS team authorised by the CIO/CISO to investigate cases of suspected unacceptable use. The specified staff member may undertake specific actions (for example, accessing personal files or monitoring internet use) against specified users within the scope and for the duration of the investigation. The specified staff member may not undertake further actions or investigate other users without the approval of the CIO/CISO, and all such actions must cease once the investigation is concluded. (14) The specified staff member or external party will investigate all relevant ICT assets, including but not limited to computer systems, applications, log data, usage history, and cache files, and provide all relevant data to the CIO/CISO for review and assessment. (15) If the CIO/CISO determines that unacceptable use has occurred, they will produce a report for the relevant Member of the Vice-Chancellor’s Advisory Committee regarding the nature and severity of the incident. (16) In certain circumstances, such as finding evidence of criminal activity, the CIO/CISO is required to notify relevant statutory authorities. In these circumstances, notifying the statutory authorities takes precedence over notifying and reporting to the University. (17) The CIO/CISO will make recommendations on responding to the incident to the relevant Member of the Vice-Chancellor’s Advisory Committee or statutory authority, who will determine what further actions, if any, are to be taken. This may include, but is not limited to: (18) Responses to incidents will be proportional to the degree of non-compliance, and consideration will include matters such as whether the incident was intentional, whether the incident was illegal, and the degree of risk and/or damage caused by the incident. (19) Consideration of responses to an incident will involve all relevant executives and responsible officers, and may include representatives or executives of People and Culture, Student Services and VET, Faculty Pro Vice-Chancellors, and direct line managers. (20) Where a user’s actions pose an immediate threat to the security of the University through its ICT systems the CIO/CISO will: (21) The University must keep a record of: (22) Records are to be maintained in accordance with the Records and Information Management Policy and Procedure and associated procedures. (23) Non-compliance with Governance Documents is considered a breach of the Code of Conduct – Staff or the Code of Conduct – Students, as applicable, and is treated seriously by the University. Reports of concerns about non-compliance will be managed in accordance with the applicable disciplinary procedures outlined in the Charles Darwin University and Union Enterprise Agreement 2022 and the Code of Conduct – Students. (24) Complaints may be raised in accordance with the Code of Conduct – Staff and Code of Conduct - Students. (25) All staff members have an individual responsibility to raise any suspicion, allegation or report of fraud or corruption in accordance with the Fraud and Corruption Control Policy and Whistleblower Reporting (Improper Conduct) Procedure.Investigating Unacceptable Use of ICT Procedure
Section 1 - Preamble
Section 2 - Purpose
Section 3 - Scope
Section 4 - Procedures
Detection
Suspected Infringement
Immediate threat
Record keeping
Section 5 - Non-Compliance
View Current
This is the current version of this document. You can provide feedback on this policy to the document author - refer to the Status and Details on the document's navigation bar.