IT Acceptable Use and Security Policy
The IT Acceptable Use and Security Policy is supported by two sets of procedures: IT Acceptable Use Procedures, and IT Security Procedures.
The purpose of the IT Acceptable Use and Security Policy is to:
- give a clear statement to all users of University IT facilities of their responsibilities, including what constitutes acceptable and unacceptable use
- manage the provision and modification of access to online services
- express the commitment of the University to providing and maintaining a secure, effective and reliable IT infrastructure to support the University's operations.
This Policy applies to all users of University IT facilities and services, whether the facilities are managed by Information Technology and Digital Services (ITDS), by other organisational units within the University, or by third-party providers, and whether the user is a University IT account holder or not (for instance, a user of the public terminals in the University Libraries).