ICT Acceptable Use Procedures
These Procedures have been developed to support the Information Communication Technology (ICT) Acceptable Use Policy and uphold the intent of the Policy by:
- Expressing the commitment of the University to maintaining secure, effective and reliable University ICT Services;
- Providing a clear statement of responsibilities for all users of University ICT Services, including what constitutes acceptable and unacceptable use of these services;
- Establishing clear mechanisms for rapidly responding to threats to the University ICT Services (for instance, via hacking or virus threats); and
- Providing processes to appropriately handle other security incidents, from minor breaches of Policy through to serious misconduct.
These Procedures apply to all Authorised Users of University ICT Services managed by the University or third party providers on behalf of the University, both on and off campus.
Defined terms in the ICT Acceptable Use Policy have the same meaning in these ICT Acceptable Use Procedures.
Account means a user name or other identifier which, with or without a password, allows a user to access the University ICT Services.
Asset Owner means an individual or collective group with accountability and authority for University ICT Services.
College/Directorate Representative means a person appointed by a College or Directorate whose role is to control use of University ICT Services allocated to their College or Directorate.
Corrupt Conduct has the same meaning as in the Crime and Corruption Act 2001 (Qld).
General Access Teaching Computer Facilities Labs (GATCF) means the computing labs and equipment provided by the University.
Inappropriate Material means content that, if accessed through University ICT Services, contravenes the Information Communication Technology Acceptable Use Policy;
ICT Bulletins means information supplied by Information and Communications Technology either by email, automatically output on a workstation or on the University websites.
Jailbreaking means the process of removing software controls on the operating systems to increase functionality or subvert security controls. Mostly commonly used when referring to Apple devices, however the concept can be applied to other makes or models.
Outside User means a person or organisation external to the University.
Private Cloud means a service operated solely for a single organisation, whether managed internally or by a third-party, and hosted either internally or externally.
Public Interest Disclosure means disclosure of information, as identified in the Public Interest Disclosure Act 2010 (Qld),by any person, including a Public Officer.
Public Officer has the same meaning as in the Public Interest Disclosure Act 2010 (Qld), and includes University employees.
Table of Contents
- General usage
- Personal computer security
- Software licensing
- Physical security
- GATCF computer labs
- Sustainability - energy management
- Data management
- Security management
- System logging and monitoring
- Reporting and handling events, incidents or breaches
- Handling breaches of the ICT Acceptable Use Policy
- Responding to requests for information
- Inadvertent unacceptable use
- Related policy instruments
- Related legislation
These procedures are designed to support the operational nature of the ICT Acceptable Use Policy by providing detailed acceptable use procedures.
University ICT Services are the property of the University.
1. General usage
Categories of Authorised Users include:
- Any University student who has been allocated an Account or who has been authorised by a member of University academic staff to use an Account;
- Any member of University staff who has been allocated an Account or who has been authorised to use an Account allocated to another person or to a group of people or to a section of the University. They must use University ICT Services for officially approved purposes. Limited personal use is permitted as explained in the JCU Code of Conduct Explanatory Statement;
- Any representative of another educational institution authorised to use University ICT Services through an arrangement between the University and the other educational institution;
- An Outside User who has been provided with an Authentication Credential; or
- Any individual associated with an Outside User authorised to use an Account allocated to the Outside User.
Authorised Users, must:
- Take responsibility for all activity initiated from any Account through which they have been granted access to University ICT Services;
- Ensure that their Authentication Credential(s) are securely stored as they are responsible for all activity initiated from their Account or with their Authentication Credential(s);
- Not allow another person to use their Account and/or Authentication Credential. Similarly, an Authorised User must not attempt to initiate or operate a computer session by using another person's Account and Authentication Credential, or by any other means. Should an Authorised User believe that the security of an Account has been compromised they must report this to the ICT Help Desk;
- Not circumvent the University's authorised connections or subvert its security measures. This includes ‘jailbreaking’ of University owned devices;
- Only access University ICT Services using the Accounts they have been authorised to use (kiosk services have an implicit authorisation to use);
- Observe ICT Bulletins issued by the University; and
- Comply with any system quotas. If an Authorised User exceeds any of their quotas, they may be personally charged for the cost of their use and/or temporarily prevented from using the affected University ICT Service.
2. Personal computer security
University staff and students, who use a personal computer (including smartphones) must:
- Take responsibility for the security of personally owned computers and equipment used in conjunction with the University's ICT Services;
- Familiarise themselves with ICT good practice guidelines (available on the Information and Communications Technology website) and take reasonable steps to ensure that personal computer(s) do not pose a threat to University ICT Services when connected to the University network. This may include:
- Regularly scanning their device for viruses; and
- Maintaining up-to-date software versions; and
- Protect against loss or theft of University data by:
- Regularly backing up data;
- Using encryption tools to protect sensitive data;
- Logging off or locking devices when left unattended;
- Implementing a secure access mechanism, such as a password; and
- Avoiding leaving devices unattended in public places even if physically secured.
3. Software licensing
The University has entered into various software licensing agreements with software vendors. Under the terms of those agreements, University staff and students may be able to install any of the products covered under the agreement onto University owned machine or personal device(s).
4. Physical Security
Authorised or Outside Users must:
- Take responsibility for the physical security of all University ICT Services owned or leased by their area. Where these University ICT Services are managed by Information and Communications Technology, the responsibility is shared between the College/Directorate (physical security) and Information and Communications Technology (data and systems security).
Information and Communication Technology must:
- Physically secure all University core infrastructure and GATCF Labs against theft. This can be achieved by:
- Implementing secure cables between the device and the building; or
- Storing equipment in lockable rooms; or
- Storing equipment in lockable cabinets.
5. GATCF computer labs
Authorised Users who use the GATCF facilities must:
- Abide by the ICT Acceptable Use Policy, associated procedures and GATCF Conditions of Use.
6. Sustainability - energy management
When on a University campus, University staff and students should:
- Save consumption of energy by powering down systems/devices when left unattended for long periods.
Information and Communication Technology must:
- Implement power management programs to reduce the energy consumption for non-critical University ICT Services.
7. Data management
All academic research supervisors and College Deans are responsible for ensuring that they:
- Define research data management requirements and communicate these requirements to the relevant stakeholders; as required by the Code for the Responsible Conduct of Research.
All University staff and students must:
- Adhere to the data management requirements as specified by their College or Division;
- Ensure all electronically held University owned information is stored in such a way that it is backed up regularly. This can be achieved by:
- storing data on University approved systems;
- storing data on a University network drive or system; or
- storing data on a University endorsed cloud based storage; and
- Ensure all University owned information is disposed of in accordance with the University's Records Management Policy and sustainability procedures as provided by TropEco.
8. Security management
All Asset Owners must:
- Take responsibility for the physical security and access control of all the data stored on, transmitted through or processed by University ICT Services within their responsibility;
- Implement suitable security controls to prevent un-authorised access or modification to data; and
- Monitor the effectiveness of security controls to ensure their on-going effectiveness.
Information and Communications Technology must:
- Lead and advise on good practice security management across the University. This includes providing advice and support to Asset Owners on good practice with regard to information and data security;
- Manage common University ICT Services in such a way that the services and data are reasonably protected from:
- Unauthorised access and unacceptable use;
- Common and easily exploitable vulnerabilities;
- Wilful, malicious damage or any activity undertaken to intentionally bypass security controls on University ICT Services; and
- Virus infection and malicious software;
- Take reasonable steps to ensure that data on University ICT Services is:
- Accurate and complete;
- Available to be accessed by Authorised Users, and only those users, when required; and
- Recovered in an agreed timeframe in the event of serious systems failure or disaster;
- Ensure required University owned or leased computers, desktops or laptops are configured to have a password enabled screensaver that activates within a period of no greater than 30 minutes of inactivity;
- Promote a positive and safe computing environment for all Authorised Users;
- Implement appropriate quotas on the use of University ICT Services (this may include print, file storage, email and internet usage) in order to ensure the ongoing integrity and availability of University ICT Services;
- Ensure sensitive information is disposed of in a manner that renders any information illegible and irretrievable at the time of disposal by:
- Physically destroying the media;
- Bulk wiping (degaussing); or
- Implementing an industry approved 3-times secure wipe of the media; and
- Carry out security reviews of University ICT services to verify the on-going effectiveness of controls. This should include access reviews of administrative accounts.
9. System logging and monitoring
Information and Communications Technology will:
- Implement appropriate logging of use of University ICT Services and routinely monitor to assist in the detection of breaches of these Procedures and the ICT Acceptable Use Policy.
- Monitor the use of University ICT Services and investigate potential breaches of University Policy, or State or Commonwealth Law.
10. Reporting and handling events, incidents or breaches
All Authorised Users must:
- Report any actual or suspected security weakness, breach or threat involving University ICT Services to the ICT Help Desk or the Director, Information and Communications Technology as soon as possible;
- Respond to potential incidents or events, including un-authorised system usage, as directed by an Information and Communications Technology staff member; and
- Report lost, stolen or damaged University owned computers or other equipment to the ICT Help Desk. These should also be reported in accordance with the University insurance finance policy and procedures FMPM 450: Policy – Insurance, FMPM 920: Policy – Losses and FMPM 323: Procedure - Disposal of Plant and Equipment located at www.jcu.edu.au.
Information and Communications Technology must:
- Respond to potential incidents, events, breaches or requests for information (as per Section 12). Responses may include, but are not limited to:
- Modifying University ICT Services;
- Taking reasonable steps to protect University ICT Services from unauthorised or unacceptable use. This may include suspending Accounts, confiscating University owned electronic devices and/or disconnecting or disabling relevant services or other equipment, with or without prior notice;
- Handle alleged breaches in accordance with Clause 11; or
- The retrieval or examination of documents or messages for purposes such as finding lost files or messages, complying with legal requests, or recovering from system failure.
11. Handling breaches of ICT Acceptable Use Policy
If an alleged breach of the ICT Acceptable Use Policy is reported to the ICT Help Desk or the Director, Information and Communications Technology will conduct a preliminary evaluation of the allegation. Any alleged breach that may also constitute Corrupt Conduct will be referred, in the first instance, to the University Secretary. Similarly, any disclosure by a person of an alleged breach that may constitute a Public Interest Disclosure must also first be referred to the University Secretary.
Following the preliminary evaluation, the Director, Information and Communications Technology may:
- Dismiss the matter if the allegation is deemed to be unfounded or trivial, and send written advice of the dismissal and reasons for the dismissal to the complainant or appropriate officer;
- In the case of an alleged breach by a University student refer the matter to the Director, Student Services to be dealt with under the Student Conduct Policy or other appropriate University policies;
- In the case of an alleged breach by a University staff member or adjunct refer the matter to the Director, Human Resources (or Vice Chancellor if Director, Human Resources is alleged to have committed the breach) to be dealt with in accordance with the terms of the applicable Enterprise Agreement and/or appointment document;
- In the case of an alleged breach by a University Council member or co-opted Committee member refer the matter to the University Secretary to be dealt with in accordance with the James Cook University Act 1997 (Qld) and the Code of Conduct – University Council;
- In the case of an alleged breach by an Outside User, refer the matter to the University Authorised User who is responsible for the Outside User to be dealt with by that University Authorised User; and/or
- In the case of an alleged breach by a student or staff of another educational institution authorised to use University ICT Services through an arrangement between the University and the other educational institution, refer the matter to the relevant educational institution to be dealt with by that institution.
12. Responding to requests for information
- Information and Communications Technology must respond to all requests to access records relating to University ICT Services received from the University General Counsel.
- Subject to paragraph 1 above, Information and Communication Technology may only respond to requests to access records relating to University ICT Services, as follows:
- In so far as the request relates to student records, from the Director, Student Services;
- In so far as the request relates to staff or adjunct records, from the Director, Human Resources;
- In so far as the request relates to a breach of copyright, from the Director, Library and Information Services (Copyright Officer);
- In so far as the request relates to a third party request for information made under the Information Privacy Act 2009 (Qld), from the University Privacy Decision Maker or University General Counsel;
- In so far as the request relates to a third party request for information made under the Right to Information Act 2009 (Qld), from the University’s Right To Information Decision Maker;
- In so far as the request relates to Singapore staff or students, from the Head of the Singapore Campus, Director of Compliance or Director of Human Resources; and
- In so far as the request relates to University Council members or matters, from the University Secretary.
13. Inadvertent unacceptable use
Authorised Users, who inadvertently receive, transmit or access material (for example, via email or the Internet) that may be considered Inappropriate Material and is not related to their work duties, must take immediate action to either delete such material or cease such access.
Advice must be sought from the Authorised User’s supervisor or the ICT Help Desk if Inappropriate Material continues to be received.
For further information, please contact:
- JCU ICT Help Desk (Townsville: 4781 5500; Cairns: 4042 1777; Singapore: 6576 6811 – 814).
- JCU Director Human Resources (firstname.lastname@example.org)
- JCU Director ICT (email@example.com)
- JCU Student Services (Townsville: +61 7 4781 5601, firstname.lastname@example.org or Cairns: +61 7 4232 1558, email@example.com)
- JCU Copyright Officer (firstname.lastname@example.org)
- JCU Privacy (email@example.com)
- JCU Cybersecurity (firstname.lastname@example.org)
15. Related Policy Instruments
JCU Code of Conduct
TropEco Disposal Guidelines
JCU Software Supplier Agreements & Offers
JCU ICT Secure IT
16. Related legislation
NOTE: Printed copies of this policy are uncontrolled, and currency can only be assured at the time of printing.
Deputy Vice Chancellor, Services and Resources
Date for next Major Review
NOTE: A minor amendment will not result in a change of the next major review date.
Approval date - the date the Policy Sponsor approved the establishment, minor or major amendment or disestablishment
Implementation Date - the date the procedure was published in the Policy Library and is the date the procedure takes effect
Information and Communications Technology
Acceptable use, disposal, security, virus, code of conduct, email