View Document

Acceptable Use of Information and Communications Technology Resources Policy

This is the current version of this document. You can provide feedback on this document to the document author - refer to the Status and Details on the document's navigation bar.

Section 1 - Purpose

(1) QUT provides information and communications technology (ICT) resources to support its functions and activities and is committed to ensuring that these resources are used in a transparent and accountable manner. All members of the University community have a responsibility to use its ICT resources consistent with this commitment. Unacceptable use of the University's ICT resources may:

  1. be detrimental to other students, staff and workplace culture;
  2. undermine the University's reputation;
  3. be unlawful or illegal;
  4. expose the University to vicarious liability for a person's actions;
  5. have a negative effect on productivity;
  6. be detrimental or pose a security threat to the University's systems.

(2) This Policy sets out the University's behavioural expectations for the use of its ICT resources. The use of all ICT resources is monitored and any unacceptable use will be investigated.

Top of Page

Section 2 - Application

(3) This Policy applies to any member of the University community utilising QUT's ICT resources, services and/or facilities both on and off campus, including:

  1. Students;
  2. Staff, whether full-time, part-time, ongoing, fixed-term, casual or sessional;
  3. Individuals associated with QUT including:
    1. individuals who have been granted access to QUT property, services or infrastructure (for example, temporary staff engaged by QUT through an employment agency);
    2. consultants and independent contractors undertaking services for QUT;
    3. members of QUT Council or other University committees whether they hold office by election, nomination or appointment;
    4. visiting and adjunct academics, or other academic or research collaborators;
    5. volunteers who contribute to or act on behalf of the University.
Top of Page

Section 3 - Roles and Responsibilities

Position Responsibility
Vice-President (Administration) and University Registrar Disciplining students found to have used the University's ICT resources in an unacceptable manner.

Reporting of use of ICT resources involving illegal actions or material to the appropriate law enforcement agency or other statutory authority (in cases requiring urgent action with law enforcement agencies, initial contact may be made by Information Security staff and/or the Manager, Security and Emergency Management, with notification as soon as practicable to the Vice-President (Administration) and University Registrar.
Vice-President (Digital) and Chief Digital Officer
Promoting all QUT users' awareness of this Policy.
Monitoring unacceptable use of ICT resources by staff and students.
Investigating alleged breaches and, as appropriate, initiating disciplinary action depending upon the nature of the breach of this Policy, refer to Section 11, Failure to Comply.
Vice-President (People) and Chief People Officer Providing advice to the Vice-Chancellor and President on staffing matters and ensuring appropriate disciplinary processes are undertaken for staff found to have used the University's ICT resources in an unacceptable manner.
Users of Information and Communications Technology resources (ICT) Using ICT resources in accordance with the requirements of this Policy.
Top of Page

Section 4 - Acceptable use of Information and Communications Technology Resources

(4) QUT provides ICT resources to support its teaching and learning, research, administrative and business activities, and expects that these resources will only be utilised for the appropriate and legitimate performance of these activities. Acceptable use of the University's ICT resources will:

  1. be consistent with Commonwealth or State laws;
  2. be consistent with the University's behavioural expectations as defined in the QUT Code of Conduct - Staff and QUT Code of Conduct - Student and compliant with other policies, and Schedule 1, Part 3, section 12 of the Queensland University of Technology Act 1998;
  3. be within any quota or cost limit imposed by the University;
  4. be in accordance with any lawful direction of a University officer or an authorised officer under the QUT Act; and
  5. maintain the security of the University's ICT resources and facilities.
Top of Page

Section 5 - Unacceptable use of Information and Communications Technology Resources

(5) Any of the following activities constitute unacceptable use of the University's ICT resources:

  1. breaching any Queensland State or Commonwealth law;
  2. breaching the University's behavioural expectations, including not complying with the QUT Code of Conduct - Staff and the QUT Code of Conduct - Student;
  3. disobeying a lawful direction given by a University officer or an authorised officer under the QUT Act;
  4. receiving, accessing, downloading, displaying, transmitting and/or making available unacceptable material via any media, including personal storage devices connected to a QUT network;
  5. overloading or monopolising ICT resources in a manner which adversely affects other users including unauthorised sending of electronic messaging to a large number of recipients that may initiate an IT service disruption;
  6. breaching the University's expectations regarding personal responsibility for a user's QUT access account;
  7. acting in a manner that compromises the security, confidentiality, integrity and availability of ICT resources;
  8. excessive personal use.

(6) Any user making unacceptable use of QUT's ICT resources will be subject to disciplinary proceedings in accordance with F/1.11.11 Failure to comply.

Top of Page

Section 6 - Inadvertent Unacceptable Use

(7) Users who inadvertently receive or access unacceptable material must take immediate action to either delete such material or cease such access. Advice should be sought from the user's supervisor or from the HiQ Contact Centre if unacceptable material continues to be received.

Top of Page

Section 7 - QUT Access Account

(8) A user is responsible for any activity, transaction or publication of information which originates from their QUT access account. A user must accept responsibility for the use of their QUT access account prior to being granted access, or if requested to do so by the University. A user must not do any act which prejudices the security of their QUT access account including disclosing their password to any other person or allowing any other person to use their account.

Top of Page

Section 8 - Incidental Personal Use

(9) QUT recognises that ICT resources may be used for incidental personal use. Incidental personal use must be infrequent and minor, and must not breach this policy or interfere with University business operations or, in the case of staff users, with the performance of that staff member's duties. Incidental personal use of the University's ICT resources does not include any of the following:

  1. maintaining or supporting a personal private commercial or non-commercial enterprise;
  2. recruitment of members to, or soliciting donations for, political parties, political campaigns, or religious groups;
  3. the transmission, viewing or publication of unacceptable material;
  4. publication of internet sites or pages unrelated to University activities;
  5. personal observations using inappropriate or offensive language;
  6. a malicious or unlawful purpose;
  7. use of QUT resources for personal financial gain.
Top of Page

Section 9 - Use of Information and Communications Technology Resources for Approved Activities

(10) QUT acknowledges that staff and students may use ICT resources to access unacceptable material as a result of approved activities arising out of their employment or studies. Students and staff must ensure approval for such activities is, in the first instance, given by their executive dean of faculty or head of division and subsequently registered with the Information Security Team via the Digital Workplace (QUT staff access only), prior to access or use occurring.

Top of Page

Section 10 - Monitoring and Detection

(11) QUT routinely logs network activity and scans QUT connected storage devices and may use this information to investigate faults, security breaches, unlawful or illegal activity and unacceptable use in accordance with this Policy and the Information Security Policy.

(12) Allegations that unacceptable use of the University's ICT resources has occurred may be reported to a staff member's Supervisor, a supervisor of an IT area, Vice-President (Digital) and Chief Digital Officer or the Associate Director, Information Security.

Top of Page

Section 11 - Failure to Comply

(13) QUT reserves the right to take disciplinary action against users who fail to comply with this Policy.

(14) Some breaches of this Policy may also have consequences for users under criminal or civil provisions of the general law (for example, if the breach contravenes the Criminal Code (Qld), the Crimes Act 1914 (Cth) or other laws). In certain situations, the University may be legally required to disclose information about unacceptable use of ICT resources to law enforcement agencies or other statutory authorities.

Breaches by Staff

(15) A breach of this policy by a staff member may be investigated and, depending on the nature of the alleged breach, may be referred, to be dealt with under the University's processes for the management of misconduct or serious misconduct (Disciplinary Action for Misconduct and Serious Misconduct Policy - Senior Staff, Enterprise Agreement (Academic Staff) Clause 45; Enterprise Agreement (Professional Staff) Clause 54) or unsatisfactory performance (Enterprise Agreement (Academic Staff) Clause 44; Enterprise Agreement (Professional Staff) Clause 53).

Breaches by Students

(16) A breach of this Policy by a student may be investigated and, depending on the nature of the alleged breach, may be referred, to be dealt with under the Management of Student Misconduct Policy.

Breaches by Other Users

(17) Other members of the University community (honorary appointments, contractors and visitors) who do not comply with this Policy may have their association with QUT terminated, or may have their rights of access to QUT's ICT resources, services, facilities or infrastructure revoked by the Vice-President (Digital) and Chief Digital Officer.

Top of Page

Section 12 - Definitions

Term Definition
Information and Communications Technology (ICT) Resources Means any ICT resource or facility provided by the University to assist or support learning and teaching, research, administrative and business activities, and includes:
  1. infrastructure, equipment, software, and facilities including technologies such as computers, smart phones, the internet, broadcasting technologies (radio and television), and telephony;
  2. all networks, hardware, software and communication services and devices owned, leased or used under licence by QUT including academic and administrative systems;
  3. any web page hosted on QUT’s ICT resources;
  4. any work area or physical space designated for teaching, study or research, including computer laboratories, technology-equipped classrooms and library study rooms;
  5. technology or medium used to generate, capture, manage, preserve and access those records. Records may be in many formats, both physical/hardcopy or electronic, including unstructured data for example emails, or structured data (any data that resides within the fixed fields within a business system, the combination of which can constitute a record).
QUT Act Means the Queensland University of Technology Act 1998.
Special Circumstances Means circumstances that apply to a student that are beyond the student’s control; do not make their full impact until on or after the census date for the unit of study in question; and make it impracticable for the student to complete the requirements of the unit during the relevant teaching period.
Unacceptable Material Includes material in any format that is one or more of the following:
  1. unlawful, including breaches of federal or state legislation
  2. copyright material that is not obtained and/or used under an applicable licence or permission from the copyright owner;
  3. sexually explicit or pornographic;
  4. violent, as judged against accepted community standards for material on public display in a workplace or learning environment;
  5. defamatory, harassing or abusive, including personal observations using unacceptable or offensive language;
  6. spreading or inciting hatred;
  7. offensive, as judged against accepted community standards for material on public display in a workplace or learning environment.
Unacceptable Use Means any use of QUT’s ICT resources in a manner contrary to this Policy including but not limited to the manner defined in Section 5 of this Policy.
User Means any member of the University community utilising QUT's ICT resources, services and/or facilities.
Top of Page

Section 13 - Delegations

(18) Refer to Register of Authorities and Delegations (VC038) (QUT staff access only).