Bulletin Board - Review and Comment
Step 1 of 4: Provide comments and feedback
How to make a comment
1. Use the to open a comment box for a specific section, part, heading or clause.
2. Enter your feedback into the comment box and click ‘save comment’.
3. There is an opportunity to leave general comments and feedback on the second page.
4. Complete all three pages – make sure you ‘save and continue’ and ‘finalise submission’ before leaving the bulletin board.
5. You will be emailed a pdf copy of your comments. If you don’t receive this, your comments may not have saved correctly.
Important Information
The following tips will help to avoid losing your comments or corrupting your entries:
-
Sessions may time out, so submit multiple responses instead of trying to complete a long document in one session.
-
Avoid jumping between web pages/applications while logging comments.
-
Log comments for one document at a time. Complete and submit all comments for one document before commenting on another.
-
Use paste as plain text in the comment boxes if you need to copy and paste from another source (e.g. Word, email or other web content).
-
You can’t save your progress, so if you need to stop, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
Complete all three stages and ‘finalise submission’ before leaving the bulletin board.
(1) This procedure supports the Information Technology Policy and sets out detailed information and requirements to: (2) This procedure applies to all authorised users and ICT resources, as defined in the Information Technology Policy. (3) See the Information Technology Policy (4) The University provides secure access to ICT services and resources for all students, staff and other authorised users, for the purpose of pursuing and advancing its object and functions. (5) Secure access to electronic information and communication services is available to University staff during periods of authorised access from University managed locations and managed devices. (6) Secure access to electronic information and systems implemented to provide and progress a student's study and interactions with the University is available continuously to students during periods of authorised access from University managed locations. (7) Additional access via remote access platforms is provided for staff and students, and is delivered via highly available infrastructure that limits unplanned outages to those required for essential maintenance only. (9) The University reserves the right to recover or otherwise protect University ICT resources, including University hardware, communications devices, storage media, data, information, and records. (10) The University accepts no responsibility for any damage to or loss of data arising directly or indirectly from use of ICT resources or for any consequential loss or damage. (11) Authorised users will be provided with a unique username and password to enable access to University ICT systems and facilities. These will be provided: (12) Authorised users will be provided with other information and guidance to ensure they are aware of the conduct expected of them when using University ICT resources in alignment with relevant industry standards. (13) An authorised user’s access will be removed after their enrolment, employment or engagement with the University has ended. (15) Subject to clause 16, authorised users must not: (16) Subject to appropriate delegated approval, the provisions of clause 15 may be waived where an authorised user is required to carry out any of these acts in the performance of duties directly related to their work or, in the case of students, to their academic program. (17) The University will allow employees reasonable personal use of ICT resources, with the exception of activities prohibited under clause 15, where such use has no negative impact on the employee in the performance of their duties or adverse impact on the University ICT resources. (18) Current students may use University ICT resources for personal use, with the exception of activities prohibited under clause 15, in accordance with this procedure. (19) The University will monitor and audit the use of ICT resources. (20) As per the Surveillance Procedure, the University will not prevent or block emails or internet access of any authorised user except as permitted under the Workplace Surveillance Act s 17, this procedure, or other University policy. The University is not obliged to notify a worker that it has prevented delivery of an email if: (21) All authorised users must report breaches of this procedure. (22) The Chief Operating Officer may authorise an investigation where there are reasonable grounds to suspect that a breach of this procedure has occurred, on the recommendation of relevant University officers (including but not limited to the Chief Information and Digital Officer (or nominee), Director, Security and Resilience (CSO), General Counsel, the University’s public interest disclosure officer (under the Public Interest Disclosure (Whistleblowing) Policy) and/or the University’s privacy officer (under the Privacy Management Plan). (23) Subject to the authorities to access information under Delegation Schedule A - Governance and Legal, an investigation may include (but not be limited to): (24) Authorised user accounts and access to ICT resources (in full or in part) may be suspended while a potential, suspected or actual breach of the ICT Policy or related procedures is investigated (as per Delegation Schedule D - Facilities and Information Technology). (25) Misuse of University ICT resources and/or failure to comply with the ICT policy or related procedures may result in: (26) Notwithstanding clause 25, the University will report illegal activity to police or any other appropriate authority external to the University. (27) The Division of Information Technology will provide the following core information technology services at the desktop of University employees: (28) Requests for non-core services must be submitted to the division by an organisational unit manager and approved by the Chief Information and Digital Officer. (30) For the purpose of this procedure:Information Technology Procedure - Acceptable Use and Access
Section 1 - Purpose
Scope
Section 2 - Policy
Section 3 - Procedure
Part A - Providing access to ICT resources
Part B - Acceptable use
Obligations
Prohibited use
Personal use of ICT resources
Breach of acceptable use
Part C - ICT support and training
Section 4 - Guidelines
Top of PageSection 5 - Glossary