Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) This procedure supports the Information Technology Policy and sets out detailed information and requirements to: (2) This procedure applies to all authorised users and ICT resources, as defined in the Information Technology Policy. (3) See the Information Technology Policy (4) The University provides secure access to ICT services and resources for all students, staff and other authorised users, for the purpose of pursuing and advancing its object and functions. (5) Secure access to electronic information and communication services is available continuously to University staff during periods of authorised access from University managed locations and managed devices. (6) Secure access to electronic information and systems implemented to provide and progress a student's study and interactions with the University is available continuously to students during periods of authorised access from University managed locations. (7) Additional access via remote access platforms is provided for staff and students, and is delivered via highly available infrastructure that limits unplanned outages to those required for essential maintenance only. (9) The University reserves the right to recover or otherwise protect University ICT resources, including University hardware, communications devices, storage media, data, information, and records. (10) The University accepts no responsibility for any damage to or loss of data arising directly or indirectly from use of ICT resources or for any consequential loss or damage. (11) Authorised users will be provided with a unique username and password to enable access to University ICT systems and facilities. These will be provided: (12) Authorised users must acknowledge this procedure and will be provided with other information and guidance to ensure they are aware of the conduct expected of them when using University ICT resources (as required by ISO 27002 section 5.1 - Information security, cybersecurity and privacy protection — Information security controls). (13) An authorised user’s access will be removed after their enrolment, employment or engagement with the University has ended. (15) Subject to clause 16, authorised users must not: (16) The provisions of clause 15 do not apply where an authorised user is required to carry out any of these acts in the performance of duties directly related to their work or, in the case of students, to their academic program. (17) The University will allow employees reasonable personal use of ICT resources, with the exception of activities prohibited under clause 15, where such use has no negative impact on the employee in the performance of their duties or adverse impact on the University ICT resources. (18) Current students may use University ICT resources for personal use, with the exception of activities prohibited under clause 15, in accordance with this procedure. (19) The University will monitor and audit the use of ICT resources. (20) All authorised users must report breaches of this procedure. (21) The Chief Operating Officer may authorise an investigation where there are reasonable grounds to suspect that a breach of this procedure has occurred, on the recommendation of relevant University officers (including but not limited to the Chief Information and Digital Officer (or nominee), Director, Security and Resilience (CSO), General Counsel, the University’s public interest disclosure officer (under the Public Interest Disclosure (Whistleblowing) Policy) and/or the University’s privacy officer (under the Privacy Management Plan). (22) Subject to the authorities to access information under Delegation Schedule A - Governance and Legal, an investigation may include (but not be limited to): (23) Authorised user accounts and access to ICT resources (in full or in part) may be suspended for up to 14 days while a potential, suspected or actual breach of the ICT Policy or related procedures is investigated (as per Delegation Schedule D - Facilities and Information Technology). (24) Misuse of University ICT resources and/or failure to comply with the ICT policy or related procedures may result in: (25) Notwithstanding clause 24, the University will report illegal activity to police or any other appropriate authority external to the University. (26) The following online IT induction training modules assist University employees in using University IT facilities. Mandatory modules must be completed within the first month of employment and annual recertification may be required. (27) Supervisors and managers are responsible for providing all other IT induction and training required by employees in their organisational units. (28) The Division of Information Technology will provide the following core information technology services at the desktop of University employees: (29) Requests for non-core services must be submitted to the division by an organisational unit manager and approved by the Chief Information and Digital Officer, including: (31) For the purpose of this procedure:Information Technology Procedure - Acceptable Use and Access
Section 1 - Purpose
Scope
Section 2 - Policy
Section 3 - Procedure
Part A - Providing access to ICT resources
Part B - Acceptable use
Obligations
Prohibited use
Personal use of ICT resources
Breach of acceptable use
Part C - ICT support and training
IT induction and training for employees
Desktop support services
Top of PageSection 4 - Guidelines
Top of PageSection 5 - Glossary