IT Acceptable Use and Security Policy

The IT Acceptable Use and Security Policy is supported by two sets of procedures: IT Acceptable Use Procedures, and IT Security Procedures.

The purpose of the IT Acceptable Use and SecurityÌýPolicy is to:

  • give a clear statement to all users of ÐÓ°ÉÖ±²¥ IT facilities of their responsibilities, including what constitutes acceptable and unacceptable use
  • manage the provision and modification of access to online services
  • express the commitment of the ÐÓ°ÉÖ±²¥ to providing and maintaining a secure, effective and reliable IT infrastructure to support the ÐÓ°ÉÖ±²¥'s operations.ÌýÌý

This Policy applies to all users of ÐÓ°ÉÖ±²¥ IT facilities and services, whether the facilities are managed by Information Technology and Digital Services (ITDS), by other organisational units within the ÐÓ°ÉÖ±²¥, or by third-party providers, and whether the user is a ÐÓ°ÉÖ±²¥ IT account holder or not (for instance, a user of the public terminals in the ÐÓ°ÉÖ±²¥ Libraries).

Ìý