POL007 IT User Policy

 

Purpose

This policy provides details regarding the use of IT at Integrative Attachment Therapy (IAT) and the appropriate use of computing facilities and services.

Overview

IAT computing and network facilities support and enable learning, teaching, research and engagement, through provision of infrastructure. Our computing network facilities and related services are adapted to the needs of students and staff.

Scope

This policy applies to all staff, students, contractors and visitors using IT computing facilities, networks, system and accounts at IAT. This policy applies to all users of IT equipment and Wi-Fi connections associated with IAT including on their own devices.

It is the responsibility of the employee, student, contractor or visitor to make themselves aware of the policy and guidelines and conduct activities accordingly.

Policy

All users of IAT’s information technology services, equipment and connectivity are required to use these facilities and services in an appropriate and responsible manner. To the extent allowed by law, IAT are not liable for loss, damage, or consequential loss or damage, arising directly or indirectly from:

  • use or misuse of any facilities;
  • loss of data or interference with data stored on any facilities;
  • interference with or damage to equipment used in conjunction with any facilities; or
  • any acts taken or decisions made not in accordance with this or any other policy

No user may engage in any act or practice, or omit to do any act or practice, which constitutes a misuse of any of the facilities.

No user may engage in any activity that is illegal under State, Federal or international law.

Any user who becomes aware that facilities are being used by any person to infringe the intellectual property rights of another person, or that the effect of any use of any facilities is to infringe such rights, must notify IAT immediately.

Any user who becomes aware that facilities are being used by any person to infringe the privacy rights of another person, or that the effect of any use of any facilities is to infringe such rights, must notify IAT immediately.

All users must report any lost or stolen IAT owned or managed computing devices immediately to IAT.

Users are to logout or lock systems connected to the network when not in use, including when unattended

All users are responsible for activity on their account. If a user suspects unauthorised access to their account they are to change their password immediately and report the suspected breach to IAT.

Users are not permitted to share log in details including passwords or log in to another users account.

IAT may take remedial action to suspend user access with or without prior notice in response to suspect breaches of this policy.

Related Documents

Student Code of Conduct

E-Learning Policy

 

 

Review

Document Name

POL007 IT User Policy

Approved by

Managing Directors, November 2023

Previous Versions

Nil

Review Date

November 2026

Enquiries to

Education Services Manager