a) All computing devices, must be configured to comply with the following instructions when connecting to the University network. Specifically;
i. Passcode or password should be configured on device with automatic screen lock after a period of inactivity.
ii. Security software such as antivirus and personal firewall should be installed.
iii. Operating system and applications should be kept up to date.
iv. Only digitally signed software from trusted sources should be used. Users must not install or use any device or software on University IT equipment that subverts or bypasses University security controls including monitoring or filtering.
v. Users must avoid storing sensitive and confidential data on mobile devices.
b) To reduce risk of unauthorised use of their account, account holders are strongly encouraged to either log off or leave screensavers locked when leaving their devices unattended.
c) Devices that are compromised by a malware, or determined to pose threat to the security of University IT and other users, may be blocked from connecting to the University network until the sources of threats have been removed.
d) Devices with inappropriate names (relating to virus, hackers and other threats) will be blocked from connecting to the University network
UniSey provides electronic mail to students, staff and visitors to enhance communication and promote greater efficiency in teaching, research, community service and administration. It is expected that all use of UniSey email will be in accordance with the Acceptable Use of Information and Communications Technology Resources Policy (2019).
(a) Communications on University business in any format or media are official records, subject to statutory record keeping requirements and the University Recordkeeping Policy. This includes email sent and received by staff members on any University related matter. Staff need to be conscious of the need to preserve official communications in accordance with the relevant University guidelines
(b) Limited minor and incidental personal use is allowed, but it is a privilege and must not interfere with the operation of IT resources, burden the University with incremental costs, interfere with the User’s employment or other obligations to the University and is subject to compliance with University policies.
(c) Use of IT Resources is not considered private. Using UniSey email for personal correspondence and setting up social media accounts is prohibited.
(d) Users should be aware that they do not have the same rights as they would using personally owned equipment through commercial service providers. They should be aware that personal use of the University’s IT Resources may result in the University holding personal information about the User and/or others. UniSey’s electronic communication systems generate detailed logs of all transactions and use. All Users should be aware that the University has the ability to access these records and any backups. In addition, system administrators have the ability to access the content of electronic communications and files sent and stored using the University’s equipment.
e) Users should not open unsolicited email unless the sender’s identity and authenticity of the email have been verified. Users must refrain from accessing links that appear unusual.
(f) Sending an email on an official University matter is similar to sending a letter on University letterhead. Such email transactions should be handled with the normal courtesy, discretion and formality of all other University communications. Users should not write anything in an email that they would not sign off in a memorandum.