PURPOSE
This policy details the parameters of Information, Communications, and Technology (ICT) access and help for staff, students, contractors, and visitors at Leaders Institute (LI).
PRINCIPLES
LI ensures that:
- ICT services support LI’s activities in learning and teaching, research and scholarship, and student services and support;
- appropriate training is provided for staff and students during induction and orientation activities, student support tutorials, study skills workshops, and other programs regarding LI’s electronic Learning Management System, as well as other ICT software, such as Microsoft Office and Turnitin.
- students have access to learning support services consistent with the requirements of their courses, modes of study, and learning needs. This includes arrangements for supporting and maintaining contact with students who are off campus or studying online;
- students are aware of all support mechanisms to ensure they maximise LI’s ICT services for their learning and are used for the correct means;
- all non-current staff and student accounts are deleted to safeguard security and ensure that data and space is used efficiently;
- student email addresses and ICT accounts are created for the purposes of all official communication between students and LI. LI is responsible for protecting the privacy of student information and communications as required by the Privacy Act 1988. It is the responsibility of the students to:
o Students activate their account once enrolment has been confirmed;
o maintain security of their personal information including assessments.
- all staff and enrolled students have access to the LI online learning management system, learning resource repository, and library electronic resources;
- timely internet and computer access are provided to all staff and students at LI campuses.
ACCEPTABLE USE OF ICT RESOURCES
LI requires all users of its ICT resources to do so in an authorised, responsible, ethical, equitable, and legal manner in accordance with LI’s Code of Conduct Policy and other LI policies. The use of LI’s ICT resources is subject to Australian laws. This includes but is not limited to copyright, breach of confidence, defamation, privacy, contempt of court, bullying, cyber-bullying, harassment, vilification, anti-discrimination, wilful damage, and computer hacking.
SCOPE
All staff, students, contractors, and visitors
Procedures
The ICT Manager creates temporary passwords and accounts for all new students prior to the commencement of semester. All students are provided with student access to email, internet, Learning Management System, campus ICT infrastructure, and electronic library resources.
Staff and students receive training during induction, orientation, study skills sessions, and professional development workshops. It is the responsibility of staff and students to activate their accounts. Assistance is provided by the ICT Manager as required.
EMAILS
- Staff members and students are allocated an email account that has a storage capacity of 15GB. Users receive automated alerts when usage of the email storage approaches and exceeds 95% of the storage limit.
- When the above situation takes place the staff member or student will not be able to send emails but will continue to receive email.
- When the capacity reaches 100%, it will not be possible to receive or send emails.
- Staff and students should contact the ICT Manager to help archive their emails if required.
- Staff and students should contact the ICT Manager for all password resets to their accounts.
INAPPROPRIATE USE OF ICT
Staff or students who undertake the following are in breach of the lawful use of LI’s ICT resources:
- directly or indirectly breaching a Commonwealth Law or State Law;
- directly or indirectly breaching LI’s Code of Conduct Policy;
- disregarding or disobeying the lawful direction provided by the appropriate authorities;
- sharing access to the nominated ICT resources or facilities without the consent of the ICT Manager or delegated representative;
- accessing, receiving, downloading, displaying, or transmitting unacceptable material via media, including sharing through personal media storage devices such as external USB sticks, hard drives, etc. while using the LI ICT network;
- acting in a manner that compromises the security, confidentiality, integrity, and availability of ICT resources and facilities. This includes, but is not limited to, purchased or commercial software, sound, graphics, images, or datasets; shareware; freeware; and electronically stored documentation and the media that holds it. This includes online services (i.e. software-as-a-service) licensed to the LI.
NOTIFYING AND HANDLING OF BREACHES
Users who become aware of a possible breach of this policy must report it to the ICT Manager or delegated representative. Breaches of this policy, as well as outstanding student fees or charges, may result in having an ICT account disabled. Staff or students who have their ICT account disabled have the right to access the relevant grievance policies.
LI will report illegal activities and corrupt conduct to appropriate authorities. All ICT usage may be recorded for the purpose of security and risk management.
CYBERSECURITY RISK MANAGEMENT
Cybersecurity controls are in place to help reduce cyber security risk by either reducing the likelihood or impact of an incident, or both. LI will identify and treat cybersecurity risk through the following processes:
- keep and maintain a register of key information assets;
- The ICT Manager shall use the established framework for performing cybersecurity risk assessments;
- incorporate cybersecurity risk identification and assessment into processes impacting the use and processing of LI resources and systems;
- maintain a register of cyber security risks with related controls;
- review risks at regular intervals, including significant security incidents, threats, or potential changes to business requirements;
- implement and strengthen controls to reduce risk;
- Evaluate the effectiveness of controls.