Comments

Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

 

Information Technology - Acceptable Use Standard

Section 1 - Purpose

(1) The objective of this Standard is to:

  1. provide guidance and define enforceable standards for using RMIT information technology (IT) assets
  2. protect RMIT IT assets and provide a reliable information technology infrastructure, and
  3. protect and maintain RMIT reputation.
Top of Page

Section 2 - Scope

(2) This standard applies to all students, staff, contractors, visitors and any other parties who have access to the IT assets of RMIT University and its controlled entities (‘RMIT’). 

Top of Page

Section 3 - Authority

(3) Authority for this document is established by the Information Technology and Security Policy.

Top of Page

Section 4 - Standard

Principles

(4) Access and use of IT assets must be for legitimate RMIT purposes, specific to the user’s role, and in accordance with RMIT policies, procedures and standards.

(5) Access and use of IT assets for reasonable non-commercial personal purpose is acceptable, provided such use:

  1. does not directly or indirectly impose an unreasonable burden on any RMIT IT assets
  2. does not burden RMIT with incremental costs
  3. does not interfere with RMIT staff executing their responsibilities. 

(6) Access and use of RMIT IT assets for any commercial purpose other than legitimate RMIT purposes is not allowed.

(7) Any use of RMIT IT assets is not acceptable when it is used for any act which: 

  1. is not legal
  2. negatively impacts RMIT’s reputation
  3. adversely impacts continued operation of RMIT
  4. adversely affects other RMIT IT users, or
  5. is a breach of RMIT policies, procedures and standards including, but not limited to, Code of Conduct, Workplace Behaviour Policy, Student Charter, Student Conduct Policy, Delegations of Authority Policy, Intellectual Property Policy, and Information Technology - User Device Security Standard.

    A list of examples of unacceptable IT usage is given in Appendix A: Examples of Unacceptable Use - RMIT IT Assets.  

(8) Speak to your manager, College or Portfolio management, People team, or the Information Technology Services (ITS) Service and Support Centre if you are uncertain whether other activities are acceptable or not, or you are uncertain about whether a standard applies to a given situation.

User Behaviour

(9) To protect RMIT Information everywhere, users must:

  1. ensure all non-public printed or digital information is kept discrete and secure
  2. not allow student or staff personal information to be included when taking photos or videos in RMIT office environments
  3. screen lock devices when not in use
  4. not take RMIT IT asset offsite (other than laptops/mobiles, which are specifically assigned to them and expected to be mobile) without prior authorisation from ITS or relevant College or Portfolio manager.

(10) Users must only access, use and share RMIT information on a need-to-know basis. They must:

  1. ensure they are authorised to share protected or restricted information
  2. ensure the recipient is authorised to receive RMIT information
  3. share only the minimum information required for the task.

(11) Users must dispose RMIT IT assets in a secured manner and in accordance with the Retention and Disposal Standard. This includes:

  1. using secure waste when disposing of non-public hard copy information
  2. returning to ITS all RMIT devices due for disposal.

(12) Information security is a shared responsibility. All users must play their role in keeping RMIT safe by:

  1. changing their password immediately and reporting to the ITS Service and Support Centre if they suspect their RMIT password is compromised
  2. not writing down RMIT password or leaving them in a place where an unauthorised person might discover them
  3. not using RMIT password or PIN for non-RMIT applications or services
  4. not sharing password or multi-factor authentication code or one time password (OTP) with anyone  
  5. classifying RMIT emails and documents based on sensitivity of the information
  6. reporting any event that may put RMIT IT assets at risk of compromise or unauthorised disclosure, whether accidental or intentional, to: 
    1. their manager, Portfolio or College management, and
    2. ITS Service and Support Centre
  7. reporting phishing emails using Microsoft Outlook’s phishing report feature.

Monitoring

(13) RMIT conducts surveillance across all systems and devices to determine any security weakness or policy non-compliance.

(14) Use of RMIT IT assets is a privilege, not a right. RMIT has full rights to withdraw access to RMIT IT assets at any time without prior notification.

(15) RMIT may block any email or communication, inbound or outbound, that threatens the security of RMIT IT assets.

Information Security Standard Exemptions

(16) Exemptions from the Information Technology and Security Policy and related standards must be sought using the ITS Policy exemption process determined by the Chief Information Security Officer.

Compliance

(17) Non-compliance with this standard may result in a disciplinary action, or legal action in cases of illegal activity. Management will decide what action to take, if any, based on the severity of the incident.
 

Appendix A - Unacceptable IT Use Examples

(18) Creating, using, saving, accessing or distributing material is prohibited if it might reasonably be considered offensive, obscene or indecent by an ordinary member of the public, or is illegal (e.g. pornographic, racist or sexist material, or violent content), except where such items are legitimately held within the RMIT curated collections such as Art, Archival or Library Collections. Accessing or distributing material for legitimate research or educational purposes must have been granted an exemption through the ITS Policy Exemption Form. 

(19) Plagiarising, copying or distributing information in contravention of copyright or similar legal obligations without the owners’ express permission (e.g., copyright images, text messages, videos, memes or sounds from websites owned by a third party).

(20) Using IT systems to harass, bully or defame (e.g. spreading of malicious information via email).

(21) Unauthorised attempts to interfere with the operation of or make RMIT IT systems or services unavailable (e.g. flooding a booking system with fake bookings).

(22) Sharing or disclosure of personal user identities, identifiers and passwords, or security codes.

(23) Writing down passwords or leaving them in a place where an unauthorised person might see them.

(24) Unauthorised hacking or probing for security vulnerabilities in networks, systems or applications etc. without the written consent by the Chief Information Security Officer (CISO) (e.g. students or staff probing Canvas for vulnerabilities to exploit).

(25) Creating, introducing, or distributing computer viruses or other malicious software onto any RMIT network device or system.

(26) Disclosing, removing, or disposing of IT assets without authority from ITS, College or portfolio executive management. Such authority must comply with all RMIT policies, including the Information Governance Policy (e.g. taking a monitor home or using a staff contact database without permission, destruction of RMIT records within the mandated legal period).

(27) Monitoring, intercepting, or accessing network traffic, emails, files, etc. intended for another person.

(28) Deliberate unauthorised access to systems or data and/or unauthorised use of data or information obtained (e.g. using someone’s unlocked computer to act on their behalf).

(29) Storing non-public information on non-RMIT endorsed site or location such as a USB drive, cloud storage or forwarding RMIT email to your personal email account (e.g., saving a student class listing on a personal storage service such as personal Dropbox or Box etc.).

(30) Transmitting unsolicited commercial advertising material or any other form of unsolicited commercial electronic message, including material commonly known as spam, or junk email (e.g., perpetuating chain letters, virus warnings or hoax messages).

(31) Responding to spam or phishing messages by supplying non-public RMIT or personal information.

(32) Using non-RMIT supplied VPN services or anonymisation technologies like VPN and TOR to access RMIT network, applications or services is not permitted (e.g. MobileVPN, ExpressVPN, etc.)

(33) Using applications on RMIT computers that allow for remote control of those computers from other locations. (e.g. TeamViewer, AnyDesk, etc.)

(34) Auto forwarding of RMIT email to non-RMIT managed devices or personal email accounts.

(35) Downloading, installing or running software, applications or software as a service (SaaS) that are not endorsed by ITS (e.g. Bitcoin miner, SpeedUpMyPC, etc.).

(36) Copying or distributing to unauthorised users software developed by, procured by or licensed to RMIT including computer software and cloud services.