These conditions cover use of all UNSW information and communication technologies such as:
- The University network (including wireless access)
- Desktop and laptop computers
- Software and peripherals
- Telephone equipment (including mobile phones)
- Personally-owned equipment when it is connected to the University network
A brief summary of the policy is set out below for quick reference:
- Access to the University's ICT resources is made available for teaching, research and administrative purposes, and other specifically authorised activities.
- Use of the resources must be ethical, legal and responsible at all times, including limited incidental personal use.
- The University reserves the right to limit access to its networks through University-owned or other computers and to remove or limit access to material and resources stored on University-owned computers (or accessed via the internet from within the University network).
As a user of these resources, you are subject to the following conditions:
Respect for Intellectual Property and Copyright: You agree to respect the copyright and intellectual property rights of others.
Legal and Ethical Use of ICT Resources: Use of the University’s ICT resources is subject to the full range of State and Federal legislation, as well as current UNSW policies. You must ensure that your use of University ICT resources is legal and ethical at all times.
Security and Privacy: UNSW employs various measures to protect the security and privacy of its ICT resources and user accounts, as described in the Policy document. The University reserves the right to inspect material on its ICT resources when investigating a breach or when required by formal legal disclosure requests, but does not routinely inspect files.
You agree to protect UNSW ICT systems, information and accounts by: Using your access only as authorised; keeping your account details confidential; keeping virus protection and operating system/security patches up to date; using only authorised and licensed software programs and; promptly reporting any breach in system or network security to your system administrator.
Examples of inappropriate use include (but are not limited to):
- Making/using illegal copies of a licensed computer program;
- Downloading, copying, storing or transmitting copyrighted material such as music, video or movie files, graphics without the express permission of the copyright holder or as permitted by law.
- Using another’s login or password, or allowing others to use yours;
- Gaining unauthorised access to systems by any means, including port scans, ‘hacking’ and use of ‘password sniffer’ software;
- Using UNSW ICT resources to attack or compromise any other system, whether on or off-campus, including circumventing system security or protection measures.
- Knowingly propagating or installing computer viruses or malicious code;
- Accessing or intercepting others’ electronic communications without permission.
- Create/send email under another’s name (forgery); create/send/forward: electronic chain letters, unsolicited broadcast emails (“Spam”), obscene, abusive, fraudulent, threatening or repetitive messages;
- Use of ICT resources to harass, threaten, defame, vilify or discriminate against any group or individual;
- Intentional or irresponsible damage of ICT resources, or theft of equipment;
- Excessive personal use of ICT resources (see Section 4.2.3 of Policy document for examples of acceptable personal incidental use);
- the deliberate or negligent accessing, preparing, storing, displaying or transmitting of material that:
- is obscene, pornographic or paedophilic;
- is discriminatory or vilificatory, that promotes illegal acts, or that advocates violence;
- is offensive or potentially unlawful;
- promotes/allows online gambling;
- unless this material is a requisite component of an approved course of study or research programme.
Breaches of these Conditions of Use
Penalties will depend upon the type and severity of breach.
Misuse of ICT resources by students may attract financial penalties. Cases of serious, deliberate, and/or criminal breach will be referred to external authorities and may result in civil or criminal proceedings.