Acceptable Use Policy

  • You are responsible for complying with the Department’s policies when using the Department’s information resources and/or on the Department’s time. If requirements or responsibilities are unclear, please seek assistance from the ICT Team.
  • You must promptly report harmful events or policy violations involving the Department’s assets or information to the Information Solutions and Facilities Manager. Events include, but are not limited to, the following:
    • Technology incident: any potentially harmful event that may cause a failure, interruption, or loss in availability to the Department’s Information Resources.
    • Data incident: any potential loss, theft, or compromise of the Department’s information.
    • Unauthorized access incident: any potential unauthorised access to a the Department’s Information Resource.
    • Facility security incident: any damage or potentially unauthorised access to a the Department’s owned, leased, or managed facility.
    • Policy violation: any potential violation to this or other the Department’s policies, standards, or procedures.
  • You should not purposely engage in activities that may
    • harass, threaten, impersonate, or abuse others;
    • degrade the performance of the Department’s Information Resources;
    • deprive authorised staff access to a the Department’s Information Resource;
    • obtain additional resources beyond those allocated;
    • or circumvent the Department’s computer security policies.
  • All inventions, intellectual property, and proprietary information, including reports, drawings, blueprints, software codes, computer programs, data, writings, and technical information, developed on the Department’s time and/or using the Department’s Information Resources are the property of the Department’s.
  • The Department’s Information Resources are provided to facilitate official business and should not be used for personal financial gain.
  • You are expected to cooperate with incident investigations, including any federal or state investigations.
  • You are expected to respect and comply with all legal protections provided by patents, copyrights, trademarks, and intellectual property rights for any software and/or materials viewed, used, or obtained using the Department’s Information Resources.
  • You should not intentionally access, create, store or transmit material which the Department’s may deem to be offensive, indecent, or obscene.