By accessing and using the ICT resources provided by Catholic Education Services – Diocese of Cairns (CES), you are agreeing to abide by the Conditions of Use of ICT Resources statement below:
- By accessing and using the ICT resources provided by Catholic Education Services – Diocese of Cairns (CES), you are agreeing to abide by this Conditions of Use of ICT Resources statement.
- These conditions apply to all CES ICT resources, regardless of how they are accessed. This includes access at all installed computers, through user’s own hardware (for example, personal laptops, tablets or other similar technology) whether wired or wireless, or remote access over the internet through users’ own resources.
- While staff (in particular, ICT staff engaged by individual schools) may be called upon in the course of their duties to undertake activities beyond those permitted by the terms of this Agreement, it is expected that any such activities undertaken must be done in accordance with the spirit of this statement.
Ethical, Legal and Responsible Use of ICT Resources
- CES requires all users of its ICT resources to do so in an ethical, legal and responsible manner.
- Users of CES ICT resources must be aware that use of these resources are subject to the full range of laws that apply to the internet, communications and to the use of computers, as well as any other relevant laws and CES policies. Such law and principles includes users’ obligations in relation to copyright, intellectual property, breach of confidence, defamation, privacy, bullying/harassment, vilification and anti-discrimination legislation, the creation of contractual obligations, and other civil and criminal laws.
- CES’s ICT resources must not be used for unauthorised commercial activities or unauthorised personal gain. Actions performed using CES ICT resources must comply with the terms of any license agreed to for the use of software programs and other online resources.
Copyright and Intellectual Property Rights
- Users must not, through the use of CES ICT resources, copy, download, store or transmit material which infringes copyright or the intellectual property rights of others without appropriate approval. Such material includes music files, movies, videos or any other form of media.
- Users should be aware that actions performed using computer and network resources, regardless of any disclaimers that might be made, ultimately reflect on our educational institution and community as a whole. This is particularly relevant where users post or submit material in a way that makes it publicly available over the internet
Security and Privacy
- Users have a role to play in ensuring the security and privacy of information transmitted by use of the ICT resources. Users are issued with unique usernames and passwords, which should be kept strictly confidential at all times.
- Users must protect systems, information and accounts by
- Choosing a secure password which is changed regularly (a secure password is one that is difficult to guess, for example, containing a combination of letter and numbers and not simply a name or date of birth)
- Using access to ICT resources only as authorised;
- Respecting the privacy and confidentiality of information to which they may come across through access to the resources;
- Only downloading, installing or using authorised software;
- Reporting any breach or prospective breach of network security to the appropriate personnel;
- Performing a virus check on all email attachments and USB media before opening.
- Unacceptable conduct by users which could result in a breach of security or privacy includes:
- Disclosing username and password details to another person;
- Disclosing other private or confidential information to unauthorised persons;
- Gaining unauthorised access to any systems by any means;
- Using CES ICT resources to attack or compromise another system or network;
- Downloading, installing or using unauthorised software programs;
- Deliberately installing computer viruses or other malicious programs;
- Accessing or intercepting others’ electronic communications without permission.
- Users should not, as a general rule, display personal information about themselves in a way that is publicly available. Where such disclosure is made through authorised avenues (for example, by the use of email or an official website), users should be aware that invasions of privacy may sometimes occur and it is outside CES’s control to prevent such instances from occurring.
- Users are reminded that email should not be used to send sensitive and confidential information.
- Users must, however, be aware that the operation and maintenance of ICT systems often requires the backup and caching of data, the logging of activity and the monitoring of general usage patterns and as such, complete confidentiality and privacy cannot be guaranteed. CES (and individual schools) may also be required to inspect or provide copies of electronic communications where required to by law, or where the investigation of possible misuses of ICT resources is required.
Additional Conditions Relating to Specific Resources
- The uses of the following resources are subject to additional conditions of use, which must be read in conjunction with this document. These are detailed in the policy document ‘Cairns Catholic Education Acceptable Use of Computer and Internet Resources, which include services such as
- World Wide Web
- Online Social Media Tools; and
- Web Publishing and Collaboration Tools.
Breaches of these Conditions of Use
- The breach of these Conditions of Use will be taken seriously and may result in disciplinary action being taken.
- Any known breaches of these Conditions of Use must be reported to Catholic Education Services Professional Standards and/or the Manager Information Technology
- Examples of possible consequences range from loss or restriction of access to ICT resources, to formal disciplinary action for breach of School Discipline policy (students) or Code of Conduct (staff). Cases of serious, deliberate, and/or criminal breach will be referred to external authorities and may result in civil or criminal proceedings.