QUT ICT Access Terms and Conditions

Users of QUT Information Communication and Technology (ICT) resources must comply with the Acceptable Use of Information and Communications Technology Resources Policy (Acceptable Use Policy). The Acceptable Use Policy:

  • specifies that acceptable use of QUT ICT resources is for the legitimate performance of QUT's teaching and learning, research, administrative and business activities;
  • describes the activities which constitute unacceptable use of QUT's ICT resources;
  • sets out the University's behavioural expectations for the use of its ICT resources; and
  • highlights that the use of all ICT resources is monitored and any unacceptable use will be investigated.

Unacceptable use of QUT ICT resources includes activities which breach the law, breach University policies such as the codes of conduct for staff or students, or deal in any way with unacceptable material. Unacceptable material includes unlawful material, copyright material which is not available under an applicable licence or permission, pornographic, sexually explicit, violent material, defamatory, harassing or abusive, spreading or inciting hatred, or may be offensive as judged against accepted community standards for material on public display in a workplace or learning environment.

QUT routinely logs network activity and logs include personal information about users and their usage of QUT ICT resources. This includes scanning QUT connected storage devices. QUT may use this information to investigate faults, security breaches, unlawful or illegal activity and unacceptable use in accordance with this Policy and the Information Security Policy. Access to these logs is generally available only to a small number of technical staff in Digital Business Solutions to manage the ICT resources, diagnose and resolve faults or to detect and manage IT security breaches.

Allegations that unacceptable use of the University's ICT resources has occurred may be reported to a supervisor of an ICT area, Vice-President (Digital) and Chief Digital Officer or the Associate Director, Information Security. Consistent with QUT's Information Privacy Policy information contained in these logs may also be released beyond this group if:

  • there is appropriate documentary evidence that the individual has agreed to disclosure;
  • where a privacy notice given at the point of collection advises the individual about the usual practices for disclosure;
  • where disclosure is required or authorised by law (for example, court order or subpoena, legislative obligation to disclose);
  • where disclosure is necessary to manage or lessen a serious threat to a person’s life, health, safety, or welfare, or to public health, safety or welfare; and
  • where disclosure is necessary for investigation or enforcement of criminal matters or other law enforcement matters.

By proceeding, you agree to comply with:

  • QUT's Acceptable Use Policy;
  • confirm that you are over the age of 18, or if you are under 18, that the consent of the parent, guardian, teacher or other responsible adult has been obtained to use the QUT internet access account and other ICT services and applications provided by QUT; and
  • acknowledge that QUT logs network activities which may be used for the purposes specified above.