By proceeding, you agree to the following terms and conditions
QUT ICT Access Terms and Conditions
Users of QUT Information Communication and Technology (ICT) resources must comply with the
Acceptable Use
of Information and Communications Technology Resources Policy (Acceptable Use Policy).
The Acceptable Use Policy:
- specifies that acceptable use of QUT ICT resources is for the legitimate performance of QUT's teaching and
learning, research, administrative and business activities;
- describes the activities which constitute unacceptable use of QUT's ICT resources;
- sets out the University's behavioural expectations for the use of its ICT resources; and
- highlights that the use of all ICT resources is monitored and any unacceptable use will be investigated.
Unacceptable use of QUT ICT resources includes activities which breach the law, breach University policies such as
the codes of conduct for staff or
students, or deal in any way with
unacceptable material. Unacceptable material
includes unlawful material, copyright material which is not available under an applicable licence or permission,
pornographic, sexually explicit, violent material, defamatory, harassing or abusive, spreading or inciting hatred,
or may be offensive as judged against accepted community standards for material on public display in a workplace or
learning environment.
QUT routinely logs network activity and logs include personal information about users and their usage of QUT ICT resources.
This includes scanning QUT connected storage devices. QUT may use this information to investigate faults, security breaches,
unlawful or illegal activity and unacceptable use in accordance with this Policy and the
Information Security Policy.
Access to these logs is generally available only to a small number of technical staff in Digital Business Solutions
to manage the ICT resources, diagnose and resolve faults or to detect and manage IT security breaches.
Allegations that unacceptable use of the University's ICT resources has occurred may be reported to a supervisor of
an ICT area, Vice-President (Digital) and Chief Digital Officer or the Associate Director, Information Security.
Consistent with QUT's Information Privacy Policy
information contained in these logs may also be released beyond this group if:
- there is appropriate documentary evidence that the individual has agreed to disclosure;
- where a privacy notice given at the point of collection advises the individual about the usual practices for disclosure;
- where disclosure is required or authorised by law (for example, court order or subpoena, legislative obligation to disclose);
- where disclosure is necessary to manage or lessen a serious threat to a person’s life, health, safety, or welfare, or to public health, safety or welfare; and
- where disclosure is necessary for investigation or enforcement of criminal matters or other law enforcement matters.
By proceeding, you agree to comply with:
- QUT's Acceptable Use Policy;
- confirm that you are over the age of 18, or if you are under 18, that the consent of the parent, guardian,
teacher or other responsible adult has been obtained to use the QUT internet access account and other ICT services
and applications provided by QUT; and
- acknowledge that QUT logs network activities which may be used for the purposes specified above.