Computer Systems Regulations
Responsibility for policy: Chief Information Officer
Approving authority: Vice-Chancellor
Last reviewed: December 2024
Next review date: December 2029
Print version
Application
- These regulations apply to all student users of the University of Waikato’s computer systems, networks and ICT resources.
Purpose
- The purpose of these regulations is to provide a framework for the acceptable use of the computer systems, networks and ICT resources provided by the University for student use in learning and research.
Related documents
- The following documents set out further information relevant to these regulations:
Definitions
- In these regulations:
computer system means a software application and/or a system made up of one or more software applicationsinformation and communications technology (ICT) means hardware and software, data and associated infrastructure and devices that are:
- owned, leased, controlled or operated by the University, or
- connected by physical or wireless connection to the University network
ICT resource means, but is not limited to, computers (such as desktops, laptops, tablets), storage devices (such as portable hard drives, USB and flash memory devices, CDs, DVDs), cameras (such as video, digital, webcams), all types of mobile phones, video and audio players/receivers and telecommunication equipment, networks, software, cloud services, databases and any other similar technologies as they come into use
network means any University communications and data network on and between its campuses or other locations, including the internet
objectionable material means all material which is objectionable as defined in the Films, Videos, and Publications Classification Act 1993 and any other material which could reasonably be described as unsuitable or offensive having regard to the circumstances in which, and the persons to whom, it becomes or may become available
student means a person enrolled at the University of Waikato, or a prospective or past student using the 'Waikato' guest wifi network
University means the University of Waikato
user means a person using a University computer system, network or ICT resource
Principle
- University computer systems, networks and ICT resources are made available to student users for the purpose of learning and research.
Access to computer systems, networks and ICT resources
- A student user’s entitlement to access and use the University's computer systems, networks and ICT resources is:
- by virtue of their status as an enrolled student, or
- as a prospective or past student using the 'Waikato' guest wifi network.
Responsibilities
- University computer system, network and ICT resource student users must:
- comply with all applicable New Zealand laws, including but not limited to, law on copyright, privacy, defamation, fraud, objectionable material and human rights
- comply with the terms of any licence agreement between the University and any third party that governs the use of software, computer systems or other ICT resources
- comply with any instruction given by University staff about the use of the University's computer systems, networks or ICT resources
- only access University computer systems, networks and ICT resources to which they have been granted access
- respect the rights of other users with respect to access to computer systems, networks and ICT resources and enjoyment of use
- take all reasonable precautions to secure their passwords, account credentials, software and data; if access is compromised or potentially insecure they must immediately notify the ITS Service Desk and, as soon as is practicable, implement a new secure password.
- acknowledge that all information and communications created, transmitted or stored through the University's computer systems, networks and ICT resources are considered information assets owned by the University and may be accessed, monitored, reviewed and disclosed for security, investigation, maintenance and legal purposes; there can be no expectation of privacy with respect to these information assets.
- University computer system, network and ICT resource users must not:
- use or attempt to use a computer system in a manner that will incur costs to the University or any other person or organisation without the consent of that person or organisation
- gain access or attempt to gain access to a University computer system without authorisation
- use a University computer system, network or ICT resources to attempt to gain unauthorised access to computer systems, networks or ICT resources of any third party
- do anything that deliberately damages, restricts, jeopardises, impairs or undermines the performance, usability, reliability, confidentiality or accessibility of any computer system, network or ICT resource
- connect or attempt to attach any network switching or routing equipment to a University network without authorisation
- use a computer system, network or ICT resource to deceive others, including by impersonating another person
- give their password or divulge an access code to any other person that enables access any University computer system or use the username and password of another user to log into any University computer system
- use, make copies or distribute proprietary software, media or data without the authority of the software provider or media or data owner
- distribute outside the University, in whole or in part, an application program containing embedded proprietary software, or publish material identifying proprietary software, without the written permission of the software provider
- use a computer system, network or ICT resource to impede the activities of the University or to interfere with the reasonable use of computer systems, networks or ICT resources by another person
- use a computer system, network or ICT resource for the purpose of accessing, sending or attempting to send objectionable material or abusive, fraudulent, harassing, threatening or illegal content
- use a computer system, network or ICT resource in any way that constitutes discrimination, bullying or harassment
- use a computer system, network or ICT resource in a manner, or for a purpose, which would or could bring the University into disrepute
- assist, encourage or conceal any unauthorised use, or attempt at unauthorised use, of any computer system, network or ICT resource
- make unreasonable use of a computer system, network or ICT resource for personal purposes, including undertaking private business activity, without the consent of the Chief Information Officer
- use a computer system, network or ICT resource in a way that is inconsistent with their conditions of enrolment.
- University internet and online resource users must:
- ensure that any internet (web) content acessed, uploaded or downloaded conforms to New Zealand laws, including but not limited to, law on copyright, privacy, defamation, fraud, objectionable material and human rights
- not request or accept payment, in money, goods, services, favours or any other form of remuneration, either directly or indirectly, for any activity using a University computer system, network or ICT resource
- acknowledge that the University is not responsible for the content of, or events arising from, communications or interactions between users and others on internet sites where access is not controlled by the University.
Personal information and privacy
- The University of Waikato Privacy Statement describes how the University collects, stores, uses and shares personal information and explains the rights of students and in relation to those activities.
- The University has the authority to:
- inspect and monitor the University computer systems, networks or ICT resources where:
- there are reasonable grounds to suspect there may have been or be a breach of any University statute, code, regulation or policy, the terms of a student's enrolment agreement or of New Zealand law, or
- for systems maintenance, problem resolution and capacity planning purposes or for similar reasons related to ICT security, performance or availability.
- access personal information about a student user's and a student user's activities on University computer systems, networks or ICT resources for which they have responsibility where there are reasonable grounds for suspecting that the student user may have breached these regulations
- provide personal information accessed under subclauses 11a and b of these regulations to staff of the University responsible for student discipline or other relevant authorities, including, if a crime appears to have been committed, the Police.
- inspect and monitor the University computer systems, networks or ICT resources where:
Breaches
- The Chief Information Officer or delegated authority may immediately exclude from any computer system, network or ICT resource any student user who they consider to be, or to have been, in breach of these regulations where that breach poses a serious or imminent threat to the operation or security of a computer system, network or ICT resource while the matter is investigated.
- The exclusion of any student user from the use of any computer system, network or ICT resource must be notified to the student user at the time of exclusion.
- The exclusion of a student user from the use of any computer system, network or ICT resource for more than 24 hours must be reported to the relevant Head of School or equivalent and the Director of Student Systems and Administration to be taken into account in terms of the student’s coursework.
- Any exclusion of a student user for more than 72 hours must be reported to the Vice-Chancellor.
- Any student user who has been excluded from the use of any computer system, network or ICT resource under clause 12 of these regulations may appeal the exclusion decision to the Vice-Chancellor.
- The Vice-Chancellor may suspend an exclusion until an appeal has been heard and determined.
- If, under clause 12 of these regulations or at any other time, the Chief Information Officer considers that a breach of these regulations contravenes the Code of Student Conduct they may refer the matter to be dealt with in accordance with clause 21 of these regulations.
Waivers and variations
- Only the Chief Information Officer has authority to vary or waive the provisions of these regulations in individual cases.
Responsibility for monitoring compliance
- The Chief Information Officer is responsible for monitoring compliance with these regulations and reporting any breaches to the Vice-Chancellor.
- Breaches of these regulations may result in disciplinary action under the Student Discipline Regulations.