Rules of use of RMIT information technology systems
- Access is for university study or work purposes, with an allowance for reasonable personal use outside of work hours as per the RMIT Electronic communications policy.
- You must not undertake any anti-social activities, including nuisance e-mail, chain letters, and obscene, harassing, or unwelcome behaviour.
- You are required to advise appropriate RMIT IT staff or supervisors of any security issues or breaches of which you become aware.
- You must not share your account with anyone and must not disclose your password to anyone, including RMIT employees.
- You accept that all actions and usage may be monitored or recorded.
- You must not use University systems to attempt to gain unauthorised access to other systems.
- You must not use IT University resources for commercial purposes without explicit permission.
- You must not send unsolicited e-mail messages to multiple users, unless explicitly approved by the appropriate University authority. RMIT Student Lists may only be used for direct academic purposes and only by authorised staff.
- Access for the following purposes is specifically prohibited:
- Unauthorised streaming video, music, internet radio, online games, file-sharing, recreational chat
- RMIT's IT systems and networks are not to be used for any unlawful activities, including violation of copyright, hacking and the deliberate spreading of viruses or malicious code.
Users can contact the IT Helpdesk for advice on issues or problems.[Next: Accountability]