Department of Justice Instructions for users of ICT services
Tabled paper 1369
Tabled papers for 10th Assembly 2005 - 2008; Tabled papers; ParliamentNT
2008-06-18
Tabled By Christopher Burns
Made available by the Legislative Assembly of the Northern Territory under Standing Order 240. Where copyright subsists with a third party it remains with the original owner and permission may be required to reuse the material.
English
Tabled papers
application/pdf
Copyright
See publication
https://www.legislation.gov.au/Details/C2019C00042
https://hdl.handle.net/10070/283805
https://hdl.handle.net/10070/410520
Instructions for users of ICT services Interfering with the access rights of others, either by technical means or by obtaining access codes or passwords of others. Initiating or being party to any malicious activity directed towards internal or external ICT services. Connecting any privately owned computer or other network device to the NT Government network without appropriate authorisation. Violating any software licence agreement or copyright. Disclosing or removing third-party proprietary information. | 3 .6 2 .4 Usage m onitoring * [Formatted: Bullets and Num bering J While NT Government does not actively monitor use of ICT services, you should be aware that there are circumstances under which a CEO or their delegate may authorise agency access to information regarding your use of those services. The reasons for such access include but are not limited to: Investigative purposes: Where there has been a suspected inappropriate use of ICT services or a breach of any NT Government or agency ICT policy or procedure, the code of conduct, or any relevant Territory or Commonwealth legislation. Security purposes: Such as system performance monitoring. Absence: Where you are absent, for example having taken extended leave, and work related documents are stored on your computer or network file systems or in your mailbox. Your supervisor may be provided with reports that contain information on your use of ICT services. The reports a supervisor may receive include, but are not limited to: The number of e-mail messages you send and receive, including details of individual messages. The amount of your Internet use and details of web sites you visit. Telephone and fax numbers that you call and the frequency of such calls. The size of your network file system and details of the files it contains. I 2 ,7 - 2 .5 Approval for access to user accounts * f Formatted: Bullets and Num bering J Where access is required to a users accounts or ICT equipment, the person requesting access must first obtain the appropriate approval in writing from the agency CEO or delegate. Requests for personal use information should then be forwarded to the relevant service provider or the ICT Security Unit, DCIS. The following rules apply: Investigative purposes An agency may investigate where an inappropriate use of ICT services is suspected. Investigations involving NT Government staff must be undertaken in accordance with relevant employment legislation and agreements. Investigations involving non-NT Government staff must comply with all relevant NT and Commonwealth legislation. Agencies should seek advice from DoJ prior to commencing investigations of non-NT Government staff. The ICT Security Unit is able to assist agencies by providing technical and procedural advice, and can coordinate investigations with service providers. 3