Use and Security of Information Systems

Section
Corporate
Approval Date
12 December 2024
Approved By
Executive Director
Next Review
30 December 2026
Responsibility
Executive Director
Purpose

Otago Polytechnic supports and encourages open access to digital resources; however, this policy defines the security practices to be followed when using the Otago Polytechnic IT systems and services. 

IT services are those that support Otago Polytechnic's digital activities. This policy explains the security practices in place to protect IT systems, and to maintain the confidentiality, integrity, and availability of IT services. This policy also explains user responsibilities and what is acceptable and unacceptable use of IT services. 

This policy aims to: 

  • ensure that all Polytechnic kaimahi are aware of the Polytechnic computer security policy and practice for maintaining a secure operating environment. 
  • provide a clear statement on IT security and information management. 
  • define what is acceptable and unacceptable practice for kaimahi using Polytechnic IT systems and services. 

define for Polytechnic kaimahi the responsibilities they have for maintaining security when using and accessing the Polytechnic's IT services. 

meet the general objectives of AS/NZS ISO/IEC 27001:2006 and 27002:2006 Code of Practice for Information Security Management and the IT best practice defined within the Information Technology Infrastructure Library (ITIL). 

Compliance

Privacy Act 2020 and all subsequent amendments 

Official Information Act 1982 and all subsequent amendments 

Public Records Act 2005 and all subsequent amendments. 

Policy

 

1.  This policy defines and enforces an appropriate level of IT protection within the Polytechnic. It serves to protect the Polytechnic's IT and information assets across the Polytechnic. 

It aims to provide the following protection: 

  • Confidentiality - the prevention of unauthorised disclosure of information. 
  • Integrity - the prevention of the unauthorised amendment, corruption, or deletion of information. 
  • Availability - the prevention of the unauthorised withholding of information or resources. 

 

2. Scope 

The policy applies to all kaimahi and ākonga of Otago Polytechnic, and also, to contractors, consultants, and visitors engaged to work with, or who have access to, the Polytechnic technology infrastructure and its information. 

 

3.  Responsibilities 

3.1.  Users are responsible for: 

3.1.1.    Operating within the bounds of the IT Use and Security of Information Systems Policy. 

3.1.2.    Ensuring that no breach of information security results from their actions. 

3.1.3.    Reporting any breach or suspected breach in security to the Otago Polytechnic Information Systems and Support (ISS) Service Desk. 

3.1.4.    The confidentiality of their user account and password information. 

 

3.2.  ISS are authorised to: 

3.2.1.    Protect information and computing resources through implementing and administering the IT Use and Security of Information Systems Policy and associated Security Standards. 

3.2.2.    Implement new systems and processes that are compliant with industry standards, or any governing body as applicable. 

3.2.3.    Ensure that the Polytechnic complies with relevant legislation and regulations relating to IT. 

3.2.4.    Take all reasonable steps to limit remove risk to the Polytechnic's operational environment e.g. includes removing access, blocking files/ functionality etc. 

3.2.5.    Search kaimahi email and files if instructed, to do so, by the Executive Director or Otago Polytechnic Privacy Officer. 

 

4.  Acceptable and Unacceptable Use 

4.1.  Acceptable Practice 

4.1.1.            Communicating and sharing information the individual is authorised to share with Otago Polytechnic kaimahi or the public. 

4.1.2.            Research on the internet to develop professional and educational skills related to the user's position at Otago Polytechnic. 

4.1.3.            Broadening knowledge of the education sector, clients, and applicable news within the context of an individual's assigned responsibilities. 

4.1.4.            Acquiring or sharing information necessary or related to the performance of an individual's assigned responsibilities. 

4.1.5.            Reasonable use of computing facilities for personal correspondence e.g. sending personal emails and using internet web- sites so long as it does not interfere with kaimahi productivity, bring Otago Polytechnic into disrepute, pose a security risk, or consume sustained high-volume traffic. 

 

4.2.   Unacceptable Practice 

4.2.1.            Use of IT services for illegal or unlawful purposes. This includes, but is not limited to intentional copyright infringement, obscenity, fraud, defamation, discrediting the Polytechnic or third party, plagiarism, harassment, intimidation, forgery, impersonation, and computer tampering (e.g. spreading computer viruses). 

4.2.2.            Intentionally using IT services to visit internet sites that contain sensitive obscene, pornographic, hateful, or other objectionable material. 

4.2.3.            Where access to websites is deemed sensitive it is necessary for teaching and learning or research purposes, specific access may be authorised via the Head of College applying to the Executive Director. This access is recorded on a register. 

4.2.4.            Using IT services to reveal or publicise confidential or proprietary information which includes but is not limited to financial information, new business and product ideas, marketing strategies and plans, databases and the information contained therein, customer/ākonga/kaimahi details, personal details about an individual, technical product information, computer software and code, computer network and access details and business relationships. 

4.2.5.            Intentionally saving any Polytechnic-owned information deemed as records under the Public Records Act to external systems not endorsed or operated by ISS. This includes but is not limited to Cloud service providers, Google, Amazon etc. 

4.2.6.            Where the use of IT service/s is deemed unacceptable practice (as per but not limited to the descriptions above) then disciplinary action may be taken in line with policy Resolving Performance Problems (kaimahi) and Ākonga/Learner Discipline Policy (ākonga). 

 

5.  Access 

5.1.         The Polytechnic provides both open and closed access to its IT services. Specific permissions are required to access closed aspects of the IT services and infrastructure to ensure confidentiality and maintain the integrity of the infrastructure. 

 

5.2.         Only authorised users are permitted to access and use the Polytechnic's Closed IT services. 

 

5.3.         Kaimahi and ākonga user accounts are created and managed by ISS under direction of Otago Polytechnic, People and Culture. 

5.3.1     Creating and deleting of user accounts as directed by Otago Polytechnic, People and Culture. 

5.3.2     Annual auditing of accounts to verify account status. 

5.3.3.    Disablement of kaimahi accounts two (2) weeks post Otago Polytechnic People and Culture notifying of the termination date, unless requested sooner. 

5.3.3.1          Or when kaimahi accounts are to be retained as active, with approval from the Executive Director’s Office. 

5.3.4.    Deletion of kaimahi accounts five (5) years post Otago Polytechnic, People and Culture notifying of termination date with the exception of access for Otago Polytechnic honours awards recipients as per  Honorary Degrees and Recognition Awards Policy. 

5.3.5.  Deleting ākonga accounts that have not been accessed for at least twelve (12) months from the last time of access. 

5.3.6.    Ensuring that no account user IDs are to be used again unless a returning kaimahi or ākonga. 

 

5.4.         Contractor (non-staff) access created and managed by ISS. 

5.4.1     Contractor accounts will all have account expiry set on creation; these force review of account validity. 

5.4.2     Only the Otago Polytechnic kaimahi responsible for the contractor can request the enablement of disabled and expired accounts. 

 

5.5.         System access audit review. 

5.5.1     Systems will have an access review every four (4) months. This includes the following systems: 

  • Learner Management System 
  • Learner Health System 
  • Organisational Finance System 
  • People and Culture system 
  • Payroll system 
  • Physical access security (Cardax). 

 

5.6.         IT accounts can be disabled at the request of the Executive Director or a member of Te Kāhui Manukura.  

 

6.  Remote Access 

6.1.     Remote access to the Polytechnic's IT services is provided for kaimahi working offsite. Refer to Flexible Working Policy. 

 

7.  Password Management 

7.1.         Passwords must be kept confidential and are the responsibility of the individual user. They are not to be shared or used by anyone else, even for a short period of time. 

 

7.2.         Password construction must comply with the following minimum standard. 

7.2.1.    All passwords are required to be a minimum length of sixteen (16) characters (Passphrase) and are not required to contain special or numerical characters. 

7.2.2.    Access is denied after three (3) unsuccessful login attempts and a security process is required to reinstate. 

7.2.3.    When passwords are first issued, users are required to change their password on first use. 

 

7.3.         Privileged user accounts (i.e. system-wide administrator accounts) are subject to additional password requirements. 

7.3.1.    All administrative accounts are subject to passwords of not less than eight (8) characters, using special characters, forced change every one-hundred and eight (180) days with unique last 24 passwords. 

7.3.2.    Long-term contractors (generally external providers i.e. not kaimahi) are subject to passwords of not less than eight (8) characters, using special characters, forced change every ninety (90) days with unique last 5 passwords. 

 

8.  IT Asset and Media 

8.1.         Personal devices are welcome on the Otago Polytechnic "OP -Guest" WiFi network. Personal devices are not authorised to connect to the internal Polytechnic cabled networks. 

8.2.         ISS are authorised to install, remove, and configure software and make configuration changes to IT services. This includes returning Otago Polytechnic IT equipment to its original build status to rectify faults and remove unlicensed software. 

8.3.         Computers and mobile devices issued by the Polytechnic to users remain the property of the Polytechnic unless otherwise agreed with the Formal Manager, which often are in cases of redundancy. 

 

8.4.         Removable Media 

8.4.1.   Information stored electronically on removable devices must be encrypted if it contains any information listed below. The ISS Service Desk is available to assist in this activity in confidence. 

a.  Personal Information about any customer/kaimahi/ākonga of Otago Polytechnic. 

b.  Confidential Financial data. 

c.  Passwords or secure user information. 

8.4.2.   information stored on removable devices, not included under 8.4.1, is the responsibility of the device owner to ensure it is used by the intended recipient. 

 

8.5.         All Polytechnic IT equipment is required to be identified with a unique asset number. This number is to remain accessible and only ISS kaimahi are permitted to remove the asset identifier in coordination with Otago Polytechnic, Finance. 

 

8.6.         All Polytechnic IT hardware or media are to be returned to ISS when no longer required or when users terminate their association with the Polytechnic. 

 

8.7.         In the event of a Polytechnic IT asset being lost, accidentally damaged, or stolen, the incident is to be reported to the ISS Service Desk.  It is at the discretion of the Executive Director or equivalent whether theft or damage is escalated to the New Zealand Police following the report to the ISS Service Desk. 

 

8.8.         Only ISS is authorised to dispose of Polytechnic IT equipment, including software. 

 

Note: Polytechnic IT assets include but are not limited to equipment such as laptops and desktop computers, printers and peripheral devices that connect or have access to the Polytechnic network. This also includes handheld mobile devices, e.g. phones, and tablets. IT assets also include all software, whether packaged or custom-built.  IT media includes but is not limited to USB keys and portable hard drives. 

 

9.  Communications and Operations Management 

9.1.          ISS Operations 

The following security requirements apply to the operations of ISS services. 

9.1.1.    No investigations are permitted without authority from either the Executive Director or Otago Polytechnic Privacy Officer. The Executive Director must be notified in all cases of an investigation being authorised. 

9.1.2.    ISS kaimahi who are authorised on a case-by-case basis by any of those identified in 9.1.1 are permitted to search, collect, and report on IT activity for the purposes of a specific security audit and/or investigation. 

 

9.2          Physical and Environmental Security 

9.2.1.    Access to IT infrastructure facilities is restricted to authorised individuals whose job responsibilities require access to IT facilities. This will be reviewed every four (4) months. 

9.2.2.    Visitors requiring access to IT infrastructure facilities are required to sign in through the Otago Polytechnic Campus Services Health and Safety sig- in/out process. 

9.2.3.    IT facilities are to be protected against environmental changes in power, cooling and flooding as defined within the physical computer standards. 

 

9.3          Operational readiness 

9.3.1     Any new systems must be fully tested prior to implementation to ensure they are secure and will not have a negative effect on Polytechnic operations or expose the Polytechnic to risk. 

9.3.2     Any ākonga-developed systems must comply with the guidelines set out in the Product to Production Specification (Use and Security of Information Systems Appendix One). 

9.3.3     ISS are responsible for ensuring that all systems are secure and patched to an appropriate level in accordance with vendor recommendations and this policy. 

 

9.4          Disaster Recovery and Incident Management 

9.4.1     Disaster Recovery: The information systems disaster recovery is maintained and tested regularly to ensure the ability of Otago Polytechnic to continue operations as required by the business continuity plan. 

9.4.2     lncident Management 

9.4.2.1.    All incidents will be recorded and managed in the service management system operated by the Otago Polytechnic ISS Service Desk. 

9.4.2.2.    Incidents will be classified by severity and reported on. 

 

9.5          Internet Access and Communications 

9.5.1.    Kaimahi can access the internet and browse sites that comply with the Acceptable Use as defined in Section 4. 

9.5.2.    Kaimahi must not transmit sensitive Polytechnic information or information that is classified as highly confidential through the internet unless the information is encrypted to reduce the risk of data being compromised. The ISS Service Desk can advise of secure methods that can be used to transmit highly confidential information across the internet. 

9.5.3.    The Executive Director has the right to block internet sites that do not comply with the Acceptable Use policy in Section 4. Or that poses a risk to the Polytechnics ability to operate effectively. 

 

9.6          Email Access and Communications 

9.6.1.    Email messages sent from and received to the Polytechnic's email service are the property of the Polytechnic and may be accessed by the Polytechnic under order refer to Clause 9.1. 

9.6.2.    Email messages subject to retention requirements noted in Information Management Policy must be electronically saved in the manner and for the period specified in the policy. 

9.6.3.    AII email originating from or destined for Otago Polytechnic will be digitally recorded (in the 'Cloud'), scanned and blocked where it is deemed a risk to organisational security. 

9.6.4.    Email access will be terminated when kaimahi or third party terminates their association with the Polytechnic unless an extension has been agreed by the Formal Leader or by the Honorary Degrees and Recognition Awards Policy. 

 9.6.5.    Email signature blocks must follow the agreed standard as defined within the Email Communications Guidelines, refer to Otago Polytechnic Intranet site (Tūhono I Marketing, Engagement and Communications I Email Communications Guidelines). 

9.6.6.    Email is not to be used for unsolicited mass mailings, political campaigning, dissemination of chain letters, and use by non-kaimahi sending chain emails, malicious data (viruses), solicitation emails or any offensive material. This is deemed unacceptable practice and subject to disciplinary action - refer to Clause 4.2.5. 

9.6.7.    Email accounts are provided for Polytechnic kaimahi  sole use. One account is created and exists independent of how many roles are held, e.g. kaimahi and ākonga. It is not appropriate to send, reply or modify another kaimahi's email without the authority of the person. 

9.6.8.    Confidential or sensitive email messages, including confidential or sensitive information in attachments, are not to be sent outside the Polytechnic without the authority of the originator or owner of the information contained within the email. This includes but is not limited to information about kaimahi and ākonga, refer to Te Pūkenga Protected Disclosures Policy and Procedures, Privacy Policy and Procedures and Appendix Two Business Email Etiquette Basics. 

9.6.9.    Kaimahi are encouraged to manage emails appropriately by deleting those emails which are not Polytechnic business as soon as possible. 

 

9.7          Ākonga Email Accounts  

9.7.1.    AII ākonga have an Otago Polytechnic email account, which provides access to a number of ISS services. More information is available on the Otago Polytechnic website. 

 

9.8          Kaimahi Security 

9.8.1.    If an onsite computer or laptop is left idle for more than five (5) minutes, it is programmed to automatically lock. To unlock the device, the user must enter their network password. 

Appendices Product to Production and Business *Email Etiquette Basics

APPENDIX One.  Product-to-Production Requirements 

 

Otago Polytechnic encourages the development of ākonga work into production environments here at Otago Polytechnic. This document outlines the product and documentation requirements for the transition from development to production.  

All systems or services developed by ākonga and/or kaimahi must have the following before it can be considered for Production. 

1. An Otago Polytechnic kaimahi must own the system or service, i.e. when the ākonga has left Otago Polytechnic, a person must continue to hold the maintenance and update responsibility.  

 

2. Product documentation must be delivered before the system is transitioned to production. The document must contain.  

 

3. Full un-compiled code in the appropriate electronic format, with instructions on how to compile if bugs are found and need to be fixed post-handover.  

 

4. Full uncompressed executable or other files where applicable.  

 

5. Bug control history detailing past bugs and the resulting fix.  

 

6. Full product functionality including any dependencies on other resources.  

 

7. Full user installation and usage information.  

 

8. If the product is to be supported by the ākonga into the future, a full update schedule with associated costs must be included with prices valid for twenty-four (24) months. Break-fix time and materials costs must be included along with service support hours.  

 

9. All production systems or services must be operated by ISS if resources are required on-campus.  

 

10. All production systems or services running from a Cloud environment must be made known to ISS, including the monthly costs and budget holder approved to cover these costs.  

 

Contact information for ISS  

ISS Service Desk - servicedesk@op .ac.nz 

 

 

APPENDIX Two. Business* Email Etiquette Basics 

Using your email, company email address and employer's technology is a serious issue.  

 

 *NOTE: There is still room for colloquial and friendly language within internal peer groups - always think first about who your audience is and is this going wider.  

 

Be professional: 

  • Do not send non-business-related emails, jokes, forwards, or chain letters on Polytechnic time to friends or co-kaimahi - this may reflect a lack of professionalism.  
  • Avoid questionable websites, or websites not necessary to your job responsibility.  
  • Never assume that these activities are not monitored.  

 

Respond promptly: 

  • You should do your best to respond to business communications as quickly as possible within business hours - this is all about customer service. 

 

Common courtesy, spell check, and avoiding formatting 

  • The staples of professional business communications apply - think business letterhead. 
  • Include a salutation and a signoff that includes your name. 
  • Proper capitalisation and punctuation are a must. 
  • Type in full sentences with proper sentence structure. 
  • Always spell check to avoid misinterpretation and to look professional. 
  • Refrain from using formatting or embedded images, including email stationery e.g. coloured or embellished backgrounds - as current spam filters could block your emails. 
  • Avoid uncommon fonts as the recipient may not have the designated font and the email will display completely differently from the way it appears in your system. 

If you would not put it in bold or red in a formal letter do not do it in an email.  

 

Subject field: 

Be short-and-concise in the subject field to indicate clearly what the email is about. This will also determine if your email will be opened.  

 

Attachments: 

Ask the recipient first if you intend to send a large file attachment - some systems will block oversized files or stop other incoming correspondence to a person inbox. 

Do not send unrequested attachments. 

 

Reply All: 

Use with discretion! 

Consider carefully whether 'all' really need to be aware of your reply to conduct business. 

Keep the volume of email traffic down.  

Forwarding other people’s emails: 

Always ask permission first - the email has been sent specifically to you for a reason and possibly in a language suitable for your reading, not the world.  

Edit/Refine/Reduce your replies: 

  • Do not just hit reply and start typing - always reread the original email and edit your reply before sending. 
  • Make an effort to reply point by point to keep the conversation on track with fewer misunderstandings.