Code: Title: Date: Approval: QA411 End User Policy 06/01/2014 University Management Team (UMT) 1. Purpose To ensure continuity of our University and to minimise damage from incidents, it is essential that we embed a minimum set of security standards to protect the University. This policy is developed to protect NUI Galway from all threats, whether internal or external, deliberate or accidental. In support of its mission of teaching and research, NUI Galway provides access to computing resources for students and staff of the University. Access to the University's computing facilities is a privilege granted to members of the University which can be withdrawn. The University reserves the right to limit, restrict or extend computing privileges and access to its information resources. The policy is designed to ensure resources are utilised in an effective, efficient, ethical and lawful manner. 2. Description This policy applies to: - All Staff, and Students who have access to University IT Systems - All contractors, vendors or others (including 3rd parties), who have access to University IT Systems. It is the personal responsibility of each individual to read this and related security policies and be familiar with its contents. It is the responsibility of Academic Heads, and managers to ensure all staff using the IT systems are aware of and understand their responsibilities in this policy. 3. Definitions This document details information security rules and responsibilities for all users of NUI Galway IT systems and as end-user of these systems. Additional requirements specific to Asset Owners and administrators are not detailed in this policy. “Must”, or the terms "required" or "shall", refer to an absolute requirement of the policy. “Must not” or "shall not", refer to statements which are an absolute prohibition of the policy. “Should” or "recommended" refer to a statement that should be applied. In certain circumstances, there may be a valid reason to ignore a particular item. In this case the full implications must be understood and carefully weighed before choosing a different course. “Should not” or "not recommended" mean the specified behaviour should not be performed. There may exist valid reasons in particular circumstances when the particular behaviour is acceptable, but the full implications should be understood and the case carefully weighed before implementing any behaviour described with this label. P a g e 1 of 3 4. Requirements 1. University IT resources are the property of NUI Galway and are to be used for legitimate purposes only. As an end-user of these systems, you must also understand that these IT resources may also offer an opportunity for unauthorised or unlawful activity (either intentional or unintentional), which is explicitly forbidden. You must not seek to gain unauthorised access to either the University resources or any other organisation and you must not allow unauthorised access to the University’s systems. Note that you do not have the authority to grant access to NUI Galway IT systems. 2. NUI Galway information must be classified and handled in line with the University data classification and handling policies. Where encryption is mandated, this must comply with the University encryption policy. This applies to information processed on both University owned and privately owned devices. For more information refer to the encryption policy. Extra vigilance and care must be taken when handling of personal information in line with the data protection policy. 3. As an end-user, you are responsible for all actions undertaken using your user login, and will be held accountable for any misuse. You must not use another person’s password or user account, even if they have left the university. You must follow the university password policy and never give any of your account passwords to someone else to use. You must never request login details or passwords from other users but must only use the account which has been issued to you. 4. Never transmit or store any illegal or inappropriate materials on your PC, laptop, mobile phone or shared drive (inappropriate material includes potentially illegal, defamatory, abusive, blasphemous, obscene, profane, racist, sectarian or pornographic words, pictures, or any materials which may cause offence or annoyance to any reasonable person). 5. Software and/or information provided by NUI Galway may only be used as part of your duties as a member of NUI Galway or for educational purposes related to your activities at NUI Galway. You must abide by all the licensing agreements for software entered into by the University with other parties, and not infringe any copyright of documentation or software. Thus any software, data or information which is not provided or generated by the user personally and which may become available through the use of University computing or communications resources shall not be copied or used without permission of NUI Galway, or the owner of the software, data or information. If such permission is sought from owner of the software, data or information, then NUI Galway must be informed that you are making such a request. 6. If you observe a security incident or weakness, you should report it as soon as possible. You must not take advantage of a security incident or weakness in any system and you must not facilitate another to do so. Attempts should be made to avoid taking actions which may contaminate any evidence or audit trail associated with activity. Incidents should be reported as quickly as possible to NUI Galway Information Solutions and Services (ISS) Service Desk, and to your Head of School or Unit. If you suspect that unauthorised access to personal data has taken place then you must report the incident in accordance with the NUI Galway Data Protection Policy. 7. In order to protect NUI Galway resources from internal and external threats whether deliberate or accidental, and to ensure compliance with regulatory and/or legal requirements, your use of all IT resources and information passing through or stored on IT resources is subject to monitoring. You should be aware that there are tools in place to monitor the content of all incoming and outgoing emails and online activity and have no expectation of privacy while using the IT resources of NUI Galway. P a g e 2 of 3 8. Remote access to the University networks and systems is only permitted using an approved remote access mechanism and in line with the remote access policy. 9. You must not deactivate or disengage any protection mechanisms installed on IT resources (personal firewalls, antivirus software, administration account, etc.) 10. You must ensure appropriate anti-virus protection is active on all devices connecting to the university IT resources in line with the anti-virus and malware protection policy. 11. It is your responsibility to read and be familiar with the contents of this policy. If you violate any of these policies, you may be denied access to University Information and IT Systems and may also be subject to other disciplinary action. 5. Responsibilities Name ICT Security Committee Chair Director ISS University Management Team All End-users (refer to end-user policies) Internal and external audit ISS Service Desk Responsibility Policy Owner Revisions and updates to the policy Approval of the Policy Responsible for implementation of the policy. Monitoring and reporting compliance with the policy Tracking of calls related to Security Incidents 6. Related Documents QA400 Data Protection Policy QA401 Data Handling QA402 Data Classification QA404 Password Policy QA406 Remote Access Policy QA408 Logical Access Policy QA409 Encryption Policy QA410 Anti-virus and Malware Protection Policy P a g e 3 of 3