Mzuni Ict Policy
Mzuni Ict Policy
UNIVERSITY
ICT POLICY
Table of Contents
1.1 Policy................................................................................................4
1.2 Definitions..........................................................................................4
1.3Principles............................................................................................5
1.4Coverage.............................................................................................5
1.5 Conditions of Use..................................................................................5
1.6Monitoring...........................................................................................8
1.7Responses to Breaches............................................................................8
1.8Security, Confidentiality and Privacy...........................................................9
1.9Approval............................................................................................10
1.10. Amendment and Review......................................................................10
2.0SOCIAL MEDIA POLICY...............................................................................11
2.1 Introduction...................................................................................11
2.2 Purpose.........................................................................................12
2.3 Scope...........................................................................................12
2.4 Statement of Liability.......................................................................12
2.5 Policy Statements............................................................................13
2.5.1........................................................................Use of the Mzuni Marks
13
2.5.2.................................................................................Applicable Laws
13
2.6 Content.........................................................................................13
2.6.1......................................................Compliance with other Mzuni policies
13
2.6.2.............Considerations when discussing work-related activities on social media
14
2.6.3....................................................................Compliance Requirements
15
2.7 Penalties for Misuse..........................................................................15
2.8 User Acceptance..............................................................................16
2.9 User Acceptance Clause..................................................................16
3.0 ICT SECURITY POLICY...........................................................................17
3.1Introduction.......................................................................................17
3.2 Purpose.........................................................................................17
3.3 Scope........................................................................................18
MZUNI ICT
POLICY
Page 1
3.4 Roles and Responsibilities...................................................................19
3.5 General.........................................................................................19
3.6 Roles............................................................................................19
3.7 Responsibilities...............................................................................20
3.8 Physical Security & Integrity of Systems..................................................21
3.9 Logical Security & Integrity of Systems...................................................21
3.10 Software and Firmware upgrades..........................................................22
3.11 Malware control..............................................................................22
3.12 Network Interconnections...................................................................22
3.13 Access to Business Critical systems.....................................................23
3.14 Privacy and Confidentiality.................................................................23
3.15 Right to monitor ICT systems...............................................................23
3.16 Localised Policies.............................................................................23
4.0 MZUZU UNIVERSITY ICT USER AGREEMENT......................................................24
4.1 Network user agreement....................................................................24
4.2 General.........................................................................................24
4.2 Electronic Mail................................................................................24
4.3 ICT Policy Framework........................................................................26
5.0ICT BREACH POLICY.................................................................................27
5.1 Introduction.......................................................................................27
5.2 Objectives.....................................................................................27
5.3 Management of breaches....................................................................27
5.3.1 Breach Reporting............................................................................27
5.3.2...............................................................Breach Management Reporting
28
5.3.3 Breach penalties.............................................................................28
5.4 Schedule A – categories of breach for staff.................................................29
5.4.1....................................................................................Minor Breach
29
5.4.2....................................................................................Major Breach
29
5.5Schedule B – Categories of breach for students.............................................30
5.5.1....................................................................................Minor Breach
30
5.5.2....................................................................................Major Breach
MZUNI ICT
POLICY
Page 2
30
5.6 Schedule C - Example categorisation of breaches..........................................30
6.0ELECTRONIC MAIL & MESSAGING SERVICES POLICY............................................33
6.1Introduction.......................................................................................33
6.2 Purpose.........................................................................................33
6.3 Scope...........................................................................................33
6.4 Ownership and Responsibilities................................................................33
6.5 General.........................................................................................34
6.6 Copyright Laws and License Agreements.................................................34
6.7 Responsibilities...............................................................................34
6.8Authorized Users..................................................................................35
6.9 Use of Email/Messaging Accounts.............................................................35
6.10 Login Credentials...............................................................................35
6.11Access to Mzuni E-Mail/Messaging Services.................................................35
6.12Email Messaging Content.......................................................................35
6.13 Creation of Messages...........................................................................36
6.14 University Records..............................................................................36
6.15 Offensive Electronic Content............................................................36
6.16 Responsible Use.................................................................................37
6.17 Restrictions......................................................................................37
6.18 Misrepresentation............................................................................37
6.19 Personal Use.....................................................................................38
6.20 Electronic Messaging Etiquette...............................................................38
6.21Security and Confidentiality...................................................................39
6.22Privacy............................................................................................39
6.23Security Protection.............................................................................40
MZUNI ICT
POLICY
Page 3
POLICY ON THE USE OF MZUZU UNIVERSITY (MZUNI) INFORMATION AND
COMMUNICATION TECHNOLOGY (ICT) RESOURCES
1.1 Policy
All Users will be lawful, efficient, economical and ethical in their use
of the Mzuzu University’s ICT Resources.
1.2 Definitions
a) ICT Resources
b) User(s)
All employees, any person enrolled in any course of study at the University
and any person registered to attend short courses, seminars or
workshops in the University, as well as all other persons including
members of the general public, who have been granted access to, and
use of, the University’s ICT Resources.
NB: A member of the public reading public University web pages from
outside the University is not by virtue of that activity alone considered
to be a User.
1.3Principles
b) The University will exercise its right with regard to web based and
other electronic documents in accordance with relevant Laws.
c) While the University strives to protect its ICT resources it for loss
or damage, consequential loss or damage, or loss of data arising
from the use of its ICT Resources or the maintenance of its ICT
Resources.
1.4Coverage
1.5Conditions of Use
a) The University will not tolerate its ICT Resources being used in a
manner that is harassing, discriminatory, abusive, rude, insulting,
threatening, obscene or otherwise inappropriate.
b) It is illegal to use any ICT Resource to harass, menace, defame,
libel, vilify, or discriminate against any other person within or
beyond the University.
c) Users may be individually liable if they aid and abet others who
discriminate against, harass or vilify colleagues or any member of
the public. Users who adversely affect the reputation of another
person may be sued for defamation by that aggrieved person.
d) Users must not use the University’s ICT Resources to collect, use
or disclose personal information in ways that is contrary to the
university rules and regulations.
j) The University does not permit the use of its ICT Resources for
unauthorised profit making or commercial activities and furtherance
of personal gain.
k) Users must not use ICT Resources in inappropriate ways, which
are likely to corrupt, damage or destroy data, software or
hardware, either belonging to the University or to anyone else,
whether inside or outside the network. Note: This does not apply
to specially authorised University computing staff who may be
required to secure, remove or delete data and software, and
dispose of obsolete or redundant ICT Resources as part of their
ICT Resource management duties.
1.6Monitoring
c) The University reserves the right to audit regularly and monitor the
use of its ICT Resources to ensure compliance with this policy.
d) The University also reserves the right to look at and copy any
information, data or files (including non-University material)
created, sent or received by Users using, or while connected to, the
University’s ICT Resources in the event of a suspected breach of
this or other policies.
c) Email and other records stored in ICT Resources may be the subject
of a subpoena, search warrant, discovery order or application.
Council Date
Date of Effect
2.1 Introduction
The term “social media” refers to a set of online tools that supports
social interaction among users. These include but not restricted to
Facebook, Twitter, Flicker, YouTube, Instagram etc.
Social media has radically changed the way we communicate and interact.
It offers opportunities to connect and engage with a range of key
stakeholder groups including prospective and current students, staff,
alumni, donors, research collaborators and friends of the University.
This Policy outlines the Mzuni’s position on the appropriate use of social
media by members of its community. It seeks to clarify how best to
enhance and protect personal and professional reputations when
participating in social media. It serves to facilitate and encourage the
proper use of social media while sensitizing users about the risks of
antisocial activity with a view to protecting Mzuni from liability that may
be vicariously incurred when members of the community misuse Mzuni’s
Information and Communications Technology (ICT) systems.
2.3 Scope
This Policy applies to all Mzuni Social Media Sites and to the activities
permitted by these sites. It applies to sites and any activity that falls
within the genus of social media, whether they are current or come
into existence on or after the date of the approval of this Policy.
Examples include weblog posts (blogging), event updates, news
updates, chats, discussion boards/posts, photo/video sharing, music
and radio broadcasts and gaming.
Mzuzu University shall not be liable for any errors, omissions, loss or
damage, including indirect and/or consequential loss and/or damage
claimed or incurred due to any use of any social media site that does not
comply with this Policy or the policies cited herein.
2.5 Policy Statements
This section explains the Mzuni’s position on social media and its
response to various issues which may arise in the event of
inappropriate use of social media by users
(i) Mzuni Marks include; The Mzuni name, and all other words,
logos, signs or any other marks whether registered or not, that
belong to or are associated with Mzuzu University.
Persons making postings shall respect the laws relating to copyright and
other intellectual property rights, defamation, privacy, and other applicable
laws.
2.6 Content
e. Web Policy
(ii) User should noted that all Mzuni Social Media Sites
represent Mzuni. Therefore, content providers must ensure
that information placed on any Mzuni Social Media Site is
accurate and represents the values of Mzuni.
(i) This policy does not include matters related to the use of
social media to support teaching and learning at Mzuni.
(v) Any user desirous of using social media should consult the
Director of ICT for appropriate guidance prior to use.
Users who breach this Policy may face disciplinary action (as outlined
in the code of conduct on the use of Mzuni ICT Resources) up to and
including
termination of employment in the case of staff members; and
suspension or expulsion in the case of students.
I conditions
accept the
Signature:
Date:
3.0ICT SECURITY POLICY
3.1 Introduction
3.2Purpose
This policy is prepared for the direction and use of personnel engaged
in the implementation and support of Mzuni’s ICT systems and the services
delivered thereon. It is intended to inform:
3.3Scope
This policy outlines the requirements for securing Mzuni’s data and
information assets and provides the groundwork for the development of
local policies, guidelines and best practices insofar as it is practical.
This policy applies to the mitigation of the following categories of risk:
ICTs are provided and deployed by Mzuni to support its operational and
administrative functions of Teaching, Learning, Research, as well the
management of its business. They are intended to be used primarily as
business tools and to provide other support services.
3.5General
The ICT resources deployed are University facilities. All such technologies
are and remain the property of the Mzuni, hence certain assigned
Intellectual Property rights are excepted.
3.6Roles
3.7Responsibilities
Barriers and controls include, but are not limited to, electronic
access control to servers and critical network infrastructure,
installations of grillwork surrounding and enclosing video systems,
fire suppression, and power management systems.
The University is dependent on several of its major systems for its daily
operations. Breaches to their integrity, or their unavailability for any
significant period of time, could reduce the service delivery capability
or place the institution in disrepute. Such systems may include the
Student Administration System, online teaching and learning platforms,
the financial management system, the Library Management system.
Notwithstanding the general security safeguards enunciated before, these
business‐critical systems shall be provided with an elevated level of security.
These additional measures shall include, but are not limited to, internal
firewalls. When the security requirements are stringent enough,
internal isolation of the network segment to which such systems are
attached is the final consideration.
4.2 General
You will:
ii. be solely responsible for all actions taken under your User ID
while it is valid;
iii. not let others use your User ID and your Password nor inform
others of your User ID or Password;
iv. not delete, examine, copy or modify files and/or data belonging to
other users without their prior consent;
vii. Accept that, data stored on the Network can be moved internally
by qualified staff in ICT Services.
4.2Electronic Mail
You will :
i. be responsible for all electronic mail originating from your User ID;
ii. not forge, or attempt to forge, electronic mail messages;
iii. not attempt to read, delete, copy or modify the electronic mail
iv. directed to other users without prior consent;
v. not send, or attempt to send, harassing, obscene and/or other
threatening e-mail to another user of any e-mail service. Further
information can be found in the University’s E-Mail and Internet
Policy;
vi. not send 'for-profit' messages or chain letters.
Network Security
iii. have read and understood this User Agreement and accept full
legal responsibility for all of the actions that you commit using the
University's Systems according to any and all applicable laws;
iv. understand that from time to time the University Systems and
attached equipment may fail unexpectedly while you are using them
and you will not hold the University responsible for lost time or
data.
5.0ICT BREACH POLICY
5.1 Introduction
5.2Objectives
5.3Management of breaches
5.3.1Breach Reporting
5.3.3Breach penalties
Password/Account - 20 days,
Pornography - 14 days,
Copyrighted Content - 14 days,
All other - 7 days (after first warning)
6.1Introduction
6.2 Purpose
This policy is prepared for the direction and use of all users of the
MZUNI’s electronic messaging services. It is intended to ensure that:
6.3 Scope
This policy outlines the requirements for the use of electronic messages and
adheres to best practices as far as is practical. It applies to:
MZUNI electronic mail systems and services are university facilities. All e‐
mail addresses and messaging IDs maintained by the system are the
property of Mzuzu University.
6.7 Responsibilities
6.8Authorized Users
6.17 Restrictions
6.18 Misrepresentation
a) E‐mail users shall not give the impression that they are
representing, giving opinions, or otherwise making statements
on behalf of the University or any unit of the University
unless appropriately authorized (explicitly or implicitly) to
do so.
b) Where appropriate, an explicit disclaimer shall be included
unless it is clear from the context that the author is not
representing the University.
The following is a summarised list of Do’s and Don’ts to help promote a code
of good electronic messaging practice in the University.
Do’s
vi Try and make sure that the "Subject" field in email messages is
meaningful, to help put the e-mail into context. Also, when the
reply option is used, ensure that the subject field still accurately
reflects the content of your message
vii Try to restrict yourself to one subject per message, this helps
recipients to use the "subject" field to manage their messages
6.22 Privacy
Signature: Date: _
Printed Name: Campus/Department/Faculty/Unit: