Welcome to the University Policy Library.
If you are unable to find what you are looking for please use the 'search' function below.
Delegations of Authority Policy is the key document for who is responsible to exercise a delegation – Note: Policies and procedure documents may not reflect the current delegations. Please refer to the Delegations of Authority Policy to identify who the delegate is.

Either type in a key word(s) in the search bar (e.g. scholarship) or select ‘Exact Search’ to search for a specific phrase (e.g. Commonwealth Supported Places)
Cyber Security Travel Advice Procedure
1. Purpose:
The purpose of this procedure is to outline the steps that UC staff should take to best protect and secure corporate and personal information while travelling. The information carried by staff while travelling can be potentially invaluable to a cyber-criminal, it may unveil a critical piece of information to allow for a targeted cyber-attack on the University or add the staff member to a list of possible targets of identity theft. Taking reasonable steps to protect work and personal information, especially while travelling, is very important.
2. Scope:
This procedure applies to any UC staff member that is travelling, particularly to international destinations.
3. Procedure:
  1. Prior to Departure
    1. Carefully consider the information being taken whilst travelling and remove all non-essential sensitive data from laptops, tablets (iPads), smart phones and USB drives.
    2. Confirm that all accompanying devices are well-protected by checking that:
      • the Operating System (Windows, Mac OS, Android) has the most recent version and updates have been installed; and
      • anti-virus software is installed and up-to-date.
    3. Disable any ‘auto-join’ functionality for Wi-Fi or Bluetooth devices.
    4. Ensure a strong password is applied to each device.
    5. Back up data before travelling as it may not be possible to recover data from a compromised device.
  2. While Travelling
    1. Maintain control of any devices that hold sensitive information at all times.
    2. Sensitive work should be limited to trusted networks only.
    3. Be cautious of using free or public Wi-Fi: consider using a VPN while on public Wi-Fi.
    4. Do not use free or gifted USB devices, or other electronic devices such as ‘hotspots’ as these may contain malware which could infect your devices.
    5. Avoid using public computers or devices for business purposes or to access any personal or sensitive data.
Further advice on cyber security while travelling may be found on the Australian Government’s Smart Traveller website: https://www.smartraveller.gov.au/business/cyber-crime.html
4. Governing Policy and Legislation:
This procedure is governed by the International Travel (for staff and HDR students) Policy.
In developing this procedure the University had regard to the provisions of section 40B (1) (b) of the Human Rights Act (ACT).
6. Definitions:
Terms Definitions
Auto-join A configuration option that allows devices to automatically join available networks; search your device and ‘auto-join’ to see how to change the option on your device.
Compromised device A device infected with a security threat in the form of a virus, malware or spyware. This can be an ongoing risk both in terms of losing data that you have on the device and infecting other devices on the same network.
Cyber Security Safety measures relating to information, data, computers and networks.
Hotspots A portable device to provide Wi-Fi normally by connecting to a local 3G/4G mobile network.
Sensitive Information Any information that is protected against unwarranted disclosure. Examples of this could include information protected by the Australian Privacy Policy or University-owned intellectual property.
Trusted networks Networks that have been secured and vetted for security measures. An example of this would be the University’s Wi-Fi, an EDUROAM network at another University or the corporate and secure network of a business partner.