Technology Use Policy
Wintec expects all users to behave responsibly. Under no circumstances are staff, students, contractors, consultants, auditors, evaluators or temporaries affiliated with third parties (all users) of Wintec computers authorised to engage in any activity that is illegal in New Zealand or international law.
Includes computer hardware, audio/visual equipment, software, electronics, internet, telecom equipment, e‐commerce and computer services.
Used to refer to the information and communication technology (ICT) that our organization uses to process (capture, transmit, store, retrieve, manipulate and display) information.
Also known as computer programs, is the non‐tangible component of computers. Computer software includes all computer programs that upon execution, instructs hardware to perform the tasks for which it is designed.
Material is deemed to be objectionable if it describes, depicts, expresses, or otherwise deals with matters such as sex, horror, crime, cruelty, or violence in such a manner that the availability of the publication is likely to be injurious to the public good.
To disturb or upset, and it is characteristically repetitive. In the legal sense, it is intentional behaviour which is found threatening or disturbing.
Allows computers to exchange data and share use of applications, storage, servers, printers, email and messaging applications.
2.1. No staff, students, contractors, consultants, auditors, evaluators or temporaries affiliated with third parties (all users) of Wintec technology will engage in any activity that is illegal in New Zealand or international law.
2.2. Unacceptable use of technology (hardware, software and online services) includes but is not limited to:
a) Using an identity that is not your own or allowing anyone to use your identity for the purpose of gaining access to Wintec resources.
b) Attempting to gain unauthorised access to Wintec systems/information or intentionally using a system/information for a purpose for which it was not intended.
c) Knowingly interfering with the normal operations of Wintec technology systems (hardware, business systems, networks etc).
d) Knowingly introducing a software programme or software code intended to damage or place excessive load on Wintec technology systems.
e) Using Wintec resources or your Wintec identity to harass others.
f) Intentionally accessing or archiving objectionable material.
g) Commercial use of Wintec technology/resources for private gain. Refer to the Intellectual Property Policy EXG‐1/00.
h) Attempting to access, monitor or tamper with another user’s Wintec identity or files without the explicit agreement of the owner.
i) Excessive use of Wintec technology resources in a manner which may hinder or prevent Wintec from providing Wintec technology resources to others.
2.3. Before accessing the Wintec network, students must have read, understood and agreed to the terms and conditions of this policy (parts A and B) and Copyright Policy.
2.4. When students first log on to a Wintec account after enrolment or first log on in a new calendar year, they must confirm that they accept the conditions of this policy (parts A and B) and Copyright Policies.
2.5. By signing Employment Agreements, employees agree to follow all Wintec policies and procedures.