ÐÓ°ÉÖ±²¥

Skip to main content
ÐÓ°ÉÖ±²¥ of Adelaide home page
ÐÓ°ÉÖ±²¥ of Adelaide home page

Information Technology and Digital Services

Site Menu

  • Home
  • Contact Us
    • Contact Form
  • News
  • Technology Strategy
  • Your Support
    • Student Support
    • Removing the Service Desk Email Channels
    • Working From Home With Technology
    • IT Matters: Tech Tips videos
    • Training
  • Your Services
    • Accounts and Access
      • About Your Account
      • Manage Your Account
      • Multi Factor Authentication
      • Research Electronic Data Capture - REDCap
      • Qualtrics
    • Collaborative Communication Tools
    • Email
    • Hardware
    • Network Services
      • Remote Access via Virtual Private Network (VPN)
      • Wifi Networks
        • Wifi Coverage
    • Printing
    • Non-Standard Service Request
    • Software
    • Storage
  • Your Tools
    • Academic Tools
      • ADAPT
      • MyUni Support
      • Student Computer Suites
    • Research Tools
  • Secure IT
    • Cyber Security Training
    • Generative AI IT Security Guidelines
    • Help! I've been scammed!
    • Report an IT Security Incident
  • About Us
    • Message from the CIO
    • Managing Technical Changes
      • Change Management Process
        • The Role of CAB Members
        • Normal Change Management Process
        • Emergency Change Management Process
        • Frequently Asked Questions
      • Maintenance Windows
    • Technology Governance
      • Technology Strategy and Governance Committee
      • Technology Advisory Groups
    • Technology Teams
  • Policies and Guidelines
    • Cyber Security Framework
    • IT End User Computing Device Guidelines
    • IT Acceptable Use and Security Policy
    • Social Media
    • Third Party Hosting
  • Feedback
  • Audio Visual - Common Teaching Space Technology
Login
  • Home
  • technology
  • Current: Policies and Guidelines

Policies and Guidelines

All users of ÐÓ°ÉÖ±²¥ information technology must comply with ÐÓ°ÉÖ±²¥ policies, and associated procedures and guidelines.

For more ÐÓ°ÉÖ±²¥ policies, check the ÐÓ°ÉÖ±²¥ Policies and Procedures website.

  • A to Z

    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z
    • A

      • Account management advice
    • B

      • Behaviour and conduct policy
      • Brand and visual identity policy
    • C

      • Computer security advice
    • D

      • Data management advice
      • Data protection advice
      • Data storage advice
      • Do's and don'ts
    • E

      • Email safety advice
      • Email security advice
      • Enterprise agreement (staff)
    • G

      • Generative AI IT Security Guidelines
    • I

      • IT End User Computing Device Guidelines
    • O

      • Online safety advice
    • P

      • Password security advice
      • Privacy policy and management plan
    • R

    • S

      • Smart device safety advice
      • Social media guidelines and policies
      • Social media safety advice
      • Student misconduct rules
      • Student-related policies
    • T

      • Technology advice
      • Third party hosting advice
    • U

Cyber Security Framework

Classifying and proecting information guidelines

IT End User Computing Device Guidelines

IT End User Computing Device Guidelines

Distributed IT Governance

Guidelines for technology administrators and custodians

IT acceptable use and security policy

IT Acceptable Use and Security policy

Social media

Check out our guidelines for using social media at the ÐÓ°ÉÖ±²¥

Cloud Services

Third party hosting or cloud hosting guidelines

Information Technology and
Digital Services

ITDS Service Desk

Call us 08 8313 3000
International +61 8 8313 3000

Useful links

Staff intranet

  • Authorised by: Chief Information Officer, Information Technology and Digital Services
  • Maintained by: Information Technology and Digital Services Website Maintainer
  • Last updated: 12 Nov 2024

top