Information technology


1. Title: RACGP information technology policy

1.1 Policy number: IT-O-039.3

1.2 Category: Organisational

1.3 Approval date: September 2018

1.4 Revision date: September 2019

1.5 Unit responsible Office of the President and CEO

2. Policy declaration

This policy sets the standards of authorised RACGP usage of RACGP Technology Infrastructure. This policy must be read in conjunction with the RACGP Social Media Policy, Password Policy and Data Transmission Policy.

3. Definitions

In this policy:

Confidential Information is information disclosed to a User or known to that User as a consequence of the User’s engagement with the RACGP (including employees, contractors, volunteers, vendors, suppliers), and not generally known outside the RACGP, or is protected by law or which would be reasonably considered to be;

Information is defined as processed, stored or transmitted data. Information may constitute Confidential Information;

Technology Infrastructure includes all of the RACGP or User’s devices (where access

RACGP infrastructure), technology applications and platforms which are used by Users, at anytime and anywhere. It includes, all devices and any other means of accessing the RACGP’s devices, technology applications and platforms;

Material includes, whether electronic or physical format, text, images, sound or any other material, sent either in an email or in an attachment to an email, or through a link to a site (URL) or in electronic message (for example an SMS) or as an attachment to a text message or in physical format; and

User includes any person who uses the Technology Infrastructure by any means.

Spam includes irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.

4. Scope

This policy applies to all Users.

5. General information

5.1 Use of technology infrastructure

The Technology Infrastructure is provided to Users for RACGP purposes. The RACGP monitors all usage of the Technology Infrastructure as well as any and all materials, information and other content transmitted, received or stored in connection with this usage.

5.2 Operational requirements

When using the Technology Infrastructure, Users must:

  1. Use RACGP equipment in a responsible manner and keep secure;
  2. Use their own username/login code and/or password for access to Technology Infrastructure and store their username/password confidentially and securely. Refer to the RACGP Password Policy;
  3. Not permit third parties access to or control of RACGP data and Technology Infrastructure;
  4. All devices, both RACGP and devices with access to RACGP data and Technology Infrastructure, are fully shut down when not in use, or protected by sufficient security measures such as a code to re-activate the device after being inactive. Devices must be locked when unattended to ensure no unauthorised access to your desktop device.;
  5. Not interfere or attempt to interfere with any measures implemented by the RACGP;
  6. Not remove the disclaimer automatically included in all RACGP emails as part of the signature block;
  7. Not open an email, attachments, or click on hyperlinks that they suspect is spam, malicious, or contains a virus. Any security incident must immediately be reported to the RACGP Technology Operations Team;
  8. Immediately notify their immediate manager or the relevant HR Officer of any Material breaching or which the User suspects breaches this policy, only delete the relevant content after reporting and confirming whether it is required for investigation, and not forward it to any other person;
  9. Adhere to password requirements and policies including use of suitably complex passwords and changes to account passwords performed at regular intervals – refer to the Password Policy;
  10. Not attempt to interfere with any antivirus or antimalware software installed as part of the RACGP Standard Operating Environment, enable any and all automatic updates to such software and not attempt to interfere with any regularly scheduled virus or malware scans;
  11. Utilise suitable encryption software where sensitive data is transferred or when stored on a portable storage device, use of portable storage for sensitive data should be avoided where possible. Encryption software will be provided by the RACGP Technology Team;
  12. Only install software on RACGP equipment or use any new device with prior written approval from the RACGP Technology Operations Manager or RACGP Digital Technology General Manager and which is supported by the RACGP Technology Team. All software authorised to be installed must be legally licensed by the RACGP.

5.3 Transmission, storage and retrieval of confidential information

Users may be in a position to transmit or receive sensitive and/or confidential data from time to time. Confidential information includes (but is not limited to):

  1. Exam Content;
  2. Exam Results;
  3. Exam Details;
  4. Customer Membership Details;
  5. Financials (including credit card details);
  6. Customer Experience;
  7. Customer CPD Details;
  8. Legal Correspondence;
  9. Customer Contact Details;
  10. Employee Salary;
  11. Corporate Information;
  12. Grants Information;
  13. Copyright and Consent Forms;
  14. Educational Activities;
  15. Accounts Payable/Supplier Details;
  16. Provider Details;
  17. Employee Contact Details; and
  18. Recordings of Patient Consultations.

Users must adhere to advice received by the RACGP Technology Team for secure transmission and/or receipt of such data. This can include:

  1. Use of RACGP approved encryption software to encrypt data prior to transmission, or transfer to a physical medium such as a USB drive;
  2. Use of authorised media, either physical (for example USB drives) or electronic (for example streaming services) for transmission, storage and retrieval of Confidential Information.
  3. Appropriate treatment of physical media and its secure disposal. This includes keeping all secure items in locked cabinets and sensitive information is disposed of using the secure disposal bins or secure media destruction services.

Please refer to the Confidential Data Transmission Policy document for more details.

5.4 Prohibited conduct

Users must not use for any purpose or send (or cause to be sent), upload, download, use, retrieve, or access any Material on the Technology Infrastructure that:

  1. Is prohibited by this Policy;
  2. Breaches any applicable laws or regulations, promotes illegal activity or is fraudulent, or has the effect of being unlawful or fraudulent;
  3. Is defamatory or libellous, obscene, violent, threatening, sexually explicit, indecent or of a pornographic nature, offensive, hateful or inflammatory;
  4. Could adversely impact the image or reputation of an individual or the RACGP;
  5. Will harass, upset, embarrass, alarm or annoy any other person or causes (or could cause) insult, offence, intimidation or humiliation or which lowers the reputation of a person or group of people;
  6. Impersonates or misrepresents any other person;
  7. Is misleading or deceptive or is likely to mislead or deceive;
  8. Promotes discrimination of any kind;
  9. Breaches the RACGP Social Media policy;
  10. Could damage, disable, overburden or impair the Technology Infrastructure or interfere with any other party's productive use or enjoyment of the Technology Infrastructure;
  11. Affects the performance of, or causes damage to the Technology Infrastructure in any way;
  12. Knowingly transmits any data or material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware;
  13. Use any robot, spider, screen scraper, data aggregation tool or other automatic process to monitor, copy or extract any Information, or combine any Information with the information of a third party, without RACGP's prior written consent;
  14. Reverse engineers, reverse assembles, decompiles or otherwise attempts to discover source code or other formulae or processes in respect of the Technology Infrastructure;
  15. Transmit, or procure the sending of, any unsolicited or unauthorised advertising or promotional material or any other form of similar solicitation (otherwise known as spam); or
  16. Gives the impression of or implies is representing, giving opinions or making statements on behalf of the RACGP without the RACGP’s express authority.

Users must not use the Technology Infrastructure to:

  1. Violate any third party’s intellectual property rights, including by reproducing copyrighted documents or images;
  2. Create or be responsible for the RACGP incurring any unauthorised legal obligation or liability;
  3. Disclose any RACGP Confidential Information or information of any RACGP employee, member, client or supplier of RACGP without the RACGP’s prior written consent;
  4. Install software or run unknown or unapproved programs without receiving the prior written consent of the RACGP Technology Team;
  5. Modify the software or hardware environments on Technology Infrastructure;
  6. Gain unauthorised access into any other computer within or external to the RACGP, or attempt to deprive other Users of access to or use of the Technology Infrastructure;
  7. Send or cause to be sent chain or spam emails or text messages in any format; or
  8. Obtain personal gain, for example by running a personal business.

Unless authorised, Users must not interfere with, damage or disrupt:

  1. Any part of the Technology Infrastructure;
  2. Any equipment or network on which the Technology Infrastructure is stored;
  3. Any software used for the Technology Infrastructure; or
  4. Any equipment or network or software owned or used by any third party.

5.5 Details on blocking email and Internet access

The RACGP will prevent (or cause to be prevented) the delivery of Material to or from a User, or a User’s access to a website (including a social networking site), if the RACGP considers the relevant content breaches any of the provisions to clause 5.

The RACGP will not give a prevented delivery notice for any email messages sent by a User if the RACGP is not aware (and could not reasonably be expected to be aware) of the identity of the User who sent the e-mail or is not aware that the e-mail was sent by the User.

5.6 Devices

Users wishing to access the Technology Infrastructure on a personal device must provide their manager’s approval to the Technology Team and then provide that device to Technology Team to ensure it is installed with appropriate software and/or configured appropriate to ensure the security and integrity of the Technology Infrastructure. Users must provide Technology Team will reasonable assistance to ensure the relevant software is installed.

Where requested, the User must promptly provide the RACGP with the relevant device (whether owned by the RACGP or the User) for the purpose of investigating any breach of this Policy.

Users must ensure portable devices that are used to access college information has an appropriate virus protection solution and security posture with up to date Operating System and Application patches installed and authentication protections to prevent unauthorised access to the device.

The RACGP reserves the right to require personal devices that are used to access RACGP information and/or systems to have installed specific software that allows the RACGP to remote wipe the device if lost, stolen or no longer employed.

Personal devices are supported where that device is supported by the RACGP.

6. Enforcement

Any breach of this policy may result in disciplinary action. This may include termination of employment (or, for persons other than employees, the termination or non-renewal of contractual arrangements).

Other disciplinary action that may be taken includes, but is not limited to, issuing a warning, suspension or disconnection of access to all or part of the Technology Infrastructure whether permanently or on a temporary basis.

For more serious issues, the RACGP may consult with relevant authorities.

7. Related policies, documents and legislation

  1. Social Media Policy;
  2. Privacy Policy:
  3. Confidentiality Policy;
  4. shareGP Policy;
  5. employment Agreements;
  6. RACGP updates to User’s from time to time;
  7. Password Policy; and
  8. Confidential Data Transmission Policy & Procedures

8. Administrative procedures

8.1 Access to published policy

This policy will be available via the RACGP intranet.

8.2 Review of this policy

This policy will be reviewed annually.


Download this policy

 Information technology policy (PDF 111 KB)