Information Technology Services Policies
ITS Asset Disposal Policy
The purpose of this policy is to establish and define standards, procedures, and restrictions for the disposal of non-leased USP ICT equipment in a legal, cost-effective manner. To view please |
ITS Energy Saving Computing Policy
The following are energy-savings practices recommended by IT Services to help reduce energy consumption on campus. To view please |
ITS Accounts Policy
The purpose of this policy is to provide instructions on creation and use of USP access accounts. To view please |
ITS & SPAC Tukutuku Policy
The policy guides users on the use of the USP all-staff/students email distribution list. To view please |
ITS Open Source Policy
The policy guides users on the consideration of Open Source Software for USP. To view please |
ITS & DMCA Social Networking Policy
The policy guides users on the use of Social Networking. To view please |
Conditions of Use of Computing & Networking Facilities
The policy guides users on the use of all ICT services and resources (Revised). To view please |
Anti-Virus Policy
The purpose of this policy is to provide guidance on effective virus or malicious software detection and prevention. To view please |
Banner Access Policy
The purpose of this policy is to ensure that access to Banner Data is managed effectively. To view please |
Internet Acceptable Use Policy
The policy guides USP users on the use of USP Internet services Internet Policy (View Online) |
USP Data Backup Recovery Policy
This policy refers to the terms USP staff, students and visitors must adhere to concerning the backing up of electronic data that resides on any ICT equipment owned by USP. To view please |
Software Application Development Policy
The policy sets an environment for USP application development. To view please |
User Password Policy
The purpose of this policy is to set a standard for creating, protecting, and changing passwords such that they are strong, secure, and protected. To view please |
Backup Policy – End User
This policy refers to the backing up of data on USP PCs, laptops and other such devices. To view please |
Email Policy – Distribution
The policy provides guidance on use of the USP all-staff and student email distribution. To view please |
Email Policy – End User
The policy provides guidance on use of the USP email services To view please |
Email Policy – Public Mailing List
The policy provides guidance on how to manage the creating and monitoring of online public forums To view please |
Email Policy – Student
The policy provides guidance on use of the USP email services by students To view please |
Software Policy
The purpose of this policy is to establish standards of conduct with respect to software acquisition, copying, transfer and use. To view please |
Staff-Owned Computing Equipment Policy
This Policy are for senior staff that require use of their personal computer to effectively carry out their duties and the University is unable to provide suitable equipment To view please |
Telecommunications Policy
This Telecommunications Policy is to guide USP staff and students on the use of university owned or leased telecommunications services. To view please |
Third Party Access Policy
The Purpose of the policy is to establish the rules for third-party access to USP information systems. To view please |
Wireless Access Policy
The purpose of this policy manage the number of wireless access points connecting to University of the South Pacific’s internal network. To view please Click Here |
ITS Downtime Policy
The policy guides users on USP backup and retention of data. To view please |
ITS Patch Management Policy
The policy guides users on USP updates of IT devices. To view please |
USP Desktop Security Policy
The policy guides users desktop security. To view please |
ITS Backup & Retention Policy
The policy guides users on USP backup and retention of data. To view please |
ITS Copyright Policy
The policy guides users on use copyright specific to IT. To view please |
ITS Anti-Malicious Software Policy
The policy guides users on anti-malicious software use at USP. To view please |