• Specific Year
    Any

NORTHERN TERRITORY NATIONAL EMERGENCY RESPONSE ACT 2007 (NO. 129, 2007) - SECT 28 Development of acceptable use policy

NORTHERN TERRITORY NATIONAL EMERGENCY RESPONSE ACT 2007 (NO. 129, 2007) - SECT 28

Development of acceptable use policy

             (1)  The responsible person for a publicly funded computer must ensure that a policy is developed relating to the kinds of use of the computer that are acceptable.

Note:          A person commits an offence if the person does not develop a policy in accordance with this section (see section 30).

             (2)  The Minister may, by legislative instrument, determine matters that the policy must provide for. If the Minister does so, the policy must provide for those matters (although the policy may also provide for additional matters).

             (3)  Without limiting subsection (2), the policy must state that a person must not use the computer:

                     (a)  to access, or to send a communication containing, material or a statement:

                              (i)  that contravenes, or forms part of an activity that contravenes, a law of the Commonwealth, a State or a Territory; or

                             (ii)  that incites a person to contravene a law of the Commonwealth, a State or a Territory; or

                            (iii)  that is slanderous, libellous or defamatory; or

                            (iv)  that is offensive or obscene; or

                             (v)  that is abusive or that threatens the use of violence; or

                            (vi)  that harasses another person on the basis of sex, race, disability or any other status that is protected by a law of the Commonwealth, a State or a Territory; or

                     (b)  to send an anonymous or a repeated communication that is designed to annoy or torment.

             (4)  The responsible person for a publicly funded computer must ensure that each person (the user ) who uses the computer with the responsible person's consent is made aware of:

                     (a)  the matters provided for by the policy; and

                     (b)  the fact that use of the computer by the user is audited; and

                     (c)  the fact that a report of the audit (which might include the user's name and usage of the computer) is given to the Australian Crime Commission.

Note:          A person commits an offence if the person contravenes this subsection (see section 30).