Conditions of Use:
The computer system that you are using is provided by the Department for the conduct of community service organisation business. Your organisation has signed the CRIS(SP) Access Agreement which outlines the terms and conditions relevant to your access to CRISSP.
It outlines the commitment by both parties to the implementation, operation and maintenance of the system.
As outlined in the CRIS(SP) Access Agreement, access to CRISSP is granted on the basis that:
- Only registered and
authorised persons do so.
- Users only access
computer systems, applications, databases or files for
which they are authorised.
- They are not used for
any purpose that breaches any law or that infringes the
civil rights of any person.
- They are not used to
store or distribute material that is defamatory, obscene,
indecent, offensive, discriminatory or harassing.
- Users do not damage
these computer services, including knowingly uploading,
opening a virus or other malicious code.
- Private or confidential
information is not shared with unauthorised people.
- Private or confidential
information is not copied, unless the information is
subsequently protected in a manner appropriate to the
sensitivity of the information.
- Passwords and other
authentication devices issued to provide access are kept
secure to prevent unauthorised access.
- Passwords are not
written down where they may be accessible to an
unauthorised user.
- Breaches of security
are reported at the earliest opportunity to the Workspace Support Systems Administration - ICCMS (systemsadministration@support.vic.gov.au).
Monitoring of Computer Services
The Department seeks to safeguard the integrity of your organisations data and
prevent unauthorised access to that information. Measures taken towards this
aim to prevent corruption of data, block unauthorised access to information,
ensure the integrity of information, and to provide reasonable protection of
private information in our possession.
This includes monitoring and auditing network traffic to
identify unauthorised attempts to upload or change
information or otherwise damage its computer systems.
Industry-standard software is also used to control access to
specific applications and services and to protect data that
is transmitted electronically over the Internet.
|