This information will be used in relation to your current or future employment with us or contractor engagement with us. Acceptable use is always ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a users terminal session, via any means, locally or via the Internet/Intranet/Extranet. Employees are responsible for exercising good judgment regarding the reasonableness of personal use. However, MyDeal.com.au and Pet Culture, for example, maintain their own privacy policies (accessible on their respective websites). 0000015761 00000 n This includes services intended for public use. 0000011793 00000 n The terms and conditions for each brand and program sets out what is considered a service-based communication for that brand or program. if you are an employee, use university systems for partisan political purposes, such as using electronic mail to circulate advertising for political candidates. Do you collect my sensitive information? NIST allows the personal use of the Internet as long as it does not interfere with official business, increase cost to NIST or embarrass NIST. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access, unless these duties are within the scope of regular duties. 14. If you disagree with our decision, you may refer your complaint to the Office of the Australian Information Commissioner (OAIC) (whose contact details are as set out here). Postings by employees from a Nicholls State University email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Nicholls State University, unless posting is in the course of business duties.d not necessarily those of Nicholls State University, unless posting is in the course of business duties. waste computing resources or network resources, for example, by intentionally placing a program in an endless loop, printing excessive amounts of paper, or by sending chain letters or unsolicited mass mailings. 0000000996 00000 n This policy applies to all equipment that is owned or leased by Nicholls State University. Under no circumstances is an employee of Nicholls State University authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing Nicholls State University-owned resources. Click here to view the contact information. use only legal versions of copyrighted software in compliance with vendor license requirements. "The . A .gov website belongs to an official government organization in the United States. User: a person (wherever located) who accesses the information infrastructure. If there, is anything you are unclear about, ask your, and agree to abide by the responsibilities set, responsible and accountable for their own, Line Managers are responsible for ensuring, direct reports have read, agreed and follow, In addition, all Team Members must abide by, securing your technology and staying safe, employee salary and sales data, unless it is part, of an authorised business process or activity that, Ensure hard copies of Restricted, Confidential, and Internal Information are stored securely at all, presentation aids are erased or securely stored at, Ensure Customer information is only used for, Ensure any incidents, related to unintentional, disclosure, loss or theft of customers or, employees personal information (including but. Standard Policy A. To establish the standards of acceptable use of the University's information technology (IT) and information infrastructure, and end-to-end network by authorised users.. Overview. trailer <]/Prev 52380/XRefStm 1271>> startxref 0 %%EOF 162 0 obj <>stream 4.1.2 You have a responsibility to promptly report the theft, loss or unauthorized disclosure of Nicholls State University proprietary information. A copy of the authorization and a copy of . This is so we can give you a seamless and personalised experience while interacting with the Woolworths Group and we can run our business efficiently. Please refer to Section 16 below. This Policy applies to employees, contractors, consultants, temporary workers and anyone else given access to Logitech information systems or devices. <> Other sources: From time to time we may also collect personal information about you from other sources to help us supplement our records, improve the personalisation of our service to you, provide services to third parties such as Endeavour Group (the owner of BWS liquor stores) and detect fraud. Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which Nicholls State University or the end user does not have an active license is strictly prohibited. see, To establish the standards of acceptable use of the Universitys, Information Infrastructure and Services Rule. If your browser does not render page correctly, please read the page content below, Maple Leaf Foods CASE STUDIES ON SUCCESS TRAITS - PROCESSED FOOD SECTOR RESEARCH PROGRAM, Human Resource Management Implementation at Startup Arena Corner, DEAL NEWS TRANSPORTATION & LOGISTICS - WHAT'S UP IN YOUR MARKET - A FOCUS ON DEALS ACTIVITY - PWC, Debt Capital Markets Roadshow - July 2018 www.vukile.co.za - Vukile Property Fund, Realizing Your Vision - 2018 Guide To Listing - TSX Venture Exchange, Tourmaline Oil Corp. Corporate Presentation June 2016 - Criterion Research, AXIS ASSET MANAGEMENT COMPANY LIMITED - INVESTMENT VALUATION POLICY - JANUARY 2020 - Axis Mutual Fund, IDC MarketScape: Worldwide Colocation and Interconnection Services 2019-2020 Vendor Assessment - MTI, Dream Bigger, Disney: Exploring the Walt Disney Company's Future Role in Planetary Politics. If you believe that any of your personal information is inaccurate, out of date, incomplete, irrelevant or misleading, please contact our Privacy Office. The advertisement contains a conspicuous notice on its first page that the recipient may request not to be sent any further unsolicited advertisements, and includes a domestic telephone and fax number (neither of which can be a pay-per-call number) for sending such requests. The following activities are strictly prohibited, with no exceptions: The Information Technology team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner. Users shall comply with the following rules of acceptable use: a. This policy and related documents draw their authority from the, Acceptable use is defined as activities undertaken in the course of performing the functions of the University, as specified by the. Users must follow the guidelines established by the NIST IT Security Office when downloading software from the Internet: Only install software that will be used for work-related functions. 0000004637 00000 n to convert Everyday Rewards points to your Qantas membership, information service providers to improve data quality e.g. Some examples include the use of NIST IT resources that contain or promote (a) matters directed toward the success or failure of a political party, candidate for partisan political office, or partisan political group, (b) engaging in any action supportive of lobbying the Congress, (c) use of Internet sites that result in an unauthorized charge to the Government, (d) participating in prohibited activities such as discriminatory conduct, gambling, and disseminating chain letters, (e) intentional and unauthorized viewing of sexually explicit or pornographic material, (f) sending personal e-mail that might be construed by the recipient to be an official communication, (g) any activity that would bring discredit on NIST or the Department of Commerce, (h) statements viewed as harassing others based on race, age, creed, religion, national origin, color, sex, handicap, or sexual orientation, (i) any violation of statute or regulation; The unauthorized sharing of NIST-owned software or any other NIST information not authorized for disclosure or use by others with anyone not specifically authorized to receive such software or information. use computer programs to decode passwords or access control information. 5. NIST software must be removed from non-NIST computers when the information technology user is no longer associated with NIST or when the information technology user no longer needs the software for work-related purposes. 0000003788 00000 n See policy 7000 for further information. Nicholls State University reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. 0000002632 00000 n Access to NIST information technology resources requires formal written authorization by a user's manager. Individuals involved with misuse will also be subject to having all computer account access indefinitely suspended at the discretion of NIST management and the NIST CIO. Recent advances in supply chain technology include the establishment of electronic catalogues linked to the monitoring of product movement via a combination of radio frequency . 4.2.6. Web Analytics Strategy.pdf, Week 5 - Rights and liabilities of the parties, discharge and remedies.pdf, BUS100 Business Statistics Lecture 4 Slides.pptx, Law of Definite Proportions Lab Report (1). We use security measures such as physical and technical security access controls or other safeguards, information security technologies, policies, procedures and training programs to ensure the security of your personal information. use university systems for commercial purposes, such as using electronic mail to circulate advertising for products. This may also include products and services provided by third parties. All hosts used by the employee that are connected to the Nicholls State UniversityInternet/Intranet/Extranet, whether owned by the employee or Nicholls State University, shall be continually executing approved virus-scanning software with a current virus database. Chat with our experts. Data: Includes raw data, micro data, unorganised facts or data sets in any format. 0000001448 00000 n When you apply for a role with the Woolworths Group, we collect the personal information that you provide during that process, including in your application, such as your education and career history. The Australian National University, Canberra 0000026127 00000 n The purpose of this policy is to outline the acceptable use of computer equipment at Nicholls State University. Security and fraud detection: To protect our team members, customers, premises and systems from malicious or dangerous activity and to verify your identity and to detect fraud activities. It is expected that all users be familiar with and stay current with this policy. : includes the buildings, permanent installations, information services, fixtures, cabling, and capital equipment that comprises the underlying system within or by which the University: holds, transmits, manages, uses, analyses, or accesses data and information; and. See Section 3 for examples of what kinds of information we may collect. Limited personal use of University IT is acceptable, however access can be revoked at any time and is subject to the same monitoring practices as employment related use. This policy applies to employees, contractors, consultants, temporaries, and other workers at Nicholls State University, including all personnel affiliated with third parties. Gift cards: When you purchase a Woolworths Group Gift Card (e.g. Protect Woolworths customers, team members and business information from misuse and loss. This Privacy Policy applies to all Australian Woolworths Group businesses unless that business has adopted a separate policy. use the university's systems or networks for personal gain; for example, by selling access to your user name or to university systems or networks, or by performing work for profit with university resources in a manner not authorized by the university. There is no charge to submit a request to correct or access your personal information, however, we may charge a reasonable fee for giving access to your personal information if your request requires substantial effort on our part. be considerate in your use of shared resources. Potential opportunities for competitive advantages. protect your user name and system from unauthorized use. 0000004411 00000 n x{#q/ How will I know if Woolworths makes changes to this privacy policy? We use your personal information to show you relevant advertising from us and third parties. It is your right to have your personal information corrected. Read here for a copy of our previous Privacy Policy (that was effective 28 June 2021 to 20 December 2022). Typically this involves grouping customers into segments with other customers who share similar demographics and shopping behaviours and the generation of insights at the segment level. Commercial use of IT Systems and equipment for non-Nicholls State University purposes is generally prohibited, except if specifically authorized and permitted under University conflict-of-interest, outside employment, and other related policies. We remain committed to actively contributing to Australias reconciliation journey through listening and learning, empowering more diverse voices and working together for a better tomorrow. For example, to help personalise the ads you see when browsing or on social media, we share certain information with digital platforms like Google and Meta to create audiences with common interests. we are online and ready to help. with Everyday Rewards Partners (such as Qantas, Ampol and BWS). Does Woolworths share personal information overseas? To learn more about University records and recordkeeping practice at ANU, Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services). Making fraudulent offers of products, items, or services originating from any Nicholls State University account. This document outlines the way in which we collect, hold, secure, use and share your personal information. If you have any questions regarding its contents, we invite you to contact our Privacy Office, the contact details for which are contained in Section 18 below. Our job advertisements and recruitment processes set out further information about relevant third parties that we work with. To enable better practice within its policy and procedural frameworks, the University recognises, and is consistent with, the following standards and regulations: Australian Government Protective Security Policy Framewor, Public Governance, Performance and Accountability Act 2013, Public Governance, Performance and Accountability Rule 2014, Telecommunications (Interception and Access) Act 1979, Division of Student Administration and Academic Services, International Strategy and Future Students, Policy: English language admission requirements and post-admission support, Policy: Knowledge, pedagogic skill and qualification requirements for educators, Procedure: Student assessment (coursework), Policy: Glossary: Student policies and procedures, Policy: Recognition of prior and external learning, Procedure: Higher degree by research - submission and examination of theses, Australian Government Protective Security Policy Framework, Information Infrastructure and Services Order 2020, Information technology account management and access, Authentication for access to University resources, Information technology administrator privileges, To establish the standards of acceptable use of the Universitys Information Technology (IT) and information infrastructure, and end-to-end network by authorised users. Endeavour Group, in order for Woolworths to provide services to BWS, such as when Woolworths acts as agent for Endeavour Group when you buy liquor at woolworths.com.au or facilitates collection of BWS products via Pick Up or Direct to Boot. 4.2.3. Any personal information we hold is generally stored electronically in computers or cloud systems operated by us or by our service providers. VaHA: Visiting and Honorary Appointments; formerly referred to as Persons of Interest (POIs). 0000015182 00000 n financial services organisations for fraud prevention. ]9p~98\'7+}sovg"8d}G$ Take care. How can I correct my personal information? your personal information when you activate or use a telecommunication service we provide, or when we are otherwise required by law to collect personal information about you. 0000004314 00000 n The policy applies to all members of the University community who have been granted access to IT and information infrastructure, including but not limited to ANU staff, students, VaHAs, contractors and affiliated organisations. ERP and CRM System at Woolworths Limited The organization of Woolworths Limited faced quite a few challenges incorporating Acceptable Use Policy Defines acceptable use of equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information. 1. not limited to email address, phone number, physical address and date of birth) are reported. engage in any other activity that does not comply with the general principles presented above. have a lasting effect and can take years to, possible to protect the information of our. endobj Fax machines: Any department or individual utilizing fax machines to send information to others must comply with the Junk Fax Act of 2005 (https://www.congress.gov/bill/109th-congress/senate-bill/714) which, in part, stipulates that: 1. An official website of the United States government. In addition, NIST users should also be aware that it is often necessary to monitor network traffic or computer activity to ensure integrity, security or reliable operation of NIST systems. For example, this may include expert data companies (to help us understand our customers and business), businesses helping us improve data quality (such as Australia Post); print providers (to help with direct mail and card fulfilment); technology and software providers (who support our in-store, online and back-end systems); and payments providers. 4.2.4. Details on how to opt out of commercial electronic messages in relation to each Woolworths brand or program are contained within the terms and conditions for the relevant brand or program. balance on the gift card and its transaction history. All computing devices must be secured with a password-protected screensaver with the automatic activation feature set to 30 minutes or less. endobj If you would like to complain about a breach of the Australian Privacy Principles, you may contact our Privacy Office. We may ask you to put your complaint in writing and to provide relevant details. Members of the University community are permitted use of the Universitys IT and information infrastructure, unless explicitly denied use by the University, or under specific legislation. endobj For example, we may collect personal information from: Everyday Rewards Partners to confirm your membership of the loyalty program, e.g. If you have a cat or two you need a Litter Robot. Can I provide someone else's personal information to Woolworths? stores across, New South Wales, Queensland and Western Australia by 1930. Shopping with us: When you shop with us, including online, or browse our sites or apps: your contact details, delivery address, and loyalty card number, information about your orders and purchases, including what, how, and when you buy from us, we may ask for your ID, such as your drivers licence, if you purchase alcohol or tobacco or other forms of identification so that you can use certain services we provide, whether you have taken up or subscribed to any of our offerings such as clubs, subscriptions or loyalty programs, financial services products including insurance and credit cards or our apps, information about your online browsing behaviour on our internet sites and apps, including promotions you activated, as well as items you have added to your carts, information collected and held via our secure financial systems about the payment method you use for your purchases from us, like many websites, tracking technologies, such as "cookies", are used to obtain certain types of information such as application activities, current location of your device, type and version of your browser, your device ID and other device metrics when you visit our websites, apps or certain third parties websites or apps (see Cookies Statement for details), images and videos that you post online to facilitate our service provision or sales promotions. endobj The Acceptable Use Policy (AUP)has been implemented to ensure that your use of the services: is lawful; does not unreasonably impact other subscribers use of the services; and does not unreasonably impact Woolworths Mobile's ability to provide the service. 0000006913 00000 n The appropriate management should be consulted prior to export of any material that is in question. We may collect information from your current device using cookies or other technologies, including your online browsers or apps to protect your account security. ACCEPTABLE USE OF INFORMATION SYSTEMS POLICY | 1 We Always Do The Right Thing At Woolworths Group ("Woolworths") we aim to be Australia and New Zealand's most trusted brand. Use encryption of information in compliance with the Office of Information Technology Securitys Acceptable Encryption Use policy. Woolworths has opened its first store on Friday, 5 December 1924 in Sydney as a bargain basement store outlet. For security and network maintenance purposes, authorized individuals within Nicholls State University may monitor equipment, systems and network traffic at any time, per Information Technologys. If any local law conflicts with this Policy, the Policy will be interpreted as adjusted to comply with such law. ] MYA We may also collect personal information about you from third parties, as described in the Other sources section below. ^\g/GKhhu(`pQfJ,"HEVO.DC@'C!K* Unacceptable Use of NIST Information Technology Resources. Acceptable use of information technology policy, policy Acceptable use of information technology, Director, Information Technology Services. This term preplaces the previously use term of affiliate. NIST systems and any information on those systems are Government property. cNX #-R)@_T"Yk970 Authorised users are required to use IT and the end-to-end network responsibly, safely, ethically, and legally. and be vigilant when storing and sharing information regardless of its format. attempt to circumvent or subvert system or network security measures.