acceptable use of information systems policy woolworths

ABN 88 000 014 675. 0000004314 00000 n use another person's system, user name or credentials, password, files, or data without permission. Woolworths Group (referred to as Woolworths, we or us) includes Woolworths Group Limited ABN 88 000 014 675 and its subsidiaries. To support its core activities of teaching and research, the University is responsible for: ensuring the security, integrity, accessibility, authority, and fitness of the Universitys IT and information infrastructure, providing users with relevant legal information regarding the use of IT and information infrastructure, ensuring software used by the University is licensed in accordance with the, providing infrastructure networks to meet the information access needs of the University, and to enable collaboration with external, local, national and international rese, allow access to the information infrastructure or end-to-end network to unauthorised users, use another users credentials, masquerade as, or represent, another user, intentionally connect compromised or unapproved devices, or communication equipment to the Universitys information infrastructure or end to end network, use IT, information infrastructure, or the end-to-end network to harass, threaten, defame, libel, or illegally discriminate, create, transmit, access, solicit, or knowingly display or store electronic material that is offensive, disrespectful, or discriminatory, as identified under the, modify or remove University information without authority to do so. This policy does not apply to the personal information of our team members (employees and contractors) in their capacity as such, other than in the context described in Section 11. 2023 | A2Z Pte.Ltd. Make sure anti-virus software is installed, set to auto-protect, and maintained with current anti-virus definitions before installing any software on NIST computers. In addition to University discipline, users may be subject to criminal prosecution under federal, state or local laws; civil liability; or both for unlawful use of any IT System. Users must follow the guidelines established by the NIST IT Security Office when downloading software from the Internet: Only install software that will be used for work-related functions. 8. Endeavour Group (comprising Endeavour Group Limited and its subsidiaries including BWS) was part of the Woolworths Group prior to July 2021 but is no longer related to Woolworths Group and has its own privacy policy, accessible on Endeavour Groups website. Virginia Tech disclaims any responsibility and/or warranties for information and materials residing on non-university systems or available over publicly accessible networks. For example, we may collect personal information from: Everyday Rewards Partners to confirm your membership of the loyalty program, e.g. System owner: the senior member of staff with delegated responsibility for information assets, including defined responsibilities for the security of the data, information and application component of the asset, determining appropriate classification of information, defining access rights, the implementation and operation of enterprise systems, and ensuring that information asset risk is identified and managed. use resources only for authorized purposes. 0000019643 00000 n This includes family and other household members when work is being done at home. 0000008558 00000 n Permission for members of the University community to use the Universitys IT and information infrastructure is contingent on compliance with this policy. What is covered by this Privacy Policy? Introducing honeypots, honeynets, or similar technology on the Nicholls State University network.

Summer Wells Address Rogersville Tn, Articles A

acceptable use of information systems policy woolworths

No comments yet. Why don’t you start the discussion?

acceptable use of information systems policy woolworths