Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) Computer systems and software are vital to the academic, research and business processes of the University. (2) This policy formalises the approval processes required to implement or significantly change computer systems within the University. It is not intended to cover one-off proposals for personal computer based systems and software. Having a single formalised implementation process allows the University to ensure the most efficient, effective solutions are used; to prevent multiple systems being purchased with overlapping functionality; and to ensure that the usual controls put in place by ITDS are not accidentally circumvented or ignored. (3) This policy is to be read in conjunction with the following University policies: (4) The following definitions apply for the purpose of this policy. (5) To ensure that University computer systems and software appropriately reflect the confidentiality, integrity and availability of the data they manage, it is essential that new computer systems and software, or significant changes to existing systems, are evaluated for compliance with legislation, strategic alignment, University policies, the security and technical environments, and will not cause conflicts with active or pending systems [Ref. ISO 27002 sections 7.2.1, 8.1, 12.1.2, 12.5]. Any capacity or load demands placed on University IT Resources by the new or changed computer system(s) must also be assessed and priced as part of the approval process. (6) The University must also ensure that systems and software projects are sustainable in terms of the strategic value and operational costs of implementation, as well as ongoing use and maintenance (including licensing, service, or support). The University has limited resources to support computer systems and must ensure that proposals and projects are properly scoped and funded, and fit in to overall University priorities. (7) All computer systems documenting University business are required to comply with the State Records Act 1998, including the standard on digital recordkeeping. (8) All computer systems must comply with Privacy Legislation and University's Privacy Policy. (9) Staff, or committees, who identify a need for new or improved IT Resources, should contact the Service Desk to be connected with an Information Technology Relationship Manager (ITRM), who will provide advice, assistance and relevant templates to system proposers throughout the proposed project. (10) ITDS staff assess individual computer system proposals through a prioritisation process in the context of: (11) Staff requesting a new or improved computer system, in collaboration with an ITRM, will develop an Outline Business Case for justification and assessment in the prioritisation process. (12) Staff implementing a new or improved computer system or service: (14) This policy is to be read in conjunction with the following acts and processes: (15) This policy makes reference to the International Standard for Information Security, AS/NZS ISO/IEC 27002, which can be accessed under "Standards On-line Premium (SAI Global)" via the alphabetical listing in the e-Resources section of the University Library.Computer Systems Implementation Policy
Section 1 - Purpose and Context
Section 2 - Definitions
Top of PageSection 3 - Policy Statement
Section 4 - Procedures
Top of PageSection 5 - Guidelines