we are online and ready to help. not limited to email address, phone number, physical address and date of birth) are reported. Making fraudulent offers of products, items, or services originating from any Nicholls State University account. Authorised user: a person who has been granted access to all or part of the information infrastructure of the University by a responsible officer, as defined in the Information Infrastructure and Services Rule. Access to NIST information technology resources requires formal written authorization by a user's manager. 3. 3.2 Final Project Milestone Two. 2. 0000005339 00000 n %PDF-1.4 Analysis and reporting: To understand the preferences and shopping patterns of our customers and to produce other insights about our performance. 0000026127 00000 n ACCEPTABLE USE OF INFORMATION SYSTEMS POLICY | 1 We Always Do The Right Thing At Woolworths Group ("Woolworths") we aim to be Australia and New Zealand's most trusted brand. <> VaHA: Visiting and Honorary Appointments; formerly referred to as Persons of Interest (POIs). Use encryption of information in compliance with the Office of Information Technology Securitys Acceptable Encryption Use policy. System owners are a Service Division Director or an equivalent management position. An acceptable use policy outlines what an organization determines as acceptable use of its assets and data, and even behavior as it relates to, affects, and reflects the organization. All employees, contractors, consultants, temporary, and other workers at Nicholls State University and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with Nicholls State University policies and standards, and local laws and regulations. The use of NIST systems and networks in a manner which is unacceptable may subject the person(s) involved to loss of all privileges to use NIST systems, may result in other disciplinary sanctions up to and including dismissal, or may result in criminal prosecution. However, before we provide you with access to your personal information we may require verification of proof of identity. Read here for a copy of our previous Privacy Policy (that was effective 28 June 2021 to 20 December 2022). Like most businesses, we work with third parties so we can provide you with better experiences. We also collect demographic information, if you choose to provide it, to support our diversity and inclusion goals. <>stream Secure .gov websites use HTTPS Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of Nicholls State University. Sending bulk email: Any department or individual utilizing University resources to send email advertising or promoting a commercial product or service must conform to the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (otherwise known as CAN-SPAM (https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business ). 12. 0000001448 00000 n 8 0 obj This requirement does not apply to NIST software where the software usage license allows for free public distribution. Woolworths Group acknowledges the many Traditional Owners of the lands on which we operate, and pay our respects to their Elders past and present. CRICOS Provider : 00120C 1.1 Objective The purpose of this policy is to define the accepted practices and responsibilities associated with the correct usage of Trust information systems. Some examples include the use of NIST IT resources that contain or promote (a) matters directed toward the success or failure of a political party, candidate for partisan political office, or partisan political group, (b) engaging in any action supportive of lobbying the Congress, (c) use of Internet sites that result in an unauthorized charge to the Government, (d) participating in prohibited activities such as discriminatory conduct, gambling, and disseminating chain letters, (e) intentional and unauthorized viewing of sexually explicit or pornographic material, (f) sending personal e-mail that might be construed by the recipient to be an official communication, (g) any activity that would bring discredit on NIST or the Department of Commerce, (h) statements viewed as harassing others based on race, age, creed, religion, national origin, color, sex, handicap, or sexual orientation, (i) any violation of statute or regulation; The unauthorized sharing of NIST-owned software or any other NIST information not authorized for disclosure or use by others with anyone not specifically authorized to receive such software or information. 0000004411 00000 n 3 0 obj 8. Use of unsolicited email originating from within Nicholls State Universitys networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise, any service hosted by Nicholls State University or connected via Nicholls State Universitys network. Sharing of accounts and passwords or authorization methods is prohibited, except in special cases such as e-mail accounts for the operation of special services supported by a team of people. use university systems for commercial purposes, such as using electronic mail to circulate advertising for products. This policy and related documents draw their authority from the, Acceptable use is defined as activities undertaken in the course of performing the functions of the University, as specified by the. customers, Team Members and organisation. Acceptable Use of Information Systems Policy At Woolworths Group ("Woolworths") we aim to be Australia and New Zealand's most trusted brand.Strong customer trust helps Woolworths build, attract and retain customers, maintain a reputation for providing valuable products and services. General access to public NIST information technology resources, such as Web, bulletin boards, public anonymous ftp, Mosaic, gopher, or other services used by NIST to disseminate information to the public requires no special authorization. emails and SMS), by. Casual reading of e-mail messages addressed to others is prohibited. engage in any other activity that does not comply with the general principles presented above. Woolworths Group is proud to have 372,000 shareholders, many of whom are everyday mum and dad investors. %PDF-1.7 Yes, you may provide someone elses personal information to us, for example. 0000015182 00000 n Users shall not reveal to or allow use of their accounts or passwords by others, including family members. (PDF). A breach of customer trust can result in harmful business consequences . ) or https:// means youve safely connected to the .gov website. Does Woolworths share personal information overseas? Information infrastructure: includes the buildings, permanent installations, information services, fixtures, cabling, and capital equipment that comprises the underlying system within or by which the University: Integrated Communication Network (ICN): the University network infrastructure including the following network sites Acton Campus, ANU UniLodge, Hume Library Store, Gowrie Hall, Mount Stromlo Observatory, Siding Spring Observatory, North Australia Research Unit, University House Melbourne, ANU Medical School remote sites and hospitals, and ANU Exchange sites. If we do not collect the information, we may not be able to provide these things. Verified answer. Communication: To send you offers and other communications that may be of interest to you. Woolworths Detailed assessment A Governance and. To establish the standards of acceptable use of the Universitys information technology (IT) and information infrastructure, and end-to-end network by authorised users. You can access or correct your personal information on your online profile via your online account at any time. An Acceptable Use Policy not enforced with appropriate systems relying on the end user alone to do the right thing, affords little protection. Acceptable use is always ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. At a minimum, you should be able to identify the original source of the software and validate that you can locate and communicate with the author or company to discuss problems that might arise. Purpose What kinds of personal information does Woolworths collect and hold and how does Woolworths collect it? for security and fraud prevention. The Acceptable Use Policy (AUP)has been implemented to ensure that your use of the services: is lawful; does not unreasonably impact other subscribers use of the services; and does not unreasonably impact Woolworths Mobile's ability to provide the service. 7*:6. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals' rights to privacy and to freedom from intimidation and harassment. 0000006913 00000 n Details on how to opt out of commercial electronic messages in relation to each Woolworths brand or program are contained within the terms and conditions for the relevant brand or program. Standard https://www.nist.gov/director/nist-policy-information-technology-resources-access-and-use-0, Originally Posted: October 8, 1998 Updated: February 21, 2003 Updated: October 2003 CIO Approved: October 10, 2003. 1 0 obj we validate addresses with Australia Post to improve your delivery experience. Limited personal use of University IT is acceptable, however access can be revoked at any time and is subject to the same monitoring practices as employment related use. Acceptable Use of Information Technology Resource Policy Information Security Policy Security Awareness and Training Policy Identify: Risk Management Strategy (ID.RM) ID.RM-1 Risk management processes are established, managed, and agreed to by organizational stakeholders. 2023 Virginia Polytechnic Institute and State University. . . .. Overcoming resistance to change the way of working: . Possible Leadership in supermarket industry: . . Australian Woolworths Limited is the well-established retail company leading in the, supermarket industry. 1 0 obj The general criteria used in deciding acceptable use are whether the application is of benefit to NIST, whether it complies with government laws and regulations, and whether it does not adversely affect others. When using University resources to access and use the Internet, users must realize they represent the University. Using a Nicholls State University computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws in the users local jurisdiction. 0000004816 00000 n 4.2.7. 0000023197 00000 n Shopping with us: When you shop with us, including online, or browse our sites or apps: your contact details, delivery address, and loyalty card number, information about your orders and purchases, including what, how, and when you buy from us, we may ask for your ID, such as your drivers licence, if you purchase alcohol or tobacco or other forms of identification so that you can use certain services we provide, whether you have taken up or subscribed to any of our offerings such as clubs, subscriptions or loyalty programs, financial services products including insurance and credit cards or our apps, information about your online browsing behaviour on our internet sites and apps, including promotions you activated, as well as items you have added to your carts, information collected and held via our secure financial systems about the payment method you use for your purchases from us, like many websites, tracking technologies, such as "cookies", are used to obtain certain types of information such as application activities, current location of your device, type and version of your browser, your device ID and other device metrics when you visit our websites, apps or certain third parties websites or apps (see Cookies Statement for details), images and videos that you post online to facilitate our service provision or sales promotions. These rules are in place to protect the employee and Nicholls State University. to convert Everyday Rewards points to your Qantas membership, information service providers to improve data quality e.g. Acceptable Use of NIST Information Technology Resources. Creating or forwarding chain letters, Ponzi or other pyramid schemes of any type. RATs are available at most major supermarkets (such as Woolworths or Coles) or chemists/pharmacies (such as Chemist Warehouse or Priceline). Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam). If you have any questions regarding its contents, we invite you to contact our Privacy Office, the contact details for which are contained in Section 18 below. use computer programs to decode passwords or access control information. 0000003172 00000 n The Australian National University, Canberra Protect Woolworths customers, team members and business information from misuse and loss. Examples of acceptable communications include: Disseminating appropriate information related to NIST mission topics electronically to our customers in industry, government, universities, and the public around the world; Communicating by electronic mail or other means with research colleagues, customers, other government agencies, and vendors for purposes of NIST business; Accessing public information available on the Internet, or elsewhere, related to NIST research and the mission of NIST; Obtaining software patches, and updates from vendors, public domain software repositories, and other sources, provided such software is obtained, checked and tested, and installed in accordance with U.S. copyright regulations, the license for that software, and NIST security policies; Participation in forums, news groups, and other information exchanges for the purpose of furthering the NIST mission or improving the professional knowledge or skills of NIST staff. % ?O~v[]N1k=~/e|5iL3:MUXgo.,;U/Pjine8?kUE8D.%xI^Bld_+2;0]<==OS)z with service providers who offer us operational and technical assistance to help us run our business. All computer and network systems that utilize University resources are also governed by the policies of the University (https://ocio.osu.edu/assets . 0000004525 00000 n We primarily collect, hold and use your personal information to provide services, or to promote and sell goods and services that you have requested, or which we think may be of interest to you. Every individual using these systems and services is expected to know and follow this standard. Revealing your account password to others or allowing use of your account by others. The sender obtained the fax number through voluntary communication from the recipient or from an Internet directory or site to which the recipient voluntarily made the fax number available for public distribution. with related bodies, business units and brands within the Woolworths Group. <> (b) whether the information or opinion is recorded in a material form or not. 0000001593 00000 n We may conduct auditing and monitoring of transactions and financial engagement. An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. This term preplaces the previously use term of affiliate. PDF DOC Acquisition Assessment Policy 0000003788 00000 n Regardless of whether you opt-out of any or all commercial electronic messages, you will still receive information we are required by law to provide to you or service-based communications. Do you collect my sensitive information? We remain committed to actively contributing to Australias reconciliation journey through listening and learning, empowering more diverse voices and working together for a better tomorrow. We may also collect, hold and use your personal information for: Managing your online shopping accounts: To fulfil your online orders and maintain your accounts on our websites and apps. 0000005886 00000 n +#4|T" See policy 7000 for further information. Inside Nicholls State University is a weekly email newsletter that is distributed to the campus community communicating Nicholls News and Events. What is covered by this Privacy Policy? Such materials do not necessarily reflect the attitudes, opinions, or values of the Commonwealth of Virginia, Virginia Tech, its faculty, staff, or students. 17. Personal information information to which Under privacy laws, Woolworths Limited has Anyone with access to the you have access, with a number of obligations concerning personal Woolworths Limited Information any person who is information it collects from individuals, such as our customers. How can I access my personal information? You must ensure through legal or technical means that proprietary information is secured and protected. 7e"_W+|e"_W+Y?((? Fglt68 Fglt68Y. Acceptable use is always ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. have a lasting effect and can take years to, possible to protect the information of our. endobj Investigation: To assist in responding to your complaints or enquiries and to undertake investigations. 5 0 obj A central destination where you can learn all about how your personal information is handled under the Woolworths Group Privacy Policy. You must not use the service in order to transmit, distribute or store material: engage in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files or making unauthorized modifications to university data. Woolworths has opened its first store on Friday, 5 December 1924 in Sydney as a bargain basement store outlet. We use your personal information to show you relevant advertising from us and third parties. Endeavour Group, in order for Woolworths to provide services to BWS, such as when Woolworths acts as agent for Endeavour Group when you buy liquor at woolworths.com.au or facilitates collection of BWS products via Pick Up or Direct to Boot. You must have their consent beforehand and we may ask you to provide evidence of that consent. Download Acceptable Use Of Information Systems Policy Woolworths doc. b. An official website of the United States government. Violations of Nicholls State University, University of Louisiana System, or Board of Regents policies, or local, state, or federal laws. for in-app notifications and advertising on certain websites and social media, by adjusting your device setting or online privacy settings. For example, we need to provide your address to delivery providers who fulfil your online orders, and we need to pass on your order details to Everyday Market Partners who sell products on Everyday Market. Definitions Acceptable Use is the use of information assets (IA) and information technology (IT) resources that is expressly permitted by Bentley University. use only legal versions of copyrighted software in compliance with vendor license requirements. <> c. Abide by applicable laws and regulations. Examples of authorized access to systems include: Access to NIST systems and networks from off-site locations for users with specific needs for such types of access, such as access when on travel or from home; Access to academic, government, and industrial computer systems for accomplishing joint projects, where that access is authorized by the owner; Access to academic computing facilities for taking courses. We may need your real name and a valid ID for specific purposes or where we are required to ask by law. 0000009585 00000 n If you would like more information about how we may, or may not, send you commercial electronic messages, including in relation to specific Woolworths Group brands or programs, please see the terms and conditions of each of those Woolworths Group brands or programs. This includes services intended for public use. acceptable use policy (AUP): An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. We are on a mission to deliver the best in convenience, value and quality for our customers. Disclosures between our secure financial systems that allow your service. A locked padlock This Privacy Policy is current from 21 December 2022. We also need to pass on your personal information to third parties that provide services that you request, for example, the insurers who underwrite Woolworths Insurance, and Telstra which provides you with your Woolworths Mobile service. "The . To ensure accountability of actions and resources, each person who has access to a NIST information technology system must have an individual account. students, faculty and staff are responsible for seeing that these information systems are used in an effective, efficient, ethical and lawful manner. Solicitation of email for any other email address, other than that of the posters account, with the intent to harass or to collect replies. Fax machines: Any department or individual utilizing fax machines to send information to others must comply with the Junk Fax Act of 2005 (https://www.congress.gov/bill/109th-congress/senate-bill/714) which, in part, stipulates that: 1. We may collect information from your current device using cookies or other technologies, including your online browsers or apps to protect your account security. protect your user name and system from unauthorized use. Postings by employees from a Nicholls State University email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Nicholls State University, unless posting is in the course of business duties.d not necessarily those of Nicholls State University, unless posting is in the course of business duties. Nicholls State University proprietary information stored on electronic and computing devices whether owned or leased by Nicholls State University, the employee or a third party, remains the sole property of Nicholls State University. Each Woolworths Group brand and program sends different service-based communications (such as communications relating to terms and conditions, your account or your orders). ABN : 52 234 063 906, Information generated and received by ANU staff in the course of conducting business on behalf of ANU is a record and should be captured by an authorised recordkeeping system. Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of pirated or other software products that are not appropriately licensed for use by Nicholls State University. Members of the University community are permitted use of the Universitys IT and information infrastructure, unless explicitly denied use by the University, or under specific legislation. x]n}W9rx A 3$ Bu-]E=eHUut?wh_~T|gu_~}Q&9uNC_^|s3hcN^wglk~w=u]~>||GxS_bJ^x6BS8xw4Bi/^S?KQ#B)OT{m@Ikq?0>[B171+*=s'9A9 f2>w09YC3J^f PI>QLX*gBMWj;8_]4%W5L==[4Nj:75TDx"pb:8 ERP and CRM System at Woolworths Limited The organization of Woolworths Limited faced quite a few challenges incorporating An Acceptable Use Policy is an important document that can demonstrate due diligence with regards to the security of your IT network and the protection of sensitive data in the event of a breach or regulatory audit.