Client Relationship Information System for Service Providers

CRISSP

CRISSP

Conditons of Use Monitoring of Computer Services
Conditions of Use:

The computer system that you are using is provided by the Department for the conduct of community service organisation business. Your organisation has signed the CRIS(SP) Access Agreement which outlines the terms and conditions relevant to your access to CRISSP. It outlines the commitment by both parties to the implementation, operation and maintenance of the system.

As outlined in the CRIS(SP) Access Agreement, access to CRISSP is granted on the basis that:

  • Only registered and authorised persons do so.
  • Users only access computer systems, applications, databases or files for which they are authorised.
  • They are not used for any purpose that breaches any law or that infringes the civil rights of any person.
  • They are not used to store or distribute material that is defamatory, obscene, indecent, offensive, discriminatory or harassing.
  • Users do not damage these computer services, including knowingly uploading, opening a virus or other malicious code.
  • Private or confidential information is not shared with unauthorised people.
  • Private or confidential information is not copied, unless the information is subsequently protected in a manner appropriate to the sensitivity of the information.
  • Passwords and other authentication devices issued to provide access are kept secure to prevent unauthorised access.
  • Passwords are not written down where they may be accessible to an unauthorised user.
  • Breaches of security are reported at the earliest opportunity to the Workspace Support Systems Administration - ICCMS (systemsadministration@support.vic.gov.au).
Monitoring of Computer Services

The Department seeks to safeguard the integrity of your organisations data and prevent unauthorised access to that information. Measures taken towards this aim to prevent corruption of data, block unauthorised access to information, ensure the integrity of information, and to provide reasonable protection of private information in our possession.

This includes monitoring and auditing network traffic to identify unauthorised attempts to upload or change information or otherwise damage its computer systems. Industry-standard software is also used to control access to specific applications and services and to protect data that is transmitted electronically over the Internet.

 

 
CRISSP Login

Username Password

By logging in you accept the conditions of use

> Click here if you have forgotten your login details