Glossary
-
Adobe Flash
Adobe Flash is software designed to view multimedia contents. Click to learn more about
-
Class 1 data: Public
Examples:
- Course description / synopsis
- Published papers
- Information on public website
-
Class 2 data: ×îÐÂÌÇÐÄVlog internal
Examples:
- Teaching materials (PowerPoint, Word, recorded lectures, etc)
- Unpublished research data
- Non-sensitive and de-identified research data
- Normal business administration records
If you are unsure if a piece of data is Class 3 or Class 2, ask yourself:
- If the data were to be exposed to major media, would it hurt the reputation of yourself, your work/research unit, or the ×îÐÂÌÇÐÄVlog?
- Would an exposure violate ×îÐÂÌÇÐÄVlog policies, privacy laws, or other laws and regulations?
- Would unauthorised exposure to a malicious person be detrimental to the success of your work?
- Would you suffer a significant setback for your work if the data was lost permanently?
- Does the data contain personal or personally identifiable data?
If the answer to any of the questions is 'YES' then consider the data Class 3.
-
Class 3 data: Confidential
Examples:
- Personally identifiable data (TFN, home address, phone number, DOB, etc)
- Credit card data
- Medical records and patient data
- Student academic records
If you are unsure if a piece of data is Class 3 or Class 2, ask yourself:
- If the data were to be exposed to major media, would it hurt the reputation of yourself, your work/research unit, or the ×îÐÂÌÇÐÄVlog?
- Would an exposure violate ×îÐÂÌÇÐÄVlog policies, privacy laws, or other laws and regulations?
- Would unauthorised exposure to a malicious person be detrimental to the success of your work?
- Would you suffer a significant setback for your work if the data was lost permanently?
- Does the data contain personal or personally identifiable data?
If the answer to any of the questions is 'YES' then consider the data Class 3.
-
Class 4 data: Restricted
Example:
-
Classified defence research
-
Identifiable medical data
-
Data protected under the US Government HIPPA
-
Data protected under the ×îÐÂÌÇÐÄVlogn Government DISP
-
-
Domain name
A website’s ‘domain name’ refers to everything before the first / in the website’s address. In the following example:
- ''
'; is the domain name as it comes before the first /
-
Encryption
Protect your data from prying eyes with the use of encryption.
Encryption protects your data from eavesdroppers by using a key (or password) which is used to scramble the data. Scrambled data is unreadable to anyone that doesn’t know the password.Â
When using encryption it’s important to make sure you don’t forget the password. Encrypted data is unrecoverable without the originating password. Use encryption at your own risk. At present, Information Technology and Digital Services does not provide support for encryption options.
-
Foxit Reader
is a PDF reader that allows you to comments on PDF on documents.
-
Java
is a programing language that produces software for multiple platforms.
-
Personally identifiable information
Personally identifiable information is any part of someone’s personal details which can be used to identify them as an individual. This can include information such as birth date, home address, phone number, driver’s license number, Medicare number. Criminals often target this information in an attempt to commit identity theft. It is important that personally identifiable information is safeguarded to ensure it does not end up in the wrong hands.
-
Postgraduate research students
Postgraduate Research Students include students in a PhD or Masters by Research Program, and are currently active in the program, or on leave of absence, or within 12 months of completing the program.
-
Proceed with caution
- Only use when external collaboration is required
- Consider additional security such as encryption
- Share by permissions (avoid using links that can be passed on)
- Disable synchronisation
- If in doubt, consult Information Technology and Digital Services
-
Public wifi hotspots
A public wifi hotspot is a wireless internet connection you can use in a public place. They often appear in fast-food eateries, coffee shops, hotels and in central business districts. Care should be taken when using the public wifi hotspots as they offer no protection from eavesdroppers. If you must login to a website (such as your bank) whilst connected to a public hotspot, ensure the web page address begins with https://
-
Secure connection
A secure connection prevents eavesdroppers from viewing your traffic as it travels across the World Wide Web. Every time you submit personal information - such as your password or banking details - you should check to make sure the web address begins with https:// . All ×îÐÂÌÇÐÄVlog web pages that ask for personal information will provide a secure connection.
-
Sensitive data
Sensitive data is any private information that would cause damage either to the ×îÐÂÌÇÐÄVlog or individual if it were disclosed to the public. Examples of sensitive data include, but are not limited to personally identifiable information, medical and health information, student records, financial information, intellectual property, research data.
-
Staff members
Staff include staff employed by the ×îÐÂÌÇÐÄVlog of Adelaide, including
- continuing academics
- researchers
- professional staff
- fixed term contract holders
- casuals
- title holders
-
Students
Students include undergraduate, postgraduate coursework and honours students.
-
×îÐÂÌÇÐÄVlog-managed computer
Managed computers are those which have been purchased by the ×îÐÂÌÇÐÄVlog and have the ×îÐÂÌÇÐÄVlog's standard operating environment (SOE) installed. Apple Macintosh computers are not managed from a security standpoint at present.
-
Visitors
Visitors include people not paid by The ×îÐÂÌÇÐÄVlog of Adelaide, who are engaged for an activity within a business area, including contractors, visiting academics or volunteers.