Bulletin Board - Review and Comment
Step 1 of 3: Comment on Document
There are 3 steps in the submission process. You must complete all three steps in one session, otherwise your comments will be lost.
1. Use this
icon to open a comment box.
2. Type your feedback and then click the"Save Comment" button in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments, go to step 2 by clicking on the “Save and Continue” button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity or if you close your browser or go to a different tab/window and try to come back.
To ensure that your comments are received:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time.
-
DO NOT leave your submission unfinished. If you need to take a break, submit your current set of comments now and return later to make a further submission. You will receive a copy of your comments so that you can see what you have already said.
-
DO NOT exit from the interface until you have completed all three steps of the submission process. Simply saving a comment in the comment box does not mean it is submitted and if you exit the system, you will not be able to retrieve it later.
When you finalise your submission in step 3 your comments will be emailed to the Document Author with a copy to you, and to policy@mq.edu.au for record keeping purposes.
(1) This Policy outlines the University’s Security Vulnerability disclosure program, which aims to provide a method for individuals and/or groups to notify the University of any identified or suspected security vulnerabilities within the University’s IT Resources or products. (2) This Policy applies to any individual and/or group with lawful access to Macquarie University’s (the University’s) IT Resources or products provided by the University. (3) The University is committed to maintaining a secure technology environment and as such, believes in the responsible disclosure of potential security vulnerabilities. By establishing an official reporting channel, the University aims to remediate security vulnerabilities and therefore decrease the likelihood of malicious exploitation. (4) To encourage responsible reporting, the University will not take legal action against an individual and/or group who reports a Security Vulnerability, so long as any actions undertaken are in accordance with the requirements of this Policy. (5) Any individual with access to the University’s resources or products must comply with Australian law, and not compromise or exploit the University’s Information, staff, infrastructure or operations. The following actions are not authorised, unless specifically authorised by the University: (6) Upon receiving a Security Vulnerability report, the University will: (7) A potential Security Vulnerability can be reported to cyber@mq.edu.au and should contain the following information (where possible): (11) The following definitions apply for the purpose of this Policy: Vulnerability Disclosure Policy
Section 1 - Purpose
Scope
Background
Section 2 - Policy
Reporting Protection
Unauthorised Conduct
Vulnerability Assessment & Mitigation
Top of PageSection 3 - Procedures
How to Report
Outcome
Top of PageSection 4 - Guidelines
Top of PageSection 5 - Definitions