Glossary

  • Adobe Flash

    Adobe Flash is software designed to view multimedia contents. Click to learn more about Adobe Flash

  • Class 1 data: Public

    Examples:

    • Course description / synopsis
    • Published papers
    • Information on public website
  • Class 2 data: University internal

    Examples:

    • Teaching materials (PowerPoint, Word, recorded lectures, etc)
    • Unpublished research data
    • Non-sensitive and de-identified research data
    • Normal business administration records

    If you are unsure if a piece of data is Class 3 or Class 2, ask yourself:

    • If the data were to be exposed to major media, would it hurt the reputation of yourself, your work/research unit, or the University?
    • Would an exposure violate University policies, privacy laws, or other laws and regulations?
    • Would unauthorised exposure to a malicious person be detrimental to the success of your work?
    • Would you suffer a significant setback for your work if the data was lost permanently?
    • Does the data contain personal or personally identifiable data?

    If the answer to any of the questions is 'YES' then consider the data Class 3.

  • Class 3 data: Confidential

    Examples:

    • Personally identifiable data (TFN, home address, phone number, DOB, etc)
    • Credit card data
    • Medical records and patient data
    • Student academic records

    If you are unsure if a piece of data is Class 3 or Class 2, ask yourself:

    • If the data were to be exposed to major media, would it hurt the reputation of yourself, your work/research unit, or the University?
    • Would an exposure violate University policies, privacy laws, or other laws and regulations?
    • Would unauthorised exposure to a malicious person be detrimental to the success of your work?
    • Would you suffer a significant setback for your work if the data was lost permanently?
    • Does the data contain personal or personally identifiable data?

    If the answer to any of the questions is 'YES' then consider the data Class 3.

  • Class 4 data: Restricted

    Example:

    • Classified defence research

    • Identifiable medical data

    • Data protected under the US Government HIPPA

    • Data protected under the Australian Government DISP

  • Domain name

    A website’s ‘domain name’ refers to everything before the first / in the website’s address. In the following example:

    'www.xyzbank.com'  is the domain name as it comes before the first /

  • Encryption

    Protect your data from prying eyes with the use of encryption.

    Encryption protects your data from eavesdroppers by using a key (or password) which is used to scramble the data. Scrambled data is unreadable to anyone that doesn’t know the password. 

    When using encryption it’s important to make sure you don’t forget the password. Encrypted data is unrecoverable without the originating password. Use encryption at your own risk. At present, Information Technology and Digital Services does not provide support for encryption options.

  • Foxit Reader

    Foxit Reader is a PDF reader that allows you to comments on PDF on documents.

  • Java

    Java is a programing language that produces software for multiple platforms.

  • Personally identifiable information

    Personally identifiable information is any part of someone’s personal details which can be used to identify them as an individual. This can include information such as birth date, home address, phone number, driver’s license number, Medicare number. Criminals often target this information in an attempt to commit identity theft. It is important that personally identifiable information is safeguarded to ensure it does not end up in the wrong hands.

  • Postgraduate research students

    Postgraduate Research Students include students in a PhD or Masters by Research Program, and are currently active in the program, or on leave of absence, or within 12 months of completing the program.

  • Proceed with caution

    • Only use when external collaboration is required
    • Consider additional security such as encryption
    • Share by permissions (avoid using links that can be passed on)
    • Disable synchronisation
    • If in doubt, consult Information Technology and Digital Services
  • Public wifi hotspots

    A public wifi hotspot is a wireless internet connection you can use in a public place. They often appear in fast-food eateries, coffee shops, hotels and in central business districts. Care should be taken when using the public wifi hotspots as they offer no protection from eavesdroppers. If you must login to a website (such as your bank) whilst connected to a public hotspot, ensure the web page address begins with https://

  • Secure connection

    A secure connection prevents eavesdroppers from viewing your traffic as it travels across the World Wide Web. Every time you submit personal information - such as your password or banking details - you should check to make sure the web address begins with https:// . All University web pages that ask for personal information will provide a secure connection.

  • Sensitive data

    Sensitive data is any private information that would cause damage either to the University or individual if it were disclosed to the public. Examples of sensitive data include, but are not limited to personally identifiable information, medical and health information, student records, financial information, intellectual property, research data.

  • Staff members

    Staff include staff employed by the University of Adelaide, including

    • continuing academics
    • researchers
    • professional staff
    • fixed term contract holders
    • casuals
    • title holders
  • Students

    Students include undergraduate, postgraduate coursework and honours students.

  • University-managed computer

    Managed computers are those which have been purchased by the University and have the University's standard operating environment (SOE) installed. Apple Macintosh computers are not managed from a security standpoint at present.

  • Visitors

    Visitors include people not paid by The University of Adelaide, who are engaged for an activity within a business area, including contractors, visiting academics or volunteers.