State Government of Victoria, Department of Human Services  State Government of Victoria
Client Relationship Information System for Service Providers
Conditons of Use Monitoring of Computer Services
Conditions of Use:

The computer system that you are using is provided by the Department of Human Services for the conduct of Community Service Organisation business. Your organisation has signed the CRISSP Heads Of Agreement which outlines the terms and conditions relevant to your access to CRISSP. As outlined in the Heads of Agreement, access to CRISSP is granted on the basis that:

  • Only registered and authorised persons do so.
  • Users only access computer systems, applications, databases or files for which they are authorised.
  • They are not used for any purpose that breaches any law or that infringes the civil rights of any person.
  • They are not used to store or distribute material that is defamatory, obscene, indecent, offensive, discriminatory or harassing.
  • Users do not damage these computer services, including knowingly uploading, opening a virus or other malicious code.
  • Private or confidential information is not shared with unauthorised people.
  • Private or confidential information is not copied, unless the information is subsequently protected in a manner appropriate to the sensitivity of the information.
  • Passwords and other authentication devices issued to provide access are kept secure to prevent unauthorised access.
  • Passwords are not written down where they may be accessible to an unauthorised user.
  • Breaches of security are reported at the earliest opportunity to the SRM/CRM Application Support - Agency Application Support (
Monitoring of Computer Services

The Department of Human Services seeks to safeguard the integrity of your organisations data and prevent unauthorised access to that information. Measures taken towards this aim to prevent corruption of data, block unauthorised access to information, ensure the integrity of information, and to provide reasonable protection of private information in our possession.

This includes monitoring and auditing network traffic to identify unauthorised attempts to upload or change information or otherwise damage its computer systems. Industry-standard software is also used to control access to specific applications and services and to protect data that is transmitted electronically over the Internet.



Username Password

By logging in you accept the conditions of use

> Click here if you have forgotten your login details

> Click here for help

For information relating to this page contact:
Site authorised by: Manager, SRM/CRM Application Support

Last Updated: February 18, 2014
Copyright | Disclaimer | Privacy Statement | State Government of Victoria Home | Search DHS