All posts by admin

THE PRIVACY ACT IS CHANGING ON 22 FEBRUARY 2018

Why is the law changing?

From 22 February 2018 amendments to the Privacy Act 1988 will take effect and introduce a mandatory notification procedure for data breaches. Currently, there are no requirements to notify individuals affected by a data breach. There is a rising threat to the safety and privacy of personal information.

What are the changes?

The Act requires entities to notify individuals whose personal information is breached and the Australian Information Commissioner when an ‘Eligible Data Breach’ (EDB) occurs.

Who do the changes apply to?

The Notifiable Data Breach (NDB) scheme applies to agencies and organisations that the Privacy Act requires to take steps to secure certain categories of personal information. This includes Australian Government agencies, businesses and not-for-profit organisations with an annual turnover of $3 million or more, credit reporting bodies, health service providers, and TFN recipients.

What is an Eligible Data Breach?

The first step in deciding whether an eligible data breach has occurred involves considering whether there has been a data breach; that is, unauthorised access to or unauthorised disclosure of personal information, or a loss of personal information

Data breach response plan quick checklist

Privacy

 

 

https://www.oaic.gov.au/media-and-speeches/media-releases/mandatory-data-breach-notification-comes-into-force-this-thursday

SCHOOL COMPLIANCE MADE EASY

 tickit-schools

 

ENTERPRISE RISK MANAGEMENT – CONTRIBUTING TO A SAFE AND POSITIVE SCHOOL ENVIRONMENT

ISO 31000:2018 ‘Risk management – Principles and guidelines’ is the international standard that all businesses need to be utilising as a benchmark. Risks in Schools is highly regulated and is a rather complex concept which is comprised of several functions.

This can be done in 5 steps:

  1. Risk Identification
  2. Risk Analysis
  3. Risk Evaluation,
  4. Risk Monitor and Review
  5. Risk Reporting.

Identifying risks that can occur within your school is the first step in the Risk Management process. Risk Management Analysis and evaluation using a likelihood and consequence table will allow you to rank your risks. Risks that you identify, may have either a positive or negative impact on your school and will obviously vary from one school to another. Some risks may be common across all schools such as cybersecurity issues whereas other risks will be unique such as risks associated with Boarding Schools.

Schools can also identify controls to put in place that will minimize the likelihood of that risk occurring. The steps identified here will form your School Risk Framework.

Risk Management Process

 

 

SCHOOL COMPLIANCE MADE EASY

tickit-schools

Why On Demand?

The latest version of Tickit is delivered over the internet, on demand. The application is hosted on our fast and reliable servers and this presents our clients with several benefits:

 

There is no need to install any software on your servers or PCs, all you need is any standard internet browser like IE 6 or 7 and above or Mozilla Firefox 2.0 and above to use Tickit on demand.

 

  • Tickit on demand updates and upgrades can easily be deployed to your instance of Tickit saving your IT team time.

 

  • Tickit on demand is hosted professionally in a safe, scalable and fault tolerant environment. Data is partitioned into a per client database with strict access policies.

This means you have a simple, intuitive risk and compliance application that can very rapidly be deployed across your business.

Active Directory

Many clients do not know that Tickit On Demand has a security verification feature that allows us to confirm your userid and password with your own Active Directory environment. Whilst that may sound technical and difficult, all it really means is that users no longer need to remember different user ids and passwords for Tickit On Demand; you could just use the same ones that you currently use to access your network. This allows your own corporate security policy to apply to your Tickit On Demand access, and it means that Tickit On Demand users just need to remember a single user id and password.

If you want to know more about Active Directory Versification, please contact us for further details.

RMIA 2016

Tickit on Demand will be returning to the RMIA National Conference this year in Melbourne.

This year in Melbourne as a Bronze Event Partner!

We are also excited to be introducing the latest addition to our software line, Linus Revive: Business Continuity Management System.

If you are going to be attending the event make sure you pop down to our stand and say hi.

Let the countdown begin!

That’s A Wrap! – RMIA National Conference 2015

Tickit on Demand were once again honoured to be an exhibition partner at the RMIA National Conference 2015. Held in the beautiful city of Adelaide in South Australia, the event served as a great platform in the facilitation of knowledge sharing and networking with key risk management professionals across the Asia Pacific Region.  Many delegates and risk professionals from all around Australasia gathered  at the Adelaide Oval for a dynamic line up of key industry speakers and the best minds in the industry.

There was much interest in Tickit on Demand Exhibition among the conference delegates. We had the pleasure of giving a number of demos of the software, with considerable interest shown in the intuitiveness and ease of use of Tickit on Demand.

We would  like to say a big thank you to RMIA and the staff who organised the event. The conference a great success! We were delighted to meet many of the people there and we hope that  some of you will soon be apart of the Tickit on Demand family.

 

RMIA Blog Collage