Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.


Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.


Security procedure

Section 1 - Preamble

(1) This Procedure was approved by the Vice-Chancellor on 29 March 2004 and incorporates all amendments to 15 November 2011.

(2) This Procedure is pursuant to Regulation 6.1(2) - University Property.

Top of Page

Section 2 - Purpose

(3) This Procedure outlines the processes involved in accessing and utilising University security.

Top of Page

Section 3 - Scope

(4) This Procedure applies University-wide.

Top of Page

Section 4 - Policy

(5) Refer to Regulation 6.1(2) - University Property.

Top of Page

Section 5 - Procedure

(6) Security officers are based on all campuses of the University and will assist in providing staff, students and visitors with a safe environment, as specified on the Campus Services (Security) website.

(7) Security officers will attend functions or events where security is required, e.g. examinations. Heads of organisational units must submit a work request to Infrastructure, Property and Precincts no later than 2 working days before the event or function.

(8) The Security Manager, Facilities Services may approve the installation of closed-circuit television (CCTV) systems in special circumstances. The installation of a CCTV system must comply with legal requirements and University policy.

(9) The Head of Organisational Unit must submit a request for the installation of a CCTV system, or the installation of additional cameras to a current system, to the Security Manager, Facilities Services.

(10) Before installation, the Head of Organisational Unit must inform the users of a facility that CCTV will operate in the area. Appropriate signs must be placed at all entry points to a facility where CCTV is or will be operating.


(11) Deakin Card provides proof of employment and association with the University and is used for identification and other services such as photocopying, library borrowing and controlled access to secure areas.

(12) Deakin Security officers are authorised to request campus users to present their Deakin Card, failure to do so may result in being asked to leave the University premises.

Keys and access cards

(13) Heads of Organisational Units will designate staff in their areas who may approve the issue of keys and access cards for the area. They will forward the names of the staff to CO, and a list of the designated staff members will be placed on the CO (Keys/Access Cards) website.

(14) The Executive Director, Campus Operations will ensure that keys and access cards are available for collection within four (4) working days of the receipt of a request. If keys or access cards are not collected within thirty (30) days from the date of issue, the application will lapse.

(15) Staff and students must present their University identification card to CO when collecting keys or access cards.

(16) Staff or students must not obtain duplicate keys from external sources. If this occurs the matter will be dealt with under University disciplinary processes.

(17) Should any keys/access cards be lost or stolen, the key or access card holder's organisational unit is responsible for the cost of restoring security to the affected area, including the replacement of locks, keys and access cards.

(18) CO will install all new locks unless otherwise approved by the Security Services Manager, CSD or nominee. All locks must be keyed to a University or campus master key unless otherwise approved by the Security Services Manager, CSD or nominee.

(19) Requests for University or campus master keys require the approval of one of the following persons:

  1. Security Manager, CSD
  2. Executive Director, Campus Operations
  3. Chief Operating Officer
  4. Vice-Chancellor.
Top of Page

Section 6 - Definitions

(20) There are no definitions arising under this Procedure.