Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) The purpose of this policy is to protect the reputation and assets of Charles Sturt University (the University) from fraudulent and corrupt activities. (2) This policy establishes a fraud and corruption control system (FCCS) consistent with the Australian Standard on Fraud and Corruption Control (AS 8001:2021). The policy provides guidance on how to prevent, detect and respond to incidents of fraud and corruption and: (3) This policy applies to the University community, which for the purpose of this policy includes all staff, students, customers, contractors, business associates, partners, external service providers, volunteers and controlled entities of the University. (4) This policy should be read in consideration of the University’s Risk Management Policy. (5) The reporting and investigation of any allegations of fraud or corruption are dealt with under the Public Interest Disclosure (Whistleblowing) Policy and associated processes. (6) Research, academic and general misconduct by staff and students will be dealt with under the relevant policy instruments such as the Research Integrity Complaints Management Procedure and the Student Misconduct Rule 2020. (7) Disciplinary matters in relation to staff are dealt with in accordance with the provisions of the prevailing Charles Sturt University Enterprise Agreement. (8) Charles Sturt University has zero tolerance for fraud and corruption. (9) The University Council acknowledges and accepts overall accountability for controlling the University’s fraud and corruption risks. (10) The University recognises that fraud and corruption can create reputational and financial damage to the University, undermine public confidence and damage staff and student productivity and morale. Fraud and corruption are incompatible with the values of the University and present a risk to the achievement of our objectives and provision of our services to all our stakeholders. (11) The University recognises that laws prohibit fraud and corruption in Australia and in countries where the University has operations and/or engages in activities, with significant penalties (including imprisonment) and fines that can be imposed on the persons who commit such offences and on the University itself. Key laws are emphasised in policies and procedures related to the relevant University operations and activities. (12) The University recognises that the risk of fraud and corruption can arise in various contexts and will put in place measures proportionate to the risks it faces in order that the University community is aware and understands the relevant policies and procedures for the prevention, detection and response to fraud and corruption. (13) To demonstrate this commitment the University, through the Vice-Chancellor and Executive Leadership Team, will ensure: (14) This policy is one element of a suite of practices in place across the University that reinforce the University’s values. These values aim to guide our behaviour and way of working to help us achieve our ethos of respectfully knowing how to live well in a world worth living in. (15) The University’s framework of ethical conduct includes but is not limited to: (16) Supporting the University’s commitment to an observable ethical culture, all staff are required to confirm in writing, annually, that they have over the previous twelve months complied with the University’s Code of Conduct and this Fraud and Corruption Control Policy and that they will so comply over the ensuing twelve months. (17) The University recognises the Director, Security and Resilience (CSO) as its primary fraud control officer. In relation to fraud and corruption matters, the Director, Security and Resilience (CSO) is responsible for: (18) While not limiting the capacity of any person to report matters of concern to any person or agency, the Director, Security and Resilience (CSO) is the nominated position authorised to make official reports to external agencies as a representative of the University with the exception of: (19) The Director, Security and Resilience (CSO) is to attend continuing professional development in order to maintain a sound understanding of methods for managing the risk of fraud and corruption in accordance with relevant standards and contemporary and emerging practice in the field. (20) The Director, Security and Resilience (CSO) is responsible for ensuring that all of the University’s fraud and corruption control resources are coordinated and work together to fulfill the objectives of this policy. (21) The University recognises the Director, IT Infrastructure and Security (DIIS) as the information security management system officer. The DIIS is responsible for: (22) The University is committed to preventing fraud and corruption within the University and its controlled entities. To this end, the University will put in place appropriate mechanisms for fraud and corruption risk management, including policies and procedures, risk assessment, internal controls, investigation, reporting, education and independent auditing to reduce the incidence of fraud and corruption and regularly evaluate these for effectiveness. (23) The University will minimise the incidence of fraud and corruption by: (24) The Director, Security and Resilience (CSO) will coordinate an annual program of fraud and corruption risk management activities across the University: (25) The Director, Security and Resilience (CSO) will use the findings of the fraud and corruption risk assessments to develop a fraud and corruption control assurance management plan to be reported annually to the Audit and Risk Committee and monitored for effectiveness over time. (26) The Director, Security and Resilience (CSO) will coordinate a regular program of communication and awareness to inform all stakeholders impacted by this policy of: (27) To prevent unlawful and improper payments or corrupt conduct, the University prohibits the following by all persons acting for or on behalf of the University: (28) The Fraud and Corruption Control Guideline – Anti-bribery [in development] provides more information about identifying, avoiding and/or reporting these activities. (29) The Executive Director, People and Culture will develop, implement and coordinate an employment screening program consistent with contemporary human resources practice, relevant legislation, codes and standards. The employment screening program should apply to appointments of: (30) The program will provide for effective employment screening of relevant persons: (31) The Executive Director, People and Culture will develop, implement and coordinate business processes for the declaration of outside professional activities. (32) The Executive Director, People and Culture will develop, implement and coordinate business processes for the declaration of conflicts of interest. (33) The Chief Financial Officer will develop, implement and coordinate a process for the vetting of business associates (suppliers): (34) The vetting process is to include but is not limited to the following: (35) Vetting is to be undertaken prior to the award of contracts exceeding the threshold value and at such time that the University becomes aware that expenditure with a specific supplier has exceeded the annual threshold value. (36) Adverse outcomes in relation to vetting are to be reported to the Chief Operating Officer for consideration of the University’s ongoing commercial relationship with the business associate. (37) The Director, IT Infrastructure and Security (DIIS) is to implement an information security management system consistent with relevant standards and contemporary practice. (38) The Director, Security and Resilience (CSO) is to maintain oversight of the University’s practices for the physical security and asset management. The security of the physical environment is to be assessed in order to ensure appropriate measures are put in place for the prevention of theft of valuable tangible assets. These measures should include but are not limited to consideration of the following: (39) Refer to the International Education Agent Policy and the University Partnerships Policy. (40) The University undertakes pre-admission vetting on all potential students applying for enrolment in a coursework or research course in accordance with the Admissions Policy and Admissions Procedure. (41) Where the University outsources pre-admission vetting to a third party, the Division of Customer Experience is to ensure that vetting occurs to an equivalent or better standard to that undertaken by the University. (42) Verification of identification occurs at point of issuing a student identification card (Charles Sturt Card) in accordance with the Enrolment and Fees Policy and Enrolment and Fees Procedure. (43) Refer to the Academic Integrity Policy and the Research Policy which set out the requirements for the protection of academic and research integrity. (44) Refer to the Intellectual Property Policy which sets out the requirements for the protection of intellectual property. (45) The University Secretary will ensure the development, implementation and coordination of business practices to protect the integrity of certification documentation. (46) These business practices must ensure all certification documentation issued by the University is: (47) The University Secretary will ensure the development, implementation and coordination of business practices to protect the integrity of personal information. (48) These business practices must ensure all personal information is compliant with: (49) These business practices will also have consideration of the Australian Privacy Principles and best practice in the sector. (50) Internal audit supports the prevention of fraud and corruption by: (51) In the event that the mechanisms in place at the University fail to prevent fraud and corruption, the University is committed to the establishment of robust systems of detection. The Director, Security and Resilience (CSO), as the University’s primary fraud control officer, has the responsibility to ensure and validate the development of systems to detect and investigate fraud and corruption. As a minimum, these processes will include post transactional review, data mining and analysis of management accounting reports. (52) A random selection of transactions will be reviewed, after processing, by personnel unconnected with the business unit making the transaction. Transactions to be reviewed include any action where a fraudulent or corrupt gain or loss is possible and includes: (53) The transaction reviews will look to ensure: (54) Processes for data analysis will be developed to consider the relevant indicators of the University’s fraud and corruption exposures. Data analysis is to be used to identify suspect transactions with particular consideration of false or fictitious invoicing. (55) Processes for the analysis of accounting reports will be developed to identify trends that may be indicative of fraud or corruption. Such analysis may include: (56) Refer to relevant policies such as Admissions Policy, Enrolment and Fees Policy, Student Misconduct Rule, Academic Integrity Policy, Research Integrity Complaints Management Procedure, Assessment Policy, Credit Policy, or Research Policy. (57) The University will have the Audit Office of NSW validate the annual financial statements. (58) The University will participate in audits by the Audit Office of NSW annually and as otherwise required. (59) Fraud and corruption, and other wrongdoing, can be reported as set out in the Public Interest Disclosure (Whistleblowing) Policy. The University encourages all members of the University community to report reasonable suspicions of wrongdoing in relation to the University. (60) The University’s complaints management processes are to ensure that relevant staff receiving complaints, including frontline and communications staff, are trained in recognising complaints about fraud and corruption and the subsequent internal and external reporting processes that are available. (61) The University’s exit interview process is to seek to identify any knowledge or reasonable suspicion the exiting employee has of potentially fraudulent or corrupt conduct. The scope of the enquiry is to include the conduct of: (62) Where a report of wrongdoing is made to an authorised disclosure officer as set out in the Public Interest Disclosure (Whistleblowing) Policy, the report will be managed and investigated as stated in the Public Interest Disclosure (Whistleblowing) Procedure. (63) Where a person expresses a concern regarding their personal information held by the University, these concerns will be responded to in accordance with the University’s Privacy Management Plan. (64) The University may commence applicable disciplinary procedures if a person to whom this policy applies breaches this policy (or any related procedures), which may include referral to the police. A breach of this policy may also be a breach of other University policies, such as the Code of Conduct. (65) The University may consider breaches of this policy serious misconduct and grounds for termination of employment, in accordance with the relevant enterprise agreement and/or employment contract. (67) Fraud and Corruption Control Guideline – Anti-bribery [in development] (68) For the purpose of this policy, the following additional terms have the definitions stated:Fraud and Corruption Control Policy
Section 1 - Purpose
Scope
Top of PageSection 2 - Policy
Part A - Planning and prevention of fraud and corruption
Mandate and commitment
Framework of ethical conduct
Director, Security and Resilience (CSO) is the fraud control officer
Director, IT Infrastructure and Security is the information security management system officer
Prevention systems
Fraud and corruption risk assessment
Communication and awareness of fraud and corruption
Prohibition of bribery and other forms of unlawful or improper payments or corrupt conduct
Employment screening and employee declarations
Business associate vetting
Preventing technology-enabled fraud
Physical security and asset management
Education agent, intermediary and partner vetting
Student capability vetting
Protection of academic and research integrity
Protection of intellectual property
Protection of certification documentation
Privacy management
Internal audit
Part B - Detection of fraud and corruption
Detection systems
Post-transactional reviews
Data analytics
Analysis of accounting reports
Student related fraud and corruption detection systems
External audit
Part C - Response to fraud and corruption
Reporting fraud and corruption
Complaint management
Exit interviews
Investigation of fraud and corruption
Responses to privacy concerns
Breach of policy
Section 3 - Procedures
Top of PageSection 4 - Guidelines
Section 5 - Glossary
Corrupt conduct is generally taken as something that is intentional, not something that occurs through mistaken action. The ICAC Act provides examples of corrupt conduct, including but not limited to official misconduct (including breach of trust, fraud in office, nonfeasance, misfeasance, malfeasance, oppression, extortion or imposition); bribery; blackmail; obtaining or offering secret commissions; fraud; theft and perverting the course of justice. For further information see sections 7, 8 and 9 of the ICAC Act.