How do I access the CGGs app?
The App will require your CGGS login information and access is only available to members of our community who have been issued with CGGS credentials. We look forward to you using these two new school resources.
Who is Access Canberra and what do they do?
Access Canberra delivers information, payments and emergency support on behalf of the ACT Government. You can contact us online, by telephone, in person or by post. Locations and opening hours are available here.
How is the Australian government supporting food security in remote communities?
The Australian Government is implementing a number of initiatives to support food security in remote communities with the broader objective of improving the health and wellbeing of Indigenous people. There are an estimated 80 000 Indigenous Australians living in remote communities.
How does CGGs recruit teachers?
CGGS utilises a number recruitment channels when advertising employment opportunities including our School website, SEEK, Teachers-on-net, and other specialist web sites. CGGS utilises a number recruitment channels when advertising employment opportunities including our School website, SEEK, Teachers-on-net, and other specialist websites.
How to apply for CGGS?
To apply for a position at CGGS you will be asked to complete the online employment application form. This is a short four-step process and will require you to upload a current CV and cover letter. The cover letter should provide us with enough information to determine your suitability for the role and your ability to fulfil the required duties. A brief understanding of why you are interested in working at CGGS is also good to include. There is no need address selection criteria.
What is CGGS recruitment?
CGGS utilises a number recruitment channels when advertising employment opportunities including our School website, SEEK, Teachers-on-net, and other specialist web sites.
What is CGGS school?
Canberra Girls Grammar School (CGGS) is a well-established and well-resourced educational community. We aim to attract the best staff in order to provide a wide range of opportunities for our students.
Does CGGS maintain privacy?
CGGS endeavours to maintain strict privacy and confidentiality regarding all employment applications. For further information please refer to our Privacy Policy.
Access Canberra services, locations and opening hours
Access Canberra delivers information, payments and emergency support on behalf of the ACT Government. You can contact us online, by telephone, in person or by post. Locations and opening hours are available here.
ACT Government Information Portal
This portal serves as a community noticeboard and contains useful information such as media releases, events, hot topics, community consultations and public notices.
Jobs ACT
Looking for a job in the ACT Public Service? This site lists current temporary and permanent vacancies.
What is privileged access?
Privileged access. Using privileged access via a remote desktop client, when accessing an organisation’s system, presents a security risk to the organisation. An adversary that gains access to a user’s authentication credentials can cause greater damage should they have privileged access instead of unprivileged access.
Why disable client clipboard mapping?
Disabling the client clipboard mapping setting on a remote desktop server can reduce this security risk.
What happens if you leave a host computer unattended?
Leaving a host computer unattended in a public location presents a number of security risks to an organisation. An adversary could use such an opportunity to steal the host computer, install keylogger software or hardware, or if a remote desktop client has already authenticated to an organisation’s system, gain access to information.
Why is it important to use a trusted operating environment?
Using a trusted operating environment for a host computer can reduce the security risk of an adversary remotely installing keylogger software.
Is screenshoting a security risk?
The screenshot functionality of an operating system presents a security risk to an organisation. An adversary can exploit this functionality on a host computer through a number of methods, such as using the Print Screen key to copy information to the clipboard, installing screen capture software or installing malware that detects the presence of a remote desktop session and automatically takes screen captures at pre-defined intervals.
Can a remote desktop client use single factor authentication?
A remote desktop client may only require the use of single-factor authentication to authenticate to an organisation’s system. An adversary with knowledge of a user’s authentication credentials, such as their passphrase, can gain unauthorised access to an organisation’s system, often until such time that a user changes their passphrase. If unauthorised access is achieved remotely, it can be very difficult to detect or prevent.
Can a remote desktop client disable encryption?
By default, a remote desktop client may disable the use of encryption once authentication of the client has been completed. This allows an adversary to eavesdrop on information that is being communicated over a remote desktop session.
How many Indigenous Australians live in remote communities?
1.1 An estimated 80 000 Indigenous Australians live in remote communities and have poor access to fresh and nutritious food, largely due to their distance from major centres. Poor nutrition has been linked to poor community health outcomes, and is recognised as a significant contributing factor to the total burden of disease for Indigenous Australians. 10
What is the purpose of the Northern Territory Act?
The objective of this Act is ‘to support Aboriginal people in the Northern Territory to live strong, independent lives, where communities, families and children are safe and healthy’. 22 The SFNT Act contains specific provisions relating to food security and enables the Australian Government to implement special measures for the purpose of promoting food security for Aboriginal communities. In particular the Australian Government is aiming to enhance the contribution made by community stores in the Northern Territory in relation to food security for Aboriginal communities through the licensing of these stores.
How many projects have been completed under the ABA SIP?
4.60 Two out of 18 projects have been completed under the ABA SIP since the project was agreed to in 2008. The implementation of the ABA SIP has been slower than expected as key risks identified were underestimated. The commencement of the delivery phase was delayed and did not start until late 2012. These delays, coupled with unexpected cost increases, have put pressure on the ABA SIP’s budget and the desired food security outcomes. As a consequence, the implementation of the ABA SIP has taken longer than expected but no review has occurred to confirm the high priority rating given to the remaining 16 communities. As the ABA SIP was initially expected to be completed within two years, FaHCSIA did not develop a review mechanism that would confirm the high priority rating given to the 18 communities in mid-2010. An assessment of the continued need to build new, high risk and often unviable stores in communities where existing stores are now licensed would have provided greater assurance that the ABA SIP provides value for money in the longer term. However, the department’s view is that a review should have been included at the beginning of the project and is no longer feasible (as noted in paragraph 4.48).
What is COAG 2.32?
2.32 Decisions in relation to actions yet to be completed under the COAG National Strategy for Food Security in Remote Indigenous Communities would be a matter for government, but it would be appropriate for such decisions to be informed by departmental advice.
What is section 46 of the SFNT Act?
3.8 The food security matters under section 46 of the SFNT Act establish relevant considerations for stores (see Table 3.2 above) and form the basis of licensing requirements set by the department. The requirements vary to reflect the size of the store but will include (to varying degrees):
How do community stores help Indigenous people?
A community store’s primary business is the sale of food, drink and grocery items for an Indigenous community and may also provide other goods and services, such as fuel, takeaway and general merchandise. Some stores may also be an outlet for some Centrelink and Australia Post services. Community stores often operate in difficult circumstances and many are barely viable. This can make capital and infrastructure investment projects unachievable.
When was the National Strategy for Food Security in Remote Indigenous Communities (the Strategy) developed?
1.10 The National Strategy for Food Security in Remote Indigenous Communities (the Strategy) was developed and agreed to by the Council of Australian Governments (COAG) in December 2009, with a formal review that was scheduled for December 2012.