Skip to Content

PART 5 Forms

Court Rules

image_pdfimage_print

part 5

5.1

The Chief Justice may by Practice Direction prescribe the forms to be used in proceedings before the Court.

5.2

A form may be varied by the Court or a party if the variation is required by the circumstances of a particular case.

5.3

A form must not be varied so as to leave out any information or guidance which the form gives to the recipient.

5.4

Where these Rules require a form to be sent by the Court or by a party for another party to use, it must be sent without any variation except such as is required by the circumstances of the particular case.

X

Privacy Policy

The Dispute Resolution Authority and all its affiliates are committed to preserve the confidentiality, integrity and availability of client data and personal information.

Dispute Resolution Authority and all its affiliates employees, vendors, contract workers, shall follow Information Security Management System in all the processes and technology.

  1. DRA's Top Management is committed to secure information of all our interested parties.
  2. Information security controls the policies, processes, and measures that are implemented by DRA in order to mitigate risks to an acceptable level, and to maximize opportunities in order to achieve its information security objectives.
  3. DRA and all its affiliates shall adopt a systematic approach to risk assessment and risk treatment.
  4. DRA is committed to provide information security awareness among team members and evaluate the competency of all its employees.
  5. DRA and all its affiliates shall protect personal information held by them in all its form.
  6. DRA and all its affiliates shall comply with all regulatory, legal and contractual requirements.
  7. DRA and all its affiliates shall provide a comprehensive Business Continuity Plan encompassing the locations within the scope of the ISMS.
  8. Information shall be made available to authorised persons as and when required.
  9. DRA’s Top Management is committed towards continual improvement in information security in all our processes through regular review of our information security management system.