The ACA is joining forces with Grok Learning to form a new organisation Grok Academy. This new organisation will be your one stop shop for all your digital technologies needs. For more information go to grokacademy.org
The Australian Computing Academy (“we”, “our”), together with Grok Academy Limited and our training provider, Grok Learning Pty Ltd, collects your personal information for the purposes of managing your registration and use of our online training programs. We also collect your personal information when you register with Eventbrite to manage your participation in one of our teacher training workshops. Through our website we collect your contact details for the purposes of including you in our mailing list to receive information about updated news and events for the Academy. Provision of the information requested is voluntary, however if you do not supply all the information we may not be able to provide the services you request.
We also collect personal information about you as you use and progress through our online training programs, such as progress rates, completion rates and scores. We may use this personal information for analytics purposes to help us make better decisions about our services and programs. This information may also be used in a de-identified format for research purposes where Grok Learning may share your fully-anonymised Learning Data with researchers from reputable research organisations if they propose a clearly-defined research project that we believe will advance the state-of-the-art in computer science education.that research has obtained approval from a Human Research Ethics Committee.
We will only use your information for the purposes identified above and will not disclose it without your consent, except where we are otherwise required, permitted or authorised by law. To access or amend your personal information, contact email@example.com or +61 2 8627 8686.
This website also automatically collects personal information when you are browsing or otherwise using our website. The various mechanisms used by include server logs, proxy logs, and cookies.
The information collected by these various mechanisms includes: