Data Entry Overview

Data entry

The Australian Flood Studies Database (AFSD) is the main catalogue of flood information available through the Australian Flood Information Portal (the portal). The portal is focussed on providing access to flood information from authoritative sources. Information in the portal can be searched and accessed by all users, but only registered users can add flood studies and associated maps to the database.

A registered user would typically have been responsible for the creation or publication of flood hazard information, and might include state authorities, local councils, consultants and authorised data custodians.


Register to enter flood information
To become a registered user send an email request to hazards@ga.gov.au detailing your:
  • Name
  • Job title
  • Place of employment
  • State or Territory
  • Email address
  • Telephone contact number

Geoscience Australia will review your request and send a confirmation email, and login instructions, when the registered account is authorised and ready for use. Please direct any questions or feedback to hazards@ga.gov.au.

 

Already a registered user?

Data Entry Application

By logging in to the data entry
application you acknowledge that
you have read and accepted the

User Responsibility Statement

Log in

 

Guidelines

The following guidelines will assist you with the data entry process.

Data Entry Guidelines

The Data Entry Guidelines provide guidance on the use of the data entry application and provide information on the requirements for users submitting a study and associated GIS data to the database.

The Quality Assurance Guidelines

The Quality Assurance Guidelines inform the accuracy and quality of flood study metadata submitted to the database, and are intended as a guide for reviewers.

User Responsibility Statement

The User Responsibility Statement sets out the responsibilities of users of the Data Entry Application. It should be read and understood before performing any data entry to avoid potential issues surrounding unauthorised or improper access or use of the system.