(1) This Policy aims to acknowledge and safeguard the University's information systems as crucial assets, ensuring their integrity, security, and constant availability. It affects all individuals who utilise, install, develop, maintain, or manage these systems. (2) The Policy's goals are to: (3) This Policy applies to: (4) Information assets (for example, databases and files), software assets (e.g., applications and development tools), and hardware assets (for example, computers, communication equipment, and portable media), whether located on or off campus, fall under this policy. The scope also extends to privately devices that access University data and systems. (5) All users of the University's information systems must also be familiar with and adhere to their responsibilities as detailed in the Information Technology Conditions of Use Policy. (6) For the purposes of this Policy, the following definitions apply: (7) The University will conduct regular risk assessments of its information systems. Assessments will identify potential vulnerabilities and security measures and develop controls to reduce identified risks to an acceptable level. (8) All cloud IT applications and services must be evaluated through a formal risk assessment before their procurement and implementation. (9) Risk assessments completed under this policy will be referred to the Director, Cyber Security or Vice President (Operations) where risks remain high following treatment recommendations. Any cloud-based services that fail to meet the minimum standards will be isolated and/or removed from the University’s IT environment. (10) All users must receive authorisation to access the University's information systems from the relevant system owner. (11) Each user of the information systems will be assigned a unique user identifier (user ID). (12) Access to the University's information systems is granted only to users who have legitimate reasons for access, as determined by System Owners. (13) Users who hold access to multiple critical roles, particularly where segregation of duties is unable to be enforced, should have their access regularly reviewed by the System Owner to ensure it remains appropriate. (14) Authentication confirms the identity of a user, device or process. Each user ID must be associated with a method, typically a password or token, to validate the identity. (15) All System Owners are required to regularly review their schedule of delegated authority to verify who is authorised to use the system and the extent of their authorisation. (16) All attempts at unauthorised access must be logged. The Audit Trail/System Access Log must be regularly reviewed, and exception reports should be generated and examined. (17) System Administrators, who have high-level access rights to all data stored on the University's information systems, are required to adhere to the Information Technology Professionals Association Code of Ethics established by the System Administrators Guild of Australia. (18) Access for contractors and third-party individuals is allowed only when the System Owner agrees, and a full-time employee sponsors them. (19) Users who access third-party information systems and resources using their unique user ID and password must ensure compliance with the Information Technology – Third Party – Security Policy as applicable to those systems and resources. (20) All major information systems must have a designated owner who is responsible for implementing and managing this policy with respect to those assets. (21) All business-critical information at the University must be stored on environments that are professionally maintained, backed up or journaled regularly. (22) All backups of business-critical information must undergo annual testing to confirm their consistency and reading capability for full system recovery. Off-Site Storage (Backup Media) (23) System owners are responsible for specifying and documenting the retention duration for data in accordance with the University’s Records Management Policy. (24) Business Continuity and Disaster Recovery plans need to be developed and periodically tested for all corporate information systems as per the University’s Business Continuity Management Policy. (25) Access to secure areas, such as computer rooms, network equipment rooms, and any related IT service facilities, is limited to authorised University staff. (26) System Owners and System Administrators are responsible for ensuring that all software and related materials are appropriately licensed as required. (27) All end-user computing devices provided by the University, including workstations, laptops, tablets, and smartphones that connect to the University network, will be configured, where possible, to include: (28) Users will not have access to administrative rights to their devices; however, such access may be granted in exceptional circumstances by exemption. (29) University data must not be stored on privately owned or any non-university devices accessible to others. (30) Confidential data must not be transferred to privately owned computing or storage devices without explicit authorisation from the appropriate system owner. (31) Once an incident is confirmed, the responsible officer must urgently undertake the following step, the Director, Cyber Security must be notified immediately. The Director, Cyber Security will advise: (32) Investigations of a security incident are required to follow the steps outlined in the Security Incident Response Plan. A report detailing the incident is to be prepared for the Vice President (Operations). Once approved, this report should be presented to the appropriate Head of Work Unit or equivalent, including the following information, where possible: (33) Upon starting employment, staff members must be informed that they are prohibited from disclosing any information accessible through their normal work activities. They should also be aware that seeking access to data not necessary for their job duties is not permitted. (34) Students should be advised of their information security responsibilities at the start of their enrolment and reminded periodically thereafter. (35) Any breach of this Policy by staff or students that constitutes misconduct will be handled in accordance with the provisions of the Enterprise Agreement, Student Academic and Non-Academic Misconduct Rules or other University disciplinary processes, as relevant.Information Technology (IT) Security Policy
Section 1 - Purpose and Scope
Purpose
Scope
Section 2 - Definitions
Top of PageSection 3 - Policy
Risk Based Approach
Access Management
Identification
Authorisation
Authentication
Review
Unauthorised Access Attempts
Privileged Users
Information System Operated by Third Parties
Asset Security Management
Server and System Backup
Recovery
Data Retention
Business Continuity and Disaster Recovery
Physical Security
Software Security
End User Device Security
University Provided Devices
Privately Owned Devices
Security Incident Notification and Reporting
Notification of a Security Incident
Reporting a Security Incident
Awareness and Communication
Compliance
View Current
This is the current version of this document. You can provide feedback on this policy to the document author - refer to the Status and Details on the document's navigation bar.