Comments

Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

 

Personnel Security Policy and Standard

Section 1 - Executive Summary

(1) To protect the University's ICT resources and data from compromise, the University must ensure that the users of those resources and data can be trusted. This requires screening employees prior to employment and continually informing employees on the secure and appropriate use of University assets.

(2) Access to the University's ICT resources and data must also be managed to ensure only current employees have access, access is role-based, and to revoke access upon changes to employment.

(3) Terminated employees and employees changing positions must also be notified of their obligation to protect the information gained during their employment at the University.

Top of Page

Section 2 - Purpose

(4) This document articulates the personnel security controls that must be applied to the access and use of the University's ICT resources and data.

Top of Page

Section 3 - Scope

(5) This policy is applicable to all employees of the University. In the context of this document, an employee is anyone who is engaged by the University to provide a service to the University regardless of the job function, including:

  1. full-time, part-time and casual staff;
  2. contractors and third party users; and
  3. volunteers.
Top of Page

Section 4 - Personnel Security Requirements

Prior to Employment

(6) Digital Technology Solutions (DTS) must assign a risk designation to all positions. The risk designation should reflect the position level, level of access to systems, and access to classified information.

(7) Human Resource Services must determine screening requirements for individuals filling positions.

(8) Screening criteria must reflect applicable federal and state laws, directives, policies, standards, and specific criteria established for the risk designations of assigned positions.

(9) Human Resource Services and/or the hiring business unit must screen individuals prior to offering employment at the University.

(10) The security responsibilities of each position must be documented in job descriptions and within the terms and conditions of employment.

During Employment

(11) All employees must undergo an orientation process and be provided with access to security policies and procedures.

(12) All employees must acknowledge that they have read and understood the University's Information Technology Conditions of Use Policy.

(13) All employees must complete the University's Information Security Awareness Training within the first three (3) months of employment and annually thereafter.

(14) Managers and supervisors should provide briefings to employees on the secure and appropriate use of ICT resources and data prior to granting access.

Termination of Employment

(15) Each business unit must assign responsibilities for performing employee terminations.

(16) The Separations and Transfers Checklist must be completed for terminated employees.

(17) University property must be returned on the last day of employment. This includes but is not limited to laptops, identification cards and building passes.

(18) Access to all systems and data must be revoked on the last day of employment.

(19) Managers and supervisors must perform exit interviews to ensure terminated employees understand their responsibility to protect information gained during their employment at the University.

Changes to Roles

(20) Each business unit must review and confirm the ongoing need for logical and physical access to ICT resources and data when individuals are reassigned or transferred to other positions.

(21) Each business unit must ensure that access to ICT resources and data is revoked on the last day of that individual filling a position within their department.

Contractors and Vendors

(22) Contractors and vendors must immediately notify the University of any terminations or transfers of personnel who possess credentials, building passes, or have information system privileges.

Top of Page

Section 5 - Roles and Responsibilities

Responsibilities of all Employees

(23) All employees must:

  1. participate in annual security awareness training;
  2. read and action advice from the Information Security Team;
  3. understand and abide by the University's Information Technology Conditions of Use Policy and their associated documents;
  4. follow established processes and procedures to maintain system and information security;
  5. consult managers and supervisors for guidance on security issues; and
  6. consider security implications when making changes to ICT resources and information assets.

(24) All employees must pay attention to:

  1. legislation and policy related to information security; and
  2. University communications relating to information security.

(25) All employees must report:

  1. actions or activities which could circumvent or impair security controls; and
  2. actual and suspected security incidents.

Responsibilities of Management

(26) All managers must:

  1. ensure information security requirements are included in job descriptions;
  2. ensure required pre-employment checks are completed for all new employees;
  3. prior to granting access to systems and resources, provide any necessary briefings;
  4. when assigning work, ensure employees are aware of security requirements;
  5. consult the Information Security Team for guidance on security issues;
  6. understand and abide by the University's Information Technology Conditions of Use Policy and their associated documents;
  7. support security awareness training and events; 
  8. if a security breach occurs, review and revise related operating procedures as needed; and
  9. inform departing employees of their continued obligation to protect sensitive information gained during their employment at the University.

(27) All managers must establish:

  1. procedures for orienting new employees;
  2. procedures for reviewing system access for employees when roles or employment status changes occur; and
  3. develop standard operating procedures for system use.

(28) All managers must monitor:

  1. employees to ensure they support and follow security processes and practices.

(29) All managers must report:

  1. actual or suspected breaches of information security by contacting the Information Security Team.

(30) All managers must reinforce with employees:

  1. the importance of understanding policies, adhering to standards, and following approved processes for the protection of information; and
  2. that everyone has a role in securing information resources.