View Current

Information Security Policy

This is not a current document. To view the current version, click the link in the document's navigation bar.

Section 1 - Audience

(1) This policy applies to all users of the University's ICT resources and connected systems. Each user is required to comply with the terms of this policy as well all applicable legislation.

(2) This policy is supplemented by a comprehensive set of information technology procedures, manuals and guidelines.  

Top of Page

Section 2 - Purpose

(3) This policy provides management direction and support for information technology security in accordance with the University's operational requirements, relevant laws and regulations. This policy aligns with the Information Security Industry Standard ISO/IEC 27002:2013: Information technology - Security techniques - Code of Practice for Information Security Controls.

(4) The University aims to maintain an information security profile consistent with industry requirements and best practices in compliance with applicable laws and regulations. This policy defines the framework by which information security will be managed and supported across the University.

(5) Risk Management is at the core of the University's Information Security Management System (ISMS). Information security risks must be identified, assessed, mitigated and monitored to help protect the confidentiality, integrity and availability of the University's information and information systems in line with the requirements of the University's Risk Management Framework.

(6) Information security is supported by a suitable set of policies, procedures, processes, organisational structures and software and hardware functions. These controls are established, implemented, monitored, reviewed and improved, where necessary, to help ensure that the specific security and strategic objectives of the University.

Top of Page

Section 3 - General Principles

(7) The University endeavours to manage the University's ICT resources in accordance with ISO 27001 ISMS standards to help ensure that the University provides a high quality and secure digital environment for users.

(8) Where an explicit policy, procedure, manual or guideline does not exist, the following security principles are to be applied by each user to guide their decision making with respect to the use of, and the protection of, University's ICT resources and connected systems:

  1. all users are responsible for following the University's policies and procedures for managing information in a secure manner;
  2. a risk-based approach to information security should be adopted by all users to help ensure that all information related risks are managed in a consistent and effective manner;
  3. all users are to assist with the protection of University data and information to prevent disclosure to unauthorised individuals;
  4. all users must comply with relevant legal and regulatory requirements; and
  5. users are to use or apply approved information security solutions and services, where possible, to avoid creation of disparate IT security controls.
Top of Page

Section 4 - Policy Statements

Human Resources Security

(9) All applicable users are subject to appropriate security processes before, during and after the cessation of their employment with the University in accordance with the Human Resource Information Security Guidelines.

(10) Exit procedures should be followed as far as practicable where a staff member is transferring to a new role or work location within the University. The staff member's line manager (from the area that the staff member is transferring from) is responsible for organising the exit procedures.

(11) Security awareness training should be provided to all University employees, contractors and third-party users of the University's ICT resources and connected systems to minimise possible security risks.

Asset Management

Inventory of Assets

(12) A register should be maintained by the CIO of all the University's major information assets and the information owner of each asset is to be clearly stated.

Information and Data Classification

(13) Information owners must classify their assigned information assets upon creation according to the classifications outlined in the Information Security Data Classification and Handling Manual. The classification of an information asset is based on the asset's importance and risk, relative to the goals and objectives of the University or business unit.

(14) Information owners must review the data classifications of their information assets upon any significant change to the asset, or changes in regulatory requirements, to ensure that appropriate controls remain in place for the asset as it evolves over time.

Information Handling

(15) Based on the data classification, System Owners and System Administrators must comply with the applicable controls to help maintain the confidentiality, integrity and availability of information assets under their control.

(16) All users must ensure that information is handled in accordance with its classification as set out in the Information Security Data Classification and Handling Manual.

(17) All users must ensure that information within the scope of the University's Records and Information Management Policy is managed in accordance with that policy.

Access Control

(18) Access to University information assets, and University ICT resources that store or process those assets, should only be granted following a controlled and auditable process on the basis of operational and security requirements defined by the nominated information owner.

(19) All users must protect passwords and other types of credentials in accordance with the requirements of the University's Information Security Access Control Manual.

Physical and Environmental Security

(20) The University's CIO is responsible for defining the standards, processes and procedures related to the management and access of physical ICT facilities, such as data centres, network rooms, servers and networking hardware.

(21) The physical protection of ICT resources should be managed to ensure protection against malicious or accidental damage, or loss. See Information Security Physical and Environmental Manual.

Operations Management

Information Security Operations Management Manual

(22) The minimum requirements for each of the items in this section of the policy, "Operations Management", are set out in the Information Security Operations Management Manual.

Operations Security

(23) System Owners and System Administrators are responsible for the documenting and maintaining Standard Operating Procedures (SOP) for the ICT resources and information assets that they manage.  These SOPs must be made available to all users who need them, to ensure the correct and secure operation of the University's ICT resources and information assets.

(24) Users involved in the administration, development, testing and commissioning of the University's ICT resources must follow appropriate change management procedures, defined in the University's Change and Release Management Process Manual

Controls Against Malicious Code

(25) System Owners and System Administrators are responsible for:

  1. implementing detection, prevention, and recovery controls to protect against malicious code; and
  2. appropriate user awareness procedures for the ICT resources they manage. 

(26) These controls must also be implemented in accordance with the Information Security Operations Management Manual and the Information Security Network Security Manual.


(27) Data backups are an essential control and safeguard to ensure the availability of University information. 

(28) System Owners must ensure that the information assets that they are responsible for are backed up.

(29) System Administrators must back-up all information assets under their management on a regular basis and store these in such a way to protect them from unauthorised access or modification.

(30) Backup procedures must be tested to confirm that recovery can be completed in a timely manner to help ensure the continuity of University operations.

Log Management

(31) All System Owners and System Administrators are responsible for ensuring that event logs to record user relevant information security events (such as user activity, exceptions and failures) are produced for the ICT resources that they manage, and kept for an appropriate period of time.  Event logs may be used to identify potentially unauthorised activity, assist in investigations, and to facilitate appropriate follow up action.

Vulnerability Management

(32) All System Owners and System Administrators are responsible for ensuring that security patch and vulnerability management processes are defined to identify, prioritise and remediate security vulnerabilities for ICT resources that they own or manage. This will help to minimise the risk of malicious attacks compromising the confidentiality, integrity or availability of University information assets and ICT resources.

(33) Security patching and vulnerability management of University's ICT resources must be carried out in accordance with the Information Security Patch Management Manual and the Vulnerability Management section of the Information Security Operations Management Manual.

Network Communications Security

(34) The System Owner and System Administrator must manage, control and segregate those parts of the network for which they are responsible to protect information in systems and applications in accordance with the Information Security Network Security Manual.

System acquisition, development and maintenance

(35) The CIO shall ensure that information security is an integral part of information system and application architecture and design across the entire lifecycle of the University's ICT resources.

(36) System Owners and System Administrators must ensure that all of the applications and services for which they are responsible for within the University’s ICT environment, are security reviewed and benchmarked against industry best-practice prior to acquisition or upgrade, in consultation with the CIO.

(37) Users must only use applications or services approved by the CIO to store or process University information assets.  Exemptions to this requirement must be applied for in accordance with Section 6 of this policy.

Supplier Relationships

(38) To ensure protection of the University's ICT resources and information assets, any access provided to external providers must be correctly risk-managed, and covered by a formal agreement. Any agreement to be entered into on behalf of the University must be done so in accordance with the University's Procurement Policy and executed in accordance with the University's delegation of authority.

(39) The University will work with those third parties who access, support and service the University's ICT resources to ensure, as far as reasonably practicable, that they comply with this policy and information security requirements. These requirements must, where applicable, be outlined in the formal agreement with the relevant external provider.

Information Security Incident Management

(40) To ensure a consistent and effective approach to identifying and managing information security incidents that could impact University's ICT resources, defined guidelines have been developed and implemented. See Information Security Incident Management Guidelines.

(41) All users of the University's ICT resources must report any suspected event or weakness that might have an impact on the security of University information assets and ICT resources to the IT Services Service Desk.

Top of Page

Section 5 - Enforcement

(42) All Users of the University's ICT resources should be aware of this policy, their responsibilities and obligations.

(43) Non-compliance with the provisions of this policy may result in action under the University's policies, code of conduct or relevant enterprise agreement, and may also result in referral to a statutory authority and/or agency.

(44) The CIO (or their delegate) is responsible for monitoring the use of the University's ICT resources to measure compliance with this policy.

(45) Where a user has been found to fail to comply with this policy or any other of the University's IT policies, procedures, manuals, or guidelines, a delegated officer, as outlined in the Schedule of Operational Subā€Delegations made by the Viceā€Chancellor, may disconnect or restrict that user's access to any part of the University's ICT resources.

Top of Page

Section 6 - Exceptions

(46) Exceptions to this policy may be requested by a user in writing to the CIO. Exceptions will be assessed based on the business impact, the security risk that the proposed exemption may pose and any compensating controls that may be implemented in relation to the proposed exemption.

Top of Page

Section 7 - Roles and Responsibilities

Chief Information Officer (CIO)

(47)  The CIO is responsible for information security policy development, and for managing the implementation and operation of the University's information security capabilities, to ensure that the requirements of this policy are appropriately applied.

(48) The CIO is responsible for:

  1. ensuring that users are aware of this policy;
  2. defining the University’s IT application and technology standards;
  3. maintaining a repository of the University’s approved applications and services;
  4. monitoring use of the University's ICT resources, and disconnecting or restricting a user's access if the user has failed to comply with this policy or any of the University's other IT policies, procedures, manuals and guidelines;
  5. reviewing and updating this policy to ensure that the policy continues to be suitable, adequate and effective.

Information Owner

(49) The Information owner's responsibilities include the following in relation to applicable information:

  1. determining the value of the information;
  2. determining the statutory requirements regarding privacy and retention;
  3. assigning an appropriate security classification according to the Information Security Data Classification and Handling Manual;
  4. developing guidelines for, and authorising and reviewing access to the information;
  5. ensuring that risk assessments for their information assets are performed; and
  6. ensuring that appropriate controls are specified and communicated to the system owner who has technical control of the information.

System Owner

(50) The System Owner is the University staff member responsible for having an ICT resource operated and maintained.  An ICT resource may only have one System Owner.  The System Owner's responsibilities include the following:

  1. managing system risk;
  2. developing SOP’s to protect the system in a manner commensurate with risk;
  3. maintaining compliance with requirements specified by information owners for the handling of data processed by the system; and
  4. designating a System Administrator for the system.

System Administrator

(51) A System Administrator is a person or team that implements, manages and/or operates an ICT resource at the direction of the System Owner. The System Administrator’s responsibilities include the following:

  1. the day-to-day administration of the ICT resource;
  2. developing, maintaining and documenting SOPs that include data integrity controls, authentication, recovery, and continuity of operations;
  3. ensuring that access to information and the ICT resource is secured as defined by the System Owner and Information owner;
  4. implementing security controls and other requirements of this policy on ICT Resources for which the System Administrator has been assigned responsibility;
  5. completing regular role-based training to ensure the effective management of the ICT resource;
  6. taking corrective action in respect of audit findings, system vulnerabilities and any reported security breaches; and
  7. developing and testing disaster recovery plans.

Information Security Team

(52) The Information Security Team reports to the Associate Director, Enablement who reports to the Chief Information Officer. The Information Security Team is responsible for:

  1. performing compliance and audit functions in accordance with the Information Security Audit Considerations section of the Information Security Operations Management Manual; and
  2. investigating and reporting on suspected breaches of this policy.