(1) All (2) The (3) This procedure supports the (4) This procedure seeks to apply effective security controls to the (5) This procedure endorses the (6) The following are the principles of this procedure: (7) Information and (8) For each classification, several data handling requirements are defined to appropriately safeguard the information. It is important to understand that overall sensitivity of institutional data encompasses not only its confidentiality but also the need for integrity and availability. (9) The following table lists required safeguards for protecting data based on their classification. The table lists some of the key information and data handling requirements, and requirements are not limited to this list. (10) Information processed by an information system will have an (11) (12) The (13) The (14) Information Custodians are those individuals who control information systems regardless of physical or logical location, storage medium, technology used, or the purpose(s) they serve. (15) The Information Custodian will be responsible for the administration of controls as specified by the owner. This will include: (16) Information Users are individuals who have been granted explicit authorisation by the relevant (17) An Information User will be responsible for:Information Security Data Classification Procedure
Section 1 - Procedure
Audience
Executive Summary
Purpose
Procedure Principles
Information Classification
IMPACT TYPE
SEVERITY
Lowest
<------>
Highest
Insignificant to Minor
Moderate
Major
Severe
Security – What competitive advantage does this information provide.
Little or no advantage.
Might provide some advantage.
Definite advantage.
Significant Advantage.
Likelihood of the competitors looking for this information.
Low or No Possibility.
Low Possibility.
Medium Possibility.
High Possibility.
If this
General / Provision of business operation and service.
Significant effect on operational performance.
Compliance / Legal
Employees / WHS&E
No impact to employees / WHS&E
Financial
2-5% budget or $250k – 1m.
5-10% budget or $1-5m.
Over 10% of budget or over $5m.
Reputation
No Impact to reputation.
Service Levels
Loss of 1-7 days of teaching, research and/or business functions.
Loss of two weeks to two months of teaching, research and/or business functions.
Loss of over two months of teaching, research and/or business functions.
Example information types
SECURITY CLASSIFICATION
Consider for PUBLIC OR UNCLASSIFIED
Consider for X – In Confidence
Consider for Restricted
Consider for HIGHLY Restricted
Data Handling Requirements
Top of Page
Data Handling
Control Category
Description of Controls
Public
X – In confidence
Restricted
Highly Restricted
Access Control
No restriction on viewing
X
Restricted to
X
X
X
X
X
X
Authentication and authorisation required for access
X
X
X
Viewing and modification restricted to authorized individuals as needed for business-related roles
X
X
Non-disclosure agreement required to be signed by
X
Copying / Printing (paper and electronic forms)
No restrictions
X
Should not be left unattended on a printer
X
X
X
Data should only be printed when there is a legitimate need
X
X
Copies must be limited to individuals with a need to know
X
Network Security
May reside on public network
X
Protection with firewall and Intrusion Prevent System (IPS) required
X
X
X
Servers hosting the data should not be visible to the Internet
X
X
Servers hosting the data should not be visible to unprotected internal networks such as
X
System Security
Systems should be hardened as per vendor hardening guidelines
X
X
X
X
Apply security patches within defined SLA
X
X
X
X
Anti-virus software must be installed on all applicable systems, and must be automatically updated with the latest signatures
X
X
X
X
Host-based firewall enabled in default deny mode and permit minimum necessary services
X
X
Laptop hard drives must be encrypted
X
Physical Security
Must be locked or logged out when unattended
X
X
X
X
Documents and information
X
X
X
Must be hosted in a Secure Data Centre
X
X
Physical access must be monitored, logged, and limited to authorised individuals
X
Remote Access to systems hosting data
No restrictions unless for system administrative purposes.
X
Requires user authentication
X
X
X
Access restricted to
X
X
Remote access by
X
X
Two-Factor authentication recommended
X
X
Unsupervised remote access by
X
Audit logs
Log login and logoff events
X
X
X
X
Log fail and delete events
X
X
Forward logs to a remote log server
X
X
Log read and write events
X
Transmission of data
Encryption required (via TLS or secure file transfer protocols)
X
X
X
Must not be sent via email unless encrypted
X
Backups
Daily backups required
X
X
X
Off-site storage recommended
X
X
Off-site storage in a secure location required.
X
X
Section 2 - Roles and Responsibilities
Information Custodian
Information User
View Current
This is not a current document. To view the current version, click the link in the document's navigation bar.
Impact
Some localised inconvenience, but no impact to the University .
Disruption to operations with no permanent or significant effect on University .
Some impact on the University’s operational performance.
Less impact on strategic goals in the medium term .
Achievement of operational and strategic goals in the medium term jeopardised.
Existence of the University under threat.
Breach of legislation, contract, rule or policy that does not have any penalty or litigation impact.
Breach of legislation, contract, rule or policy that may have an impact on the relationship with the third party or the legislator, but no long lasting effect.
No litigation or prosecution and/or penalty.
Regulatory consequence limited to standard inquiries.
Breach of legislation, contract rule or policy leading to escalated legal enquiries.
Regulatory or legal consequence limited to additional questioning or review by legislator.
Breach of legislation, contract, rule or policy leading to possible legal action.
Possible litigation or criminal prosecution and/or penalty.
External enquiry or regulatory review and/or possible negative sanction by a regulatory body.
Breach of legislation, contract, rule or policy leading to significant and costly legal action with widespread potential impact for the University .
Litigation or criminal prosecution and/or substantial major negative sanction by a regulatory body.
Continuity of employment concerns across the University .
WHS&E incident requiring significant medical attention.
WHS & E event reported and investigated.
Significant (up to 15%) loss of staff contained to one faculty / division.
Widespread damage to staff morale.
WHS&E even causing serious injury, or negative environmental impact, and the relevant external authority notified.
Significant loss of staff extending to the entire University (over 15%).
WHS&E event causing serious permanent injury, death or environmental.
Impact leading to costly action and widespread impact on the University and/or senior staff .
Less than 1% of budget or up to $25K.
1 to 2% of budget or $25-50k.
National media coverage and external criticism.
Reputation impacted with some stakeholders.
Loss of student confidence in a School or Faculty .
Sustained adverse national media and public coverage.
Reputation impacted with a significant number of stakeholders.
Breakdown in strategic and or business partnership.
Loss of student confidence in the University .
Reputation and standing of the University affected nationally and internationally.
Serious public outcry and/or international coverage.
Reputation impacted with majority of key stakeholders.
Significant breakdown in strategic and or business partnerships.
Loss of less than one day’s teaching, research and/or business functions.
Loss one full day of teaching, research and/or business functions.
Published research data.
Business unit process and procedure.
Unpublished intellectual property .
ITC system design and configuration information.
Departmental intranet.
Organisational financial data.
Current exam material.
Research Data (containing personal data).
Data subject to regulatory control.
Employee relations and complaints information.
Medical, Children & Young person’s information.
Research data (containing personal medical data).