(1) The (2) Establishing an information classification scheme and the controls appropriate for each classification level is essential for protecting information throughout its lifecycle. (3) Formalising information classification and protection requirements also enables the (4) This document articulates the (5) The appropriate information classification level is determined by the (6) A compromise of information is any loss in the confidentiality, integrity, or availability of that information. (7) This Policy and Standard applies to all information created, processed, stored, or communicated by the (8) All (9) The information classification and protection principles of the (10) These principles apply to the creation, storage, processing, and communication of all (11) Any disputes regarding the appropriate classification of information will be resolved by the Legal & Compliance team. (12) (13) If (14) If information is received from an external source, the information must be classified by the Information Custodian. (15) Information assets must be re-classified by the (16) (17) (18) The (19) The NSW and Commonwealth classifications and associated protections must be applied when dealing with state and federal government information. In these scenarios, guidance on implementing data protections must be sought from the (20) Data protections are defined for each classification level and must be applied throughout the information lifecycle. The protections address data confidentiality, integrity, and availability requirements. (21) Data protection requirements are described in Table 3. (22) The (23) The (24) The (25) The (26) Information Custodians are those individuals who control information (27) The Information Custodian defines information systems architecture and provides technical consulting assistance to (28) Information Custodians are responsible for safeguarding the information (29) In cases in which the information being stored is paper-based, and not electronic, the Information Custodian responsibilities will logically fall to the department gathering the information. For such systems, Digital Technology Solutions or Records Governance Services (RGS) can offer guidance or provide opportunities for digitisation. (30) Information Users are individuals who have been granted explicit authorisation by the relevant (31) An Information User will be responsible for: (32) When dealing with state or federal government classified data, advice must be sought from the Information Security Team to ensure appropriate data protections are applied.Data Classification and Handling Policy and Standard
Section 1 - Executive Summary
Section 2 - Purpose
Section 3 - Scope
Section 4 - Audience
Section 5 - Information Classification
Principles
Information Classification Requirements
Table 1 – The University of Newcastle Information Classification Scheme
IMPACT TYPE
SEVERITY
Lowest
<------>
Highest
Insignificant to Minor
Moderate
Major
Severe
Security – What advantage does this information provide?
Little or no advantage.
Might provide some advantage.
Definite advantage.
Significant advantage.
Likelihood of malicious persons searching for this information.
Low or no likelihood.
Low
Medium
High
If this
Provision of business operation and service.
Significant effect on operational performance.
Compliance / Legal
Employees / WHS
No impact to employees / WHS
Financial
2-5% budget or $250k – 1m.
5-10% budget or $1-5m.
Over 10% of budget or over $5m.
Reputation
No impact to reputation.
Service Levels
Loss of 1-7 days of teaching,
Loss of two weeks to two months of teaching,
Loss of over two months of teaching,
Example information types
Public
X–in-Confidence
Restricted
Highly-Restricted
Alignment with Government Security Classification
Table 2 – Alignment of University Information Classification Scheme with Government Security Classification
University
NSW
Commonwealth
Public
UNOFFICIAL and OFFICIAL
UNOFFICIAL and OFFICIAL
X-in-Confidence
OFFICIAL: Sensitive
OFFICIAL: Sensitive
Restricted
PROTECTED
PROTECTED
Highly-Restricted
SECRET
SECRET
N/A
TOP SECRET
TOP SECRET
Section 6 - Data Protections
Data Protection Requirements
Table 3 – Data Protection Requirements
Top of Page
Data Protections
Control Category
Description of Controls
Public
X – In confidence
Restricted
Highly Restricted
Access Control
No restriction on viewing
X
Role-based access to ICT resources and data
X
X
X
Access to authorised users only
X
X
X
Authentication and authorisation required for access
X
X
X
X
X
Authorisation by Information owner required for modification
X
X
X
X
Multi-Factor Authentication recommended
X
X
Multi-Factor Authentication required
X
Non-disclosure agreement required to be signed by
X
X
X
Copying / Printing (paper and electronic forms)
No restrictions
X
Should not be left unattended on a printer
X
X
X
Data should only be printed when there is a legitimate need
X
X
X
Electronic and physical copies must be labeled according to their data classification
X
X
X
Copies must be limited to authorised individuals
X
X
X
Network Security
Protection with firewall and Intrusion Prevent System (IPS) required
X
X
X
X
Access to user interfaces must be via a virtual server or reverse proxy. No direct access to servers permitted for end users
X
X
X
X
Servers hosting the data should not be visible to the Internet. Presentation layer services should reside in a DMZ network
X
X
X
Servers hosting the data should not be visible to unprotected internal networks such as Students, Guest & Quarantine
X
System Security
Systems should be hardened as per vendor hardening guidelines
X
X
X
X
Apply security patches within defined SLA
X
X
X
X
Anti-virus software must be installed on all applicable systems, and must be automatically updated with the latest signatures
X
X
X
X
Host-based firewall enabled in default deny mode, and permit minimum necessary services
X
X
PC hard drives and removable media must be encrypted
X
X
X
Data should not be stored or processed on PCs, portable devices, and removable media. Data should remain secured within the
X
Physical Security
Facility that provides access to data must be locked or logged out when unattended or unused
X
X
X
Documents and information
X
X
X
Must be hosted in a Secure Data Centre
X
X
Physical access must be monitored, logged, and limited to authorised individuals
X
Remote Access to systems hosting data for administrative purposes
Requires user authentication
X
X
X
X
Multi-Factor Authentication recommended for roles with administrative access to data
X
Multi-Factor Authentication required for roles with administrative access to data
X
X
Access to administrative interfaces restricted to IT Management networks, or via a Jump Server, or protected with Multi-Factor Authentication
X
X
Remote access by
X
X
X
Unsupervised remote access by third party, such as an application vendor, for technical support is not allowed, unless covered by an appropriate formal agreement stipulating data handling requirements equivalent to or stronger than those in this document
X
X
X
Audit logs
Log login and logoff events, and login failures
X
X
X
Log delete events
X
X
Forward logs to a remote log management server (SIEM)
X
X
Log read and write events
X
X
Transmission of data
Encryption required (e.g. HTTPS, SCP, SFTP)
X
X
X
Must not be sent via email unless encrypted
X
X
X
Backups
Daily backups required
X
X
X
X
Geographically dispersed storage required
X
X
Disposal
All disposals of data (electronic and hard copy) must be made in accordance with the appropriate General Disposal Authority (GDA) – University Record Retention and Disposal
X
X
X
X
Paper-based information shredded and placed in managed confidential bins
X
X
X
Wipe, erase or destroy electronic media such as hard drives, USBs, CD and DVDs
X
X
X
Section 7 - Roles and Responsibilities
Information owner
Information Custodian
Information User
View Current
This is not a current document. To view the current version, click the link in the document's navigation bar.
Impact
Some localised inconvenience, but no impact to the University .
Disruption to operations with no permanent or significant effect on University .
Some impact on the University's operational performance.
Less impact on strategic goals in the medium term.
Achievement of operational and strategic goals in the medium term jeopardised.
Existence of the University under threat.
Breach of legislation, contract, rule or policy that does not have any penalty or litigation impact.
Breach of legislation, contract, rule or policy that may have an impact on the relationship with the third party or the legislator, but no long lasting effect.
No litigation or prosecution and/or penalty.
Regulatory consequence limited to standard inquiries.
Breach of legislation, contract rule or policy leading to escalated legal enquiries.
Regulatory or legal consequence limited to additional questioning or review by legislator.
Breach of legislation, contract, rule or policy leading to possible legal action.
Possible litigation or criminal prosecution and/or penalty.
External enquiry or regulatory review and/or possible negative sanction by a regulatory body.
Breach of legislation, contract, rule or policy leading to significant and costly legal action with widespread potential impact for the University .
Litigation or criminal prosecution and/or substantial major negative sanction by a regulatory body.
Continuity of employment concerns across the University .
WHS incident requiring significant medical attention.
WHS event reported and investigated.
Significant (up to 15%) loss of staff contained to one college / division.
Widespread damage to staff morale.
WHS event causing serious injury, or negative environmental impact, and the relevant external authority notified.
Significant loss of staff extending to the entire University (over 15%).
WHS event causing serious permanent injury, death or environmental.
Impact leading to costly action and widespread impact on the University and/or senior staff .
Less than 1% of budget or up to $25K.
1 to 2% of budget or $25-50k.
National media coverage and external criticism.
Reputation impacted with some stakeholders.
Loss of student confidence in a School or College .
Sustained adverse national media and public coverage.
Reputation impacted with a significant number of stakeholders.
Breakdown in strategic and or business partnership.
Loss of student confidence in the University .
Reputation and standing of the University affected nationally and internationally.
Serious public outcry and/or international coverage.
Reputation impacted with majority of key stakeholders.
Significant breakdown in strategic and or business partnerships.
Loss of less than one day’s teaching, research and/or business functions.
Loss of one full day of teaching, research and/or business functions.
Published research data.
Business unit process and procedure.
Unpublished intellectual property .
ITC system design and configuration information.
Departmental intranet.
Organisational financial data.
Current exam material.
Research Data (containing personal data).
Data subject to regulatory control.
Employee relations and complaints information.
Medical, Children & Young person’s information.
Recommended information classification