Information Security Policy
|
|
- Laurel Shields
- 8 years ago
- Views:
Transcription
1 Information policies and standards Department of Transport and Main Roads Prepared by Enterprise Security Unit Version no. v3.0 Status Final QGCIO ref. QGEA Information Standard, Information Security (IS18) DMS ref. no. 700/00458 E Template v1.0 I:\Policies\Information Security IS18\v3.0 Final 2009\Information security policy v3.0.doc
2 Version legend Version Document status Date 2.0 Final Sign off document 08/08/ Draft policy rewritten by Information Policies and Standards Unit to 18/06/2009 combine the two department's separate policies. Further amended to align to updated QGCIO Information Security Standard (IS18) 2.2 Review by Enterprise Security Unit 10/09/ Additional review by Enterprise Security Unit 16/11/ Final document 25/01/2010 Document control sheet Contact for enquiries and proposed changes Officer Phone Operational owner (Director) Lloyd Carter, Director (Information Management) Review officer (contact officer) Greg Smith, Enterprise Security Manager Version history Version no. Issue date Nature of amendment /09/2003 First final version /08/2008 Major review /01/2010 Major review to create one policy and remove all sub-policies including updated to new department's name following a restructure. This document has an information security classification of PUBLIC. The State of Queensland (Department of Transport and Main Roads) This work is licensed under a Creative Commons Attribution 2.5 Australia Licence To attribute this material, cite State of Queensland (Department of Transport and Main Roads) 2009, Information Security Policy Information policies and standards v3.0 ii
3 Document sign off This information policy is approved by the Director-General: David Stewart Director-General Signature Date 25/01/2010 This information policy is endorsed by: Jack Noye Deputy Director-General (Corporate) Signature Date 21/01/2010 This information policy is endorsed by: Cathi Taylor Chief Information Officer Signature Date 18/12/2009 This information policy is presented for approval by the operational owner: Lloyd Carter Director (Information Management), Enterprise Information and Systems Division Signature Date 14/12/2009 Information policies and standards v3.0 iii
4 Contents 1 Policy statement Scope Applicability Objectives Rationale Benefits Definitions References... 2 Information policies and standards v3.0 iv
5 1 Policy statement The Department of Transport and Main Roads will develop, document, implement and continually review appropriate security controls and processes to ensure the confidentiality, integrity and availability of the department's information and ICT assets. These information security controls and processes will include security measures to protect information from misuse and loss, and from unauthorised access, modification or disclosure. 2 Scope This policy encompasses all information and ICT assets (as defined in section 7) that are owned, managed or operated by the department. 3 Applicability This policy applies to all employees (as defined in section 7) for the duration of their employment within the department. 4 Objectives The objectives of this policy are to assist the department to meet all legislative requirements for information security and to mitigate the risk to the confidentiality, integrity and availability of the department's information and ICT assets. 5 Rationale Under the Queensland Financial and Performance Management Standard 2009 (Part 2, Section 27), the department has a legal requirement to implement policies and standards in compliance with the Queensland Government's Information Standard, Information Security (IS18). 6 Benefits The benefits to the department from implementing this policy include: appropriate protection and control of the departments information and ICT assets information security measures commensurate with the value, business significance and sensitivity of the department's information assets adherence to all legal and legislative requirements. 7 Definitions Terms, abbreviations and acronyms Authentication Definitions Process that verifies the claimed identity of an individual as established by an identification process. Information policies and standards v3.0 1
6 Terms, abbreviations and acronyms Employee ICT ICT assets Information Information assets QGCIO Definitions All temporary and permanent staff, consultants, contractors, students or any other person who provides services on a paid or voluntary basis to the Department of Transport and Main Roads. Information and communication technology. ICT hardware, software, systems and services used in the departments operations including physical assets used to process, store or transmit information. Knowledge communicated, processed, analysed, interpreted, classified or received concerning some fact or circumstance. An identifiable collection of data stored in any manner and recognised as having value for the purpose of enabling the department to perform its business functions, thereby satisfying a recognised departmental requirement. Note: Data or information from an external source does not need to be managed as the department's information asset. However, any modification of this information will create a new information asset that will require management. The Queensland Government Chief Information Office within the Department of Public Works provides strategic leadership, management and advice to ensure that whole-of-government ICT initiatives are maximised. 8 References Queensland Government Information Standard, Information security (IS18), Queensland Government Chief Information Office ges/information%20security.aspx Financial Accountability Act Financial and Performance Management Standard Queensland Government Enterprise Architecture 2.0, Queensland Government Chief Information Office s/index.aspx Queensland Government Authentication Framework, Queensland Government Chief Information Office Queensland Government Information Security Classification Framework, Queensland Government Chief Information Office Information policies and standards v3.0 2
Complaints Management Policy
Complaints Management Policy Effective date This policy will take effect from 15 March 2012. This document has an information security classification of PUBLIC. The State of Queensland (Department of Transport
More informationTasmanian Government Identity and Access Management Toolkit
Tasmanian Government Identity and Access Management Toolkit Summary January 2010 Department of Premier and Cabinet For further information on the Toolkit, contact the Office of egovernment: egovernment@dpac.tas.gov.au
More informationCloud Computing Strategy. an addendum to the. Queensland Government. ICT Strategy 2013 17. Queensland Government
Department of Science, Information Technology, Innovation and the Arts Queensland Government Cloud Computing Strategy an addendum to the Queensland Government ICT Strategy 2013 17 Supporting Queensland
More informationTreasurer s Guidelines for the Use of the Queensland Government Corporate Purchasing Card
Treasurer s Guidelines for the Use of the Queensland Government Corporate Purchasing Card Policy requirements for public sector entities using corporate credit cards as a payment tool Document details
More informationGuideline for Roles & Responsibilities in Information Asset Management
ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009
More informationQueensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
More informationInformation Management Advice 50 Developing a Records Management policy
Information Management Advice 50 Developing a Records Management policy Introduction This advice explains how to develop and implement a Records Management policy. Policy is central to the development
More informationNHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
More informationHow To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
More informationEA-ISP-001 Information Security Policy
Technology & Information Services EA-ISP-001 Information Security Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 13/03/2015 Document Security Level: PUBLIC Document Version: 2.41 Document Ref:
More informationRecords Management Policy
Records Management Policy Responsible Officer Chief Operating Officer Approved by Vice-Chancellor Approved and commenced April, 2014 Review by April, 2017 Relevant Legislation, Ordinance, Rule and/or Governance
More informationInformation Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
More informationOPERATIONAL DIRECTIVE. Data Stewardship and Custodianship Policy. Superseded By:
OPERATIONAL DIRECTIVE Enquiries to: Ruth Alberts OD number: OD0321/11 Performance Directorate Phone number: 9222 4218 Date: February 2011 Supersedes: OD 0107/08 File No: F-AA-00673 Subject: Data Stewardship
More informationInformation Privacy Policy
Information Privacy Policy pol-032 Version: 2.01 Last amendment: Oct 2014 Next Review: Aug 2017 Approved By: Council Date: 04 May 2005 Contact Officer: Director, Strategic Services and Governance INTRODUCTION
More informationInformation security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
More informationInformation Management Responsibilities and Accountability GUIDANCE September 2013 Version 1
Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1 Document Control Document history Date Version No. Description Author September 2013 1.0 Final Department of
More informationFinancial Management Framework >> Overview Diagram
June 2012 The State of Queensland (Queensland Treasury) June 2012 Except where otherwise noted you are free to copy, communicate and adapt this work, as long as you attribute the authors. This document
More information4.10 Information Management Policy
Policy Statement Information is a strategic business resource that the must manage as a public trust on behalf of Nova Scotians. Effective information management makes program and service delivery more
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationSecurity Awareness and Training
T h e A u d i t o r - G e n e r a l Audit Report No.25 2009 10 Performance Audit A u s t r a l i a n N a t i o n a l A u d i t O f f i c e Commonwealth of Australia 2010 ISSN 1036 7632 ISBN 0 642 81115
More informationIssue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
More informationStandard. Enterprise Architecture Dispensation. 1. Statement. 2. Scope. 3. Dispensation Requests QH-IMP-402-13:2014. 3.1. Approach
Enterprise Architecture Standard QH-IMP-402-13:2014 1. Statement This Standard describes the dispensation process (Enterprise Architecture Health Service Directive (HSD) and Enterprise Architecture Policy
More informationMerthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
More informationHead of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
More information(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
More informationFISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
More informationInformation Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
More informationThe system: does NOT contain PII. If this is the case, you must only complete Section 13.
1. Contact Information Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
More informationCapital Works Management Framework
POLICY DOCUMENT Capital Works Management Framework Policy for managing risks in the planning and delivery of Queensland Government building projects Department of Public Works The concept of the asset
More informationPolicy (Board Approved)
Policy (Board Approved) Legal and Regulatory Compliance Policy Document Number GOV-POL-20 1.0 Policy Statement Stanwell is committed to and conducts its business activities lawfully and in a manner that
More informationRECORD KEEPING IN HEALTHCARE RECORDS POLICY
RECORD KEEPING IN HEALTHCARE RECORDS POLICY Version 6.0 Key Points The Policy provides a framework for the quality of the clinical record facilitates high quality, safe patient care and that subsequently
More informationSecurity Incident Management Process. Prepared by Carl Blackett
Security Incident Management Prepared by Carl Blackett 19/01/2009 DOCUMENT CONTROL Purpose of document This document describes the Security Incident Management and defines all roles and responsibilities
More informationEmail Protective Marking Standard Implementation Guide for the Australian Government
Email Protective Marking Standard Implementation Guide for the Australian Government May 2012 (V2012.1) Page 1 of 14 Disclaimer The Department of Finance and Deregulation (Finance) has prepared this document
More informationCOUNCIL POLICY R180 RECORDS MANAGEMENT
1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.
More informationENTERPRISE RISK M A NAGEMENT POLICY
Tablelands Regional Council ENTERPRISE RISK M A NAGEMENT POLICY Draft Final Policy No: PD 3.3.1 File ref: PD 3.3.1 Policy Section: INSURANCE AND RISK MANAGEMENT Version: 1 Date Adopted: 7 July 2010 Review
More informationCorporate Governance Framework June 2015
Corporate Governance Framework June 2015 This publication has been compiled by Don Clunes of the Office of the Director-General, Department of Energy and Water Supply. State of Queensland, 2015. The Queensland
More informationGuideline for the Implementation of Retention and Disposal Schedules
Guideline for the Implementation of Retention and Disposal Schedules Guideline for Queensland Public Authorities Queensland State Archives March 2014 Department of Science, Information Technology, Innovation
More informationPrivacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
More informationThird Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationInformation Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
More informationNSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
More informationINDEFINITE DELIVERY CONTRACT(IDC) GENERAL CONTRACTOR CONSTRUCTION SERVICES DELIVERY ORDER WORK RELEASE AND CHANGE ORDER PROCEDURES
Page 1 of 5 MUSC Construction Services Delivery Order (SE-680) and Change Orders (SE-690): 1) Contract Administrator receives a proposal which is signed by the Project Manager and Director of Engineering
More informationInformation Governance Policy
Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading
More informationCorporate ICT Asset Management
Policy Corporate ICT Asset Management Please note this policy is mandatory and staff are required to adhere to the content Summary A comprehensive program to monitor the location, use and value of all
More informationInformation & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
More information5.3. Train@ CQUniversity records and information will be captured and managed within one of the following corporate systems:
POLICY AND PROCEDURE RECORDS MANAGEMENT 1 PURPOSE This policy and procedure provide a framework for the creation, management, retention and disposal of Train@ CQUniversity records in accordance with the
More informationNetwork Password Management Policy & Procedures
Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL
More informationPolicy Checklist. Head of Information Governance
Policy Checklist Name of Policy: Information Governance Policy Purpose of Policy: To provide guidance to all staff on their responsibilities regarding information governance and to ensure that the Trust
More informationInformation Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
More informationInformation Management: A common approach
Information Management: A common approach July 2013 Document Control Document history Date Version No. Description Author July 2013 1.0 Final Department of Finance and Services October 2013 1.1 Updated
More informationPrivacy Policy. Board for Lutheran Education Australia. Policy. Purpose. Exclusion
Policy Relevant to Responsible officer Contact officer Authorisation Date introduced March 2014 Effective date of latest version March 2014 Next review date March 2017 Relevant legislation or source Board
More informationNUMBER 107-004-030 PO EFFECTIVE DATE. July 1, 2015 REFERENCE/AUTHORITY. Procedure: 107-004-030 PR APPROVED SIGNATURE
STATEWIDE POLICY DIVISION NUMBER 107-004-030 PO EFFECTIVE DATE July 1, 2015 REFERENCE/AUTHORITY SUPERSEDES Policy #107-004-030 Feb. 1, 2004 PAGE NUMBER Pages 1 of 7 Chief Information Office POLICY OWNER
More informationService Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
More informationRotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
More informationNHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
More informationCOMPANY NAME. Environmental Management System Manual
Revision No. : 1 Date : DD MM YYYY Prepared by : Approved by : (EMR) (Top Management) Revision History Revision Date Description Sections Affected Revised By Approved By Table of Content 0.0 Terms and
More informationQUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
More informationSPG 223 Fraud Risk Management. June 2015
SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation
More informationWest Midlands Police and Crime Commissioner Records Management Policy 1 Contents
West Midlands Police and Crime Commissioner Records Management Policy 1 Contents 1 CONTENTS...2 2 INTRODUCTION...3 2.1 SCOPE...3 2.2 OVERVIEW & PURPOSE...3 2.3 ROLES AND RESPONSIBILITIES...5 COMMISSIONED
More informationRECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
More informationTechnical Competency Framework for Information Management (IM)
Technical Competency Framework for Information Management (IM) Office of the Chief Information Officer (OCIO) June 15, 2009 Table of contents IM Competency Framework...1 Competency 1: Information Management
More informationBanking Supervision Policy Statement No.18. Agent Banking Guideline
Banking Supervision Policy Statement No.18 Agent Banking Guideline NOTICE TO COMMERCIAL BANKS LICENSED UNDER THE BANKING ACT 1995 PART I: PRELIMINARY 1. Introduction 1.1. This Notice, issued under section
More informationInformation and records management. Purpose. Scope. Policy
Information and records management NZQA Quality Management System Policy Purpose The purpose of this policy is to establish a framework for the management of corporate information and records within NZQA.
More informationDFS C2013-6 Open Data Policy
DFS C2013-6 Open Data Policy Status Current KEY POINTS The NSW Government Open Data Policy establishes a set of principles to simplify and facilitate the release of appropriate data by NSW Government agencies.
More informationMIS Privacy Statement. Our Privacy Commitments
MIS Privacy Statement Our Privacy Commitments MIS Training Institute Holdings, Inc. (together "we") respect the privacy of every person who visits or registers with our websites ("you"), and are committed
More informationSoftware Policy. Software Policy. Policy and Guidance. June 2013
Software Policy Policy and Guidance June 2013 Project Name Software Policy Product Title Policy and Guidance Version Number 1.2Final Page 1 of 8 Document Control Organisation Title Author Filename Owner
More informationCouncil Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
More informationInformation and Compliance Management Information Management Policy
Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and
More informationInformation Management Advice 39 Developing an Information Asset Register
Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if
More information3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;
Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document
More informationNSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
More informationInformation Management Committee. Terms of Reference
Information Management Committee Terms of Reference 1 DOCUMENT INFORMATION This is a document controlled by the Chair of the Information Management Committee and endorsed by Board of Management. VERSION
More informationPolicy Document RECORDS MANAGEMENT POLICY
The District Council Of Elliston Policy Document RECORDS MANAGEMENT POLICY Date Adopted: 16 th December 2005 Review Date: Ongoing, as necessary Minute Number: 300. 2005 E:\WPData\Jodie\My Documents\policies
More informationBusiness Internet Banking
Business Internet Banking user guide COMMERCIAL BANKING Business Internet Banking / USER GUIDE 1 Dear Customer, Thank you for choosing Business Internet Banking (BIB) from HSBC to conduct your business
More informationSECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT
SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT Through CGIAR Financial Guideline No 3 Auditing Guidelines Manual the CGIAR has adopted the IIA Definition of internal auditing
More informationDate of review: Information Governance Group January 2016. Policy Category: CONTENT SECTION DESCRIPTION PAGE
Title: Date Approved: January 2015 Division/Department: Corporate Services Corporate Records Policy Approved by: Date of review: Information Governance Group January 2016 Author (post-holder): Interim
More informationUniversity of Ulster Policy Cover Sheet
University of Ulster Policy Cover Sheet Document Title Custodian Approving Committee Information Technology Disaster Recovery and Data Backup Policy 1.2 Deputy Director of Finance and Information Services
More informationRecords Management Policy
Once printed off, this is an uncontrolled document. Please check the Intranet for the most up to date copy Author Freedom of Information Lead Version 5.0 Issue Issue Date October 2011 Review Date October
More informationACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services
ACT Auditor-General s Office Performance Audit Report Whole-of-Government Information and Communication Technology Security Management and Services Report No. 2 / 2012 PA 09/03 The Speaker ACT Legislative
More informationINFORMATION TECHNOLOGY POLICY
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY POLICY Name Of : DPW Information Security and Privacy Policies Domain: Security Date Issued: 05/09/2011 Date Revised: 11/07/2013
More informationStatements of Learning for Information and Communication Technologies (ICT)
Statements of Learning for Information and Communication Technologies (ICT) ISBN-13: 978-1-86366-633-6 ISBN-10: 1 86366 633 8 SCIS order number: 1291673 Full bibliographic details are available from Curriculum
More informationBUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
More informationCorporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
More informationInformation Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
More informationHighland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
More informationLegislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
More informationInformation Handling Policy
Information Handling Policy 10 December 2015 Information Handling Policy 1. Who We Are 1.1 In this Information Handling Policy, references to we, our, us and ClearView are to ClearView Wealth Limited and
More informationBEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
More information005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to privacy.consultation@ag.gov.au) Your details Name/organisation
More informationInformation Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
More informationTABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
More informationAPPLICATIONS WILL NOT BE ACCEPTED BY A THIRD PARTY
Role Description APPLICATIONS WILL NOT BE ACCEPTED BY A THIRD PARTY Job ad reference: MN207084 Closing Date: Wednesday, 06 April 2016 Role title: Senior Procurement and Contracts Officers Classification:
More informationIT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationIT Security Management
The Auditor-General Audit Report No.23 2005 06 Protective Security Audit Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036 7632 ISBN 0 642 80882 1 COPYRIGHT INFORMATION This work
More informationNetwork Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. jgkolo@gmail.com, usdauda@gmail.com
More informationInformation Management and Protection Policy
Document Title: Information Management and Protection Policy Document Type: Policy No. Of Pages (11) Scope: Government of Newfoundland and Labrador and Public Bodies supported by the Office of the Chief
More informationSocial impact assessment. Guideline to preparing a social impact management plan
Social impact assessment Guideline to preparing a social impact management plan September 2010 Looking forward. Delivering now. The Department of Infrastructure and Planning leads a coordinated Queensland
More information