Contact Reporting Guidelines The Australian Government Contact Reporting Scheme

Size: px
Start display at page:

Download "Contact Reporting Guidelines The Australian Government Contact Reporting Scheme"

Transcription

1 Contact Reporting Guidelines The Australian Government Contact Reporting Scheme Version 1.0 Approved September 2010

2 Contents Introduction... 1 The role of ASIO... 1 Australian Government Contact Reporting Scheme... 2 Threat sources... 2 Reporting Criteria... 3 Reporting procedures... 3 Implementation... 4 Implementation outside Australia... 4 Required contact report information... 5 Contact Report Form... 6 i

3 Introduction This guide should be read in conjunction with the: Protective Security Policy Framework, and PSPF - Australian Government Personnel Security Protocol. Information provided in these guidelines was provided by the Australian Security Intelligence Organisation (ASIO). The Australian Government has developed a number of mechanisms designed to protect official information from potential compromise because of accidental or deliberate disclosure. A key element in protecting official information is informing Australian Government employees of the risk posed by foreign intelligence services in Australia and overseas. Human intelligence collection is low-risk and a very common form of intelligence gathering. Intelligence services can develop an aggregate picture through low-level collection from a number of sources including government employees. Throughout this document, employees are defined as: people employed by, or representing, the Australian, State or Territory Governments government contractors and their employees, and all others who hold Australian Government security clearances. Small pieces of information they may provide others could form part of an intelligence collection process. Accordingly, employees need to recognise that an innocent conversation or contact (eg. ) with a foreign official can be part of human intelligence gathering. The role of ASIO ASIO is Australia s security intelligence service. Its roles and responsibilities are mandated by the Australian Security Intelligence Organisation Act 1979 (ASIO Act). The ASIO Act specifies ASIO s role as security. This is defined as the protection of Australia, its people and its interests from: espionage sabotage politically motivated violence acts of foreign interference promotion of communal violence attacks on Australia s defence systems, and Australia s territorial and border integrity from serious threats. ASIO s responsibility for security extends geographically beyond Australia. In fulfilling its obligations to protect Australia, ASIO collects, assesses, investigates and disseminates intelligence relevant to security. 1

4 Australian Government Contact Reporting Scheme ASIO manages the Australian Government Contact Reporting Scheme. Specifically, the Scheme assists ASIO in identifying intelligence or hostile activity directed against Australia and its interests, government employees and contractors, and people who hold an Australian Government security clearance. It also helps identify trends, including: what information is of interest to foreign intelligence services who is interested in it, and the methods the foreign intelligence services are prepared to use to collect the information. ASIO uses this intelligence to assist in the formulation of threat assessment and security intelligence advice. Threat assessments help agencies to understand existing threats to their resources and formulate appropriate counter measures for risk mitigation. Threat sources Foreign intelligence services, foreign officials and politically, commercially or issuemotivated groups and individuals can devote considerable energy and resources into obtaining access to political, economic, scientific, technological, military and other information. This is not limited to classified information. The access sought often includes privileged information, ie. information that is not normally available to the general public. Any compromise may be prejudicial to Australia s national interest. Relationships or contacts often happen when an employee's job requires communication with foreign representatives. Contacts can also occur, but are not limited to, scenarios such as: invitations to attend functions written correspondence sport and recreation activities overseas travel visits to embassies, consulates or involvement with trade missions or other international events membership of international clubs, institutes, professional associations or friendship societies incidental social interaction unsolicited phone calls including unsolicited phone calls where the caller has obtained the employee s details from a department/company website training or study (eg. language classes) on-line social networking sites, and/or introductions via a third party. The initial overture might be subtle, carefully planned and occur over an extended period of time. It is designed so that the person being cultivated is not aware it is occurring. However there could be indicators that arouse suspicion including: a seemingly innocuous interest in an employee s official, social or personal activities 2

5 a fascination with some particular aspect of an employee s work, social or personal activities requests for information about other employees who work in the agency a request to meet with the employee away from the work environment introduction to another person who takes a similar interest encouragement to participate in questionable or illegal activity, or offers of hospitality or gifts. Reporting Criteria Employees should complete a contact report when a contact, either official or social, with: embassy or foreign government officials within Australia, or foreign officials or nationals outside Australia seems suspicious, persistent or unusual in any respect, or becomes ongoing. Foreign officials could include trade or business representatives. Additionally, employees should complete a contact report for instances when an individual or group, regardless of nationality, seeks to obtain official information they do not have a need to access in order to fulfil their work function. Reporting procedures If an employee believes he/she has been the subject of contact by a foreign national that meets the reporting criteria, he/she should report the incident to the Agency Security Adviser (ASA). The ASA can provide employees with a Contact Report form. To assist with the accurate recall of events, the employee should complete a written report as soon as possible after the suspected contact has occurred. The ASA is responsible for receiving completed Contact Reports. The ASA should have the appropriate experience and expertise to: analyse reports make a sound judgement about the best course of action, and provide support and advice to the person who has been contacted. See PSPF Governance - Developing a Security Culture. ASAs are encouraged to seek advice from ASIO to assist in determining the best course of action. In certain exceptional circumstances, a contact report may lead to a security or criminal investigation. If the matter is clearly fraud-related, the agency should inform the AFP. Fraud may also involve loss of equipment or technology that may have application to a foreign country, including intellectual property. See PSPF Governance - Protective Security Investigations. Additionally agencies are to report promptly any potentially major security incidents to ASIO independent of the Contact Reporting Scheme. Examples of such incidents include the loss or compromise of security classified or privileged information in any format (eg. hard copy, electronic, verbal) or the loss of equipment or technology. 3

6 Implementation Agencies security awareness training programs are to ensure employees know about the Scheme and understand their obligations and the reporting arrangements. The Scheme is not intended to restrict legitimate contact between employees and foreign officials. It provides support and encourages information sharing, which benefits the Government employee who has been contacted, and the Australian Government. Agencies are to ensure employees are aware of: the existing threat and threat sources their personal and professional responsibilities the ways that people can be deceived, coerced or pressured into actions harmful to national security or interest the fact that targeting occurs across all levels or ranks of an organisation not just at senior level the fact that most attempts to collect intelligence will be subtle and often appear innocuous the effectiveness of security awareness training in restricting information collection by foreign representatives the need for high standards of personal conduct, and the procedures for contact reporting. Agencies are to identify whether or not they have people working in high risk areas and, if so, provide appropriate briefings. High risk employees include those who: are required to liaise with foreign officials because they have a good proficiency in the native language of the foreign officials are involved in sensitive or priority negotiations or policy work, or work in units which regularly share information with foreign officials. See PSPF Governance - Security awareness training guidelines. ASIO can provide a brief on the Contact Reporting Scheme to agencies. These briefings are arranged through the individual ASA. Implementation outside Australia The Contact Reporting Scheme does not aim to constrain official and social contact with representatives of other governments outside Australia. Rather, it aims to alert employees to the possibility that foreign officials contacting them could have ulterior motives obtaining classified or privileged information to which they have access. Employees performing official duties overseas should be aware that the intelligence and security services in certain countries conduct surveillance of foreign representatives. Employees should contact their ASA prior to travel to ascertain the possible threat from foreign intelligence services and seek appropriate briefings. ASIO can, where relevant, provide a briefing on security situations that individuals may encounter when they perform official duties overseas. This includes advice on document security, physical security, reporting procedures and other security issues. 4

7 Required contact report information The style and format of contact reports may vary from agency to agency, but the following information should be included: Time, Date indicating if details are approximate Location including address where contact or incident occurred Names, Designations and Nationalities the reporting person s details along with those of all other persons present during the contact Types of Contact may include a combination of social, informal, official business and/or other aspects. All aspects should be indicated Conversation any conversation or discussion may cover a number of subjects. The general topic areas should be described, including personal details disclosed by either party, and Other details such as the circumstances that led to the contact or incident and the factors that made it noteworthy or unusual, should be recorded. A generic Contact Report Form is attached. The person making the report should contact his/her ASA in the first instance for any enquiries regarding the Contact Reporting Scheme or Contact Reporting procedures. 5

8 Contact Report Form Details of Contact (If space is insufficient, please include an attachment) Time: Date: Location: Means of Contact: In Person Telephone Correspondence Other Contact Initiated By: If Other, please specify: Unit or Firm Rep Foreign Rep Other Topics of Conversation Significant to Security (Or details of incident): If Other, please specify: Names of Persons Present (Include Designations and Nationality): Further Contact (Outline any arrangements made): Reason or Occasion: Business Social Personal Official Incidental Other Other Information (eg Documents provided, undertakings given or received, etc): If Other, please specify: Details of Person Making the Report Signature: (Hard copy only) Printed Name: Designation/Position: Phone #: Date: The completed Contact Report Form should be provided to your Agency Security Adviser. 6

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Reporting incidents and conducting security investigations Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this

More information

SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY. Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1

SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY. Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1 SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1 CONTENTS PAGE BACKGROUND 3 REVIEW HISTORY 4 GAMBLING,

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Security of outsourced services and functions Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this publication

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Security awareness training Version 1.0 Approved September 2010 Contents Introduction... 1 Who gets of security awareness training/briefings?... 2 Security awareness

More information

Physical security management guidelines

Physical security management guidelines Physical security management guidelines Event security Approved 13 December 2011 Version 1.0 i Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons

More information

Cyber security the facts

Cyber security the facts Cyber security the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present and every business is at risk. Australia s security and intelligence agencies

More information

AUSTRALIAN SECURITY INTELLIGENCE ORGANISATION

AUSTRALIAN SECURITY INTELLIGENCE ORGANISATION AUSTRALIAN SECURITY INTELLIGENCE ORGANISATION Section 1: Agency overview and resources 1.1 STRATEGIC DIRECTION STATEMENT The mission of the Australian Security Intelligence Organisation (ASIO) is to identify

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Protective Security Governance Policy. Outlines ANAO protective security arrangements

Protective Security Governance Policy. Outlines ANAO protective security arrangements Protective Security Governance Policy Outlines ANAO protective security arrangements Version 2.0 Effective JULY 2012 Document management Document identification Document ID Document title Release authority

More information

Industry Security Notice

Industry Security Notice Industry Security Notice Number 2011/01 Subject: ADVICE ON THE USE OF SOCIAL MEDIA AND NETWORKING SITES BY MOD CONTRACTOR STAFF Introduction 1. The Ministry of Defence (MOD) is aware of the prevalence

More information

Fraud and the Government Internal Auditor

Fraud and the Government Internal Auditor Fraud and the Government Internal Auditor January 2012 Fraud and the Government Internal Auditor January 2012 Official versions of this document are printed on 100% recycled paper. When you have finished

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired

More information

GLOBAL PORTS INVESTMENTS PLC

GLOBAL PORTS INVESTMENTS PLC Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....

More information

Records Authority. Australian Security Intelligence Organisation

Records Authority. Australian Security Intelligence Organisation Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

BANKING. Sector Specific AML/CFT Guidance Notes. May 2015

BANKING. Sector Specific AML/CFT Guidance Notes. May 2015 BANKING Sector Specific AML/CFT Guidance Notes May 2015 Whilst this publication has been prepared by the Financial Supervision Commission, it is not a legal document and should not be relied upon in respect

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

Review of an SMSF audit engagement questionnaire

Review of an SMSF audit engagement questionnaire Review of an SMSF audit engagement questionnaire Introduction Instructions for the Reviewer This questionnaire has been designed to help you assess whether the audit of Self Managed Superannuation Funds

More information

Privacy Charter. Protecting Your Privacy

Privacy Charter. Protecting Your Privacy Privacy Charter Protecting Your Privacy 1 1. Introduction 3 2. Collection of personal information 3 What sort of personal information do we collect and hold? 3 Anonymity and Pseudonymity 3 Why do we collect

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

INFRAGARD.ORG. Portland FBI. Unclassified 1

INFRAGARD.ORG. Portland FBI. Unclassified 1 INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence

More information

FSDF SPATIAL INFORMATION MANAGEMENT POLICIES SECURITY

FSDF SPATIAL INFORMATION MANAGEMENT POLICIES SECURITY FSDF SPATIAL INFORMATION MANAGEMENT POLICIES SECURITY Objective: Securing the Foundation Spatial Data Framework. This document is presented by ANZLIC the Spatial Information Council, representing the Australian

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Statutory Disclosure Guidance. Second edition August 2015

Statutory Disclosure Guidance. Second edition August 2015 Statutory Disclosure Guidance Second edition August 2015 Statutory guidance to chief officers of police on providing information for inclusion in enhanced criminal record certificates PURPOSE OF THIS GUIDANCE

More information

Public Sector Internal Audit Standards. Applying the IIA International Standards to the UK Public Sector

Public Sector Internal Audit Standards. Applying the IIA International Standards to the UK Public Sector Public Sector Internal Audit Standards Applying the IIA International Standards to the UK Public Sector Issued by the Relevant Internal Audit Standard Setters: In collaboration with: Public Sector Internal

More information

2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY. WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA

2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY. WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA 2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA OVERVIEW The objects of this Bill are to ensure that employers

More information

Risk & Compliance Committee Charter. HCF Life Insurance Company Pty Ltd (ACN 001 831 250) (the Company )

Risk & Compliance Committee Charter. HCF Life Insurance Company Pty Ltd (ACN 001 831 250) (the Company ) Risk & Compliance Committee Charter HCF Life Insurance Company Pty Ltd (ACN 001 831 250) (the Company ) Board approval date: 27 October 2015 Contents 1. Introduction and Purpose of this Charter...1 2.

More information

Queensland State Emergency Service Operations Doctrine

Queensland State Emergency Service Operations Doctrine Queensland State Emergency Service Operations Doctrine Human Resources Business Management Directives Peer Support Version: 1.0 Valid from: 14/05/2008 BMH 19.0 1. PURPOSE To outline the scope and functions

More information

BBC. Anti-Bribery Policy. June 2011

BBC. Anti-Bribery Policy. June 2011 BBC Anti-Bribery Policy June 2011 CONTENTS CLAUSE 1. Anti-Bribery Policy statement... 1 2. Who is covered by the policy?... 2 3. What is bribery?... 2 4. Gifts and hospitality... 3 5. Gifts and hospitality

More information

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Business impact levels Approved November 2014 Amended April 2015 Version 2.1 Commonwealth of Australia 2013 All material presented in this publication is provided

More information

IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data

IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO

More information

Anti-Bribery and Corruption Policy

Anti-Bribery and Corruption Policy Newcrest strictly prohibits bribery and other unlawful or improper payments made to any individual or entity, as outlined in this Anti-Bribery & Corruption Policy. Newcrest's Anti- Bribery & Corruption

More information

CONTROL DOCUMENTATION for CAT II/IIA

CONTROL DOCUMENTATION for CAT II/IIA 1 CONFLICTS OF INTEREST MANAGEMENT POLICY: CONTROL DOCUMENTATION for CAT II/IIA 2 CONTENTS: Introduction 3 PAGE No. 1. Conflicts of Interest Management Policy Framework-Controls & Procedures (Notes on

More information

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures Open Awards Malpractice and Maladministration Policy and Procedures Page 1 of 14 Open Awards Malpractice and Maladministration Policy and Procedures Policy Statement Open Awards is committed to ensuring

More information

Act of 20 March 1998 No. 10 relating to Protective Security Services (the Security Act)

Act of 20 March 1998 No. 10 relating to Protective Security Services (the Security Act) Act of 20 March 1998 No. 10 relating to Protective Security Services (the Security Act) Chapter 1. General provisions Section 1. The purpose of the Act The purpose of this Act is to: a) take steps enabling

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Crampton Credit Reporting Policy

Crampton Credit Reporting Policy Crampton Credit Reporting Policy Crampton Automotive Pty Ltd (ACN 057 283 253), trading as Toowoomba Holden and its related bodies corporate (Crampton) is committed to protecting the privacy of individuals

More information

PRIVACY POLICY Personal information and sensitive information Information we request from you

PRIVACY POLICY Personal information and sensitive information Information we request from you PRIVACY POLICY Business Chicks Pty Ltd A.C.N. 121 566 934 (we, us, our, or Business Chicks) recognises and values the protection of your privacy. We also understand that you want clarity about how we manage

More information

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions

DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.

More information

Information Privacy Policy

Information Privacy Policy Information Privacy Policy pol-032 Version: 2.01 Last amendment: Oct 2014 Next Review: Aug 2017 Approved By: Council Date: 04 May 2005 Contact Officer: Director, Strategic Services and Governance INTRODUCTION

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position

More information

CRIME PROFILE SERIES ORGANISED CRIME IN PROFESSIONAL SPORT

CRIME PROFILE SERIES ORGANISED CRIME IN PROFESSIONAL SPORT Threats to the integrity of professional sport in Australia Organised criminal groups currently have a limited presence in professional sports in Australia. However, there are vulnerabilities within the

More information

Example of a Child Protection Policy

Example of a Child Protection Policy Example of a Child Protection Policy Introduction Policy Statement/aims Promoting good practice Good practice guidelines Use of photographic/filming equipment Recruitment and training of staff and volunteers

More information

RFU REGULATION 17 - ANTI-CORRUPTION AND BETTING

RFU REGULATION 17 - ANTI-CORRUPTION AND BETTING RFU REGULATION 7 - ANTI-CORRUPTION AND BETTING 7. Introduction and Scope 7.. This Regulation 7 establishes a set of regulations and sanctions to apply across the Game at International level and Contracted

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Belmont 16 Foot Sailing Club. Privacy Policy

Belmont 16 Foot Sailing Club. Privacy Policy Belmont 16 Foot Sailing Club Privacy Policy APRIL 2014 1 P age Belmont 16 Foot Sailing Club Ltd (the 16s ) respects your right to privacy and is committed to protecting your personal information. This

More information

Town of Cobleskill Workplace Violence Policy & Procedures

Town of Cobleskill Workplace Violence Policy & Procedures The employer known as the Town of Cobleskill has a long-standing commitment to promoting a safe and secure work environment that promotes the achievement of its mission of serving the public. All employee

More information

POLICY TITLE: MATCH FIXING POLICY

POLICY TITLE: MATCH FIXING POLICY POLICY TITLE: MATCH FIXING POLICY RELATED POLICIES: RESPONSIBLE OFFICERS: AUTHORITY: APPLICABLE FORMS: Player Contract Disciplinary Policy Chief Executive Officer Bowls Australia Board Nil APPROVED: July,

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Incident Response Policy Reference Number Title CSD-012 Information Security Incident Response Policy Version Number 1.2 Document Status Document Classification

More information

INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS)

INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) INTERNATIONAL STANDARDS FOR THE PROFESSIONAL PRACTICE OF INTERNAL AUDITING (STANDARDS) Introduction to the International Standards Internal auditing is conducted in diverse legal and cultural environments;

More information

Public Sector Internal Audit Standards

Public Sector Internal Audit Standards Public Sector Internal Audit Standards Table of Contents Section 1 Introduction 3 Section 2 Applicability 6 Section 3 Definition of Internal Auditing 8 Section 4 Code of Ethics 9 Section 5 Standards 12

More information

Whistleblower Protection Policy

Whistleblower Protection Policy Whistleblower Protection Policy Contents Definitions... 3 1.0 Background... 5 2.0 Purpose of this Policy... 5 3.0 Policy commitment... 5 4.0 To whom does this Policy apply?... 5 5.0 Laws, regulations and

More information

The faculty of BGSU reaffirms that the following are an accepted part of their responsibilities as teacher-scholars:

The faculty of BGSU reaffirms that the following are an accepted part of their responsibilities as teacher-scholars: Page 1 of 7 SECTION E: ETHICAL RESPONSIBILITIES Faculty members shall follow professional ethical standards in conducting the affairs of the University. These standards are articulated in the Statement

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:41 Security for Projects and Capability Planning Version 3 ation date July 2015 Amendment list 24 Optimised for Screen; Print; Screen Reader Releasable to Compliance

More information

Internal Audit Standards

Internal Audit Standards Internal Audit Standards Department of Public Expenditure & Reform November 2012 Copyright in material supplied by third parties remains with the authors. This includes: - the Definition of Internal Auditing

More information

Threat Intelligence. Benefits for the enterprise

Threat Intelligence. Benefits for the enterprise Benefits for the enterprise Contents Introduction Threat intelligence: a maturing defence differentiator Understanding the types of threat intelligence: from the generic to the specific Deriving value

More information

ANTI-CORRUPTION (SPORTS BETTING) POLICY. Scottish Target Shooting Federation

ANTI-CORRUPTION (SPORTS BETTING) POLICY. Scottish Target Shooting Federation ANTI-CORRUPTION (SPORTS BETTING) POLICY Scottish Target Shooting Federation Approved by the STSF Council on: 19/03/2014 Page 1 of 15 CONTENTS Section 1: Section 2: Introduction Sporting Integrity Section

More information

All photographers and staff at Success Photography must ensure that:

All photographers and staff at Success Photography must ensure that: Child Protection Policy All photographers and staff at Success Photography must ensure that: The welfare of the child is paramount. All children, whatever their age, culture, disability, gender, language,

More information

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2014 All material presented in this publication

More information

Volunteer Policy & Procedures POLICY AND PROCEDURES MANUAL FOR VOLUNTEERS

Volunteer Policy & Procedures POLICY AND PROCEDURES MANUAL FOR VOLUNTEERS Volunteer Policy & Procedures POLICY AND PROCEDURES MANUAL FOR VOLUNTEERS Contents 1. ACF Volunteer Policy 2. ACF Volunteer Procedures 1. Recruitment 1.1 Position descriptions 1.2 Initial contact 1.3 Registration

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING

NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING NATO SECURITY BRIEFING FOREWORD This sample security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified

More information

POLICE CHECKS GUIDANCE NOTE

POLICE CHECKS GUIDANCE NOTE POLICE CHECKS GUIDANCE NOTE Index Purpose Obligations and risks Information about national police checks Recruiting new staff Checking current employees Finding out more Purpose When recruiting someone

More information

PRSTS301A Identify technical security requirements

PRSTS301A Identify technical security requirements PRSTS301A Unit descriptor Employability skills Application of the unit Unit sector ELEMENT Elements describe the essential outcomes of a unit of competency. 1 Prepare to identify security requirements.

More information

Spear phishing campaign targeting staff to perform wire transfers

Spear phishing campaign targeting staff to perform wire transfers Spear phishing campaign targeting staff to perform wire transfers Updated 3 February 2015. This is an update to the advisory originally released on 9 October 2014. The update includes additional recommendations

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

Code of Business Conduct

Code of Business Conduct Code of Business Conduct Our Employees We treat each other with fairness, respect, and dignity, offering equal opportunities to all individuals. Intimidation, harassment, or discrimination based on race,

More information

CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015

CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015 GOLDFIELDS MONEY LIMITED ACN 087 651 849 CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015 1. Purpose This Code of Conduct (Code) clearly states the standards of responsibility and

More information

Sample Workplace Alcohol and Drugs Policy

Sample Workplace Alcohol and Drugs Policy Sample Workplace Alcohol and Drugs Policy 1. Introduction This company is committed to providing a safe, healthy and productive working environment for all employees, contractors, customers and visitors

More information

SCOTTISH CHILDREN S REPORTER ADMINISTRATION

SCOTTISH CHILDREN S REPORTER ADMINISTRATION Part 1 - Policy for Fraud Prevention, Detection and Investigation 1. Introduction 1.1 SCRA like other public bodies, has a duty to conduct its affairs in a responsible and transparent way and to take into

More information

National Accreditation Scheme

National Accreditation Scheme National Accreditation Scheme A national accreditation program has been developed by the Coaching and Officiating Unit of the Australian Sports Commission - (i.e. previously known as the Australian Coaching

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

The Sector Skills Council for the Financial Services Industry. National Occupational Standards for the Financial Services Sector.

The Sector Skills Council for the Financial Services Industry. National Occupational Standards for the Financial Services Sector. The Sector Skills Council for the Financial Services Industry National Occupational Standards for the Financial Services Sector Bank Accounts Contents Unit BA1 Unit BA2 Unit BA3 Unit BA4 Unit BA5 Unit

More information

Consultant Annual DoD Security Refresher

Consultant Annual DoD Security Refresher Consultant Annual DoD Security Refresher 1 About This Course This course should be taken by Consultants Only in this PDF format All others should take this course online LMPeople > LMCareers > Learning

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

12 FAM 260 COUNTERINTELLIGENCE

12 FAM 260 COUNTERINTELLIGENCE 12 FAM 260 COUNTERINTELLIGENCE 12 FAM 261 GENERAL (CT:DS-191; 03-29-2013) (Office of Origin: DS/DO/ICI) 12 FAM 261.1 Program Implementation a. The Department s counterintelligence (CI) program is defensive

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

Board Charter. HCF Life Insurance Company Pty Ltd (ACN 001 831 250) (the Company )

Board Charter. HCF Life Insurance Company Pty Ltd (ACN 001 831 250) (the Company ) Board Charter HCF Life Insurance Company Pty Ltd (ACN 001 831 250) (the Company ) Board approval date: 27 October 2015 Contents 1. Introduction and Purpose of this Charter...1 2. Role of the Board...1

More information

National Policy on Match-Fixing in Sport

National Policy on Match-Fixing in Sport As agreed by Australian Governments on 10 June 2011... Corruption in sport is an emerging and critical issue facing Australian and international sport... the integrity of sport must be protected. Sport

More information

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Audit summary of Security of Infrastructure Control Systems for Water and Transport V I C T O R I A Victorian Auditor-General Audit summary of Security of Infrastructure Control Systems for Water and Transport Tabled in Parliament 6 October 2010 Background Infrastructure critical to the

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

Hazard/Incident Recording, Reporting and Investigation

Hazard/Incident Recording, Reporting and Investigation Hazard/Incident Recording, Reporting and Investigation Power and Water Corporation Procedure 1 Purpose... 1 2 Scope... 1 3 References... 2 4 Roles and Responsibilities... 2 5 Definitions... 6 6 Records...

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994

NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994 [ASSENTED TO 23 NOVEMBER 1994] [DATE OF COMMENCEMENT: 1 JANUARY 1995] (English text signed by the President) as amended by National Strategic Intelligence

More information

EA-ISP-005-Personnel IT Policy. Technology & Information Services. Owner: Adrian Hollister Author: Paul Ferrier Date: 17/02/2015

EA-ISP-005-Personnel IT Policy. Technology & Information Services. Owner: Adrian Hollister Author: Paul Ferrier Date: 17/02/2015 Technology & Information Services EA-ISP-005-Personnel IT Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 17/02/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref: EA-ISP-005

More information

COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT

COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT 1. Introduction The Company is committed to maintaining ethical standards in the conduct of its business activities. The Company's reputation as an ethical

More information

Physical security management guidelines

Physical security management guidelines Physical security management guidelines Security zones and risk mitigation control measures Approved 21 June 2011 Version 1.4 i Commonwealth of Australia 2011 All material presented in this publication

More information

Cuban Intelligence Targeting of Academia a

Cuban Intelligence Targeting of Academia a September 2, 2014 Cuban Intelligence Targeting of Academia a The academic world primarily defined as schools, colleges, universities, and research institutes provides a fertile environment in which foreign

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information