UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
|
|
- Bryan Hampton
- 7 years ago
- Views:
Transcription
1 DSM Supplementary Document Annex I to DSM Part 2:30 Classificvation and Protection of Official Information - Disposal and Destruction of Protectively Marked Information and Assets Version 7 ation date July 2015 Amendment list 18 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements Compliance requirements for this supplementary document are the same as for its parent document. Copyright Commonwealth of Australia 2010 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Department of Defence. Requests and inquiries concerning reproduction and rights should be addressed to Defence Publishing Services, Department of Defence.
2 Disposal and Destruction of Protectively Marked Information and Assets 1. Any disposal of Commonwealth records is to be done in accordance with the Archives Act Under the Act it is illegal to destroy Commonwealth records without the permission of the National Archives of Australia (NAA), or in accordance with a practice or procedure approved by the NAA, unless the destruction is required by law. Note: For Defence policy see the Defence Records Management Policy Manual. 2. The Australian public has a statutory right of access to all open period Commonwealth records; refer DI(G) ADMIN 27-2 for details. Disposal and Destruction Procedures 3. When TOP SECRET information and assets or Accountable Material are required to be destroyed, the destruction must be conducted under the supervision of two persons who are security cleared to at least the classification of the information or asset being destroyed. Recording Disposal and Destruction 4. Details of the disposal of all classified documents or assets recorded in the Classified Document Register (CDR) must be clearly annotated alongside each individual document record and those carrying out the destruction must sign the CDR or document register. 5. The originator of a copy-numbered classified document must be consulted prior to the destruction of such a document. If the originator approves destruction of the copy-numbered document, the destruction must also be recorded by completing form XC024 - Certificate of Destruction for Classified Material. The completed form XC024 is then to be sent to the document originator. 6. For as long as any one document recorded in a given CDR is still in existence, the CDR must be maintained. Following destruction of the final document recorded in a CDR, the CDR must be retained for at least five years before being transferred to the Defence repository in the relevant state or territory. 7. The book of XC051 - Dispatch Advice/Receipt for Classified Matter must be retained for at least five years after the last form XC051 is returned. For information regarding CDR, refer to the DSM Part 2:33 Physical Transfer of Classified Information and Assets. Methods of Destruction 8. Protectively marked information and unclassified information not for public release, must be disposed of using Security Construction and Equipment Committee (SCEC) approved destruction equipment in one of following methods: a. Pulping - transforming used paper into a moist, slightly cohering mass, from which new paper products will be made; b. Burning - in accordance with relevant environment protection restrictions; c. Pulverising - using hammermills with rotating steel hammers to pulverise the material; d. Disintegrating - using blades to cut and gradually reduce the waste particle to a given size determined by a removable screen; and e. Shredding - using strip-shredders and crosscut shredders (only crosscut shredders are SCECapproved for security classified information). Annex I to DSM Part 2:30 Page 2 of 5
3 f. Details on destruction equipment and methods of destruction can be found in the SCEC Security Equipment Catalogue and by contacting the Defence Security and Vetting Service (DS&VS) Regional Office. 9. Sensitive: Cabinet. Information which bears the DLM Sensitive: Cabinet is to be disposed of in accordance with the practices mandated by the Department of the Prime Minister and Cabinet. Refer to the Cabinet Handbook. 10. High grade cryptography and communications security. High grade cryptography and communications security (COMSEC) material is to be handled in accordance with the DSM and its authoritative sources. 11. Electronic media. Electronic media is sanitised/destroyed in accordance with the requirements of the ISM. Shredders 12. Where the disposal method is shredding, and the information is classified as: a. SECRET or above (including all Codeword, AUSTEO, AGAO and Sensitive: Cabinet information), it must be shredded in a SCEC-approved A Class crosscut shredder (maximum particle size 1 mm x 20 mm). b. CONFIDENTIAL or PROTECTED, it must be shredded in a B Class crosscut shredder (maximum particle size 2.3 mm x 25 mm) or SCEC-approved A Class crosscut shredder. Note: Commercial strip shredders are not suitable for the destruction of classified or sensitive information. The smaller the particle size the more secure the results. For further details on selecting shredders see the SCEC Security Equipment Catalogue. 13. ICT media shredders. Refer to the SCEC Security Equipment Catalogue to select SCEC-approved media shredders to destroy ICT media. Garbage and Recycling 14. Protectively marked information must not be disposed of by garbage or unsecure recycling collection unless it has already been through a SCEC-approved destruction process. 15. Garbage, whether it is placed in a garbage hopper or other area for collection or delivered directly to a garbage disposal service, is extremely vulnerable. Only information that is public domain information or has already undergone a SCEC-approved destruction process, such as shredding, may be discarded in Defence's general garbage. 16. Recycling or discarding intact documents does not serve the same purpose as document destruction and can only be used for public domain information disposal or when information has already undergone some form of appropriate destruction, such as shredding. Contracted Disposal and Destruction 17. It may be considered necessary, after a comprehensive risk assessment, for the disposal of security classified waste to be undertaken by an authorised disposal company. Authorised companies have had both transport and disposal facilities approved by ASIO-T4 and equipment approved by SCEC. Defence personnel or external service providers setting up a contract for destruction of classified information must contact DS&VS or the Service Security Authority (SSA) and formally register the advice provided by either. DS&VS or SSA can provide advice on appropriate procedures and level of security throughout the pick up, transportation and destruction of the waste. Annex I to DSM Part 2:30 Page 3 of 5
4 18. The destruction of TOP SECRET or Accountable information or assets should occur within a Defence facility. The originator of the information may also apply special conditions to the destruction of some classified information which might prohibit the use of contractors. Form XC024 - Certificate of Destruction for Classified Material must be sent to the originator upon destruction of the material. 19. Classified waste bags are used to temporarily store classified waste until a contractor can carry out complete destruction. Classified waste bags must [Auth:None] be stored according to the highest level of classification of their contents. Destruction of Classified Information Overseas 20. If possible, classified information or assets located overseas must be taken to an Australian controlled area, such as an Australian Embassy or High Commission, for destruction. If this is not possible, Defence personnel and external service providers must [Auth:None] ensure that the classified waste is completely destroyed. Emergency Destruction Plan 21. Defence units are sometimes in sensitive areas where there is a risk of uninvited entry by unfriendly forces. In such cases, an emergency destruction plan must be developed. The security officer, or an appointed officer on deployment, is responsible for keeping the plan current. 22. The plan must: a. identify the order and method of destruction of all classified documents and information embedded in electronic systems; and b. ensure that the most highly classified and sensitive information or assets are destroyed first if the complete destruction of all classified information is necessary. 23. If Security Standing Orders are applicable to a unit on deployment, the plan must be incorporated into those orders. 24. Aircraft. Contingent commanders who have aircraft making flights over foreign territories must develop: a. a list of security classified information or assets carried on each type of aircraft; and b. a plan detailing the order and method of destruction of each classified item. 25. An authorised technical officer will provide instruction on the methods of destruction for those items. Additional Requirements for Classified Assets 26. Classified assets must be destroyed so that: a. the security nature of the asset cannot be identified; b. security classified performance details or data cannot be recovered; c. components, if not totally destroyed, are no longer operational; and d. the relationship of components to the overall asset cannot be identified. Annex I to DSM Part 2:30 Page 4 of 5
5 Appendixes and Attachments N/A This annex currently has no appendixes or attachments. Annex I to DSM Part 2:30 Page 5 of 5
Information security management guidelines
Information security management guidelines Protectively marking and handling sensitive and security classified information Approved 21 June 2011 Version 1.0 Document details Security classification Unclassified
More informationUNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:41 Security for Projects and Capability Planning Version 3 ation date July 2015 Amendment list 24 Optimised for Screen; Print; Screen Reader Releasable to Compliance
More informationGeneral Records Authority
General Records Authority Transfer of custody and ownership of Personal Security Files (PSFs) Job no 2008/00174731 18 April 2008 Commonwealth of Australia 2008 This work is copyright. Apart from any use
More informationUNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:5 Security Awareness and Training Version 4 ation date July 2015 Amendment list 17 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements Defence
More informationUNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:61 Access Control and Identity Management Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements
More informationUNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements
Defence Security Manual DSM Part 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Version 1 ation date July 2105 Amendment list 23 Optimised for Screen; Print; Screen Reader Releasable to
More informationUNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards
DSM Supplementary Document Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen
More informationEmail Protective Marking Standard Implementation Guide for the Australian Government
Email Protective Marking Standard Implementation Guide for the Australian Government May 2012 (V2012.1) Page 1 of 14 Disclaimer The Department of Finance and Deregulation (Finance) has prepared this document
More informationPhysical security management guidelines
Physical security management guidelines Event security Approved 13 December 2011 Version 1.0 i Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons
More informationRecords Management Policy
Records Management Policy Reference Number: 1.49 Classification: Policy - Public Subject: Corporate Governance Department: Corporate Services Responsible Officer: Chief Executive Officer Community Plan
More informationAustralian Government Information Security Manual CONTROLS
2014 Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2014 All material presented in this publication
More informationMENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY. Ensuring Information is Accurate and Fit for Purpose
MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY Index: Introduction Information is a Corporate Resource Personal Responsibility Information Accessibility Keeping Records of what we do Ensuring
More informationGatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
More informationProtective security governance guidelines
Protective security governance guidelines Security of outsourced services and functions Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this publication
More informationRecords Authority. Australian Security Intelligence Organisation
Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3
More informationLegal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used.
Handling information based on the protective marking OFFICIAL INFORMATION MARKING Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective
More informationAustralian Government Information Security Manual CONTROLS
2015 Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2015 All material presented in this publication
More informationREGIONAL COUNCIL OF GOYDER. Records Management
Records Management Section: R Version No: 3.0 Adopted: 19/4/11 Reviewed: 19/4/16 Next Review: April 2018 Minutes Ref: 64/16 Responsibility: CEO Introduction The State Records Act 1997 ("the Act") governs
More informationPOLICY ON THE SECURITY CLASSIFICATION OF DOCUMENTS
POLICY ON THE SECURITY CLASSIFICATION OF DOCUMENTS Policy on the Security Classification of Documents Page: Page 1 of 22 Recommended by Approved by Executive Management Team Board of Directors Approval
More informationIntroducing collaborative based recommendation systems to the online brokerage domain
Introducing collaborative based recommendation systems to the online brokerage domain Eldiwany, Ahmed ProQuest Dissertations and Theses; 2007; ProQuest pg. n/a Reproduced with permission of the copyright
More informationRecords Authority. Department of Health Private Health Insurance
Records Authority 2012/00651438 Department of Health Private Health Insurance 2013 This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS
More informationMedia Disposition and Sanitation Procedure
Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...
More informationInformation and records management. Purpose. Scope. Policy
Information and records management NZQA Quality Management System Policy Purpose The purpose of this policy is to establish a framework for the management of corporate information and records within NZQA.
More informationService Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information)
APPENDIX E Service Instruction 0759 Destruction of Information Assets (Including Protectively Marked Information) Document Control Description and Purpose This instruction is intended to provide guidance
More informationSecurity Awareness and Training
T h e A u d i t o r - G e n e r a l Audit Report No.25 2009 10 Performance Audit A u s t r a l i a n N a t i o n a l A u d i t O f f i c e Commonwealth of Australia 2010 ISSN 1036 7632 ISBN 0 642 81115
More informationGeneral Disposal Authority. For encrypted records created in online security processes
General Disposal Authority For encrypted records created in online security processes May 2004 Commonwealth of Australia 2004 ISBN 1 920807 04 7 This work is copyright. Apart from any use as permitted
More informationPrivacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
More informationNATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised:
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12 Issue Date: 15 December 2014 Revised: NSA/CSS STORAGE DEVICE SANITIZATION MANUAL PURPOSE AND SCOPE This manual provides guidance
More informationforesightconsulting.com.au
Mr. James Kavanagh National Security Officer Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 02 March 2015 Microsoft Office 365 IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,
More informationRECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY ADOPTED BY COUNCIL 13 JUNE 2006 REVIEWED BY COUNCIL 6 NOVEMBER 2006 REVIEWED BY COUNCIL 10 MAY 2010 1. INTRODUCTION The State Records Act 1997 governs the obligations and responsibilities
More informationProtective security governance guidelines
Protective security governance guidelines Security awareness training Version 1.0 Approved September 2010 Contents Introduction... 1 Who gets of security awareness training/briefings?... 2 Security awareness
More informationProtective security governance guidelines
Protective security governance guidelines Reporting incidents and conducting security investigations Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationGuideline for the Implementation of Retention and Disposal Schedules
Guideline for the Implementation of Retention and Disposal Schedules Guideline for Queensland Public Authorities Queensland State Archives March 2014 Department of Science, Information Technology, Innovation
More informationCOUNCIL POLICY R180 RECORDS MANAGEMENT
1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.
More informationSCOTTISH GOVERNMENT RECORDS MANAGEMENT: NHS CODE OF PRACTICE (SCOTLAND) Version 2.1 January 2012
SCOTTISH GOVERNMENT RECORDS MANAGEMENT: NHS CODE OF PRACTICE (SCOTLAND) Version 2.1 January 2012 Records Management: NHS Code of Practice (Scotland) The Scottish Government, Edinburgh 2012 Crown copyright
More informationThird Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide
Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work
More informationStudent Guide. informationsecurity.training@dss.mil
Short: Disposal and Destruction of Classified Information Objective POC Estimated completion time Identify the who, what, when, why, and how concerning disposal and destruction of classified information
More informationCORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY RECORDS MANAGEMENT POLICY APPROVED BY GOVERNING BODY ON 2 APRIL 2009 INTRODUCTION What are Records? Records are documents created, used and maintained for business reasons.
More informationQueensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
More informationDefence Terrestrial Communications Network Facilities and Infrastructure Project
3 Defence Terrestrial Communications Network Facilities and Infrastructure Project 3.1 The Department of Defence (Defence) seeks approval from the Committee to commence works on its Joint Project 2047
More informationPolicy Document RECORDS MANAGEMENT POLICY
The District Council Of Elliston Policy Document RECORDS MANAGEMENT POLICY Date Adopted: 16 th December 2005 Review Date: Ongoing, as necessary Minute Number: 300. 2005 E:\WPData\Jodie\My Documents\policies
More informationDigital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
More informationAustralian Standard. Emergency control organization and procedures for buildings, structures and workplaces AS 3745 2002
AS 3745 2002 (Incorporating Amendment Nos. 1 and 2) AS 3745 2002 Australian Standard Emergency control organization and procedures for buildings, structures and workplaces This Australian Standard was
More informationProtective Security Governance Policy. Outlines ANAO protective security arrangements
Protective Security Governance Policy Outlines ANAO protective security arrangements Version 2.0 Effective JULY 2012 Document management Document identification Document ID Document title Release authority
More informationGuidance on Personal Data Erasure and Anonymisation 1
Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data
More informationImplementing an Electronic Document and Records Management System. Checklist for Australian Government Agencies
Implementing an Electronic Document and Records Management System Checklist for Australian Government Agencies Acknowledgments The checklist for implementing an electronic document and records management
More informationt +61 2 6100 7714 a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e info@foresightconsulting.com.au foresightconsulting.com.
e info@ Mr. James Kavanagh Chief Security Advisor Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 17 September 2014 Microsoft Azure IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,
More informationComhairle nan Eilean Siar Internal Audit Follow Up Review Document Management. Final Report FU01 14/15
Comhairle nan Eilean Siar Internal Audit Follow Up Review Document Management Final Report FU01 14/15 11 November 2014 CONTENTS Page SECTION 1 - EXECUTIVE SUMMARY 1 4 SECTION 2 - DETAILED FINDINGS AND
More informationAPES 310 Dealing with Client Monies
M EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) [Supersedes APES 310 Dealing with Client Monies issued
More informationDepartment of Commerce Office of Security. Initial Information Security Briefing
Department of Commerce Office of Security Initial Information Security Briefing Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information.
More informationRegulatory Impact Statement
Regulatory Impact Statement Removing Legislative Barriers to Effectiveness and Efficiency in Corrections - Paper 5: Further Legislative Change to Facilitate Prison Management Agency Disclosure Statement
More informationRecords Disposal Schedule Anti-Discrimination Services Northern Territory Anti-Discrimination Commission
Records disposal schedule Records Disposal Schedule Anti-Discrimination Services Northern Territory Anti-Discrimination Commission Disposal Schedule No. 2015/12 August 2015 NT Archives Service For information
More informationMedical Indemnity (Prudential Supervision and Product Standards) (Consequential Amendments) Bill 2002. Bills Digest No.
INFORMATION, ANALYSIS AND ADVICE FOR THE PARLIAMENT INFORMATION AND RESEARCH SERVICES Bills Digest No. 126 2002 03 Medical Indemnity (Prudential Supervision and Product Standards) (Consequential Amendments)
More informationPOLICY FOR PRESERVATION / ARCHIVAL OF DOCUMENTS
POLICY FOR PRESERVATION / ARCHIVAL OF DOCUMENTS (As approved by the board at its meeting held on 27 th October 2015) 1. Introduction Securities and Exchange Board of India (SEBI) has introduced SEBI (Listing
More informationLord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000
Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under
More informationRTO Delegations Guidelines
RTO Delegations Guidelines ISBN 0 7594 0389 9 Victorian Qualifications Authority 2004 Published by the Victorian Qualifications Authority This publication is copyright. Apart from any use permitted under
More informationDATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
More informationITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:
ITEM NO: 4 Report To: AUDIT PANEL Date: 23 March 2010 Reporting Officers: Subject: Report Summary: Recommendations: Links to Community Strategy: Policy Implications: Financial Implications: (Authorised
More informationAssociated Files: Managing resources. Expected Duration: 2 hours
Unit 2 Business Managing Instructions and answers for Teachers These instructions should accompany the OCR resource Managing, which supports the OCR Level 3 Cambridge Technical Certificate in Business
More informationConstruction Contracts
Compiled Accounting Standard AASB 111 Construction Contracts This compiled Standard applies to annual reporting periods beginning on or after 1 January 2009 that end on or after 30 June 2009. Early application
More informationProtective security governance guidelines
Protective security governance guidelines Business impact levels Approved November 2014 Amended April 2015 Version 2.1 Commonwealth of Australia 2013 All material presented in this publication is provided
More informationRecords Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy...
Council Policy Records Management Table of Contents Table of Contents... 1 Policy... 2 Policy Objectives... 2 Policy Statement... 2 Records Management Program... 2 Accountability Requirements... 3 General
More informationCriminal Code Amendment (Cluster Munitions Prohibition) Act 2012
Criminal Code Amendment (Cluster Munitions Prohibition) Act 2012 No. 114, 2012 An Act to criminalise some acts involving certain munitions, and for related purposes An electronic version of this Act is
More informationDEFENCE INSTRUCTIONS (GENERAL)
DEFENCE INSTRUCTIONS (GENERAL) New instruction 0 LOG 4 5 012 Regulation of technical integrity of Australian Defence Force materiel Department of Defence CANBERRA ACT 2600 10 September 2010 Issued with
More informationAPES 310 Dealing with Client Monies
EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies ISSUED: December 2010 Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) Prepared and issued by Accounting
More informationJUDICIAL APPOINTMENTS. Ensuring a strong and independent judiciary through a transparent process
JUDICIAL APPOINTMENTS Ensuring a strong and independent judiciary through a transparent process New transparency in judicial appointments The impartial and competent administration of justice is fundamental
More informationDistrict Council of Yankalilla
District Council of Yankalilla Elected Members Records Management Policy Strategic Reference File Reference Responsibility Revision Number Effective Date Last Revised Date Provide leadership, good governance,
More informationMontana Local Government Records Management Guidelines
Montana Local Government Records Management Guidelines Prepared and Published by the Montana Local Government Records Committee Rev 3.0 Sep 2010 TABLE OF CONTENTS Introduction i Authority...ii Definitions...
More informationInformation Security Registered Assessors Program - Gatekeeper PKI Framework Guide
Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V2.0 NOVEMBER 2014 Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V 2.0 NOVEMBER
More informationPMA MODELS PTY LTD CONTRACTOR OFFER LETTER
PMA MODELS PTY LTD CONTRACTOR OFFER LETTER We are pleased to engage you ( the Contractor ) to provide services to PMA Models Pty Ltd A.C.N. 137 597 829 ( the Company ) on the terms set out in this agreement.
More informationThe Protection and Security of Electronic Information Held by Australian Government Agencies
The Auditor-General Audit Report No.33 2010 11 Performance Audit The Protection and Security of Electronic Information Held by Australian Government Agencies Australian National Audit Office Commonwealth
More informationDefence Housing Australia
Defence Housing Australia Australian Government Competitive Neutrality Complaints Office Investigation No. 13 COMMONWEALTH OF AUSTRALIA 2008 ISBN 978 1 74037 251 0 This work is subject to copyright. Apart
More informationRecords Authority. National Childcare Accreditation Council
Records Authority National Childcare Accreditation Council Child Care Quality Assurance Training and Support Job no 2009/00831189 18 March 2010 CONTENTS INTRODUCTION 3 APPLICATION OF THIS AUTHORITY 3 CONTACT
More informationClassification (Publications, Films and Computer Games) Act 1995
Classification (Publications, Films and Computer Games) Act 1995 Independent review of Part 10 (Material prohibited in certain areas in the Northern Territory) Level 3 Minter Ellison Building 25 National
More informationPhysical security management guidelines
Physical security management guidelines Security zones and risk mitigation control measures Approved 21 June 2011 Version 1.4 i Commonwealth of Australia 2011 All material presented in this publication
More informationInformation Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
More informationNSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
More informationRecords Management Plan. April 2015
Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised
More informationHMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
More informationJUDICIAL APPOINTMENTS. Ensuring a strong, independent and diverse judiciary through a transparent process
JUDICIAL APPOINTMENTS Ensuring a strong, independent and diverse judiciary through a transparent process Transparency in judicial appointments The impartial and competent administration of justice is fundamental
More informationCloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
More informationRecords Management. 1. Introduction. 2. Strategic Plan Desired Outcomes
Records Management Classification: Policy Name: First Issued / Approved: Last Reviewed: Council Policy Records Management 13/9/2011, CCS0036 12 August 2014, Cl9829 24 February 2015, C10054 Next Review:
More informationGeneral Records Authority 34
General Records Authority 34 2014/00444390 Establishing & winding up entities & companies CONTENTS INTRODUCTION 3 APPLICATION OF THIS AUTHORITY 3 CONTACT INFORMATION 4 AUTHORISATION 5 ESTABLISHING & WINDING
More informationPCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data
PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on
More informationBeing Prepared for an INFLUENZA PANDEMIC A KIT FOR SMALL BUSINESSES
Being Prepared for an INFLUENZA PANDEMIC A KIT FOR SMALL BUSINESSES i Commonwealth of Australia 2006 ISBN 0 642 72389 3 This work is copyright. Apart from any use as permitted under the Copyright Act 1968,
More informationJoint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security- Perspective for Management Information Security Management Program Concept
More informationArdington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving.
Ardington Archives Components of the process Audit of needs Cataloguing Retrieval Collection and deposit Destruction The archiving process 3 Section Contents ARCHIVING PROCESS The archiving process Reference
More informationaugust09 tpp 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper
august09 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper Preface Corporate governance - which refers broadly to the processes
More informationAUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
More informationGovernment Security Classifications April 2014
Government Security Classifications April 2014 Version 1.0 October 2013 THE GOVERNMENT SECURITY CLASSIFICATIONS WILL COME INTO FORCE ON 2 APRIL 2014 Page 1 of 35 Version 1.0 October 2013 Version History
More informationSpecialist clinics in Victorian public hospitals. A resource kit for MBS-billed services
Specialist clinics in Victorian public hospitals A resource kit for MBS-billed services 4 Clinical review of area mental health services 1997-2004 Specialist clinics in Victorian public hospitals A resource
More informationDepartment of the Premier and Cabinet Circular. PC030 Protective Security Policy Framework
Department of the Premier and Cabinet Circular PC030 Protective Security Policy Framework February 2012 PROTECTIVE SECURITY MANAGEMENT FRAMEWORK TABLE OF CONTENTS TABLE OF CONTENTS 2 1. PURPOSE 3 2. SCOPE
More informationPLEASE NOTE. For more information concerning the history of this Act, please see the Table of Public Acts.
PLEASE NOTE This document, prepared by the Legislative Counsel Office, is an office consolidation of this Act, current to December 2, 2015. It is intended for information and reference purposes only. This
More informationAmendment to the Definition of Public Interest Entity in APES 110 Code of Ethics for Professional Accountants (issued December 2010) December 2011
Amendment to the Definition of Public Interest Entity in APES 110 Code of Ethics for Professional Accountants (issued December 2010) December 2011 Copyright 2011 Accounting Professional & Ethical Standards
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationHIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES
HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES Standards for Victoria Police Law Enforcement Data Security (Standard 22) November 2008 Commissioner for Law Enforcement Data Security Acknowledgement
More informationNo. 1 of 2011. I, Stephen Smith, Minister for Defence issue the following Guidelines to the Defence Materiel Organisation. Minister for Defence
NEW AIR COMBAT CAPABILITY - INDUSTRY SUPPORT PROGRAM (NACC-ISP) PROGRAM GUIDELINES No. 1 of 2011 I, Stephen Smith, Minister for Defence issue the following Guidelines to the Defence Materiel Organisation.
More informationInformation Destruction Solutions
Information Destruction Solutions Products Guide PAPER SHREDDERS HARD DRIVE DEGAUSSERS HARD DRIVE DESTROYERS OPTICAL MEDIA DESTROYERS MIXED MEDIA DESTROYERS SECURE WASTE CONTAINERS Paper Shredders While
More informationRecords Authority. Private Health Insurance Administration Council
Records Authority Private Health Insurance Administration Council Private Health Insurance Prudential Regulation Job no 2010/00384490 21 July 2010 TABLE OF CONTENTS: INTRODUCTION 3 APPLICATION OF THIS
More information