UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

Size: px
Start display at page:

Download "UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public"

Transcription

1 DSM Supplementary Document Annex I to DSM Part 2:30 Classificvation and Protection of Official Information - Disposal and Destruction of Protectively Marked Information and Assets Version 7 ation date July 2015 Amendment list 18 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements Compliance requirements for this supplementary document are the same as for its parent document. Copyright Commonwealth of Australia 2010 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Department of Defence. Requests and inquiries concerning reproduction and rights should be addressed to Defence Publishing Services, Department of Defence.

2 Disposal and Destruction of Protectively Marked Information and Assets 1. Any disposal of Commonwealth records is to be done in accordance with the Archives Act Under the Act it is illegal to destroy Commonwealth records without the permission of the National Archives of Australia (NAA), or in accordance with a practice or procedure approved by the NAA, unless the destruction is required by law. Note: For Defence policy see the Defence Records Management Policy Manual. 2. The Australian public has a statutory right of access to all open period Commonwealth records; refer DI(G) ADMIN 27-2 for details. Disposal and Destruction Procedures 3. When TOP SECRET information and assets or Accountable Material are required to be destroyed, the destruction must be conducted under the supervision of two persons who are security cleared to at least the classification of the information or asset being destroyed. Recording Disposal and Destruction 4. Details of the disposal of all classified documents or assets recorded in the Classified Document Register (CDR) must be clearly annotated alongside each individual document record and those carrying out the destruction must sign the CDR or document register. 5. The originator of a copy-numbered classified document must be consulted prior to the destruction of such a document. If the originator approves destruction of the copy-numbered document, the destruction must also be recorded by completing form XC024 - Certificate of Destruction for Classified Material. The completed form XC024 is then to be sent to the document originator. 6. For as long as any one document recorded in a given CDR is still in existence, the CDR must be maintained. Following destruction of the final document recorded in a CDR, the CDR must be retained for at least five years before being transferred to the Defence repository in the relevant state or territory. 7. The book of XC051 - Dispatch Advice/Receipt for Classified Matter must be retained for at least five years after the last form XC051 is returned. For information regarding CDR, refer to the DSM Part 2:33 Physical Transfer of Classified Information and Assets. Methods of Destruction 8. Protectively marked information and unclassified information not for public release, must be disposed of using Security Construction and Equipment Committee (SCEC) approved destruction equipment in one of following methods: a. Pulping - transforming used paper into a moist, slightly cohering mass, from which new paper products will be made; b. Burning - in accordance with relevant environment protection restrictions; c. Pulverising - using hammermills with rotating steel hammers to pulverise the material; d. Disintegrating - using blades to cut and gradually reduce the waste particle to a given size determined by a removable screen; and e. Shredding - using strip-shredders and crosscut shredders (only crosscut shredders are SCECapproved for security classified information). Annex I to DSM Part 2:30 Page 2 of 5

3 f. Details on destruction equipment and methods of destruction can be found in the SCEC Security Equipment Catalogue and by contacting the Defence Security and Vetting Service (DS&VS) Regional Office. 9. Sensitive: Cabinet. Information which bears the DLM Sensitive: Cabinet is to be disposed of in accordance with the practices mandated by the Department of the Prime Minister and Cabinet. Refer to the Cabinet Handbook. 10. High grade cryptography and communications security. High grade cryptography and communications security (COMSEC) material is to be handled in accordance with the DSM and its authoritative sources. 11. Electronic media. Electronic media is sanitised/destroyed in accordance with the requirements of the ISM. Shredders 12. Where the disposal method is shredding, and the information is classified as: a. SECRET or above (including all Codeword, AUSTEO, AGAO and Sensitive: Cabinet information), it must be shredded in a SCEC-approved A Class crosscut shredder (maximum particle size 1 mm x 20 mm). b. CONFIDENTIAL or PROTECTED, it must be shredded in a B Class crosscut shredder (maximum particle size 2.3 mm x 25 mm) or SCEC-approved A Class crosscut shredder. Note: Commercial strip shredders are not suitable for the destruction of classified or sensitive information. The smaller the particle size the more secure the results. For further details on selecting shredders see the SCEC Security Equipment Catalogue. 13. ICT media shredders. Refer to the SCEC Security Equipment Catalogue to select SCEC-approved media shredders to destroy ICT media. Garbage and Recycling 14. Protectively marked information must not be disposed of by garbage or unsecure recycling collection unless it has already been through a SCEC-approved destruction process. 15. Garbage, whether it is placed in a garbage hopper or other area for collection or delivered directly to a garbage disposal service, is extremely vulnerable. Only information that is public domain information or has already undergone a SCEC-approved destruction process, such as shredding, may be discarded in Defence's general garbage. 16. Recycling or discarding intact documents does not serve the same purpose as document destruction and can only be used for public domain information disposal or when information has already undergone some form of appropriate destruction, such as shredding. Contracted Disposal and Destruction 17. It may be considered necessary, after a comprehensive risk assessment, for the disposal of security classified waste to be undertaken by an authorised disposal company. Authorised companies have had both transport and disposal facilities approved by ASIO-T4 and equipment approved by SCEC. Defence personnel or external service providers setting up a contract for destruction of classified information must contact DS&VS or the Service Security Authority (SSA) and formally register the advice provided by either. DS&VS or SSA can provide advice on appropriate procedures and level of security throughout the pick up, transportation and destruction of the waste. Annex I to DSM Part 2:30 Page 3 of 5

4 18. The destruction of TOP SECRET or Accountable information or assets should occur within a Defence facility. The originator of the information may also apply special conditions to the destruction of some classified information which might prohibit the use of contractors. Form XC024 - Certificate of Destruction for Classified Material must be sent to the originator upon destruction of the material. 19. Classified waste bags are used to temporarily store classified waste until a contractor can carry out complete destruction. Classified waste bags must [Auth:None] be stored according to the highest level of classification of their contents. Destruction of Classified Information Overseas 20. If possible, classified information or assets located overseas must be taken to an Australian controlled area, such as an Australian Embassy or High Commission, for destruction. If this is not possible, Defence personnel and external service providers must [Auth:None] ensure that the classified waste is completely destroyed. Emergency Destruction Plan 21. Defence units are sometimes in sensitive areas where there is a risk of uninvited entry by unfriendly forces. In such cases, an emergency destruction plan must be developed. The security officer, or an appointed officer on deployment, is responsible for keeping the plan current. 22. The plan must: a. identify the order and method of destruction of all classified documents and information embedded in electronic systems; and b. ensure that the most highly classified and sensitive information or assets are destroyed first if the complete destruction of all classified information is necessary. 23. If Security Standing Orders are applicable to a unit on deployment, the plan must be incorporated into those orders. 24. Aircraft. Contingent commanders who have aircraft making flights over foreign territories must develop: a. a list of security classified information or assets carried on each type of aircraft; and b. a plan detailing the order and method of destruction of each classified item. 25. An authorised technical officer will provide instruction on the methods of destruction for those items. Additional Requirements for Classified Assets 26. Classified assets must be destroyed so that: a. the security nature of the asset cannot be identified; b. security classified performance details or data cannot be recovered; c. components, if not totally destroyed, are no longer operational; and d. the relationship of components to the overall asset cannot be identified. Annex I to DSM Part 2:30 Page 4 of 5

5 Appendixes and Attachments N/A This annex currently has no appendixes or attachments. Annex I to DSM Part 2:30 Page 5 of 5

Information security management guidelines

Information security management guidelines Information security management guidelines Protectively marking and handling sensitive and security classified information Approved 21 June 2011 Version 1.0 Document details Security classification Unclassified

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:41 Security for Projects and Capability Planning Version 3 ation date July 2015 Amendment list 24 Optimised for Screen; Print; Screen Reader Releasable to Compliance

More information

General Records Authority

General Records Authority General Records Authority Transfer of custody and ownership of Personal Security Files (PSFs) Job no 2008/00174731 18 April 2008 Commonwealth of Australia 2008 This work is copyright. Apart from any use

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:5 Security Awareness and Training Version 4 ation date July 2015 Amendment list 17 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements Defence

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:61 Access Control and Identity Management Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Defence Security Manual DSM Part 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Version 1 ation date July 2105 Amendment list 23 Optimised for Screen; Print; Screen Reader Releasable to

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards DSM Supplementary Document Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen

More information

Email Protective Marking Standard Implementation Guide for the Australian Government

Email Protective Marking Standard Implementation Guide for the Australian Government Email Protective Marking Standard Implementation Guide for the Australian Government May 2012 (V2012.1) Page 1 of 14 Disclaimer The Department of Finance and Deregulation (Finance) has prepared this document

More information

Physical security management guidelines

Physical security management guidelines Physical security management guidelines Event security Approved 13 December 2011 Version 1.0 i Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons

More information

Records Management Policy

Records Management Policy Records Management Policy Reference Number: 1.49 Classification: Policy - Public Subject: Corporate Governance Department: Corporate Services Responsible Officer: Chief Executive Officer Community Plan

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2014 All material presented in this publication

More information

MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY. Ensuring Information is Accurate and Fit for Purpose

MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY. Ensuring Information is Accurate and Fit for Purpose MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY Index: Introduction Information is a Corporate Resource Personal Responsibility Information Accessibility Keeping Records of what we do Ensuring

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Security of outsourced services and functions Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this publication

More information

Records Authority. Australian Security Intelligence Organisation

Records Authority. Australian Security Intelligence Organisation Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3

More information

Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used.

Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used. Handling information based on the protective marking OFFICIAL INFORMATION MARKING Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2015 All material presented in this publication

More information

REGIONAL COUNCIL OF GOYDER. Records Management

REGIONAL COUNCIL OF GOYDER. Records Management Records Management Section: R Version No: 3.0 Adopted: 19/4/11 Reviewed: 19/4/16 Next Review: April 2018 Minutes Ref: 64/16 Responsibility: CEO Introduction The State Records Act 1997 ("the Act") governs

More information

POLICY ON THE SECURITY CLASSIFICATION OF DOCUMENTS

POLICY ON THE SECURITY CLASSIFICATION OF DOCUMENTS POLICY ON THE SECURITY CLASSIFICATION OF DOCUMENTS Policy on the Security Classification of Documents Page: Page 1 of 22 Recommended by Approved by Executive Management Team Board of Directors Approval

More information

Introducing collaborative based recommendation systems to the online brokerage domain

Introducing collaborative based recommendation systems to the online brokerage domain Introducing collaborative based recommendation systems to the online brokerage domain Eldiwany, Ahmed ProQuest Dissertations and Theses; 2007; ProQuest pg. n/a Reproduced with permission of the copyright

More information

Records Authority. Department of Health Private Health Insurance

Records Authority. Department of Health Private Health Insurance Records Authority 2012/00651438 Department of Health Private Health Insurance 2013 This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS

More information

Media Disposition and Sanitation Procedure

Media Disposition and Sanitation Procedure Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...

More information

Information and records management. Purpose. Scope. Policy

Information and records management. Purpose. Scope. Policy Information and records management NZQA Quality Management System Policy Purpose The purpose of this policy is to establish a framework for the management of corporate information and records within NZQA.

More information

Service Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information)

Service Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information) APPENDIX E Service Instruction 0759 Destruction of Information Assets (Including Protectively Marked Information) Document Control Description and Purpose This instruction is intended to provide guidance

More information

Security Awareness and Training

Security Awareness and Training T h e A u d i t o r - G e n e r a l Audit Report No.25 2009 10 Performance Audit A u s t r a l i a n N a t i o n a l A u d i t O f f i c e Commonwealth of Australia 2010 ISSN 1036 7632 ISBN 0 642 81115

More information

General Disposal Authority. For encrypted records created in online security processes

General Disposal Authority. For encrypted records created in online security processes General Disposal Authority For encrypted records created in online security processes May 2004 Commonwealth of Australia 2004 ISBN 1 920807 04 7 This work is copyright. Apart from any use as permitted

More information

Privacy and Cloud Computing for Australian Government Agencies

Privacy and Cloud Computing for Australian Government Agencies Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy

More information

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised:

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised: NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12 Issue Date: 15 December 2014 Revised: NSA/CSS STORAGE DEVICE SANITIZATION MANUAL PURPOSE AND SCOPE This manual provides guidance

More information

foresightconsulting.com.au

foresightconsulting.com.au Mr. James Kavanagh National Security Officer Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 02 March 2015 Microsoft Office 365 IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY ADOPTED BY COUNCIL 13 JUNE 2006 REVIEWED BY COUNCIL 6 NOVEMBER 2006 REVIEWED BY COUNCIL 10 MAY 2010 1. INTRODUCTION The State Records Act 1997 governs the obligations and responsibilities

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Security awareness training Version 1.0 Approved September 2010 Contents Introduction... 1 Who gets of security awareness training/briefings?... 2 Security awareness

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Reporting incidents and conducting security investigations Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Guideline for the Implementation of Retention and Disposal Schedules

Guideline for the Implementation of Retention and Disposal Schedules Guideline for the Implementation of Retention and Disposal Schedules Guideline for Queensland Public Authorities Queensland State Archives March 2014 Department of Science, Information Technology, Innovation

More information

COUNCIL POLICY R180 RECORDS MANAGEMENT

COUNCIL POLICY R180 RECORDS MANAGEMENT 1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.

More information

SCOTTISH GOVERNMENT RECORDS MANAGEMENT: NHS CODE OF PRACTICE (SCOTLAND) Version 2.1 January 2012

SCOTTISH GOVERNMENT RECORDS MANAGEMENT: NHS CODE OF PRACTICE (SCOTLAND) Version 2.1 January 2012 SCOTTISH GOVERNMENT RECORDS MANAGEMENT: NHS CODE OF PRACTICE (SCOTLAND) Version 2.1 January 2012 Records Management: NHS Code of Practice (Scotland) The Scottish Government, Edinburgh 2012 Crown copyright

More information

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work

More information

Student Guide. informationsecurity.training@dss.mil

Student Guide. informationsecurity.training@dss.mil Short: Disposal and Destruction of Classified Information Objective POC Estimated completion time Identify the who, what, when, why, and how concerning disposal and destruction of classified information

More information

CORK INSTITUTE OF TECHNOLOGY

CORK INSTITUTE OF TECHNOLOGY CORK INSTITUTE OF TECHNOLOGY RECORDS MANAGEMENT POLICY APPROVED BY GOVERNING BODY ON 2 APRIL 2009 INTRODUCTION What are Records? Records are documents created, used and maintained for business reasons.

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information

Defence Terrestrial Communications Network Facilities and Infrastructure Project

Defence Terrestrial Communications Network Facilities and Infrastructure Project 3 Defence Terrestrial Communications Network Facilities and Infrastructure Project 3.1 The Department of Defence (Defence) seeks approval from the Committee to commence works on its Joint Project 2047

More information

Policy Document RECORDS MANAGEMENT POLICY

Policy Document RECORDS MANAGEMENT POLICY The District Council Of Elliston Policy Document RECORDS MANAGEMENT POLICY Date Adopted: 16 th December 2005 Review Date: Ongoing, as necessary Minute Number: 300. 2005 E:\WPData\Jodie\My Documents\policies

More information

Digital Continuity Plan

Digital Continuity Plan Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach

More information

Australian Standard. Emergency control organization and procedures for buildings, structures and workplaces AS 3745 2002

Australian Standard. Emergency control organization and procedures for buildings, structures and workplaces AS 3745 2002 AS 3745 2002 (Incorporating Amendment Nos. 1 and 2) AS 3745 2002 Australian Standard Emergency control organization and procedures for buildings, structures and workplaces This Australian Standard was

More information

Protective Security Governance Policy. Outlines ANAO protective security arrangements

Protective Security Governance Policy. Outlines ANAO protective security arrangements Protective Security Governance Policy Outlines ANAO protective security arrangements Version 2.0 Effective JULY 2012 Document management Document identification Document ID Document title Release authority

More information

Guidance on Personal Data Erasure and Anonymisation 1

Guidance on Personal Data Erasure and Anonymisation 1 Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data

More information

Implementing an Electronic Document and Records Management System. Checklist for Australian Government Agencies

Implementing an Electronic Document and Records Management System. Checklist for Australian Government Agencies Implementing an Electronic Document and Records Management System Checklist for Australian Government Agencies Acknowledgments The checklist for implementing an electronic document and records management

More information

t +61 2 6100 7714 a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e info@foresightconsulting.com.au foresightconsulting.com.

t +61 2 6100 7714 a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e info@foresightconsulting.com.au foresightconsulting.com. e info@ Mr. James Kavanagh Chief Security Advisor Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 17 September 2014 Microsoft Azure IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,

More information

Comhairle nan Eilean Siar Internal Audit Follow Up Review Document Management. Final Report FU01 14/15

Comhairle nan Eilean Siar Internal Audit Follow Up Review Document Management. Final Report FU01 14/15 Comhairle nan Eilean Siar Internal Audit Follow Up Review Document Management Final Report FU01 14/15 11 November 2014 CONTENTS Page SECTION 1 - EXECUTIVE SUMMARY 1 4 SECTION 2 - DETAILED FINDINGS AND

More information

APES 310 Dealing with Client Monies

APES 310 Dealing with Client Monies M EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) [Supersedes APES 310 Dealing with Client Monies issued

More information

Department of Commerce Office of Security. Initial Information Security Briefing

Department of Commerce Office of Security. Initial Information Security Briefing Department of Commerce Office of Security Initial Information Security Briefing Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information.

More information

Regulatory Impact Statement

Regulatory Impact Statement Regulatory Impact Statement Removing Legislative Barriers to Effectiveness and Efficiency in Corrections - Paper 5: Further Legislative Change to Facilitate Prison Management Agency Disclosure Statement

More information

Records Disposal Schedule Anti-Discrimination Services Northern Territory Anti-Discrimination Commission

Records Disposal Schedule Anti-Discrimination Services Northern Territory Anti-Discrimination Commission Records disposal schedule Records Disposal Schedule Anti-Discrimination Services Northern Territory Anti-Discrimination Commission Disposal Schedule No. 2015/12 August 2015 NT Archives Service For information

More information

Medical Indemnity (Prudential Supervision and Product Standards) (Consequential Amendments) Bill 2002. Bills Digest No.

Medical Indemnity (Prudential Supervision and Product Standards) (Consequential Amendments) Bill 2002. Bills Digest No. INFORMATION, ANALYSIS AND ADVICE FOR THE PARLIAMENT INFORMATION AND RESEARCH SERVICES Bills Digest No. 126 2002 03 Medical Indemnity (Prudential Supervision and Product Standards) (Consequential Amendments)

More information

POLICY FOR PRESERVATION / ARCHIVAL OF DOCUMENTS

POLICY FOR PRESERVATION / ARCHIVAL OF DOCUMENTS POLICY FOR PRESERVATION / ARCHIVAL OF DOCUMENTS (As approved by the board at its meeting held on 27 th October 2015) 1. Introduction Securities and Exchange Board of India (SEBI) has introduced SEBI (Listing

More information

Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000

Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under

More information

RTO Delegations Guidelines

RTO Delegations Guidelines RTO Delegations Guidelines ISBN 0 7594 0389 9 Victorian Qualifications Authority 2004 Published by the Victorian Qualifications Authority This publication is copyright. Apart from any use permitted under

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers: ITEM NO: 4 Report To: AUDIT PANEL Date: 23 March 2010 Reporting Officers: Subject: Report Summary: Recommendations: Links to Community Strategy: Policy Implications: Financial Implications: (Authorised

More information

Associated Files: Managing resources. Expected Duration: 2 hours

Associated Files: Managing resources. Expected Duration: 2 hours Unit 2 Business Managing Instructions and answers for Teachers These instructions should accompany the OCR resource Managing, which supports the OCR Level 3 Cambridge Technical Certificate in Business

More information

Construction Contracts

Construction Contracts Compiled Accounting Standard AASB 111 Construction Contracts This compiled Standard applies to annual reporting periods beginning on or after 1 January 2009 that end on or after 30 June 2009. Early application

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Business impact levels Approved November 2014 Amended April 2015 Version 2.1 Commonwealth of Australia 2013 All material presented in this publication is provided

More information

Records Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy...

Records Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy... Council Policy Records Management Table of Contents Table of Contents... 1 Policy... 2 Policy Objectives... 2 Policy Statement... 2 Records Management Program... 2 Accountability Requirements... 3 General

More information

Criminal Code Amendment (Cluster Munitions Prohibition) Act 2012

Criminal Code Amendment (Cluster Munitions Prohibition) Act 2012 Criminal Code Amendment (Cluster Munitions Prohibition) Act 2012 No. 114, 2012 An Act to criminalise some acts involving certain munitions, and for related purposes An electronic version of this Act is

More information

DEFENCE INSTRUCTIONS (GENERAL)

DEFENCE INSTRUCTIONS (GENERAL) DEFENCE INSTRUCTIONS (GENERAL) New instruction 0 LOG 4 5 012 Regulation of technical integrity of Australian Defence Force materiel Department of Defence CANBERRA ACT 2600 10 September 2010 Issued with

More information

APES 310 Dealing with Client Monies

APES 310 Dealing with Client Monies EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies ISSUED: December 2010 Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) Prepared and issued by Accounting

More information

JUDICIAL APPOINTMENTS. Ensuring a strong and independent judiciary through a transparent process

JUDICIAL APPOINTMENTS. Ensuring a strong and independent judiciary through a transparent process JUDICIAL APPOINTMENTS Ensuring a strong and independent judiciary through a transparent process New transparency in judicial appointments The impartial and competent administration of justice is fundamental

More information

District Council of Yankalilla

District Council of Yankalilla District Council of Yankalilla Elected Members Records Management Policy Strategic Reference File Reference Responsibility Revision Number Effective Date Last Revised Date Provide leadership, good governance,

More information

Montana Local Government Records Management Guidelines

Montana Local Government Records Management Guidelines Montana Local Government Records Management Guidelines Prepared and Published by the Montana Local Government Records Committee Rev 3.0 Sep 2010 TABLE OF CONTENTS Introduction i Authority...ii Definitions...

More information

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V2.0 NOVEMBER 2014 Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V 2.0 NOVEMBER

More information

PMA MODELS PTY LTD CONTRACTOR OFFER LETTER

PMA MODELS PTY LTD CONTRACTOR OFFER LETTER PMA MODELS PTY LTD CONTRACTOR OFFER LETTER We are pleased to engage you ( the Contractor ) to provide services to PMA Models Pty Ltd A.C.N. 137 597 829 ( the Company ) on the terms set out in this agreement.

More information

The Protection and Security of Electronic Information Held by Australian Government Agencies

The Protection and Security of Electronic Information Held by Australian Government Agencies The Auditor-General Audit Report No.33 2010 11 Performance Audit The Protection and Security of Electronic Information Held by Australian Government Agencies Australian National Audit Office Commonwealth

More information

Defence Housing Australia

Defence Housing Australia Defence Housing Australia Australian Government Competitive Neutrality Complaints Office Investigation No. 13 COMMONWEALTH OF AUSTRALIA 2008 ISBN 978 1 74037 251 0 This work is subject to copyright. Apart

More information

Records Authority. National Childcare Accreditation Council

Records Authority. National Childcare Accreditation Council Records Authority National Childcare Accreditation Council Child Care Quality Assurance Training and Support Job no 2009/00831189 18 March 2010 CONTENTS INTRODUCTION 3 APPLICATION OF THIS AUTHORITY 3 CONTACT

More information

Classification (Publications, Films and Computer Games) Act 1995

Classification (Publications, Films and Computer Games) Act 1995 Classification (Publications, Films and Computer Games) Act 1995 Independent review of Part 10 (Material prohibited in certain areas in the Northern Territory) Level 3 Minter Ellison Building 25 National

More information

Physical security management guidelines

Physical security management guidelines Physical security management guidelines Security zones and risk mitigation control measures Approved 21 June 2011 Version 1.4 i Commonwealth of Australia 2011 All material presented in this publication

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...

More information

Records Management Plan. April 2015

Records Management Plan. April 2015 Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

JUDICIAL APPOINTMENTS. Ensuring a strong, independent and diverse judiciary through a transparent process

JUDICIAL APPOINTMENTS. Ensuring a strong, independent and diverse judiciary through a transparent process JUDICIAL APPOINTMENTS Ensuring a strong, independent and diverse judiciary through a transparent process Transparency in judicial appointments The impartial and competent administration of justice is fundamental

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

Records Management. 1. Introduction. 2. Strategic Plan Desired Outcomes

Records Management. 1. Introduction. 2. Strategic Plan Desired Outcomes Records Management Classification: Policy Name: First Issued / Approved: Last Reviewed: Council Policy Records Management 13/9/2011, CCS0036 12 August 2014, Cl9829 24 February 2015, C10054 Next Review:

More information

General Records Authority 34

General Records Authority 34 General Records Authority 34 2014/00444390 Establishing & winding up entities & companies CONTENTS INTRODUCTION 3 APPLICATION OF THIS AUTHORITY 3 CONTACT INFORMATION 4 AUTHORISATION 5 ESTABLISHING & WINDING

More information

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on

More information

Being Prepared for an INFLUENZA PANDEMIC A KIT FOR SMALL BUSINESSES

Being Prepared for an INFLUENZA PANDEMIC A KIT FOR SMALL BUSINESSES Being Prepared for an INFLUENZA PANDEMIC A KIT FOR SMALL BUSINESSES i Commonwealth of Australia 2006 ISBN 0 642 72389 3 This work is copyright. Apart from any use as permitted under the Copyright Act 1968,

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security- Perspective for Management Information Security Management Program Concept

More information

Ardington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving.

Ardington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving. Ardington Archives Components of the process Audit of needs Cataloguing Retrieval Collection and deposit Destruction The archiving process 3 Section Contents ARCHIVING PROCESS The archiving process Reference

More information

august09 tpp 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper

august09 tpp 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper august09 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper Preface Corporate governance - which refers broadly to the processes

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

Government Security Classifications April 2014

Government Security Classifications April 2014 Government Security Classifications April 2014 Version 1.0 October 2013 THE GOVERNMENT SECURITY CLASSIFICATIONS WILL COME INTO FORCE ON 2 APRIL 2014 Page 1 of 35 Version 1.0 October 2013 Version History

More information

Specialist clinics in Victorian public hospitals. A resource kit for MBS-billed services

Specialist clinics in Victorian public hospitals. A resource kit for MBS-billed services Specialist clinics in Victorian public hospitals A resource kit for MBS-billed services 4 Clinical review of area mental health services 1997-2004 Specialist clinics in Victorian public hospitals A resource

More information

Department of the Premier and Cabinet Circular. PC030 Protective Security Policy Framework

Department of the Premier and Cabinet Circular. PC030 Protective Security Policy Framework Department of the Premier and Cabinet Circular PC030 Protective Security Policy Framework February 2012 PROTECTIVE SECURITY MANAGEMENT FRAMEWORK TABLE OF CONTENTS TABLE OF CONTENTS 2 1. PURPOSE 3 2. SCOPE

More information

PLEASE NOTE. For more information concerning the history of this Act, please see the Table of Public Acts.

PLEASE NOTE. For more information concerning the history of this Act, please see the Table of Public Acts. PLEASE NOTE This document, prepared by the Legislative Counsel Office, is an office consolidation of this Act, current to December 2, 2015. It is intended for information and reference purposes only. This

More information

Amendment to the Definition of Public Interest Entity in APES 110 Code of Ethics for Professional Accountants (issued December 2010) December 2011

Amendment to the Definition of Public Interest Entity in APES 110 Code of Ethics for Professional Accountants (issued December 2010) December 2011 Amendment to the Definition of Public Interest Entity in APES 110 Code of Ethics for Professional Accountants (issued December 2010) December 2011 Copyright 2011 Accounting Professional & Ethical Standards

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES

HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES Standards for Victoria Police Law Enforcement Data Security (Standard 22) November 2008 Commissioner for Law Enforcement Data Security Acknowledgement

More information

No. 1 of 2011. I, Stephen Smith, Minister for Defence issue the following Guidelines to the Defence Materiel Organisation. Minister for Defence

No. 1 of 2011. I, Stephen Smith, Minister for Defence issue the following Guidelines to the Defence Materiel Organisation. Minister for Defence NEW AIR COMBAT CAPABILITY - INDUSTRY SUPPORT PROGRAM (NACC-ISP) PROGRAM GUIDELINES No. 1 of 2011 I, Stephen Smith, Minister for Defence issue the following Guidelines to the Defence Materiel Organisation.

More information

Information Destruction Solutions

Information Destruction Solutions Information Destruction Solutions Products Guide PAPER SHREDDERS HARD DRIVE DEGAUSSERS HARD DRIVE DESTROYERS OPTICAL MEDIA DESTROYERS MIXED MEDIA DESTROYERS SECURE WASTE CONTAINERS Paper Shredders While

More information

Records Authority. Private Health Insurance Administration Council

Records Authority. Private Health Insurance Administration Council Records Authority Private Health Insurance Administration Council Private Health Insurance Prudential Regulation Job no 2010/00384490 21 July 2010 TABLE OF CONTENTS: INTRODUCTION 3 APPLICATION OF THIS

More information