UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

Size: px
Start display at page:

Download "UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public"

Transcription

1 Defence Security Manual DSM Part 2:65 Audiovisual Security of Classified Activities Version 4 ation date July 2015 Amendment list 17 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements Defence personnel are, and external service providers subject to the terms and conditions of their contract may be, bound by security policy contained in the DSM and Information Security Manual (ISM). Failure to comply with the mandatory requirements of the DSM and ISM may result in action under the relevant contract provision or legislation including, but not limited to; the Defence Force Discipline Act 1982, the Service Act 1999, and the Crimes Act Mandatory requirements in the DSM and ISM are identified through the use of the terms must / must not and should / should not. Compliance with these requirements is mandatory unless the appropriate authority, if applicable, has considered the justification for non-compliance and accepted the associated risk through the granting of a dispensation. The terms recommend and may are used to denote a sensible security practice and noncompliance need not be approved or documented. Note: Non-compliance with a sensible security practice ought to be informed by sound risk management principles. The DSM compliance regime, including the authority to approve non-compliance with mandatory requirements, the use of dispensation indicators, and how to apply for a dispensation is detailed in DSM Part 2:1 Dispensations. Copyright Commonwealth of Australia 2010 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Department of Defence. Requests and inquiries concerning reproduction and rights should be addressed to Defence Publishing Services, Department of Defence.

2 Introduction 1. Classified information is discussed throughout Defence in a range of locations both in Australia and overseas. This information can be of great value to unauthorised persons who may make concerted efforts to acquire it. It is therefore important to be aware of potential threats and to take appropriate measures to ensure that the content of classified conversations, both in person and using audiovisual conferencing facilities, is protected. 2. The purpose of Defence Security Manual (DSM) Part 2:65 is to detail security policy relating to the protection of classified activities from deliberate or accidental audiovisual interception. Policy 3. Classified conversations, whether in person, using audiovisual conferencing facilities, or on the telephone, are to be secure from deliberate technical and accidental compromise. Conversation Security Process 4. Offsite. Classified conversations are to be protected from being overheard when conducted offsite, see DSM Part 2:31 Offsite Work for further information. 5. Open plan facilities. Open plan facilities present an increased security risk due to the ability to overhear conversations. Personnel in open plan facilities: a. are to ensure that all personnel within hearing range hold an appropriate security clearance before discussing classified material and adhere to the need-to-know principles; and b. must not [Auth: None] discuss TOP SECRET material unless the entire open plan facility is a designated Zone Five (see DSM Part 2:60 Physical Security for descriptions of Physical Security Zones). Amplified Speech 6. Where amplified classified speech is generated, the audio should remain within the physical boundaries of that certified audio-secure room. 7. The Defence Security and Vetting Service (DS&VS) must be consulted prior to: a. installing non-accredited equipment generating amplified speech in certified audio-secure rooms; and b. installing any equipment generating amplified classified speech in a room that is not normally maintained for audio security. If the advice proves that such equipment can be installed, local standard operating procedures (SOP) are to be implemented that will reduce the risk of compromising the amplified speech. 8. Amplified speech from secure hands free phones. Where speaker phone technology is enabled it must only be used in a certified audio-secure room. Note: Hands-free devices can allow both ends of a conversation to be heard, and potentially allow the near end to inadvertently discuss classified material which can be overheard by uncleared staff at the far end. DSM Part 2:65 Page 2 of 10

3 9. These systems must not be installed in any Zone Five unless they have been accredited by the area s Physical and ICT Accreditation Authority. Note: This is an ISM requirement and Zone Five areas may require a dispensation in order to permit the use of lower-classified systems within the zones. Secure Phones and Desktop Video Conferencing in a Non-Certified Audio-Secure Room 10. If any of these devices are to be used in a non-certified audio-secure room then any hands-free functionality must be disabled and a hard-wired handset or headset must be used. Unsecure, Non-Accredited Phones in Audio Secure Level (ASL) 4 and 5 Facilities 11. Hands-free phones. Hands-free phones are designed to pick up and transmit conversations in the vicinity of the device. They must not [Auth:None] be used in a Zone Five area as the audio security risk is too high. 12. Off-hook audio protection. Off-hook audio protection features must be used on all phones that are not accredited. 13. To ensure that the protection feature is used appropriately, personnel need to be made aware of the feature and trained in its proper use. Push-to-talk handsets should be used to meet the requirement for offhook audio protection. Note: Providing off-hook security minimises the chance of a classified conversation being accidentally coupled into handsets and speakerphones. Limiting the time an active microphone is open reduces this threat. Other VoIP and Desktop Video Conferencing Requirements 14. VoIP and desktop videoconferencing systems must [Auth:None] be accredited by the appropriate ICT accreditation authority (for further information regarding accreditation, see DSM Part 2:4 Facilities and ICT Systems Security Accreditation). VoIP phones accessible from public networks such as the internet require the use of an Australian Signals Directorate (ASD) approved gateway, further information on which may be found in the ISM. 15. To prevent the unauthorised use of secure VoIP phones and desktop videoconferencing they must be protected from unauthorised use by a user authentication mechanism. For standalone VoIP phones this may be met by the use of a PIN which is issued only to appropriately security cleared staff. For desktop VoIP and videoconferencing, user logon authentication by the operating system is sufficient. 16. VoIP and other desktop camera phones must be positioned in such a way as to avoid potential oversight of classified material in the background, for example on classified information on whiteboards. 17. VoIP and other desktop cameras must not be installed in any Zone Five unless they have been accredited by the area s Physical and ICT Accreditation Authority. Note: This is an ISM requirement and Zone Five areas may require a dispensation in order to permit the use of lower-classified systems within the Zone Five. Answering Machines 18. Answering machines often include a function permitting remote activation of an integrated microphone to audio monitor the answering machine location. Answering machines must not be connected to Defence networks, except by the user demonstrating to the Regional Voice Manager that: a. no other form of Defence-approved PABX voic exists; DSM Part 2:65 Page 3 of 10

4 b. an exceptional need exists; and c. the security risk has been mitigated. Telephones and Pagers 19. Telephones and pagers are to be used in accordance with the requirements of the ISM. Secure Desktop Phones 20. Secure desktop phones use attached High Grade Encryption devices approved by ASD and users must [Auth:None] comply with instructions provided for their usage, including connection and usage of approved peripheral devices such as secure faxes. Audio-Secure Facilities 21. Table 2:65-1 describes the appropriate audio-secure facilities for classified conversations. The requirements therein may be subject to the variation process on a case-by-case basis. Table 2:65-1 Appropriate Audio-Secure Rooms for Classified Conversations If a room will be used for Requirement: Irregular SECRET conversations (less than once a month) ASL2 (a) Irregular TOP SECRET conversations (less than once a ASL3 month), or SECRET conversations conducted regularly SECRET conversations ASL 3 TOP SECRET conversations TOP SECRET amplified Sensitive Compartmented ASL 5 Information (SCI) (b) ASL 4 or above a. It may be impractical to achieve ASL2 in an open plan facility. b. SCI areas are to comply with directions from the Defence Intelligence Security (DIS) 22. An individual room located within a Zone Five may not need the same level of audio-security ratings to conduct classified conversations. Rooms that are used for compartment information within Zone Five areas may still need the full audio-security protection. Managers should consider the risks involved and obtain advice from the DS&VS Technical Surveillance Countermeasures (TSCM) unit or the compartment controller. 23. If classified meetings or activities are required in a Defence facility that is not normally maintained for audio security, advice on security requirements must be obtained from the DS&VS TSCM. Meetings or activities classified SECRET and above must not be held in other non-accredited facilities without approval from the First Assistant Secretary Security and Vetting Service (FAS S&VS). Regarding material in the SCI, approval must be obtained from the DIS. 24. If an audio-secure room with a suitable Dw is not available, commanders and managers may, on receipt of advice from the DS&VS TSCM or approval from FAS S&VS, allow irregular meetings up to the SECRET level are to be held in an office room if the risks involved are adequately assessed and managed. Commanders and managers must also: DSM Part 2:65 Page 4 of 10

5 a. ensure that anyone in adjoining areas is cleared and authorised for access to the material to be discussed; b. put in place measures to ensure that nobody is allowed to loiter in adjoining corridors; c. document the frequency and nature of such arrangements, which may be subsequently used as evidence for creation and certification of an audio-secure room; and d. ensure signage is placed on all entry doors and on or near any equipment that is used to generate amplified speech. These signs will indicate that local SOP apply when using this equipment for classified conversions. Example: 'This room is fitted with a Unified Communications Conferencing Station; however this room is not rated as Audio-Secure. Before using this conferencing facility for sensitive/classified use, refer to your unit security SOP for audio control measures.' Authority to Vary the Audio Standards for Audio-Secure Rooms 25. The DS&VS TSCM may vary the Dw audio standards for rooms up to and including the SECRET level following a risk assessment. 26. Only the relevant compartment controller may vary requirements for compartmented material. Any audio-secure room that comes under international agreed audio-security requirements must not [Auth:None] be modified without the permission of the compartment controller. Security Requirements for Varying the Use of a ASL 2 Rated Room 27. ASL 2 rated rooms may be suitable for use at a higher ASL rating. This may only be done after seeking advice from the DS&VS TSCM. The room will also need a risk mitigation strategy. 28. ASL 2 facilities are not normally subject to TSCM testing unless special circumstances are identified through liaison between the user and the DS&VS TSCM. Electronic Equipment within Certified Audio-Secure Rooms 29. The following describes the electronic equipment requirements that can be used: a. DSD-approved secure telephones (including approved peripherals) may be installed; b. Accredited classified VoIP phones and desktop cameras may be installed; c. Information technology equipment and audiovisual equipment located within designated conference and briefing facilities must remain in the area. If equipment is removed for repair or replacement, seek advice from the Assistant Director TSCM for TSCM requirements before using the facility 30. The following describes the electronic requirements that cannot be used: a. The area must not [Auth:None] have installed any unaccredited audio or video transmitters, wireless microphones, intercom systems, facsimile equipment, public address systems or cordless telephones; and b. Other devices capable of transmitting or recording sound or video (including mobile phones) must not be brought into the room unless their purpose is to overtly record a meeting. The device(s) must be declared to the Security Officer, and the device(s) and media must be DSM Part 2:65 Page 5 of 10

6 classified, registered and labelled according to the maximum classification of the material recorded; refer DSM Part 2:52 Portable Electronic Devices and Media for further information. Exclusion: Accredited Defence laptops identified and classified as SECRET or higher may be brought into the room on a temporary basis if they are classified at or above the current activity within the room. 31. For more information on the physical requirements for the construction and acoustic testing of certified audio-secure rooms, see annex A. 32. External voice communications in certified audio-secure rooms. Installation advice for external voice communications such as two-way radios must be obtained from DS&VS. The purpose of this requirement is to mitigate against any vulnerabilities that may arise due to the use of external communications equipment in these facilities. Emergency service agencies when called to a secure-audio room can utilise the emergency voice communications system. This waiver is only for the duration of the visit/emergency. Operational Deployments, Military Field Trials and Field Exercises 33. Long-term operational deployments are to be treated, if possible, in the same manner as a fixed secure-facility in Australia. Commanders and managers should seek the advice from the DS&VS TSCM when setting up audio-secure facilities within these areas. 34. In the case of short-term operational deployments, military field trials and field exercises, commanders or managers can determine the need for audio-security, particularly where other measures have been taken to ensure security of the facility or area. Commanders or managers should take into consideration the occupational history of a fixed facility, and the possibility of audio-security compromise by non-australian Defence personnel. Note: This above requirements only apply to SECRET and below spaces. For TOP SECRET spaces refer to the DIS. ADF platforms 35. Normally TSCM assessments are not conducted on ADF platforms, however if the unit commander has a concern with or requires advice on audio-security, the DS&VS TSCM is to be contacted. Temporary Secure Video Conferencing Systems. 36. Temporary secure video conferencing systems are to be utilised for exercise or operational reasons and must not be used on fixed sites on a regular basis, unless the site has a certified audio-secure room. Hearing Augmentation in Conferencing Facilities 37. The National Construction Code requires facilities (conference rooms, video conference, theatres, etc) with certain criteria be fitted with a hearing augmentation system. The DS&VS TSCM has assessed the BCA, AS and AS for the requirements for hearing augmentation systems. There are four acceptable listening systems for hearing augmentation in the standards. Of these, the infrared light transmission system is acceptable in Defence Secure Audio rooms. 38. The listening system must be designed so as it can be physically isolated from the main AV system until it is required. The infrared must be contained within the audio-secure facility. DSM Part 2:65 Page 6 of 10

7 Obtaining a Technical Surveillance Countermeasures Test 39. TSCM tests are conducted to determine whether unauthorised devices have been placed in a facility to try to remove information. TSCM tests are not a guarantee of long-term audio integrity, which can only be assured by the appropriate use of physical security measures and access controls. 40. TSCM tests must be conducted periodically in audio-secure facilities, and before conferences and meetings in other facilities, if deemed necessary after consultation with the DS&VS TSCM. 41. The commander/manager responsible for the security of a certified audio secured rooms must arrange TSCM testing or assessment: a. at least two years, or as directed by the TSCM threat assessment; b. following any actual or suspected unauthorised entry into an audio-secure room; c. following any works, alterations, or furniture and appliance changes to an audio-secure room; or d. when the DS&VS TSCM considers TSCM testing is warranted. 42. The process for obtaining a TSCM test is detailed on the Defence Security Portal. Actions on Finding a Suspected Intelligence Collection Device 43. If a suspected intelligence collection device is found: a. cease all classified discussions; b. do not touch, move, or test the object; and c. immediately: (1) report it to the relevant commander/manager; and (2) secure the facility, if practical, so the suspect device cannot be removed. 44. The finding of a suspected intelligence collection device is a major security incident. When reported, the following actions must be completed: a. Immediately report the incident; (1) to the DS&VS SIC (see DSM Part 2:12 Security Incidents and Investigations); and (2) through the chain of command to the DS&VS TSCM. b. complete and send the AD429 Suspected Intelligence Collection Device form to DS&VS TSCM within 48 hours; and c. if possible, keep the facility isolated and secure. 45. The suspected compromise of audio-secure information is also a major security incident and must be reported immediately to: a. the DS&VS SIC; and b. through the chain of command to the DS&VS TSCM. DSM Part 2:65 Page 7 of 10

8 Roles and Responsibilities First Assistant Secretary Security and Vetting Service 46. FAS S&VS is responsible for: a. the provision of advice regarding audiovisual security compliance requirements and technical standards; Note: FAS S&VS has delegated the responsibility for the provision of advice regarding audiovisual security compliance requirements and technical standards to the DS&VS TSCM. b. being the first point of contact during the accreditation process to designate a facility as audiosecure; and c. ascertaining that the facility is physically suitable for use as an audio-secure room at the level required (see Annex A). Service Security Authorities 47. SSA may provide advice on physical security aspects of facilities, but are to redirect queries concerning audio appraisals to the DS&VS TSCM. Commanders and Managers 48. Commanders and managers are responsible for: a. the management of any audio-secure facility in their unit, business unit or DISP member entity, including access control measures to that facility; b. ensuring classified conversations only occur in appropriately rated facilities; c. seeking a TSCM assessment from DS&VS before conducting regular classified meetings; and d. ensuring that certified audio-secure room/s are administered accordingly as per regulations set out in DSM Part 2:60 Physical Security. Security Officer 49. Security officers are responsible to their commander, manager or DISP member executive for the necessary administrative action to enable compliance with this DSM part. Defence Personnel and External Service Providers 50. All Defence personnel and external service providers are responsible for the security of their classified and sensitive 1 conversations. They are responsible for ensuring that: a. people without a need to know are not able to overhear; b. conversations that warrant national security classification are allocated one and protected accordingly; and 1 Sensitive conversations are those that would normally be given a DLM or Sensitive protective marking, such as medical, legal, career and commercial. DSM Part 2:65 Page 8 of 10

9 c. private, unclassified conversations are not conducted in an area that could prejudice the privacy of individuals or entities concerned. Key Definitions 51. Technical surveillance countermeasures (TSCM). Measures taken to identify and mitigate potential vulnerabilities or a deliberate audio or visual attack. 52. Audio-security level (ASL). A designation that describes the level of audio-security of a facility. An ASL can be: a. ASL 1 an ordinary facility with no specific audio-security accreditation; or b. ASL 2 a secure facility with a weighted level difference (Dw) of at least 35, that has met additional defined security measures to be suitable for irregular SECRET conversations; or c. ASL 3 a secure facility with a Dw of at least 40, that has met additional defined security measures to be suitable for regular SECRET conversations and irregular TOP SECRET conversations; or d. ASL 4 a secure facility with a Dw of at least 45, that has met additional security measures to be suitable for regular TOP SECRET conversations; or e. ASL 5 a secure facility with a Dw of at least 50, that is used with amplified Sensitive Compartmented Information (SCI) audio. 53. Certified Audio Secure Room A room that is rated ASL3 or above and has been certified as audio secure. 54. Weighted level difference. A measure of audio privacy between two spaces. Further information is available in Australian/New Zealand Standard (AS/NZS) 717.1:2004 and Australian Security and Intelligence Organisation (ASIO) Technical Notes 1-06, which can be made available by DS&VS on request. 55. Voice over Internet Protocol (VoIP). A general term for a family of transmission technologies for delivery of voice communications over internet protocol or other packet-switched networks. 56. Amplified Speech. A general term for when audio is amplified into free space by means of a speaker. Amplified speech can be generated by, but not limited to, the following types of equipment: a. phones with a hand-free capability (analogue, digital, VoIP); b. audio visual equipment; c. television/monitors; and d. conferencing systems. 57. ADF platform a mobile or temporary fixed facility or capability that is used by the ADF on operations or exercises. Further Definitions 58. Further definitions for common DSM terms can be found in the Glossary. DSM Part 2:65 Page 9 of 10

10 Annexes and Attachments Annex A Constructing Audio-Secure Rooms (current version published July 2015) DSM Part 2:65 Page 10 of 10

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:5 Security Awareness and Training Version 4 ation date July 2015 Amendment list 17 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements Defence

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:41 Security for Projects and Capability Planning Version 3 ation date July 2015 Amendment list 24 Optimised for Screen; Print; Screen Reader Releasable to Compliance

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:61 Access Control and Identity Management Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Defence Security Manual DSM Part 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Version 1 ation date July 2105 Amendment list 23 Optimised for Screen; Print; Screen Reader Releasable to

More information

Information System Audit Guide

Information System Audit Guide Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2015 All material presented in this publication

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2014 All material presented in this publication

More information

Physical security management guidelines

Physical security management guidelines Physical security management guidelines Event security Approved 13 December 2011 Version 1.0 i Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons

More information

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

Email Protective Marking Standard Implementation Guide for the Australian Government

Email Protective Marking Standard Implementation Guide for the Australian Government Email Protective Marking Standard Implementation Guide for the Australian Government May 2012 (V2012.1) Page 1 of 14 Disclaimer The Department of Finance and Deregulation (Finance) has prepared this document

More information

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V2.0 NOVEMBER 2014 Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V 2.0 NOVEMBER

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Security of outsourced services and functions Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this publication

More information

IT Security Management

IT Security Management The Auditor-General Audit Report No.23 2005 06 Protective Security Audit Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036 7632 ISBN 0 642 80882 1 COPYRIGHT INFORMATION This work

More information

DPS APPROVED INSTALLER

DPS APPROVED INSTALLER COMPANY PROFILE About us ABOUT OUR COMPANY Transwall Technologies L.L.C was established in 2006 in Dubai, United Arab Emirates. Transwall Technologies L.L.C is a provider of high-level Security Systems,

More information

This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.

This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information. Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Reporting incidents and conducting security investigations Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this

More information

06100 POLICY SECURITY AND INFORMATION ASSURANCE

06100 POLICY SECURITY AND INFORMATION ASSURANCE Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Information Classification and. Handling Policy

Information Classification and. Handling Policy Information Security Document Information Classification and 1 Version History Version Date Detail Author 1.0 27/06/2013 Approved by Information Governance Jo White Group 2.0 31/07/2013 Approved by Information

More information

VoIP services offer an alternative to regular fixed line phone services that may provide benefits to consumers.

VoIP services offer an alternative to regular fixed line phone services that may provide benefits to consumers. Search Home > Internet > VoIP > ACMA VoIP Homepage ACMA VoIP Homepage Voice over Internet Protocol (VoIP) is the name for the different technologies that allow telephone calls to be made over broadband

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

Wireless Network Security Position Paper. Overview for CEO s

Wireless Network Security Position Paper. Overview for CEO s Wireless Network Security Position Paper Overview for CEO s VERSION 1.1 December 2007 Acknowledgement This document was written with the assistance of the Department of the Premier and Cabinet. Table of

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information

Gatekeeper Public Key Infrastructure Framework. Compliance Audit Program

Gatekeeper Public Key Infrastructure Framework. Compliance Audit Program Gatekeeper Public Key Infrastructure Framework Compliance Audit Program V 2.1 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work is copyright. Apart from any use as permitted

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...

More information

NOT PROTECTIVELY MARKED

NOT PROTECTIVELY MARKED s Policy Policy summary West Yorkshire Police complies with Authorised Professional Practice (APP) which contains information to assist policing, and has established a local policy procedure on to provide

More information

Records Authority. Australian Security Intelligence Organisation

Records Authority. Australian Security Intelligence Organisation Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3

More information

OVERVIEW OF THE TELEGUARD HOME SECURITY SYSTEM

OVERVIEW OF THE TELEGUARD HOME SECURITY SYSTEM OVERVIEW OF THE TELEGUARD HOME SECURITY SYSTEM 12. WIDE RANGE OF POTENTIAL INPUT DEVICES PIR s, Smoke Alarms, Emergency Transmitters, Environmental / Gas Leak Sensors, Break-in or Inactivity Detectors

More information

Protective Security Governance Policy. Outlines ANAO protective security arrangements

Protective Security Governance Policy. Outlines ANAO protective security arrangements Protective Security Governance Policy Outlines ANAO protective security arrangements Version 2.0 Effective JULY 2012 Document management Document identification Document ID Document title Release authority

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Department of Defense

Department of Defense Department of Defense DIRECTIVE NUMBER 8100.02 April 14, 2004 Certified Current as of April 23, 2007 ASD(NII) SUBJECT: Use of Commercial Wireless Devices, Services, and Technologies in the Department of

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Security Awareness and Training

Security Awareness and Training T h e A u d i t o r - G e n e r a l Audit Report No.25 2009 10 Performance Audit A u s t r a l i a n N a t i o n a l A u d i t O f f i c e Commonwealth of Australia 2010 ISSN 1036 7632 ISBN 0 642 81115

More information

PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE

PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED

More information

Video conferencing just became clearer NEC conferencing & collaboration

Video conferencing just became clearer NEC conferencing & collaboration Video conferencing just became clearer NEC conferencing & collaboration NEC Australia nec.com.au Maximise your business communications with NEC s conferencing & collaboration solution. Communicate, collaborate

More information

Australian Transport Council. National Standard for the Administration of Marine Safety SECTION 4 SURVEYS OF VESSELS

Australian Transport Council. National Standard for the Administration of Marine Safety SECTION 4 SURVEYS OF VESSELS Australian Transport Council National Standard for the Administration of Marine Safety SECTION 4 SURVEYS OF VESSELS Edition 1 Draft for comment issued 20 December 2005 Endorsed by the Australian Transport

More information

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure

More information

Box Hill Senior Secondary College/MYSC

Box Hill Senior Secondary College/MYSC Box Hill Senior Secondary College/MYSC Information and Communication Technologies Acceptable Use and Cybersafety Policy Student and Parent/Guardian Agreement Aims of this Policy Information and Communication

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):

More information

PRODUCT WARRANTY. Page 20

PRODUCT WARRANTY. Page 20 PRODUCT WARRANTY Manufactured equipment is warranted to be free from defects in material and workmanship for a period of twelve (12) months from date of manufacture as indicated by the date stamp and/or

More information

TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.

TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt. TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of

More information

16 Electronic health information management systems

16 Electronic health information management systems 16 Electronic health information management systems Section 16: Electronic information management systems The continued expansion and growth in global technologies is aiding the development of many new

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

MOBILE TELEPHONES POLICY & GUIDELINES

MOBILE TELEPHONES POLICY & GUIDELINES MOBILE TELEPHONES POLICY & GUIDELINES 1 PURPOSE The purpose of this policy is to: Implement a uniform and consistent approach to providing mobile telephony devices for WA Health official communications;

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Dublin Institute of Technology IT Security Policy

Dublin Institute of Technology IT Security Policy Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David

More information

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT 26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

Information Security Incident Protocol

Information Security Incident Protocol Information Security Incident Protocol Document Owner Caroline Dodge Tel: 01622-221652 caroline.dodge@kent.gov.uk Version Version 2: July 2013 Contents 1. Protocol Objectives 2. Scope 3. Protocol Statement

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1

PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1 Executive Summary PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1 In today s business environment, managing and controlling access to data is critical to business viability

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

4 122 b. INFORMATION TECHNOLOGY Wide Area Network Idi-astructure (IT 10) POLICY STATEMENT

4 122 b. INFORMATION TECHNOLOGY Wide Area Network Idi-astructure (IT 10) POLICY STATEMENT MetropolitanTransportation Authority Wide Area Network Idi-astructure POLICY STATEMENT The Metropolitan Transportation Authority (LACMTA)maintains a wide area network (WAN),comprised of data and voice,

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/70 23 November 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that

More information

GUIDELINES FOR THE PREPARATION OF A TRANSPORT EMERGENCY RESPONSE PLAN. Endorsed by ACTDG

GUIDELINES FOR THE PREPARATION OF A TRANSPORT EMERGENCY RESPONSE PLAN. Endorsed by ACTDG GUIDELINES FOR THE PREPARATION OF A TRANSPORT EMERGENCY RESPONSE PLAN Endorsed by ACTDG Commonwealth of Australia 2003 ISBN 0 642 45037 4 This work is copyright. You may download, display, print and reproduce

More information

Gatekeeper Compliance Audit Program

Gatekeeper Compliance Audit Program Gatekeeper Compliance Audit Program V2.0 DECEMBER 2014 Gatekeeper Compliance Audit Program V 2.0 DECEMBER 2014 Contents Contents 2 1. Guide Management 4 1.1. Change Log 5 1.2. Review Date 5 1.3. Conventions

More information

General Records Authority

General Records Authority General Records Authority Transfer of custody and ownership of Personal Security Files (PSFs) Job no 2008/00174731 18 April 2008 Commonwealth of Australia 2008 This work is copyright. Apart from any use

More information

Mobile Telephone and Wireless Handheld Devices Policy & Guideline. Information Management and Technology Policy

Mobile Telephone and Wireless Handheld Devices Policy & Guideline. Information Management and Technology Policy Information Management and Technology Policy TITLE: MOBILE TELEPHONE AND WIRELESS HANDHELD DEVICES 1 POLICY Purpose The purpose of this policy is to: 1. Establish a uniform and consistent approach to the

More information

Level 1 Technical. Polycom Voice. Contents

Level 1 Technical. Polycom Voice. Contents Contents Level 1 Technical Polycom Voice 1 - Glossary... 2 2 - Polycom Voice Networks... 3 Polycom UC Software... 3 Provisioning... 3 3 - Key Features (Desktop and Conference Phones)... 5 OpenSIP Integration...

More information

GUIDELINES FOR VOICE OVER INTERNET PROTOCOL (VoIP) COMPUTER TELEPHONY

GUIDELINES FOR VOICE OVER INTERNET PROTOCOL (VoIP) COMPUTER TELEPHONY Committee on National Security Systems CNSS Instruction No. 5000 April 2007 GUIDELINES FOR VOICE OVER INTERNET PROTOCOL (VoIP) COMPUTER TELEPHONY CNSS Secretariat (I922) / National Security Agency 9800

More information

Additional Security Considerations and Controls for Virtual Private Networks

Additional Security Considerations and Controls for Virtual Private Networks CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES

More information

INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY

INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY 1. PURPOSE In respect to this policy the term physical and environmental security refers to controls taken to protect

More information

ACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services

ACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services ACT Auditor-General s Office Performance Audit Report Whole-of-Government Information and Communication Technology Security Management and Services Report No. 2 / 2012 PA 09/03 The Speaker ACT Legislative

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

Internet Access and Use

Internet Access and Use Policy Internet Access and Use Please note this policy is mandatory and staff are required to adhere to the content Summary DECD staff must use the Internet in an appropriate and professional manner, and

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

STATUTORY INSTRUMENTS. S.I. No. 336 of 2011

STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 EUROPEAN COMMUNITIES (ELECTRONIC COMMUNICATIONS NETWORKS AND SERVICES) (PRIVACY AND ELECTRONIC COMMUNICATIONS) REGULATIONS 2011 (Prn. A11/1165) 2 [336] S.I.

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

The Cherokee Sheriff s Office is committed to providing equal access to all persons with disabilities.

The Cherokee Sheriff s Office is committed to providing equal access to all persons with disabilities. The Cherokee Sheriff s Office is committed to providing equal access to all persons with disabilities. To ensure effective communication in connection with the provision of Cherokee Sheriff s Office services

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005 AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT

More information

ADDITIONAL FEATURES. Copyright 2008 Pearson Education Canada

ADDITIONAL FEATURES. Copyright 2008 Pearson Education Canada ADDITIONAL FEATURES Because a wide array of features are available on telephone systems, check with telephone suppliers for your specific requirements. Centralized equipment usually incorporates standard

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards DSM Supplementary Document Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen

More information

HKCAS Supplementary Criteria No. 8

HKCAS Supplementary Criteria No. 8 Page 1 of 12 HKCAS Supplementary Criteria No. 8 Accreditation Programme for Information Security Management System (ISMS) Certification 1 INTRODUCTION 1.1 HKAS accreditation for information security management

More information

TSG GUIDELINES FOR COMPUTERIZED TELEPHONE SYSTEMS TSG STANDARD 2

TSG GUIDELINES FOR COMPUTERIZED TELEPHONE SYSTEMS TSG STANDARD 2 TSG GUIDELINES FOR COMPUTERIZED TELEPHONE SYSTEMS TSG STANDARD 2 March 1990 PREFACE This standard was prepared by the Telephone Security Group (TSG). The charter members of the TSG are: Department of the

More information

Remote Access and Network Security Statement For Apple

Remote Access and Network Security Statement For Apple Remote Access and Mobile Working Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Remote Access and

More information

with HD quality and many more supportive features and applications

with HD quality and many more supportive features and applications Always more than you expect Panasonic SIP telephony Terminals with HD quality and many more supportive features and applications SIP Terminals key features Advanced technology for an advanced business

More information

Physical security management guidelines

Physical security management guidelines Physical security management guidelines Security zones and risk mitigation control measures Approved 21 June 2011 Version 1.4 i Commonwealth of Australia 2011 All material presented in this publication

More information