UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
|
|
|
- Stanley Chase
- 10 years ago
- Views:
Transcription
1 Defence Security Manual DSM Part 2:61 Access Control and Identity Management Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements Defence personnel are, and external service providers subject to the terms and conditions of their contract may be, bound by security policy contained in the DSM and Information Security Manual (ISM). Failure to comply with the mandatory requirements of the DSM and ISM may result in action under the relevant contract provision or legislation including, but not limited to; the Defence Force Discipline Act 1982, the Service Act 1999, and the Crimes Act Mandatory requirements in the DSM and ISM are identified through the use of the terms must / must not and should / should not. Compliance with these requirements is mandatory unless the appropriate authority, if applicable, has considered the justification for non-compliance and accepted the associated risk through the granting of a dispensation. The terms recommend and may are used to denote a sensible security practice and noncompliance need not be approved or documented. Note: Non-compliance with a sensible security practice ought to be informed by sound risk management principles. The DSM compliance regime, including the authority to approve non-compliance with mandatory requirements, the use of dispensation indicators, and how to apply for a dispensation is detailed in DSM Part 2:1 Dispensations. Copyright Commonwealth of Australia 2010 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Department of Defence. Requests and inquiries concerning reproduction and rights should be addressed to Defence Publishing Services, Department of Defence.
2 Introduction 1. Security precautions at Defence bases aim to protect Defence personnel, prevent theft of and damage to Defence assets and infrastructure, and prevent unauthorised access to sensitive Defence information and information and communication technology (ICT) systems. A key component of these precautions is controlling access to Defence bases, establishments, military or business units, Defence industry facilities and the assets and systems contained therein. 2. The purpose of Defence Security Manual (DSM) Part 2:61 is to detail the policy for achieving effective identity management and access control. Policy 3. Defence is to positively identify individuals before granting access to an area not designated for public access so as to ensure that only people whose identity has been established, who have an appropriate security clearance and who have an accepted reason for seeking entry can access Defence assets and information. Identity Management Process 4. All individuals must [Auth:None] be positively identified before being granted entry to any part of a Defence base that is not designated a Zone 1 (public access area); anyone who cannot be positively identified must [Auth:None] be denied access. Exclusion: Emergency services personnel, who are attending an emergency incident on a part of a Defence base that is subject to access control arrangements, do not need to be positively identified before being granted entry. Note: It is recommended that emergency response arrangements are addressed in base security documentation. At larger bases, this may include making provision to assist emergency services personnel by providing an escort to take them to site of the incident. 5. Defence personnel and external service providers are identified by their Defence issued identity or access cards, either visually or through electronic access control systems. 6. Visitors without Defence issued identity cards must provide alternative identification documents. These documents are to contain a recent photo and should be issued by a government authority, such as a current passport, licence or permit issued under a law of the Commonwealth, a State or Territory such as an Australian driver's licence. Exclusion: Minors may be positively identified by a parent or guardian, who is a bearer of a Defence issued identity or access control card, or has provided alternative identification documents as detailed above. Access Control Requirements 7. DSM Part 2:60 Physical Security defines minimum standards for access to classified material and Physical Security Zones. These standards are to be met in order to maintain an area s security rating. Access to other areas and resources is determined through the security risk assessment process conducted by the local commander/manager or, with regard to whole-of-base access, the Base Support Manager (BSM) in consultation with commanders and managers. DSM Part 2:61 Page 2 of 11
3 Note: Security risk assessments take into account the differences in local conditions that affect a base, establishment, facility or military or business unit. Local Conditions of Access 8. The BSM and Senior ADF Officer (SADFO) jointly determine local conditions of access based on security requirements and workplace health and safety considerations. This should be done in consultation with resident commanders and managers. 9. It is recommended that such local arrangements are incorporated into base security documentation and are considered in SAFEBASE planning. These access arrangements may be affected by changed circumstances at the site, such as the hosting of a major event or an increase in the SAFEBASE alert level. Example: Cleaning contractors are given an identity card to allow them to conduct cleaning activities within a base. Normally they are permitted to enter the base unescorted to conduct their work. An increase in the SAFEBASE alert level may require them to be stopped at the gate and signed in as escorted visitors. Certain areas previously accessible for contracted cleaning may now be off limit. Access Entitlement 10. Prior to granting an individual unsupervised and unimpeded access to any part of a base (not including a Zone 1 area), a commander or manager must ensure, usually through the his/her security officer, that: a. the individual has a legitimate need for access arising from: (1) a performance agreement, a contract or a duty statement; or (2) a requirement or entitlement to access married accommodation or recreational facilities; and b. the proposed access is consistent with any local conditions of access determined by the BSM and SADFO; c. if required, the individual holds an appropriate security clearance and any specific compartment briefing; and d. the individual has an authorised access card (except for minors under the age of 16). Note: A holder of a Defence identity card is not automatically entitled to enter or access all areas within a Defence base, establishment, facility or military or business unit. Contractor Unescorted Access 11. Contractor unescorted access must [Auth:BSM] be time or circumstance specific (for example, in or out of business hours, on weekdays or weekends, or during periods of heightened support to ADF operations). External service providers who have not been granted an appropriate security clearance must [Auth:BSM] be escorted at all times when accessing Zone 2 areas and above of a base. Exclusion: External service providers do not need a security clearance if they only require access to a Zone 1 area, ie gardeners tending to grounds maintenance. Visitor Access 12. Visitors without Defence issued identity cards must [Auth:BSM] be escorted by a Defence pass holder at all times when accessing Zone 2 areas and above of a base. DSM Part 2:61 Page 3 of 11
4 13. For situations where achieving compliance with the escorting requirements are prohibitive or resource intensive, eg frequent and simultaneous goods deliveries to a base or a high volume of taxi pick ups or drop offs, risks associated with non-compliance and alternate strategies for managing risks are to be identified at a base level and managed through the dispensation process; for further information refer DSM Part 2:1 Dispensations. Following approval of the dispensation, it is recommended that such local arrangements are incorporated into base security documentation and are considered in SAFEBASE planning. Access for Minors Under the Age of Minors who are under 16 years of age, and therefore not entitled to be issued a family member s card (refer Annex B), are to be escorted at all times by a parent or legal guardian when accessing Zone 2 areas and above of a base. However, the BSM of a base with on-site married accommodation may develop local arrangements allowing unescorted access to minors under the age of 16, where those minors are themselves residents of the base or are visiting residents of the base. It is recommended that in such circumstances unescorted access only applies to movements to, from and within married accommodation and community/recreational areas of the base. It is recommended that such local arrangements are incorporated into base security documentation and are considered in SAFEBASE planning. Note: The escorting of a minor under the age of 16 by a parent or legal guardian is considered to be a different process and circumstance to the 'formal' escorting of a visitor. Parents and guardians who hold a national Defence families access card or base access only card do not have 'formal' escorting rights (refer Annex B for further information) for visitors, but are responsible for the movement of minors in their care. Issuing Identity and Access Cards Unescorted Access Requirements 15. All applications for an identity or access card must [Auth:None] identify a Defence sponsor who accepts the risk of the sponsored individual gaining unescorted access. It is recommended that the security officer (not including assistant security officers) be the sponsor within a military or business unit for the issuing of identity or access cards. If not the security officer then the sponsor: a. must [Auth:None] be either an ADF member or a Defence APS employee; b. should at a minimum, be at the APS6/O4 level; and c. should be employed in the area the sponsored individual intends to work in or needs access to. Exclusion: Group Heads and Service Chiefs may, for areas of their sole responsibility, dictate if sponsors are to be higher than APS6/O4 level. Commanders and managers of Defence bases, where a sponsor at the APS6/O4 level is not employed, may take on the role of the sponsor. 16. With respect to sponsorship of family members: a. ADF members may sponsor their own family member for the issue of either a national Defence families access card or a base access only family card; and b. APS employees may sponsor their own family member for the issue of a base access only family card. Note: APS employee family members are not entitled to the national Defence families access card; for further information on the specific cards see Annex B. 17. Defence personnel sponsoring a family member are to accept responsibility and are held accountable for the ongoing use of the card by their family member. DSM Part 2:61 Page 4 of 11
5 18. Identity or access cards must [Auth:DEPSEC DSR] only be issued to individuals by a pass issue officer upon presentation of: a. a suitable form of photographic identification (eg driver s licence, passport etc); b. proof of a legitimate need for unescorted entry to the area (sponsorship) if applicable; c. a signed and witnessed 'Conditions of Use' form; d. where required, proof of a security clearance (for those without a security clearance, a police check may be authorised by the BSM where appropriate); and e. if relating to a family member's card, proof of relationship to the sponsoring member. 19. Identity cards must [Auth:DEPSEC DSR] include the holder s first name and surname, a photograph of the holder and the conditions of issue. 20. Details of specific identity and access cards are found in Annex B. 21. Card issuing equipment and blank cards must be kept secure at all times on the base, establishment, facility or military or business unit which they service. 22. Standby Reserve Identity Card Before an access card for entry to a Defence facility is granted to an external service provider, the Defence sponsor must [Auth:DEPSEC DSR] provide a letter of sponsorship to the pass issue officer that confirms: a. the requirement for access; b. the areas where access is required; c. the agreement of all affected commanders and managers (or their security officers), where access is required across multiple facilities; and d. the length of the contract or the time that the pass is required (whichever is the shorter). 23. The base access only identity card (refer Annex B) is the default card issued to all external service providers. However, if the sponsor is satisfied that the external service provider has a legitimate need and security clearance to access other parts of the Defence estate, then the external service provider is to be issued with a Defence industry identity card. 24. The sponsor must ensure that the expiry date for an external service provider s access control card does not extend beyond the date of contract expiry. Escorted Access Requirements 25. Where a visitor is issued a 'To be escorted pass', the escort officer does not have to be an ADF member or APS employee; however, they must [Auth:None], as per the definition at paragraph 61.10, have escorting entitlements. For further requirements regarding visitor access see Annex A. Temporary Access 26. A temporary Defence access pass may be issued to persons with a legitimate need for access to a particular Defence premise. Such access passes will be valid for a single day and must [Auth:BSM] be returned at the end of the day. DSM Part 2:61 Page 5 of 11
6 Access Cards Conditions of Use 27. Every person issued with an identity or access card must [Auth:None] only use the card for the purpose for which that particular card was issued; refer Annex B. Example: ADF reserve members using their ADF access card to gain access to Defence facilities in order to conduct work in the course of their civilian employment or to further personal or special interests constitutes unauthorised use of their card. 28. The conditions of use of the card must [Auth:None] be acknowledged by the bearer, upon issue, through signature of a 'Conditions of Use' form and witnessed by a member of the pass office where the card was issued. The signed, original 'Conditions of Use' form is to remain at the pass office; the bearer may receive a copy. 29. All bearers of Defence identity and access cards are reminded that the use of cards for other than official Defence purposes increases the threat of identity theft and fraud. It is not difficult for information obtained from an identity/access card to be used for fraudulent purposes. 30. It is recommended that personnel refrain from using their Defence issued identity or access card for other than official Defence purposes or the provision of Government services (eg Centrelink), especially when other options are available, such as, driver's licences, birth certificates and passports. 31. It is recommended that personnel refrain from replicating and transferring a copy of their Defenceissued identity or access card (physically or electronically) to organisations or individuals for the purposes of establishing identity, for other than official Defence purposes. 32. Breaches of the acknowledged Conditions of Use for a card are to be reported as a security incident in accordance with DSM Part 2:12 Security Incidents and Investigations. If an investigation is warranted, the bearer s use of the card may be suspended until an investigation has been completed. Breaches of the conditions of use of the cards could also lead to disciplinary action under: a. the Defence Force Discipline Act 1982; b. the Australian Service Act 1999; or c. prosecution in accordance with the Crimes Act Identity cards must be worn at all times contingent upon safety requirements. Bearers are responsible for wearing their identity card in a prominent position above the waist and in front of their body. Furthermore, bearers of identity cards must: a. protect their card from loss, theft, defacement or unauthorised use; b. clearly display their identity card for inspection when entering a Defence or Defence Industry Security Program (DISP) establishment; c. show their card on demand to any appropriate authority who, in the course of their duty, requires proof of identity; d. not wear their card outside Defence or DISP facilities; and e. not lend their card to any other person. The use of another person's card for any purpose other than an immediately life threatening emergency is strictly prohibited and a reportable security incident. DSM Part 2:61 Page 6 of 11
7 34. Defence personnel and external service providers are to challenge any person not wearing an identity card in areas controlled for security reasons. If the person cannot provide a card, security staff must [Auth:None] be notified immediately. Replacement of Identity and Access Cards 35. Personnel may be issued with a replacement identity or access card at the discretion of the commander or manager. Appropriate documentary evidence must [Auth:DEPSEC DSR] be provided by the member to justify a card replacement. Circumstances under which a card may be replaced include: a. lost or stolen card; b. defacement, deterioration or inoperability of the card; c. a beard is grown or removed; d. physical appearance has been significantly altered, such as hair length or colour; e. a change in name or rank occurs; f. movement between permanent or reserve elements of the ADF; g. movement between Services; or h. other circumstances as considered appropriate by the commander or manager. Lost or Stolen Identity and Access Cards 36. A Defence identity or access card holder must report card loss at the earliest opportunity to the relevant Defence Support and Reform Group (DSRG) pass authority and their security officer. The security officer in turn must confirm that the relevant DSRG pass authority has been informed and must treat the loss as a security incident and report in accordance with DSM Part 2:12 Security Incidents and Investigations. Defence personnel or external service providers are to make every effort to recover the card. 37. When reported, the issuing authority must [Auth:None] invalidate the card and only issue a replacement after confirmation by the supervisor/sponsor of the Defence person or external service provider that this is appropriate. Return of Identity and Access Cards 38. APS employees and ADF members separating from the APS or ADF must [Auth:None] surrender their identity or access card (including family member cards) to their commander or manager for return to the pass issuing office for cancelling. This is to be part of the routine exit paperwork for all Defence personnel. 39. External service providers must [Auth:None] surrender their identity or access card to their supervisor for return to the pass issuing office on cessation of their contract or when no longer required. This is part of the routine paperwork at the conclusion of a contract. Note: Where applicable, exit paperwork shall include the return of family member cards. 40. The pass office or authorised area must cancel and invalidate all cards returned by an exiting individual. The card must be destroyed, for example by cutting it into small pieces. 41. The failure to surrender an identity or access card when lawfully required to do so may render the holder liable to prosecution. DSM Part 2:61 Page 7 of 11
8 CStandard Operating Procedures and Templates 42. Regional DSRG offices can provide information relating to standard operating procedures on the issue, replacement and return of identity or access cards. Templates of cards specified in Annex B are controlled by Directorate of Security and Searches, Defence Support Operations, DSRG. Roles and Responsibilities First Assistant Secretary Security and Vetting Service 43. The First Assistant Secretary Security and Vetting Service (FAS S&VS) is responsible for assessing the security specifications of identity cards, access cards, and access control systems and providing advice on technical requirements. First Assistant Secretary Security and Vetting Service and Service Security Authorities 44. FAS S&VS and the Service Security Authorities (SSA) are responsible for providing advice on access control requirements. SSA perform this function for their respective Services. Deputy Secretary Defence Support and Reform 45. Deputy Secretary Defence Support and Reform (DEPSEC DSR) is responsible for: a. access control arrangements at all Defence bases and facilities covered by Defence Support and Reform Group (DSRG) garrison support contracts; b. determining standards and templates for identity cards, access cards and access control systems; c. producing and distributing identity cards and access cards; and d. instituting a system that allows the loss of an identity or access card to be reported by a Defence pass holder at any time, alerts appropriate security staff of the loss and, if possible, blocks the lost card's access privileges. Base Support Manager and Senior ADF Officer 46. The BSM in consultation with SADFO and resident commanders and managers, is responsible for establishing access control measures in accordance with the Physical Security Zone methodology (see DSM Part 2:60 Physical Security), at a whole-of-base level, and has the authority to: a. grant, refuse or withdraw permission for contractors, visitors and family members of Defence personnel to access bases, establishments, facilities and military or business units on security grounds; b. require pre-approval for access to specified areas outside of normal operational hours; and c. determine any base-specific policy, additional or complementary to this DSM part, under which unescorted access will be granted to an area, including setting any conditions such as access outside of normal operational hours. 47. The BSM may advise commanders and managers where there has been a failure to comply with a reasonable and lawful direction in relation to APS employees, or a lawful order in relation to ADF members, which impacts on security. The matter may then be the subject of APS Code of Conduct or disciplinary action by the relevant authorities. DSM Part 2:61 Page 8 of 11
9 48. Generally SADFO assumes command of the relevant base in the case of a security, safety or emergency event requiring coordination of base personnel or resources. For the purposes of access control and identity management, the SADFO assumes the responsibilities and authority of BSM, as detailed above, at the heightened SAFEBASE alert levels of DELTA and ECHO. For further information refer to DSM Part 2:3 SAFEBASE. Commanders and Managers 49. Commanders and managers are responsible for: a. implementing and ensuring compliance with appropriate access control measures in accordance with the Physical Security Zone methodology (see DSM Part 2:60 Physical Security), for their organisation; and b. ensuring that records of out-of-hours access by staff to security containers or secure, partially secure or intruder resistant areas are maintained, for example through the use of an electronic access control system or a log book. Note: The commander or manager is to appoint an individual, generally a security officer, to maintain oversight of these records and to make them available for inspection in response to a security incident or investigation. For further information on security incidents and investigations refer DSM Part 2:12 Security Incidents and Investigations. Note: The term commanders and managers, which is used throughout the DSM, is interchangeable with the term Heads of Resident Units, used under the Base Accountability Model. 50. Commanders and managers have the authority to: a. grant, refuse or withdraw permission for contractors, visitors and family members of Defence personnel to access their military or business unit on security grounds; b. where necessary, on security grounds, limit Defence personnel access to bases, establishments, facilities and military or business units through suspension of duty; Note: Suspension of duty occurs in response to a failure to comply with a reasonable and lawful direction in relation to APS employees, or a lawful order in relation to ADF members. It occurs in accordance with APS Code of Conduct or Defence Force Discipline Act 1982 proceedings as appropriate, and with full pay while an investigation is conducted. c. require pre-approval for access to specified areas within their unit lines outside of normal operational hours; and d. determine any military or business unit-specific policy, additional or complementary to this DSM part, under which unescorted access will be granted within the military or business unit, including setting any conditions such as access outside of normal operational hours. Security Officers 51. Security officers assist commanders and managers to fulfil their security responsibilities. This may include ensuring that a person who does not meet the criteria for unsupervised and unimpeded access is either denied access, or treated as a visitor by being recorded in the visitor register and escorted at all times by an escort officer. Contract Managers 52. Contract managers are responsible for: DSM Part 2:61 Page 9 of 11
10 a. recommending, to relevant BSM and SADFO, the level of access to Defence facilities required by external service providers that they manage. This is to be done in consultation with relevant commanders and managers; and b. recommending withdrawal of access to Defence facilities when a contract has ended or the external service provider no longer has a requirement for access. Defence Personnel and External Service Providers 53. Defence personnel and external service providers are responsible for: a. accessing only those areas and systems to which they have been granted access; b. wearing their identity card at all times, in a prominent position; c. promptly reporting the loss of their (or a family member's) Defence identity or access card; and d. returning their (and any family member's) identity or access card when separating from the APS or ADF, or for external service providers at the conclusion of a contract unless other arrangements have been made with the Defence sponsor. Key Definitions 54. Access control. The ability to control access to designated areas, information or other assets requiring protection. 55. Escort officer. An individual charged with the responsibility of supervising the movements of a visitor to a designated area. Only an individual identified by their identity card (detailed in Annex B) as having escorting entitlements may perform the role of an escort officer. 56. Unescorted access. A type of access granted to an individual who has been positively identified, holds an appropriate security clearance and has a confirmed need to access an area in which they normally do not work. 57. Identity card. A card used for identification purposes. It identifies an individual, but does not grant access to any assets or information. 58. Access card. A card that grants access to Defence assets and information. It may contain an electronic access token, which permits automated entry to an area or access to an ICT system. 59. Defence Common Access Card. An identity card suitable for identifying Defence personnel at all Defence facilities. It may also be programmed as an electronic access control card for those facilities which the holder has a legitimate need to access in performance of their duties. 60. Family member. An individual who is considered a 'dependant' of an Australian Defence Force (ADF) member or an Australian Service (APS) employee. The term dependant is defined in: a. the Pay and Conditions Manual (PACMAN) for ADF members; and b. the Defence Enterprise Collective Agreement (DECA) for APS members. Further Definitions 61. Further definitions for common DSM terms can be found in the Glossary. DSM Part 2:61 Page 10 of 11
11 Annexes and Attachments Annex A Visitor Access Control (current version published July 2015) Annex B Details of Specific Cards (current version published on July 2015) DSM Part 2:61 Page 11 of 11
UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards
DSM Supplementary Document Annex B to DSM Part 2:61 Access Control and Identity Management - Details of Specific Cards Version 7 ation date July 2015 Amendment list 16 Optimised for Screen; Print; Screen
UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:5 Security Awareness and Training Version 4 ation date July 2015 Amendment list 17 Optimised for Screen; Print; Screen Reader Releasable to Compliance Requirements Defence
UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public
Defence Security Manual DSM Part 2:41 Security for Projects and Capability Planning Version 3 ation date July 2015 Amendment list 24 Optimised for Screen; Print; Screen Reader Releasable to Compliance
DataCentre Access Policies & Procedures
DataCentre Access Policies & Procedures Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5
HAMAD INTERNATIONAL AIRPORT (RESTRICTED AREAS) REGULATIONS 2015
HAMAD INTERNATIONAL AIRPORT (RESTRICTED AREAS) REGULATIONS 2015 Hamad International Airport (Restricted Areas) Regulations Page 1 of 27 HAMAD INTERNATIONAL AIRPORT (RESTRICTED AREAS) REGULATIONS 2015 Table
Protective security governance guidelines
Protective security governance guidelines Security of outsourced services and functions Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this publication
Data Center Access Policies and Procedures
Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010)
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010) Definition of CBP Security Area (19 CFR 122.181) The term CBP security area means the Federal Inspection
ARTWORK COMMISSION AGREEMENT
ARTWORK COMMISSION AGREEMENT THIS AGREEMENT is made the day of in the year BETWEEN the Minister for Works of Level 6, 16 Parkland Road, Osborne Park, WA 6017 being the body corporate created under Section
UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements
Defence Security Manual DSM Part 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Version 1 ation date July 2105 Amendment list 23 Optimised for Screen; Print; Screen Reader Releasable to
ASBESTOS REMOVAL LICENCE ASBESTOS NOTIFICATIONS
GUIDE FOR APPLICANTS ASBESTOS REMOVAL LICENCE ASBESTOS NOTIFICATIONS TABLE OF CONTENTS INTRODUCTION... 2 WHY YOU NEED A LICENCE... 2 WHY YOU NEED TO NOTIFY... 2 LICENCE TYPES... 2 SCOPE... 2 WHO MAY APPLY
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Casino Control Act 2006
Australian Capital Territory A2006-2 Republication No 13 Effective: 14 October 2015 Republication date: 14 October 2015 Last amendment made by A2015-33 Authorised by the ACT Parliamentary Counsel About
CORPORATE CREDIT CARD
CORPORATE CREDIT CARD CEO Directions CEO Directions define specific responsibilities of Comcare staff and others engaged to assist the organisation meet its objectives. They may also establish a set of
Bendigo Term Deposit Accounts and Facilities. Terms & Conditions. 19 October 2015
Bendigo Term Deposit Accounts and Facilities. Terms & Conditions. 19 October 2015 Terms and Conditions About this document This document must be read in conjunction with the Schedule of Fees, Charges
EVENT APPLICATION FORM MAJOR EVENT (Over 50 Attendees)
DCBW Event Form 1 File Number: Record Number: 1. EVENT ORGANISER DETAILS Organisation: Address: EVENT APPLICATION FORM MAJOR EVENT (Over 50 Attendees) Contact Person: Phone: After Hours: E-mail: Position
David Jones Storecard and David Jones American Express Card Member Agreement, Financial Services Guide and Purchase Protection. Terms and Conditions
David Jones Storecard and David Jones American Express Card Member Agreement, Financial Services Guide and Purchase Protection Terms and Conditions Issued May 2016 DAVID JONES STORECARD AND DAVID JONES
Diners Club Corporate Travel System Terms and Conditions
Diners Club Corporate Travel System Terms and Conditions Contents 1 Definitions 4 2 Accepting these Terms and Conditions 7 3 Authorised Users and Authorised Cardholders 7 4 Authorised Travel Agents 7
Witness Protection Act 1995 No 87
New South Wales Witness Protection Act 1995 No 87 Status information Currency of version Current version for 5 October 2012 to date (generated 10 October 2012 at 19:15). Legislation on the NSW legislation
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
STUDENT AGREEMENT Agreement Partner Courses Partners Accepting this Agreement Agreement Date Your Obligations OC Student Policies and Procedures
STUDENT AGREEMENT The following terms and conditions constitute the agreement between you (the undersigned) and Open Colleges Pty Ltd ACN 000 011 692 (OC) for the provision of all courses (including each
OFFICE OF THE PREMIER ACCESS CONTROL POLICY
OFFICE OF THE PREMIER ACCESS CONTROL POLICY - 1 THE ACCESS CONTROL POLICY 1. Purpose 1.1 To propose for the introduction of an ID card policy for the Office of the Premier. 2. Background 2.1 The Office
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
GymSports NZ Incorporated. Membership Data Regulation. Commencement Date 23 January 2009. Issued 23 January 2009
GymSports NZ Incorporated Membership Data Regulation Commencement Date 23 January 2009 Issued 23 January 2009 GymSports NZ, 2008 GymSports New Zealand Incorporated Membership Data Regulation 1. Purpose
Credit Card Contract
Credit Card Contract Credit Card Booklet Cardholder enquiries & Lost and stolen cards Telephone : (679) 321 4300 Facsimile : (679) 330 3738 BSP/SecDocTemp006 Page 1 of 21 Template Issue No.3 reviewed 19032012
CORPORATE CREDIT CARD POLICY & PROCEDURE. To regulate the use of Shire of Dowerin Council Credit Cards held by Council employees.
Policy Owner: CEO Distribution: Management Person Responsible: Finance Manager Date of Approval: 17 November 2015 File Reference: ADM CORPORATE CREDIT CARD POLICY & PROCEDURE Objective To regulate the
Appendix A DRAFT INFORMATION MANAGEMENT PLAN
1 Appendix A DRAFT INFORMATION MANAGEMENT PLAN Pacific Region Identity Protection Project PRIPP April 2004 Forum Eyes Only 2 ABBREVIATIONS Throughout this report the following abbreviations will be utilised:
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
Travelodge Business Account Card Terms & Conditions
Travelodge Business Account Card Terms & Conditions The agreement between You and Travelodge Hotels Ltd, a company incorporated under the laws of England, with a registered office at Sleepy Hollow, Aylesbury
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008
Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District
Building Work Contractors Act 1995
Version: 21.11.2015 South Australia Building Work Contractors Act 1995 An Act to regulate building work contractors and the supervision of building work; and for other purposes. Contents Part 1 Preliminary
A BILL for AN ACT. Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour
Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour A BILL for AN ACT to provide for the prevention of volatile substance abuse and the protection of individuals and communities from
Credit Card Conditions of Use. Credit Guide.
Credit Card Conditions of Use Credit Guide. Effective Date: September 2015 This document contains the terms and conditions that apply to St.George Bank Business Visa Debit Card cardholders and to all transactions
SUBSIDIARY LEGISLATION 104.01 MOTOR VEHICLES INSURANCE REGULATIONS
MOTOR VEHICLES INSURANCE [S.L.104.01 1 SUBSIDIARY LEGISLATION 104.01 MOTOR VEHICLES INSURANCE REGULATIONS 1st August, 1947 GOVERNMENT NOTICE 611 of 1939, as amended by Government Notice 221 of 1947 and
TERMS AND CONDITIONS OF AGREEMENT FOR CREDIT CARD WITH FIXED PAYMENT Valid as of 01.01.2012
1. GENERAL PROVISIONS 1.1 Agreement for credit card with fixed payment (hereinafter the Agreement) regulates the rights and obligations for using a credit card issued by (hereinafter the Bank). 1.2 A credit
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services
Physical security management guidelines
Physical security management guidelines Event security Approved 13 December 2011 Version 1.0 i Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons
Licence Chapter 639 Special Transportation Services
Licence Special Transportation Services 639.1.1 Citation Chapter Index Article - 1 Short Title Article 2 - Interpretation 639.2.1 Accessible vehicle - defined 639.2.2 City - defined 639.2.3 Clerk - defined
Guide for applicants for asbestos removal and asbestos assessor licences and notifications
Guide for applicants for asbestos removal and asbestos assessor licences and notifications of asbestos removal work, asbestos fibres and emergency demolition of structures containing asbestos March 2013
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
CORPORATE PROCUREMENT UNIT SITE & SECURITY PROCEDURES BOSTON SPA VERSION 9 SEPT12
SITE PROCEDURES BSPA VERSION 9 PAGE 1 OF 9 CONTENTS PAGE 1. GENERAL INFORMATION 3 2. ACCESS 3 3. SECURITY 3 4. VEHICLE PARKING 4 5. PERMITS TO WORK 4 6. DELIVERY, UNLOADING AND STORAGE 4 7. HOURS OF WORK
Identity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
ONLINE SERVICES TERMS AND CONDITIONS S E P T E M B E R 2 0 1 3
ONLINE SERVICES TERMS AND CONDITIONS S E P T E M B E R 2 0 1 3 This document sets out the terms and conditions ( Terms and Conditions ) that govern the use of the DDH Graham Limited ( DDH, we or us ) Online
THE PRIVATE SECURITY SERVICE BILL (No. VI of 2004) Explanatory Memorandum
THE PRIVATE SECURITY SERVICE BILL (No. VI of 2004) Explanatory Memorandum The object of this Bill is to provide for the licensing of private security services, the registration of security guards, the
Bendigo Rewards. Terms & Conditions. 21 December 2015. www.bendigobank.com.au
Bendigo Rewards. Terms & Conditions. 21 December 2015 www.bendigobank.com.au Bendigo and Adelaide Bank Limited The Bendigo Centre Bendigo VIC 3550 Telephone 1300 BENDIGO (1300 236 344) ABN 11 068 049 178.
EBank Debit Card Terms and Conditions
c/o Sinclair & Schanzen Road, Windhoek, Namibia P O Box 97438, Windhoek, Namibia T +264 61 297 1000, F +264 61 297 1800 E [email protected], www.ebank.na EBank Debit Card Terms and Conditions Debit Card Terms
University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10
UNIVERSITY OF LONDON CCTV POLICY Academic Buildings, Libraries and Residences Page 1 of 10 Contents The CCTV system... 3 Responsible officers... 3 Data Protection Act 1998... 3 The system... 3 Purpose
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
American Express. Credit Card Conditions, Financial Services Guide and Credit Guide. December 2010 AU027108E
American Express Credit Card Conditions, Financial Services Guide and Credit Guide December 2010 AU027108E Postal Address American Express Australia Limited Cardmember Services GPO Box 1582 Sydney NSW
Credit Card Conditions of Use. Credit Guide.
Credit Card Conditions of Use. Credit Guide. Effective Date: 20 May 2016 This document does not contain all the terms of this agreement or all of the information we are required by law to give you before
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Information Circular
Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009
RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
AUDITING GUIDELINES FOR CERTIFICATION BODIES FOR PSA 28:2013
AUDITING GUIDELINES FOR CERTIFICATION BODIES FOR PSA 28:2013 June 2014 www.psa.gov.ie 1. AUDITING GUIDELINES...4 2. GENERAL...5 2.1 PSA Licensing Requirements...5 2.2 Audits...5 2.3 Audit Compliance...7
High Peak CVS Disciplinary Policy and Procedure
High Peak CVS Disciplinary Policy and Procedure The effectiveness and credibility of HIGH PEAK CVS and its employees is dependent to a large extent on the ability to achieve and preserve high standards
2. Employees must wear their ID tag at all times while on the premises.
3. Physical Access Controls Access control must prevent unauthorized entry to facilities, maintain control of employees and visitors and protect company assets. There must be written and verifiable procedures
Recovering Your Identity. Advice for victims of identity crime
Recovering Your Identity Advice for victims of identity crime How will you know your identity has been stolen? Identity crime is unfortunately very common. Around 1 in 5 Australians have been a victim
Exception: If the player is already in possession of a FIBA Identity Card, the card number should be indicated on the list.
Exception: If the player is already in possession of a FIBA Identity Card, the card number should be indicated on the list. H.4.4 Responsibility of national member federations H.4.4.1 H.4.4.2 H.4.4.3 H.4.4.4
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Physical Security Policy Template
Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the
CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA
MAINE COMMUNITY COLLEGE SYSTEM
MAINE COMMUNITY COLLEGE SYSTEM HEALTH AND SAFETY Section 800.1 SUBJECT: PURPOSE: MOTOR VEHICLE PROCEDURE To promote the safe the authorized operation of motor vehicles operated on behalf, or for the benefit,
Passenger Transport (Taxi-cab Services) Amendment Regulation 1996
New South Wales Passenger Transport (Taxi-cab Services) Amendment Regulation 1996 under the Passenger Transport Act 1990 His Excellency the Governor, with the advice of the Executive Council, has made
American Express. Business Credit Card Conditions
American Express Business Credit Card Conditions Effective 1st June 2006 Postal Address American Express Australia Limited Cardmember Services GPO Box 1582 Sydney NSW 2001 Lost or Stolen Cards In Australia
Identity Cards Act 2006
Identity Cards Act 2006 CHAPTER 15 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 6 50 Identity Cards Act 2006 CHAPTER 15 CONTENTS Registration
New South Wales. 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness?
New South Wales Page 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness? 5 Witness protection program 5 6 Inclusion in the witness protection program 5 7 Assessing witness for inclusion in witness
APPLICATION FOR A LICENCE Security & Related Activities (Control) Act 1996
WESTERN AUSTRALIA POLICE APPLICATION FOR A LICENCE Security & Related Activities (Control) Act 1996 Instructions to applicants follow all of these steps to complete your application You must carefully
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Employer Obligations Subclass 457 Temporary Work (Skilled) Visa
Annexure A Employer Obligations Subclass 457 Temporary Work (Skilled) Visa Title Annexure A Employer Obligations Subclass 457 Temporary Work (Skilled) Visa Creation Date 9 July 2014 Version Last Revised
NXFM S UMBRELLA CONTESTING RULES AND CONDITIONS
NXFM S UMBRELLA CONTESTING RULES AND CONDITIONS The following terms and conditions apply for NXFM s Umbrella contesting, to be run between 5.30am and 8.00pm weekdays from Friday 17 February 2012 until
How to complete the AML/CTF Investor Identification Information Form
How to complete the AMLCTF Investor Identification Information Form The Australian government has introduced legislation called the Anti-Money Laundering and Counter Terrorism Financing Act 2006 which
BEConnected User Agreement
BEConnected User Agreement Page 1 of 5 INTRODUCTION This is a legal document between you and the owner ( Belmont College ) of the Apple ipad tablet ( ipad ) in connection with the delivery of an ipad to
Compulsory Drug Treatment Correctional Centre Act 2004 No 42
New South Wales Compulsory Drug Treatment Correctional Centre Act 2004 No 42 Contents Page 1 Name of Act 2 2 Commencement 2 3 Amendment of Drug Court Act 1998 No 150 2 4 Amendment of Crimes (Sentencing
IDENTITY THEFT AND MUNICIPAL UTILITIES
Minnesota Municipal Utilities Association IDENTITY THEFT AND MUNICIPAL UTILITIES Identity Theft and Red Flags Rule requirements The Red Flags Rule implements portions of the Fair and Accurate Credit Transactions
Code of Conduct for registered migration agents
Code of Conduct for registered migration agents Current from 1 JULY 2012 SCHEDULE 2: CODE OF CONDUCT (regulation 8) Migration Act 1958, subsection 314(1) THIS CODE OF CONDUCT SHOULD BE DISPLAYED PROMINENTLY
Terms of Use 1. [Preliminary provision] 1. All capitalized expressions and other terms contained and used in the Terms are primarily meanings assigned to them below: 1) Application - Software made available
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
Use of Business Cards Procedure
Use of Business Cards Procedure Related Policy General Purchasing Policy Responsible Officer Senior Manager Financial Operations Approved by Chief Financial Officer Approved and commenced December, 2014
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Our Customer Relationship Agreement CO-LOCATION SERVICE DESCRIPTION
Our Customer Relationship Agreement CO-LOCATION SERVICE DESCRIPTION Internode Pty Ltd ABN 82 052 008 581 Phone: 13 66 33 1/502 Hay Street, Subiaco WA 6008 15 October 2013 Rules of interpretation and capitalised
PROTECTION OF PERSONAL INFORMATION
PROTECTION OF PERSONAL INFORMATION Definitions Privacy Officer - The person within the Goderich Community Credit Union Limited (GCCU) who is responsible for ensuring compliance with privacy obligations,
Bacstel-IP. Customer Agreement for the Bacstel-IP Direct Service
Bacstel-IP Customer Agreement for the Bacstel-IP Direct Service Customer Agreement for the Bacstel-IP Direct Service 1. INTRODUCTION This agreement relates to the provision of the Bacstel-IP Service (
Business Vantage Visa Credit Card. Conditions of Use. Effective Date: 20 May 2016
Business Vantage Visa Credit Card Conditions of Use 1 Effective Date: 20 May 2016 Business Vantage Visa Conditions of Use Bank of Melbourne This document does not contain all the terms of this agreement
