Department of the Premier and Cabinet Circular. PC030 Protective Security Policy Framework
|
|
|
- Paula Perry
- 9 years ago
- Views:
Transcription
1 Department of the Premier and Cabinet Circular PC030 Protective Security Policy Framework February 2012
2 PROTECTIVE SECURITY MANAGEMENT FRAMEWORK TABLE OF CONTENTS TABLE OF CONTENTS 2 1. PURPOSE 3 2. SCOPE 3 3. BACKGROUND 3 4. ROLES AND RESPONSIBILITIES 4 5. PROTECTIVE SECURITY POLICY FRAMEWORK Security Risk Management Information Security Personnel Security Physical Security Procurement Security Security Incidents and Investigations Security when Working Away from the Office Exceptional Circumstances - Waiver of certain provisions 10 PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 2 of 10
3 1. Purpose 1.1. The Protective Security Policy Framework supports the South Australian Government s risk management policy through the requirement for a risk-based approach for the protection of assets and resources, to minimise disruption to service delivery and Government operations This circular outlines the strategic approach approved by Cabinet for a whole of government protective security policy, based on the principles outlined within the Australian Government s Protective Security Policy Framework The Framework addresses the security requirements for Government assets through the application of minimum standards in each of the areas comprising the protective security regime, in order to appropriately treat identified risks. 2. Scope 2.1 The Protective Security Policy Framework applies to all South Australian Government public authorities, including but not limited to, public sector agencies (as defined in the Public Sector Act 2009), administrative units, bodies corporate, statutory authorities, and instrumentalities of the Crown. Public authorities are hereinafter referred to as Agencies. 2.2 The Protective Security Policy Framework is outlined on the website of the Commonwealth Attorney-General s Department, at 3. Background 3.1. The South Australian Government is firmly committed to maintaining essential services and protecting the community as far as possible from harm. Objectives 17, 21 and 32 of the Government s State Strategic Plan, which convey the importance of improving public sector performance and the State s wellbeing through safe and secure communities, express this commitment. In the broader Australian context South Australia has obligations to work with other jurisdictions in sharing information to provide this protection to our respective communities. These commitments impose strict requirements on the Government and its Agencies Agencies need to provide proper security for their functions and official resources to ensure they do not place themselves or the Government at risk and potentially undermine public confidence in South Australia's democratic institutions. Community perceptions of government rest in part on its trust that government will be able to function in any circumstances and fulfil its proper role. PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 3 of 10
4 3.3. The Protective Security Policy Framework is designed to assist in the adoption of a culture which recognises the importance of protecting the assets which the Public Sector relies on to fulfil its responsibilities and provide services the community When security considerations are included in the corporate planning process, the security plan will assist with meeting business needs, providing a safe working environment for staff and adding value to an agency s relationship with its clients Security planning and risk treatments need to be focussed on areas of significant risk. Security planning should therefore involve an analysis of the risks to determine whether they are significant and warrant treatment. Security plans should provide treatments that are appropriate to the level of risk and be cost-effective. 4. Roles and Responsibilities 4.1 The Government is responsible for the security of all State assets. Individual Ministers are responsible for the security of assets in their portfolios. 4.2 The Protective Security Policy Framework identifies the policies and guidelines to be followed for achieving consistent security standards within and across the South Australian Government. The Protective Security Policy Framework recognises that security risk management is the responsibility of all public sector employees and places accountability on Chief Executives to ensure that strategies are developed and implemented consistently within the Government s overall risk management policy and framework. 4.3 A Chief Executive must: Develop, implement and maintain an Agency Security Plan in accordance with the minimum standards described in the Australian Government Protective Security Policy Framework. This Plan must be specifically designed for the Agency s functions and the security risks faced in its business operations Ensure responsibility for protective security matters, including the development of policies and procedures, a security management compliance program and that its performance outcomes/operations are assigned to a designated Agency Security Executive Appoint an Agency Security Adviser who regularly reports to the Agency Security Executive. The Agency Security Adviser is responsible for the protective security function on a day-to-day basis and should provide relevant briefings to the Agency Security Executive as required, as well as be available to provide appropriate advice to Agency employees about security risk management issues Appoint an IT Security Adviser, who regularly reports to the Agency Security Executive. The IT Security Adviser is responsible for the protection of the security of information and communication technology on a day-to-day basis; providing relevant briefings to the Agency Security Executive as required; and PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 4 of 10
5 should be available to provide appropriate advice to Agency employees about security risk management issues. CTO Notification 89 (issued by the Office of the Chief Information Officer) provides information about this role, including guidance on the selection of suitable persons to fill the role. It also details the relevant qualifications and accreditations that an IT Security Adviser should hold and maintain Develop, implement and maintain a protective security compliance program with documented polices, systems, procedures, internal controls and management reporting to ensure that security risks are appropriately managed and that the Protective Security Policy Framework is robustly applied. 4.4 The Auditor-General performs professional independent audits of agencies, and reports to Parliament. The Public Finance and Audit Act 1987 provides a mandate for the Auditor-General to conduct different types of audit. The types of audit include financial and compliance audits and reviews of the adequacy of controls at agencies. These audits and reviews consider the integrity of an agency s accountability responsibilities, the nature of compliance with legal, policy and procedural obligations, and the adequacy of controls to safeguard resources and assets made available to agencies. Through these audit processes the Auditor-General may review an agency s protective security compliance program and assess it in the context of the Protective Security Policy Framework. 5. Protective Security Policy Framework 5.1 Security Risk Management The Chief Executive of an agency is accountable for the development and management of an Agency Security Plan The Agency Security Plan must be developed to manage the agency s security risks and should be based on a security policy that supports the Agency s goals and resources Security risks are to be managed in accordance with ISO 31000:2009 and the principles of the South Australian Government Risk Management Policy Statement The Agency Security Policy must address the following key areas: Information Security Personnel Security Physical Security Procurement Security Security Incidents and Investigation Security When Working Away from the Office PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 5 of 10
6 5.1.5 The Agency Security Plan and associated policies and procedures must be developed in accordance with the minimum standards described in the Australian Government Protective Security Policy Framework An agency s risk management treatments must be appropriate to the level and type of risk and the importance of the function or resource. South Australia Police - Police Security Services Branch provides security risk management advice on a fee-for-service basis. This advice extends to agency security plans along with staff awareness training. Suitably qualified private sector service providers, as well as ASIO s T4, can provide similar support on a fee-forservice basis. 5.2 Information Security The Chief Executive of an Agency is accountable for protecting information resources in accordance with the minimum standards described in the Australian Government Protective Security Policy Framework Information resources include documents, papers, data and intellectual knowledge along with information and communication technology (including computing and communications systems) In relation to the security of information and communication (including cyber) technology, Agencies (and Agency suppliers with relevant contractual requirements) are required to comply with the South Australian Government Information Security Management Framework If a compromise of official information could cause harm to the Government, agencies, the public interest or other entities or individuals, Agencies must consider giving the information a security classification All Agencies must apply and use the security classification system described in the Australian Government Protective Security Policy Framework Official information can only be disclosed subject to the authorisation of an agency s Chief Executive. The authorisation must be clearly stated, not implied, and is subject to the provisions of the Freedom of Information Act (SA) 1991 (the FOI Act). In relation to personal information, the authorisation must comply with the Information Privacy Principles contained in Premier and Cabinet Circular No 12, which incorporates Cabinet Administrative Instruction No 1 of 1989 (Information Privacy Principles Instruction) A public sector employee must comply with the provisions of the Public Sector Code of Ethics in relation to handling official information. The Office of the Chief Information Officer (OCIO) provides advice to South Australian Government Agency personnel on cyber security matters. PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 6 of 10
7 Office of Public Employment and Review - Public Sector Code of Ethics pdf 5.3 Personnel Security The Chief Executive of an agency is responsible for assuring the integrity of personnel employed by the agency The security of any agency relies on the integrity of its employees and contractors. All government employees must meet the standards of probity as defined in the Code of Ethics'. An agency's recruitment process, probationary programs, performance management policies and general operations must be designed to ensure the integrity and honesty of all its employees The Commissioner for Public Employment is responsible for promoting public service principles in accordance the Public Sector Act 2009 (and in particular, Sections 14, 15, 16 and 22 of this Act), and the Public Sector Regulations Access to official and security classified information must be restricted on a need to know basis. In addition, all persons accessing security classified information must be cleared in accordance with the system and minimum standards described in the Australian Government Protective Security Policy Framework. Department of Premier and Cabinet Cabinet and Policy Coordination facilitates personnel vetting services for all South Australian Government agencies. 5.4 Physical Security The Chief Executive Officer of an agency is accountable for implementing physical security measures designed to safeguard the people, assets and information associated with the Agency Physical security measures comprise the risk treatments implemented following a Security Risk Review and can be achieved through a combination of policies, procedures and physical attributes that will protect people, assets and information Physical security measures contribute towards the employer s obligations described by the Occupational Health Safety and Welfare (SA) Act Physical security measures must be implemented in accordance with the mandated requirements described in the Australian Government Protective Security Policy Framework On 17 July 2006 Cabinet approved the introduction of a Government Protective Security Policy, The policy mandates South Australia Police (through Police Security Services Branch) as the supplier of protective security services to designated government critical infrastructure and high risk assets, and a whole of government PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 7 of 10
8 alarm monitoring service. Agencies must comply with the requirements of the Government Protective Security Policy. South Australia Police - Police Security Services Branch provides a range of security services to government Agencies on a fee-for-service basis. These services include security guards, patrols and monitoring of CCTV. Other private sector providers provide similar services on a fee-for-service basis for physical security requirements that are not mandated to be provided by South Australia Police. Police Security Services Branch is the mandated provider of security alarm monitoring services to all South Australian Government Agencies and protective security services to designated government Critical Infrastructure-High Risk assets. 5.5 Procurement Security The Chief Executive Officer of an agency is responsible for ensuring the integrity of procurement processes undertaken by that Agency. The State Procurement Board issues and reviews policies, principles and guidelines relating to the procurement operations of public authorities, in accordance with Section 12 of the State Procurement Act Procurement processes must incorporate security requirements in accordance with the minimum standards of the Australian Government Protective Security Policy Framework. Department of Treasury and Finance The State Procurement Board is responsible for setting the policy, standards, guidelines and conduct for the procurement of goods and services across the public sector. 5.6 Security Incidents and Investigations The Chief Executive Officer of an Agency is responsible for ensuring that security incidents are reported and investigated Agencies must have guidelines for reporting, recording and investigating security incidents. A record of incidents will help an Agency identify and treat risks. Additional guidelines should outline procedures to conduct security investigations, adopting a consistent approach that ensures the Government is not further compromised during an investigation South Australia Police are responsible for receiving and investigating reports of crime. Agencies need to develop policies and procedures for reporting and investigating PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 8 of 10
9 incidents that impact on the security of persons, assets and information. Many incidents occur that do not constitute a criminal offence but do impact on security risks Security incident reporting and investigation policies must be developed in accordance with the minimum standards described in the Australian Government Protective Security Policy Framework Agencies must report cyber security incidents to the Office of the Chief Information Officer in accordance with Information Security Management Framework (ISMF) Standard 140: Notifiable Incidents. South Australia Police In an emergency contact police by ringing triple zero (000). Reports for non-urgent police assistance should be directed to telephone or the nearest police station. State Protective Security Branch provides advice in relation to reporting and investigation of security incidents. Department of the Premier and Cabinet The Office of the Chief Information Officer (OCIO) provides advice in relation to the reporting and management of ICT-based security incidents. 5.7 Security when Working Away from the Office The Chief Executive Officer of an agency is responsible for the implementation of policies and procedures to ensure the security of persons, assets and information associated with work undertaken by Agency employees away from their office workplace The Commissioner for Public Employment has issued Commissioner s Standards which include general provisions that relate to working at home Security policies for work conducted away from the office must be developed in accordance with the minimum standards described in the Australian Government Protective Security Policy Framework. South Australia Police - Police Security Services Branch provides security risk assessment advice for home-based work, on a fee-for-service basis. Private sector service providers can provide similar advice on a fee-for-service basis also. Commissioner for Public Employment Commissioner s Standards PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 9 of 10
10 5.8 Exceptional Circumstances - Waiver of certain provisions If an Agency is unable to comply with a mandatory requirement described in the Australian Government Protective Security Policy Framework, (other than the preexcluded requirements identified in below), or a mandatory policy/standard described in the South Australian Government Information Security Management Framework, the agency Chief Executive may only waive that requirement in limited circumstances, and only for: A defined purpose, and A nominated period. It should be noted that some mandatory requirements relating to personnel security and information security can not be waived Mandatory requirements GOV-7 and GOV-13 from the Australian Government Protective Security Policy Framework do not require an agency Chief Executive to issue a waiver or exemption as they do not apply to the South Australian Government If a proposed waiver could impact on the protection of the information of another Government agency or from another jurisdiction, that agency, the Office of the Chief Information Officer and the other jurisdiction (where another jurisdiction is involved) must be consulted before the waiver is granted Agencies must maintain a record of any waiver issued. The record should include the submission to the agency s Chief Executive identifying associated security risks and the measures implemented to mitigate that risk If an agency Chief Executive decides to waive a mandatory requirement, advice of that decision along with its purpose and the time frame must be provided to: The Chief Executive, Department of Premier and Cabinet, and The Commissioner of South Australia Police. In the case of cyber (ICT) standards, the Chief Information Officer must also be advised of that decision (in addition to the above positions), including the purpose of the waiver and the time frame. PROTECTIVE SECURITY MANAGEMENT FRAMEWORK Page 10 of 10
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
Protective Security Governance Policy. Outlines ANAO protective security arrangements
Protective Security Governance Policy Outlines ANAO protective security arrangements Version 2.0 Effective JULY 2012 Document management Document identification Document ID Document title Release authority
Tasmanian Government Information Security Framework
Tasmanian Government Information Security Framework Tasmanian Government Information Security Charter Version 1.0 May 2003 Department of Premier and Cabinet Inter Agency Policy And Projects Unit 1 Purpose
Data Governance in-brief
Data Governance in-brief What is data governance? Data governance is the system of decision rights and accountabilities surrounding data and the use of data. It can involve legislation, organisational
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
ACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services
ACT Auditor-General s Office Performance Audit Report Whole-of-Government Information and Communication Technology Security Management and Services Report No. 2 / 2012 PA 09/03 The Speaker ACT Legislative
Information Integrity & Data Management
Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Audit summary of Security of Infrastructure Control Systems for Water and Transport
V I C T O R I A Victorian Auditor-General Audit summary of Security of Infrastructure Control Systems for Water and Transport Tabled in Parliament 6 October 2010 Background Infrastructure critical to the
Protective security governance guidelines
Protective security governance guidelines Security of outsourced services and functions Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this publication
Financial Management Framework >> Overview Diagram
June 2012 The State of Queensland (Queensland Treasury) June 2012 Except where otherwise noted you are free to copy, communicate and adapt this work, as long as you attribute the authors. This document
Entrepreneurs Programme - Business Growth Grants
Entrepreneurs Programme - Business Growth Grants Version: 15 July 2015 Contents 1 Purpose of this guide... 4 2 Programme overview... 4 2.1 Business Management overview... 4 3 Business Growth Grant... 5
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
IRAP Policy and Procedures up to date as of 16 September 2014.
Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Entrepreneurs Programme - Business Evaluation. Version: 3
Entrepreneurs Programme - Business Evaluation Version: 3 20 October 2015 Contents 1 Purpose of this guide... 4 2 Programme overview... 4 2.1 Business Management overview... 4 3 Business Evaluations...
Corporate Governance Statement
Corporate Governance Statement Magellan Flagship Fund Limited ACN 121 977 884 Magellan Flagship Fund Limited (the Company ) is a listed investment company whose shares are traded on the Australian Securities
Code of Professional Conduct for Accredited Suppliers of Monitored Medical Alarms
Code of Professional Conduct for Accredited Suppliers of Monitored Medical Alarms This Code of Conduct (the Code) applies to all Ministry of Social Development (MSD) accredited suppliers of monitored medical
Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection
Crime Statistics Data Security Standards Office of the Commissioner for Privacy and Data Protection 2015 Document details Security Classification Dissemination Limiting Marker Dissemination Instructions
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Accounts Receivable. Policy Statement
Accounts Receivable Policy Statement Policy name: Accounts Receivable Policy number: Finance Key result areas: Finance Branch: HR and Corporate Services Responsibility for review: Accountant Location:
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
Protective security governance guidelines
Protective security governance guidelines Reporting incidents and conducting security investigations Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this
Developing and Managing Contracts GETTING THE RIGHT OUTCOME, PAYING THE RIGHT PRICE
Developing and Managing Contracts GETTING THE RIGHT OUTCOME, PAYING THE RIGHT PRICE Better Practice Guide February 2007 Foreword Contracting is an integral part of doing business in the public sector.
Australian Government Information Security Manual CONTROLS
2015 Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2015 All material presented in this publication
Objective and key requirements of this Prudential Standard
Prudential Standard CPS 520 Fit and Proper Objective and key requirements of this Prudential Standard This Prudential Standard sets out minimum requirements for APRA-regulated institutions in determining
The Management of Physical Security
The Auditor-General Audit Report No.49 2013 14 Performance Audit Australian Crime Commission Geoscience Australia Royal Australian Mint Australian National Audit Office Commonwealth of Australia 2014 ISSN
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
POSITION INFORMATION DOCUMENT
POSITION INFORMATION DOCUMENT Position Title: Senior Manager, ICT Contracts Classification Code: ASO8 Division: ICT Services Directorate: ICT Contracts & Performance Management Type of Appointment: Branch:
Information Circular
Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal
CONSTRUCTION HEALTH AND SAFETY, AND INJURY PREVENTION Research and develop accident and incident investigation procedures on construction sites
1 of 7 level: 4 credit: 4 planned review date: December 2003 sub-field: purpose: Construction People credited with this unit standard are able to: research accident and/or incident investigation and reporting
Tasmanian Government Identity and Access Management Toolkit
Tasmanian Government Identity and Access Management Toolkit Summary January 2010 Department of Premier and Cabinet For further information on the Toolkit, contact the Office of egovernment: [email protected]
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Project and Policy Discipline : Procurement & Contract Management Services Branch Classification : ASO4
www.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
FMCF certification checklist 2014-15 (incorporating the detailed procedures) 2014-15 certification period. Updated May 2015
FMCF certification checklist 2014-15 (incorporating the detailed procedures) 2014-15 certification period Updated May 2015 The Secretary Department of Treasury and Finance 1 Treasury Place Melbourne Victoria
Standards for dealing with information obtained about a person s criminal history as part of a relevant history assessment
Child Safe Environments Standards for dealing with information obtained about a person s criminal history as part of a relevant history assessment Issued by the Chief Executive, Department for Education
Policy Statement on. Associations. Eligibility to apply for a Scheme under Professional Standards Legislation May 2014
Policy Statement on on Code Business of Conduct Entity Associations Eligibility to apply for a Scheme under Professional Standards Legislation May 2014 Table of Contents Professional Standards Council
CODE OF PRACTICE APPOINTMENT TO POSITIONS IN THE CIVIL SERVICE AND PUBLIC SERVICE MERIT PROBITY ACCOUNTABILITY
CODE OF PRACTICE APPOINTMENT TO POSITIONS IN THE CIVIL SERVICE AND PUBLIC SERVICE MERIT PROBITY BEST PRACTICE ACCOUNTABILITY CONSISTENCY Published in 2007 by the Commission for Public Service Appointments
Information Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
Information Governance Policy
Information Governance Policy Reference: Information Governance Policy Date Approved: April 2013 Approving Body: Board of Trustees Implementation Date: April 2013 Version: 6 Supersedes: 5 Stakeholder groups
IT Security Management
The Auditor-General Audit Report No.23 2005 06 Protective Security Audit Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036 7632 ISBN 0 642 80882 1 COPYRIGHT INFORMATION This work
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
FINANCIAL MANAGEMENT TOOLKIT
FINANCIAL MANAGEMENT TOOLKIT Reissued: September 2015 Department of Treasury and Finance Level 6, State Administration Centre 200 Victoria Square ADELAIDE SOUTH AUSTRALIA 5000 AUSTRALIA Financial Management
3D Online Education Initiative
3D Online Education Initiative Date: July 2013 Contents 1. 3D Online Education initiative... 4 1.1 Introduction... 4 1.2 Outline of the 3D Online Education initiative... 4 1.2.1 Summary of initiative...
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
Note that the following document is copyright, details of which are provided on the next page.
Please note that the following document was created by the former Australian Council for Safety and Quality in Health Care. The former Council ceased its activities on 31 December 2005 and the Australian
Enterprise Risk Management Framework 2012 2016. Strengthening our commitment to risk management
Enterprise Risk Management Framework 2012 2016 Strengthening our commitment to risk management Contents Director-General s message... 3 Introduction... 4 Purpose... 4 What is risk management?... 4 Benefits
COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES
COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES DRAFT FOR CONSULTATION June 2015 38 Cavenagh Street DARWIN NT 0800 Postal Address GPO Box 915 DARWIN NT 0801 Email: [email protected] Website:
Quality Assurance and Safeguards Working Arrangements for the Launch of the NDIS in Victoria
Quality Assurance and Safeguards Working Arrangements for the Launch of the NDIS in Victoria As agreed between the Commonwealth of Australia and Victoria As at 6 May 2013 1 Contents 1. Background... 3
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
National Code of Practice for Registration Authorities and Providers of Education and Training to Overseas Students 2007
National Code of Practice for Registration Authorities and Providers of Education and Training to Overseas Students 2007 The National Code 2007 Effective 1 July 2007 National Code of Practice for Registration
GUIDELINES FOR THE CONDUCT OF PERFORMANCE AUDITS
GUIDELINES FOR THE CONDUCT OF PERFORMANCE AUDITS NOVEMBER 2013 THE ANAO S LEGISLATIVE FRAMEWORK The Auditor-General Act 1997 (the Act) sets out the functions, mandate and powers of the Auditor-General
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
JOB AND PERSON SPECIFICATION
JOB AND PERSON SPECIFICATION Position Title: Registered Nurse and or Midwife Classification Code: Registered Nurse and or Midwife (Level 1) Division: Mid North Health Branch: Orroroo Health Service Type
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Corporate Plan 2015-19
Corporate Plan 2015-19 i ii Serving the Australian Parliament The DPS Corporate Plan 2015-2019 This corporate plan lays out the strategic direction for the Department of Parliamentary Services for the
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
PORT LINCOLN HEALTH SERVICES JOB & PERSON SPECIFICATION
PORT LINCOLN HEALTH SERVICES JOB & PERSON SPECIFICATION POSITION TITLE: Medical Records Officer CLASSIFICATION CODE: ASO2 DIVISION: Corporate Services TYPE OF APPOINTMENT: Contract DEPARTMENT: Medical
Asset management policy
Asset management policy POL-C-002 Version 3.1 26 February 2007 Contents 1. Title... 3 2. Introduction... 3 3. Scope... 3 4. Principles and guidelines... 3 5. Definition of responsibilities... 10 6. References...
Practice Note. 10 (Revised) October 2010 AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM
October 2010 Practice Note 10 (Revised) AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM The Auditing Practices Board (APB) is one of the operating bodies of the Financial Reporting
Management of Business Support Service Contracts
The Auditor-General Audit Report No.37 2004 05 Business Support Process Audit Management of Business Support Service Contracts Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036
Corporate. Security Management Policy. Document Control Summary. Contents
Corporate Security Management Policy Document Control Summary Status: Version: Author/Title: Owner/Title: Approved by: Ratified: Related Trust Strategy and/or Strategic Aims Implementation Date: Review
Casino, Liquor and Gaming Control Authority Act 2007 No 91
New South Wales Casino, Liquor and Gaming Control Authority Act 2007 No 91 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Definitions 2 4 Meaning of gaming and liquor legislation
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
Insurance Law Reforms and Requirements for Direct Offshore Foreign Insurers ("DOFIs")
Insurance Law Reforms and Requirements for Direct Offshore Foreign Insurers ("DOFIs") The Clayton Utz contact for this document is Fred Hawke, Partner Clayton Utz Lawyers Level 18 333 Collins Street Melbourne
Regulation of Insolvency Practitioners
1 Regulation of Insolvency Practitioners Regulatory Impact Statement EXECUTIVE SUMMARY Under insolvency, the main issue is that there is rarely enough money to pay all the creditors everything they are
Victorian Government Information and Communication Technology (ICT) Governance
Governance Victorian Government Information and Communication Technology (ICT) Governance Framework A framework to describe ICT governance in the Victorian Government Keywords: ICT Strategy; governance;
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Procurement of Goods, Services and Works Policy
Procurement of Goods, Services and Works Policy Policy CP083 Prepared Reviewed Approved Date Council Minute No. Procurement Unit SMT Council April 2016 2016/0074 Trim File: 18/02/01 To be reviewed: March
SOUTH AUSTRALIAN PUBLIC SERVICE JOB AND PERSON SPECIFICATIONS
SOUTH AUSTRALIAN PUBLIC SERVICE JOB AND PERSON SPECIFICATIONS Title of Position: Manager, Procurement & Contract Management Administrative Unit ATTORNEY-GENERAL S DEPARTMENT Remuneration Level: ASO8 Type
august09 tpp 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper
august09 09-05 Internal Audit and Risk Management Policy for the NSW Public Sector OFFICE OF FINANCIAL MANAGEMENT Policy & Guidelines Paper Preface Corporate governance - which refers broadly to the processes
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
Part 1 National Treasury
PUBLIC FINANCE MANAGEMENT ACT 1 OF 1999 [ASSENTED TO 2 MARCH 1999] [DATE OF COMMENCEMENT: 1 APRIL 2000] (Unless otherwise indicated) (English text signed by the President) as amended by Public Finance
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.
Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
Guide to the National Safety and Quality Health Service Standards for health service organisation boards
Guide to the National Safety and Quality Health Service Standards for health service organisation boards April 2015 ISBN Print: 978-1-925224-10-8 Electronic: 978-1-925224-11-5 Suggested citation: Australian
2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy
Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April
Fraud Control in Australian Government Agencies
T h e A u d i t o r - G e n e r a l Audit Report No.42 2009 10 Performance Audit Fraud Control in Australian Government Agencies Attorney-General s Department Australian Institute of Criminology A u s
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Corporate Governance Framework
Corporate Governance Framework Introduction Transport and Main Roads is managed in an accountable and responsible way through effective corporate governance which is defined as how the department manages
Data Governance. Policy FINAL (Approved)
Data Governance Policy FINAL (Approved) July 2010 DOCUMENT CONTROL Document Title: Data Governance Policy Summary: This document defines the policies of the Cancer Institute NSW regarding our data governance
APPLICATIONS WILL NOT BE ACCEPTED BY A THIRD PARTY
Role Description APPLICATIONS WILL NOT BE ACCEPTED BY A THIRD PARTY Job ad reference: MN207084 Closing Date: Wednesday, 06 April 2016 Role title: Senior Procurement and Contracts Officers Classification:
Email Protective Marking Standard Implementation Guide for the Australian Government
Email Protective Marking Standard Implementation Guide for the Australian Government May 2012 (V2012.1) Page 1 of 14 Disclaimer The Department of Finance and Deregulation (Finance) has prepared this document
Audit and Performance Committee Report
Audit and Performance Committee Report Date: 3 February 2016 Classification: Title: Wards Affected: Financial Summary: Report of: Author: General Release Maintaining High Ethical Standards at the City
Financial Adviser Regulations Discretionary Investment Management Services and Custody
Financial Adviser Regulations Discretionary Investment Management Services and Custody MBIE-MAKO-6101733 ISBN 978-0-478-41375-5 Crown Copyright First Published July 2013 Corporate Law Labour and Commercial
Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide
Standard 1 Governance for Safety and Quality in Health Service Organisations Safety and Quality Improvement Guide 1 1 1October 1 2012 ISBN: Print: 978-1-921983-27-6 Electronic: 978-1-921983-28-3 Suggested
COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY
COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY December 2014 1 Contents Section Page Council Tax Reduction, Discount & Exemption Anti-Fraud Policy 1 Introduction 3 2 Definition of Council
JOB & PERSON SPECIFICATION
JOB & PERSON SPECIFICATION POSITION TITLE: CLASSIFICATION CODE: Registered Nurse/Midwife Registered Nurse/Midwife DIVISION: Level 1 Acute Services TYPE OF APPOINTMENT: Contract DEPARTMENT: Nursing Casual
SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY. Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1
SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1 CONTENTS PAGE BACKGROUND 3 REVIEW HISTORY 4 GAMBLING,
