Information Asset and Security Classification Procedure
Information Asset and Security Classification Procedure
Procedure
1 Purpose
To establish a process for classifying and handling University Information Assets based on its
level of sensitivity, value and criticality to the University.
These procedures outline the specific actions and processes that will assist Information
Systems Owners implement the ICT Information Management and Security Policy requirements
in relation to Information Asset management and Information Classification.
2 Scope
This procedure applies to all Users who access, process, or store sensitive University
Information.
3 Procedure Overview
This procedure outlines the Information Asset and Security classification process to be adopted
by the University and the processes involved in implementing this process.
4 Procedures
4.1 Information Asset and Security Classification framework
The goal of Information Security is to protect the confidentiality, integrity and availability of
Information Assets and Information Systems. Information Asset classification reflects the level of
impact to the University if confidentiality, integrity or availability is compromised.
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
Tier 1: Public Information
Note: All tiers of Information, maintained by the University, are subject to third party legal
discovery such as subpoena and Right to Information access requests which are processed by
Enterprise Information Management Services.
The University is required to comply with Information Privacy Principles under Queensland
legislation. As a result the default classification for the treatment of Personal Information will be
deemed Restricted Information pending completion of a privacy threshold assessment.
1. All Information Systems and Information Assets must be uniquely identified, assigned an
Information System Custodian and given an Information Classification. Information Asset
and Security Classification Schedule -Table 1 provides a high-level default classification
for each of the functional areas mentioned. These should be used as indicative starting
points for the assessment of the potential impact (Information Asset and Security
Classification Schedule - Table 3) for the further detailed classification for individual
systems and/or assets within the functional areas. The Information System Custodian is
responsible for the adherence to the ICT Information Management and Security Policy.
2. ICT Services is responsible for monitoring the University's ICT network infrastructure,
including all hardware and communications links, and addressing any audit issues that
may be identified in relation to these items.
3. Information System Custodians are responsible for ensuring that appropriate controls
are in place for monitoring their Information System and/or Information Assets,
authorising and revoking access (for Information Systems classified as Restricted
Information) and addressing any audit issues that may be identified, with the assistance
of ICT Services.
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
to obligations with regard to University's Information Systems and Information
Assets as required.
5. The Chief Information Officer is responsible for ensuring that a central authentication
System (such as usernames and passwords for the network) is available and provides
secure access by University clients to Information Systems classified as Internal
Information.
6. All University Users who are to have access to the University's Information Systems are
to be made aware of the ICT Information Management and Security Policy and this
procedure and their responsibility for maintaining Information Security.
7. Each Information System Custodian is to ensure that staff are trained in the effective
use of their Information System.
In the case of Information Assets externally generated, and not otherwise classified, the
University officer who receives the Information Asset should approach the Information System
Custodian to classify the Information Asset and guide its control within the University.
Relevant data security issues for the Information System Custodian to consider might include:
data control
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
data encryption
The need-to-know principle requires that Information Assets should only be available to
those who need to use or access the Information Asset to do their work.
A clear desk policy requires that classified Information Assets are secured and that
unauthorised Users are not able to access any electronic material, System or network to
which the User had been connected.
Where the University is required to handle security classified Information Assets from
external organisations, the Information Assets must be treated in the following ways:
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
To maintain confidentiality and integrity of classified Information Assets a strict audit logging
process is to form part of the Security Classified Information Asset Register. This audit log must
be carefully designed to ensure it is capable of providing a 'trail of evidence' which can be used
to investigate inappropriate or illegal access.
Audit log access controls must be in place with explicit user authentication needed to view the
audit log database (Information Asset and Security Classification Schedule - Table 4).
Access to the Information within the listed Information Assets contained in the Information Asset
Register is aligned with Queensland legislative requirements.
Information held by the University, including the Information Asset Register, may be sought
through the University's Administrative Access Scheme, Publication Scheme, Disclosure Log or
a formal access request under the Right to Information Act 2009 or Information Privacy Act
2009 which is available on the Right to Information and Privacy websites.
5 References
Nil.
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
6 Schedules
This procedure must be read in conjunction with its subordinate schedules as provided in the
table below.
7 Procedure Information
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
Public Records Act 2002
Delegations Policy
Privacy Policy
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
Public Interest Disclosure Policy
Privacy website
Employee
Information
Information Asset
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
An identifiable collection of data stored in any form and recognised as
having value for the purpose of enabling the University to perform its
business functions, thereby satisfying a recognised University
requirement.
Information Classification
Information Security
Information Systems
Internal Information
Personal Information
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
Is information or an opinion, including information or an opinion
forming part of a database, whether true or not, and whether recorded
in a material form or not, about an individual whose identity is
apparent, or can reasonably be ascertained, from the information or
opinion.
Public Information
Restricted Information
University
University Members
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.
Persons who include: Employees of the University whose conditions
of employment are covered by the UniSQ Enterprise Agreement
whether full time or fractional, continuing, fixed-term or casual,
including senior Employees whose conditions of employment are
covered by a written agreement or contract with the University;
members of the University Council and University Committees;
visiting, honorary and adjunct appointees; volunteers who contribute
to University activities or who act on behalf of the University; and
individuals who are granted access to University facilities or who are
engaged in providing services to the University, such as contractors or
consultants, where applicable.
Institutional Data
System
Users
Keywords
Record No 13/931PL
Complying with the law and observing Policy and Procedure is a condition of working and/or studying at the University. A hard copy of this
electronic document is uncontrolled and may not be current as the University regularly reviews and updates its Policies and Policy Instruments.
The latest controlled version can be found in the University’s Policy and Procedure Library.