Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) This procedure establishes the University’s information classification standards and the protection and handling requirements for information created, collected, stored or processed by or for Charles Sturt University (the University). It supports compliance with: (2) This procedure applies to: (3) This procedure supports the Information Technology Policy and Records Management Policy. (4) The information classification standards are used to assess the sensitivity and security needs of University information and ensure that it is labelled, handled, stored and disposed of correctly. Classifications are assigned based on the potential impact of unauthorised disclosure or loss. (5) All University information must be assigned one of the classifications in the table below. The classification is: (6) University information that is subject to third-party agreements or contracts (e.g. data sharing agreements) may require additional or alternate security classifications and controls. (7) See also Delegation Schedule A - Governance and Legal for information governance delegations and authorities to share or disclose University information. (8) When collecting, processing, storing, and distributing highly sensitive information: (9) The University’s information classification supports compliance with NSW Cyber Security Policy (item 3.3). The Information Classification Schedule demonstrates the alignment with the dissemination limiting markers (DLMs) and security classifications used by the NSW Government Information Classification, Labelling and Handling Guidelines and Commonwealth government Protective Security Policy Framework. (10) A suspected or known breach or loss of University information must be reported as soon as possible: (11) Where the breach involves personal information, the Information Technology Procedure - Personal Data Breach will apply. (12) Breaches of this procedure or information handling requirements will be managed under the Information Technology Procedure - Acceptable Use and Access. (13) Information Security GuidelinesInformation Classification and Handling Procedure
Section 1 - Purpose
Scope
Top of PageSection 2 - Policy
Section 3 - Procedures
Part A - Information classification standards
Information classification labels
^ Examples are indicative only. A higher or lower classification may be more appropriate based on the risk assessment. The lowest appropriate classification should be applied.Additional requirements for handling highly sensitive information
Government classification alignment
Part B - Information breach procedures
Section 4 - Guidelines
Section 5 - Glossary
Top of PageSection 6 - Document context
Compliance drivers
NSW Cyber Security Policy
Review requirements
As per Policy Framework Policy
Document class
Management