(1) Computer and information systems underpin the University's activities, and are essential to the teaching, learning, research and administration functions of Charles Sturt University (the University). (2) This Policy sets out the University's information security obligations regarding the integrity, confidentiality and availability of all Information and Communication Technology (ICT) infrastructure, systems and processes. (3) The University acknowledges its obligation to ensure the security of all information, infrastructure and processes it owns and controls. Every member of the University shares this obligation to varying degrees. (4) This Policy defines in broad terms the framework within which information security risk is to be managed. (5) This Policy applies to all University staff, students and other relevant parties including visitors, contractors and associated bodies who own, manage, access or use the University's ICT services. (6) This Policy covers all: (7) This Policy should be read in conjunction with: (8) For the purpose of this Policy: (9) Availability - means information assets are accessible to authorised parties at appropriate times. (10) Confidentiality - means access to information assets is only by authorised parties. (11) Core strategic systems - means ICT information systems essential to the primary business functions of the University. (12) Data Governance Committee - means the Committee established under the Technology Initiatives. (13) ICT security breach - means incident or action that impacts the confidentiality, integrity or availability of the University's information assets. (14) ICT security risk - means a vulnerability with an associated threat that if exploited could impact the operations of the University. (15) Information Security Management System (ISMS) - refers to the University's ISMS as per ISO/IES 2700. (16) Integrity - means the quality and accuracy of information assets. (17) Security risk assessment - means analysis that occurs to test the effectiveness of current University security controls that protect information and ICT assets of the University. This assessment includes a determination of the probability of losses to those assets. (18) Significant risk - means a risk determined to be outside the University's Risk Appetite as determined in the Risk Management Policy. (19) System custodian - means University executive staff with responsibility and ownership of information or ICT assets as identified and listed in the University’s Applications Portfolio, or the Primary Budget Centre Manager responsible for non-listed systems. (20) The University will maintain compliance with the core requirements of the NSW Government Digital Information Security Policy including the operation of an Information Security Management System (ISMS) as per the guidelines defined in ISO/IEC 2700. (21) In order to achieve compliance with this Policy, information security risk management will be undertaken as per the University's Risk Management Policy. (22) The University will implement risk mitigation strategies to ensure appropriate legal, regulatory and contractual compliance to protect information assets against breaches of: (23) The University will provide education, training and awareness for information security as appropriate to individual's roles and responsibilities. (24) All University staff, students and other relevant parties as identified under clause 5, must report ICT security incidents, breaches or significant risks to the IT Service Desk Request. (25) The University will report information security breaches or incidents that may involve criminal activity to relevant law enforcement agencies. (26) Failure to comply with this Policy may result in disciplinary action as per the University's misconduct process, referred to in the Code of Conduct. (27) The Division of Information Technology is responsible for: (28) The Data Governance Committee is responsible for reviewing and prioritising: (29) System custodians are responsible for: (30) All University staff, students and other relevant parties as listed under clause 5 are responsible for ensuring: (31) Nil. (32) Nil.Information and Communications Technology Security Policy
Section 1 - Purpose
Scope
References
Top of PageSection 2 - Glossary
Section 3 - Policy
Responsibilities
Top of PageSection 4 - Procedures
Section 5 - Guidelines
View Current
This is not a current document. It has been repealed and is no longer in force.