(1) This procedure establishes the University’s information classification standards and the protection and handling requirements for information created, collected, stored or processed by or for Charles Sturt University (the University). It supports compliance with: (2) This procedure applies to: (3) This procedure supports the Information Technology Policy and Records Management Policy. (4) The information classification standards are used to assess the sensitivity and security needs of University information and ensure that it is labelled, handled, stored and disposed of correctly. Classifications are assigned based on the potential impact of unauthorised disclosure or loss. (5) All University information must be assigned one of the classifications in the table below. The classification is: (6) University information that is subject to third-party agreements or contracts (e.g. data sharing agreements) may require additional or alternate security classifications and controls. (7) See also Delegation Schedule A - Governance and Legal for information governance delegations and authorities to share or disclose University information. (8) When collecting, processing, storing, and distributing highly sensitive information: (9) The University’s information classification supports compliance with NSW Cyber Security Policy (item 3.3). The Information Classification Schedule demonstrates the alignment with the dissemination limiting markers (DLMs) and security classifications used by the NSW Government Information Classification, Labelling and Handling Guidelines and Commonwealth government Protective Security Policy Framework. (10) A suspected or known breach or loss of University information must be reported as soon as possible: (11) Where the breach involves personal information, the Information Technology Procedure - Personal Data Breach will apply. (12) Breaches of this procedure or information handling requirements will be managed under the Information Technology Procedure - Acceptable Use and Access. (13) Information Security Guidelines (14) In this procedure:Information Classification and Handling Procedure
Section 1 - Purpose
Scope
Top of PageSection 2 - Policy
Section 3 - Procedures
Part A - Information classification standards
Information classification labels
Consequence of breach or loss*
Handling guidelines
Highly sensitive
Major to catastrophic
Confidential, private
Moderate
Internal
Minor
Public
Insignificant
^ Examples are indicative only. A higher or lower classification may be more appropriate based on the risk assessment. The lowest appropriate classification should be applied.Additional requirements for handling highly sensitive information
Government classification alignment
Part B - Information breach procedures
Section 4 - Guidelines
Section 5 - Glossary
Top of PageSection 6 - Document context
Compliance drivers
NSW Cyber Security Policy
Review requirements
As per Policy Framework Policy
Document class
Management
View Current
This is the current version of this document. You can provide feedback on this policy to the document author - refer to the Status and Details on the document's navigation bar.
Classification
Definition
Examples^
Information that could reasonably be expected to cause serious harm to the University, multiple individuals or another organisation if released publicly.
Information subject to mandatory regulatory or legislative control
Login and password information
Individual’s financial records (credit card data, tax file numbers, etc.)
Highly sensitive business data, plans & strategies
Medical records
Research data containing medical data, identifiable personal/ child/young person information, or other restricted data)
Information which if disclosed could reasonably be expected to cause harm to the University, an individual or another organisation if released publicly.
Most student and staff personally identifiable records
Exam materials
Student assessment items and results, study plans, practicum placements, etc.
Intellectual property
Records of Council and Council committees
Audit reports
University financial information
Payroll information
In progress/unpublished research materials
Legal professional privilege information
Complaints and appeals
Proprietary information that is only available to current staff or students of the University.
Information that if breached would be expected to cause no or minimal harm to the University, an individual or another organisation if released publicly.
Default for most University information.
Teaching materials
Internal procedures and work instructions
System design and configuration
Project documentation
Records of academic governance committees and management committees
The information is intended for public disclosure or consumption. Its availability to the general community would be beneficial to the University. Requires no special protection or rules for use and may be freely disseminated.
Course offerings
University contact information
Recruitment, advertised positions
General information about the University
University policies
Published research information
* Refer to Appendix 1 - University risk matrix of the Risk Management Guidelines to determine the potential consequence a breach or loss may cause to students, staff or other individuals, or to University objectives, safety, finances or reputation.