(1)  This procedure establishes the University’s information classification standards and the protection and handling requirements for information created, collected, stored or processed by or for Charles Sturt University (the University). It supports compliance with: (2)  This procedure applies to: (3)   This procedure supports the Information Technology Policy and Records Management Policy. (4)   The information classification standards are used to assess the sensitivity and security needs of University information and ensure that it is labelled, handled, stored and disposed of correctly. Classifications are assigned based on the potential impact of unauthorised disclosure or loss. (5)  All University information must be assigned one of the classifications in the table below. The classification is: (6)  University information that is subject to third-party agreements or contracts (e.g. data sharing agreements) may require additional or alternate security classifications and controls. (7)  See also Delegation Schedule A - Governance and Legal for information governance delegations and authorities to share or disclose University information. (8)  When collecting, processing, storing, and distributing highly sensitive information: (9)  The University’s information classification supports compliance with NSW Cyber Security Policy (item 3.3). The Information Classification Schedule demonstrates the alignment with the dissemination limiting markers (DLMs) and security classifications used by the NSW Government Information Classification, Labelling and Handling Guidelines and Commonwealth government Protective Security Policy Framework. (10)  A suspected or known breach or loss of University information must be reported as soon as possible: (11)  Where the breach involves personal information, the Information Technology Procedure - Personal Data Breach will apply. (12)  Breaches of this procedure or information handling requirements will be managed under the Information Technology Procedure - Acceptable Use and Access. (13)  Information Security Guidelines (14)  In this procedure:Information Classification and Handling Procedure
            Section 1 - Purpose
	
Scope
	
Top of PageSection 2 - Policy
Section 3 - Procedures
Part A - Information classification standards
	
Information classification labels
	
		
			 
	
	
		
			 
			
			 
			Consequence of breach or loss* 
			
			 
			Handling guidelines 
		
			 
		
			 
			Highly sensitive
			 
			Major to catastrophic 
			
			 
			
			 
		
				
			 
		
			 
			Confidential, private
			 
			Moderate 
			
			 
			
			 
		
				
			 
		
			 
			Internal
			 
			Minor 
			
			 
			
			 
		
				
			 
	
			 
			Public
			 
			Insignificant 
			
			 
			
			 
		
				
^ Examples are indicative only. A higher or lower classification may be more appropriate based on the risk assessment. The lowest appropriate classification should be applied.Additional requirements for handling highly sensitive information
	
Government classification alignment
Part B - Information breach procedures
	
Section 4 - Guidelines
Section 5 - Glossary
	
Top of PageSection 6 - Document context
	
		
                
			 
		Compliance drivers 
			NSW Cyber Security Policy 
		
			 
		Review requirements 
			As per Policy Framework Policy 
		
			 
	
Document class 
			Management 
		
View Current
    This is the current version of this document. You can provide feedback on this policy to the document author - refer to the Status and Details on the document's navigation bar.
                    Classification
Definition
Examples^
Information that could reasonably be expected to cause serious harm to the University, multiple individuals or another organisation if released publicly.
Information subject to mandatory regulatory or legislative control
			Login and password information
			Individual’s financial records (credit card data, tax file numbers, etc.)
			Highly sensitive business data, plans & strategies
			Medical records
			Research data containing medical data, identifiable personal/ child/young person information, or other restricted data)
Information which if disclosed could reasonably be expected to cause harm to the University, an individual or another organisation if released publicly.
Most student and staff personally identifiable records
			Exam materials
			Student assessment items and results, study plans, practicum placements, etc.
			Intellectual property
			Records of Council and Council committees
			Audit reports
			University financial information
			Payroll information
			In progress/unpublished research materials  
			Legal professional privilege information
			Complaints and appeals
Proprietary information that is only available to current staff or students of the University.
			Information that if breached would be expected to cause no or minimal harm to the University, an individual or another organisation if released publicly.
			Default for most University information.
Teaching materials
			Internal procedures and work instructions
			System design and configuration
			Project documentation
			Records of academic governance committees and management committees
The information is intended for public disclosure or consumption. Its availability to the general community would be beneficial to the University. Requires no special protection or rules for use and may be freely disseminated.
Course offerings
			University contact information
			Recruitment, advertised positions
			General information about the University
			University policies
			Published research information
			* Refer to Appendix 1 - University risk matrix of the Risk Management Guidelines to determine the potential consequence a breach or loss may cause to students, staff or other individuals, or to University objectives, safety, finances or reputation.