Procedure overview
- 1 Purpose
- 2 Scope
- 3 Procedure Overview
- 4 Procedures
- 5 References
- 6 Schedules
- 7 Procedure Information
1 Purpose
To establish a process for classifying and managing University Information Assets based on their sensitivity, value and criticality. This Procedure outlines the actions required to ensure compliance with the ICT Information Management and Security Policy.
2 Scope
This Procedure applies to all Universities Information Assets, including those collected, created, handled, or stored by the University. It also applies to all Users who access, process, store, or share University Information.
3 Procedure Overview
This Procedure outlines the framework for classifying and managing Information Assets by specifying accountabilities and responsibilities at different stages of the information lifecycle, applying security controls, maintaining audit logs, and retention and disposal requirements.
This procedure aligns with:
- Higher Education Standards Framework (Threshold Standards) 2021: Standard 7.3 Information Management.
- Higher Education Support Act (2003):
- Division 179-Protection of Personal Information and
- Division 180-Disclosure or Use of Higher Education Support Act Information
4 Procedures
4.1 Information Asset and Security Classification framework
Information Assets are classified based on their security levels to help protect their confidentiality, integrity and availability. Classifications further indicate the level of impact to the University should that information be compromised, disclosed, altered, or destroyed without authorisation.
Baseline Security Controls are further applied to Information Assets to help safeguard them from unauthorised access by specifying data access rights that may be assigned to Users. By default, all University Information Assets are classified as Official unless otherwise re-assigned by this Procedure, as listed in Table 1, or by Information Systems Custodian or Data Custodians using the steps outlined in the Information Asset and Security Classification Schedule.
For Information Assets without Security Classifications, the Information System Custodian or Data Custodian must refer to the Data Types listed in Table 1 and consult the Information Asset and Security Classification Schedule to determine whether the asset requires a reclassification. Externally generated assets that have not been classified must be reviewed by the receiving University officer, in consultation with the Information System Custodian or Data Custodian.
University Information Assets are classified into four sensitivity classifications:
Table 1. Information Classifications
Classification | Access | Description | Examples |
Tier 1: Public | No access approvals required | Public Information Assets can be shared openly with anyone. |
|
Tier 2: Official | University Employees are provided default access. Persons of Interest, contractors and affiliates must obtain approval from relevant Custodians. | Official Information Assets relate to official University business and may be distributed internally or externally. These datasets may be used for reporting to State and Federal Governments or other regulatory or authoritative bodies. Datasets are made available to all Employees, and may be published in aggregated formats on UniSQ websites, subject to relevant approvals. |
|
Tier 3: Confidential | Only accessible by University Employees with delegated data access rights as authorised by Data and Systems Custodians. Refer to Table 1 in the Information Asset & Security Classification Schedule. | Confidential Information Assets contain personal or financial data. |
|
Tier 4: Restricted | Only accessible to University Employees when access is granted by University Senior Executives. | Restricted Information Assets are highly sensitive and can cause damage if disclosed without authorisation and are not to be shared internally or externally (unless otherwise approved by University Senior Executives) |
|
These classifications are assigned across the University within the UniSQ Data Reference Model, accessible to all Employees via the UniSQ Enterprise Information Management SharePoint site.
Note: All Information maintained by the University are subject to third party legal discovery such as subpoenas and Right to Information access requests which are processed by Enterprise Information Management Services.
4.2 Accountabilities and responsibilities
All University Employees, including Person of Interest, contractors, and affiliates, with access granted to University data, are required to adhere to implemented controls.
4.2.1 Information Systems and Information Assets
- Each Information Systems and Information Assets are uniquely identified, assigned a Custodian and given an Information Classification, if not already classified.
- Refer to the Information Asset and Security Classification Schedule for guidance on classification processes, including identification of Custodians (Table 1),additional responsibilities (Table 2), and associated risks and safeguards (Tables 3 and 4)
4.2.2 Custodian Responsibilities
- Information System Custodian or Data Custodian must ensure that Employees are trained in the effective use of the relevant Information System and associated Information Assets.
- Custodians are responsible for implementing appropriate controls for monitoring their systems or assets, authorising and revoking access for Confidential or Restricted Information Systems, and addressing identified audit issues with ICT Services' assistance.
4.2.3 ICT Services Responsibilities
- Monitor the University's ICT network infrastructure, including all hardware and communications links, and support and address audit issues
- Support Information Systems Custodians to manage the information lifecycle for data integrated or exported to the University's enterprise information, data and analytics infrastructure, as outlined by the ICT Information Management and Security Policy.
- Monitor and assist Custodians with compliance obligations in accordance with impact assessment guidance listed in Table 3 of the Information Asset and Security Classification Schedule.
- Provide secure access through a central authentication system, including provision of usernames and passwords to access the University's network.
4.2.4 Data Access and Usage
- All University Employees are required to complete the Data Access Agreement and must ensure that Information Assets are handled using UniSQ provisioned ICT software and hardware with UniSQ provisioned Virtual Private Network (VPN) enabled using Multi-Factor Authentication (MFA).
- Confidential or Restricted information may only be collected or accessed when required to do so for University business.
- Confidential or Restricted information must be de-identified before sharing or disclosing, except when reported to Government.
4.2.5 First Nations Data Handling
- Research data must be handled in accordance with the AIATSIS code of Ethics for Aboriginal and Torres Strait Islander Research.
- Administrative Student and Employee data for First Nations peoples must be handled in accordance with the Indigenous Data Sovereignty guidelines outlined by Maiam Nayri Wingara.
4.3 Applications of Security Controls
Security controls must be applied to protect Information Assets at all stages of the Information Asset lifecycle. Unlike a risk assessment, data security classifications have been determined by the potential level of impact to the organisation or individual should the data be shared inappropriately or compromised (for Information Assets requiring reclassification, refer to Table 3 in the Information Asset and Security Classification Schedule).
The Information System Custodian must ensure that these controls are in place by following:
- Applying the Need-to-Know Principle: Confidential and Restricted Information Assets should only be accessible to individuals who require them for their work duties.
- Implementing a Clear Desk Policy: Official, Confidential, and Restricted Information Assets must be secured in accordance with advice outlined in the Information Asset and Security Classification Schedule to prevent unauthorised access to any electronic materials or systems.
- Handling Security Classified Information Assets from external organisations: Retain the security classification as received from the data transfer. Manage the assets according to the University's Confidentiality Agreement with the external organisation, ensuring the originator of the data transfer is responsible for its protection.
- Referencing Safeguarding Measures: Consult Table 4 of the Information Asset and Security Classification Schedule for detailed safeguarding measures specific to each classification.
4.4 Audit Logs
With security controls applied, a strict audit logging process must be implemented to track and maintain the confidentiality and integrity of Information Assets. The audit logs provide a trail of evidence for investigations and must be protected with access controls, as outlined in the Information Asset and Security Classification Schedule (Table 4).
4.5 Retention and Disposal of Information Assets
To ensure ongoing compliance, the retention and disposal of Information Assets must follow the security classifications and legal requirements set out in the Information Asset and Security Classification Schedule (Table 4), which adheres to the University's obligations as outlined by the Queensland General Retention and Disposal Schedule.
4.6 Information Asset Register
All classified Information Assets must be recorded in the Information Asset Register. The University provides public access to this register in line with Queensland and National legislative requirements, supporting transparency and accountability as outlined by the Right to Information Policy.
Information held by the University, including the Information Asset Register, may be sought through the University's Administrative Access Scheme, Publication Scheme, Disclosure Log or a formal access request under the Right to Information Act 2009 or Information Privacy Act 2009 which are available on the Right to Information and Privacy websites.
The Information System Custodian must ensure that the Information Asset Register is reviewed, updated, and maintained annually. This process ensures that all assets are accounted for and properly classified. ICT Services will assist as necessary to support this ongoing responsibility.
4.7 Non-Compliance
Failure to adhere to the procedures outlined in this document may result in disciplinary actions in accordance with the University's Policy Instruments.
5 References
Australian Institute of Aboriginal and Torres Strait Islander Studies. AIATSIS code of Ethics for Aboriginal and Torres Strait Islander Research. Retrieved June 2024 from https://aiatsis.gov.au/sites/default/files/2020-10/aiatsis-code-ethics.pdf
The Australian Indigenous Data Sovereignty Collective. Maiam Nayri Wingara. Retrieved June 2024 from https://www.maiamnayriwingara.org/
6 Schedules
This procedure must be read in conjunction with its subordinate schedules as provided in the table below.
7 Procedure Information
Accountable Officer | Chief Information Officer |
Responsible Officer | Chief Information Officer |
Policy Type | University Procedure |
Policy Suite | |
Subordinate Schedules | |
Approved Date | 24/1/2025 |
Effective Date | 24/1/2025 |
Review Date | 24/1/2030 |
Relevant Legislation | Electronic Transactions (Queensland) Act 2001 Information Security Manual - ISM (Australian Government) Metadata Management Principles Public Interest Disclosure Act 2010 (Qld) Queensland Government Information Security Classification Framework Queensland Information Standard 02: ICT Resources Strategic Planning Queensland Information Standard 13: ICT Procurement and Disposal of ICT Products and Services Queensland Information Standard 18: Information Security Queensland Information Standard 31: General Retention and Disposal Queensland Information Standard 33: Information Access and Use Queensland Information Standard 38: Use of ICT Facilities and Devices Queensland Information Standard 39: Domain Names Queensland Information Standard 44: Information Asset Custodianship |
Policy Exceptions | |
Related Policies | Acceptable use of ICT Resources Policy Enterprise Risk Management Policy Fraud and Corruption Management Policy Public Interest Disclosure Policy |
Related Procedures | Research Data and Primary Materials Management Procedure |
Related forms, publications and websites | Enterprise Information Management Framework (EIM Framework) Internal Information Asset Register External Information Asset Register ServiceHub - Data Access Agreement |
Definitions | Terms defined in the Definitions Dictionary |
A person employed by the University and whose conditions of employment are covered by the Enterprise Agreement and includes persons employed on a continuing, fixed term or casual basis. Employees also include senior Employees whose conditions of employment are covered by a written agreement or contract with the University....moreA person employed by the University and whose conditions of employment are covered by the Enterprise Agreement and includes persons employed on a continuing, fixed term or casual basis. Employees also include senior Employees whose conditions of employment are covered by a written agreement or contract with the University. Any collection of data that is processed, analysed, interpreted, organised, classified or communicated in order to serve a useful purpose, present facts or represent knowledge in any medium or form. This includes presentation in electronic (digital), print, audio, video, image, graphical, cartographic, physical sample, textual or numerical form....moreAny collection of data that is processed, analysed, interpreted, organised, classified or communicated in order to serve a useful purpose, present facts or represent knowledge in any medium or form. This includes presentation in electronic (digital), print, audio, video, image, graphical, cartographic, physical sample, textual or numerical form. An identifiable collection of data stored in any form and recognised as having value for the purpose of enabling the University to perform its business functions, thereby satisfying a recognised University requirement....moreAn identifiable collection of data stored in any form and recognised as having value for the purpose of enabling the University to perform its business functions, thereby satisfying a recognised University requirement. Classified data represents data classified as either Public Information, Internal Information or Restricted Information in this document. The classification of an Information Asset is to identify Security Controls required to protect that asset....moreClassified data represents data classified as either Public Information, Internal Information or Restricted Information in this document. The classification of an Information Asset is to identify Security Controls required to protect that asset. Concerned with the protection of Information from unauthorised use or accidental modification, loss or release....moreConcerned with the protection of Information from unauthorised use or accidental modification, loss or release. An individual or group of people who have been officially designated as accountable for specific data that is transmitted, used, and stored on a System within the University....moreAn individual or group of people who have been officially designated as accountable for specific data that is transmitted, used, and stored on a System within the University. The organised collections of hardware, software, equipment, policies, procedures and people that store, process, control and provide access to information....moreThe organised collections of hardware, software, equipment, policies, procedures and people that store, process, control and provide access to information. Information should be classified as Internal when the unauthorised disclosure, alteration, or destruction of that Information could result in a moderate level of risk to the University. By default, all Information Assets that are not explicitly classified as Restricted Information or Public Information should be treated as Internal Information. A reasonable level of Security Controls s...moreInformation should be classified as Internal when the unauthorised disclosure, alteration, or destruction of that Information could result in a moderate level of risk to the University. By default, all Information Assets that are not explicitly classified as Restricted Information or Public Information should be treated as Internal Information. A reasonable level of Security Controls should be applied to Internal Information. Access to Internal Information must be requested from, and authorised by, the Information System Custodian. Access to Internal Information may be authorised to groups of persons by their job classification or responsibilities (e.g. role-based access). Internal Information is moderately sensitive in nature. Often Internal Information is used in making decisions, and therefore it is important this information remain timely and accurate. The risk for negative impact on the University should this information not be available when needed is moderate. Is information or an opinion, including information or an opinion forming part of a database, whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion....moreIs information or an opinion, including information or an opinion forming part of a database, whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent, or can reasonably be ascertained, from the information or opinion. Information should be classified as Public when the unauthorised disclosure, alteration, or destruction of that Information would result in little or no risk to the University. While little or no controls are required to protect the confidentiality of Public Information, some level of control is required to prevent unauthorised modification or destruction of that Information. Public In...moreInformation should be classified as Public when the unauthorised disclosure, alteration, or destruction of that Information would result in little or no risk to the University. While little or no controls are required to protect the confidentiality of Public Information, some level of control is required to prevent unauthorised modification or destruction of that Information. Public Information is not considered sensitive; therefore, it may be granted to any requestor or published with no restrictions. The integrity of Public Information should be protected and in particular, the growing social media phenomenon casts doubts on the messages contained within. The appropriate Information System Custodian must authorise replication or copying of the Information in order to ensure it remains accurate over time. The impact on the University should Public Information not be available is low. Information should be classified as Restricted when the unauthorised disclosure, alteration, or destruction of that Information could cause a significant level of risk to the University or its affiliates. Restricted Information includes Information protected by the State or Commonwealth privacy regulations and Information protected by confidentiality agreements. The highest level of Se...moreInformation should be classified as Restricted when the unauthorised disclosure, alteration, or destruction of that Information could cause a significant level of risk to the University or its affiliates. Restricted Information includes Information protected by the State or Commonwealth privacy regulations and Information protected by confidentiality agreements. The highest level of Security Controls should be applied. Access to Restricted Information must be controlled from creation to destruction, and will be granted only to those persons affiliated with the University who require such access in order to perform their job (e.g. need-to-know). Access to Restricted Information must be individually requested and then authorised in writing by the Information System Custodian. Restricted Information is highly sensitive and may have personal privacy considerations, or may be restricted by law. In addition, the negative impact on the institution should this Information be incorrect, improperly disclosed, or not available when needed, is very high. The term 'University' or 'UniSQ' means the University of Southern Queensland....moreThe term 'University' or 'UniSQ' means the University of Southern Queensland. Persons who include: Employees of the University whose conditions of employment are covered by the UniSQ Enterprise Agreement whether full time or fractional, continuing, fixed-term or casual, including senior Employees whose conditions of employment are covered by a written agreement or contract with the University; members of the University Council and University Committees; visiti...morePersons who include: Employees of the University whose conditions of employment are covered by the UniSQ Enterprise Agreement whether full time or fractional, continuing, fixed-term or casual, including senior Employees whose conditions of employment are covered by a written agreement or contract with the University; members of the University Council and University Committees; visiting, honorary and adjunct appointees; volunteers who contribute to University activities or who act on behalf of the University; and individuals who are granted access to University facilities or who are engaged in providing services to the University, such as contractors or consultants, where applicable. | |
Definitions that relate to this procedure only | |
Institutional Data All data owned or licenced by the University. Security Classified Information Asset Register A register, electronic or paper database that provides a record to log actions on Information Assets. System A combination of Information Assets and ICT Assets supporting a business process. Users Users are defined as all University Members, any person enrolled in an award course of study at the University and any person registered to attend short courses, seminars or workshops in any unit of the University as well as all other persons including members or the general public, who have been granted access to, and use of, the University's ICT Resources. A member of the public reading public University web pages from outside the University is not by virtue of that activity alone considered to be a User. | |
Keywords | |
Record No | 13/931PL |