Bulletin Board - Review and Comment
Step 1 of 3: Comment on Document
There are 3 steps in the submission process. You must complete all three steps in one session, otherwise your comments will be lost.
1. Use this
icon to open a comment box.
2. Type your feedback and then click the"Save Comment" button in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments, go to step 2 by clicking on the “Save and Continue” button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity or if you close your browser or go to a different tab/window and try to come back.
To ensure that your comments are received:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time.
-
DO NOT leave your submission unfinished. If you need to take a break, submit your current set of comments now and return later to make a further submission. You will receive a copy of your comments so that you can see what you have already said.
-
DO NOT exit from the interface until you have completed all three steps of the submission process. Simply saving a comment in the comment box does not mean it is submitted and if you exit the system, you will not be able to retrieve it later.
When you finalise your submission in step 3 your comments will be emailed to the Document Author with a copy to you, and to policy@mq.edu.au for record keeping purposes.
(1) This Policy outlines how IT Resources are to be secured at the University and the responsibilities of Staff and Third-Parties with access to the University’s IT Resources. (2) This Policy applies to University Staff and Third-Parties with access to the University’s IT Resources. (3) Macquarie University (the University) is committed to maintaining a secure technology environment and as such, has established requirements to secure the University’s IT Resources. Establishing these requirements aims to decrease the likelihood of negative consequences impacting the Confidentiality, Integrity and Availability of IT Resources. (4) IT Resources should be handled in accordance with the Acceptable Use of IT Resources Policy. (5) Information should be generated, stored, processed and transmitted in accordance with the: (6) Logical access to IT Resources should be managed in accordance with the Computer and Network Security Policy. (7) Logging, monitoring and alerting activities should be conducted in accordance with the Logging, Monitoring and Alerting Procedure. (8) Vulnerability and patch management activities should be conducted in accordance with the Vulnerability Management Policy. (9) Network security controls should be implemented in accordance with the Computer and Network Security Policy. (10) The use of encryption should be conducted in accordance with the Computer and Network Security Policy. (11) IT Resources should be decommissioned and destroyed in accordance with the Computer and Network Security Policy. (12) Software development activities will be conducted in accordance with the Secure Software Development Policy. (13) The University will assess, evaluate and manage cyber security risks in accordance with Confidentiality, Integrity and Availability requirements of IT Resources and information: (14) A register documenting the University’s cyber risks will be established. The register should include, at a minimum: (15) Third-Party risks should be managed in accordance with the Third-Party Cyber Risk Management Policy. (16) All Staff and Third-Parties with access to IT Resources should be screened in accordance with the Pre-Employment Checks Document. (17) Contractual agreements between the University, Staff and Third-Parties (in accordance with the Third-Party Cyber Risk Management Policy), should outline their respective cyber security obligations and responsibilities: (18) Modifications and updates to this and all related policies must be communicated to all University Staff/Academics and Third-Parties in a timely manner, using the University’s official communication channels. (19) An Incident Response Plan (IRP) should be defined and document the relevant roles and responsibilities. The IRP should be reviewed and tested annually. (20) University related cyber security events should be reported immediately to the IT Service Desk team or Cyber Security team (cyber@mq.edu.au), in accordance with the Acceptable Use of IT Resources Policy. (21) University related cyber security incidents should be responded to in accordance with the IRP: (22) Exemption from this Policy should be sought from the Chief Information Security Officer (CISO). (23) Breaches of this Policy by Staff and Students will be managed in accordance with the applicable provisions of the Student Code of Conduct ,Student Conduct Rules, Student Conduct Procedure, Staff Code of Conduct and other relevant policy instruments. (24) The Cyber Security team should be involved in the process of acquiring Commercial Off-the-Shelf (COTS) software (e.g., Software as a Service). (25) A risk assessment should be conducted prior to acquiring software solutions in accordance with the approved Cyber Data Protection Impact Assessment (DPIA) Checks Procedure. (26) Software should be patched prior to deployment, in accordance with the Vulnerability Management Policy. (27) Controls should be implemented commensurate with the application rating, in accordance with the Cyber DPIA Checks Procedure. (28) Software nearing end-of-life should not be acquired unless there is a documented plan for mitigating risks associated with the lack of future updates and vendor support. (30) Accurate and complete records of all backups should be kept. (31) Backups should be retained for a period based on business importance as well as legislative and compliance requirements. (32) Backup and recovery procedures should be documented and reviewed regularly. (33) Backup strategies (e.g. full, differential and incremental) along with frequency, should comply with the security and recovery needs of the University. (34) Backup media should receive adequate physical and environmental protection. (35) All backup information should be afforded the same level of protection as the original information based on its classification in accordance with the Information Classification and Handling Procedure. (36) Resources involved in critical business processes should be identified and the timelines for restoration and recovery should be defined. (37) Cyber security risks that could cause interruptions to business processes should be identified, along with the probability and impact of such interruptions and their consequences; (38) A Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) should be defined and document the relevant roles and responsibilities. The BCP and DRP should be reviewed and tested annually. (39) Business continuity and disaster recovery activities should be conducted in accordance with the: (41) The following definitions apply for the purpose of this Policy: Cyber Security Policy
Section 1 - Purpose
Scope
Background
Section 2 - Policy
Roles and Responsibilities
Role/Team
Responsibilities
Acceptable Use of IT Resources
Information Handling
Access Management
Logging, Monitoring & Alerting
Vulnerability & Patch Management
Network Security
Encryption
Decommissioning & Destruction
Software Development
Risk Management
Human Resources
Incident Response
Compliance and Exemptions
Section 3 - Procedures
Software Acquisition
Backups
Business Continuity and Disaster Recovery
Section 4 - Guidelines
Top of PageSection 5 - Definitions