Bulletin Board - Review and Comment
Step 1 of 3: Comment on Document
There are 3 steps in the submission process. You must complete all three steps in one session, otherwise your comments will be lost.
1. Use this
icon to open a comment box.
2. Type your feedback and then click the"Save Comment" button in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments, go to step 2 by clicking on the “Save and Continue” button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity or if you close your browser or go to a different tab/window and try to come back.
To ensure that your comments are received:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time.
-
DO NOT leave your submission unfinished. If you need to take a break, submit your current set of comments now and return later to make a further submission. You will receive a copy of your comments so that you can see what you have already said.
-
DO NOT exit from the interface until you have completed all three steps of the submission process. Simply saving a comment in the comment box does not mean it is submitted and if you exit the system, you will not be able to retrieve it later.
When you finalise your submission in step 3 your comments will be emailed to the Document Author with a copy to you, and to policy@mq.edu.au for record keeping purposes.
(1) This Policy outlines the requirements when travelling to High-Risk Countries with the University’s IT Resources and Information, in physical or digital form. (2) This Policy applies to University Staff travelling to High-Risk Countries with IT Resources and Information, for personal and work-related purposes. (3) This Policy is not applicable to the Defence Industry Security Program (DISP). (4) Macquarie University (the University) is committed to maintaining a secure technology environment and as such, has established requirements to when travelling to High-Risk Countries for personal or work-related purposes. Establishing these requirements aims to decrease the likelihood of compromise to the University’s IT Resources and Information. (5) Prior to travelling to High-Risk Countries with IT Resources or University Information, Staff should notify the IT Cyber Security team (cyber@mq.edu.au). (6) The IT Cyber Security Team should undertake a cyber risk assessment of the travel request to determine whether it is within the University’s risk appetite, per Section 3 of this Policy. (7) Staff should seek a brief from the IT Cyber Security Team for travel guidance in accordance with the: (8) Additional cyber security measures should be implemented to IT Resources taken overseas, including but not limited to: (9) When accessing University IT Resources and Information, whether in physical or digital form, in locations not controlled by the University, Staff should take all reasonable steps to ensure compliance to the Acceptable Use of IT Resources Policy and this Policy. (10) IT Resources should not be taken when travelling unless required for fulfilment of work duties. (11) IT Resources storing, or resources classified as Confidential or above (refer Information Classification and Handling Procedure) may be permitted to be taken overseas if a cyber risk assessment is undertaken to determine whether it is within the University’s risk appetite (per Section 3 of this Policy). (12) Unique IT Resources (i.e., burner devices) should be issued to Staff with only the required Information stored on them. Upon return, these devices should be re-flashed prior to re-issue to other travellers. (13) Unauthorised persons must not be provided with access to IT Resources. (15) Untrusted removable storage media (e.g., USB drives and external hard drives) should not be connected to IT Resources. (16) IT Resources should be stored in hand luggage when travelling. (17) IT Resources should only be charged using trusted charging devices (e.g., charger, cables, power adapters), and public charging stations or USB ports (e.g. airports, restaurants, conference rooms) should not be used. (18) Information should be handled in accordance with the Information Classification and Handling Procedure and the Privacy Policy. (19) Physical documents that are not required should not be taken when travelling. (20) Physical documents should be stored in hand luggage when travelling. (21) Screens and documents displaying Information classified as Confidential or above should not be shared with, or seen by, unauthorised persons (e.g., shoulder surfing). (22) Work-related conversations should remain confidential and not be discussed where other persons may hear (e.g., elevators, lobbies, cafes, public transport). (23) Confidential Information or above: (24) If travelling with personal electronic devices with access to University Information classified as Confidential or above, the following applications should be removed: (25) Any Cyber Security incident should be reported to the IT Service Desk team or IT Cyber Security Team (cyber@mq.edu.au), in accordance with the Acceptable Use of IT Resources Policy. (26) Any exemption to this Policy must be sought from the Chief Information Security Officer (CISO). (27) Breaches of this Policy by Staff will be managed in accordance with the applicable provisions of the Staff Code of Conduct and other relevant policy instruments. (28) A summary of the process to review travel requests is provided below: (30) The following definitions apply for the purpose of this Policy:Cyber Travel Policy
Section 1 - Purpose
Scope
Background
Section 2 - Policy
Protection of Physical IT Resources
Confidentiality of Information:
Personal Devices
Incident Notification
Compliance and Exemptions
Section 3 - Procedures
Top of Page
Step
Description
Individual
Section 4 - Guidelines
Top of PageSection 5 - Definitions