Bulletin Board - Review and Comment
Step 1 of 3: Comment on Document
There are 3 steps in the submission process. You must complete all three steps in one session, otherwise your comments will be lost.
1. Use this
icon to open a comment box.
2. Type your feedback and then click the"Save Comment" button in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments, go to step 2 by clicking on the “Save and Continue” button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity or if you close your browser or go to a different tab/window and try to come back.
To ensure that your comments are received:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time.
-
DO NOT leave your submission unfinished. If you need to take a break, submit your current set of comments now and return later to make a further submission. You will receive a copy of your comments so that you can see what you have already said.
-
DO NOT exit from the interface until you have completed all three steps of the submission process. Simply saving a comment in the comment box does not mean it is submitted and if you exit the system, you will not be able to retrieve it later.
When you finalise your submission in step 3 your comments will be emailed to the Document Author with a copy to you, and to policy@mq.edu.au for record keeping purposes.
(1) This Policy outlines the requirements to maintain the security of Macquarie University IT Resources which are operated and/or maintained by Third-Parties. (2) This Policy applies to all Macquarie University (University) Staff who engage with Third-Parties and Third-Parties with access to the University’s IT Resources. (3) The University is committed to maintaining a secure technology environment and as such has established requirements to manage Third-Party risks. By establishing these requirements, the University aims to reduce the risk attached to the use of Third-Parties. (4) All Third-Parties engaging with the University are expected to protect the confidentiality, integrity, availability, non-repudiation and authentication of the University’s Information and IT Resources, commensurate with the risks posed to them. (5) Third-Parties with access to IT Resources should complete University cyber security awareness and training upon induction. (6) An Information Sharing Agreement should be established prior to any engagement/disclosure of Information between the University and Third-Parties. (7) All Information shared between the University and Third-Parties should be performed using an approved secure file transfer method. (8) Third-Parties engaged to provide products or services to the University should only be done so under an appropriate contract or agreement. (9) A risk assessment must be carried out for each Third-Party requiring access to IT Resources, and Information prior to entering into a contract or agreement, as per the ‘Third-Party Risk Assessment’ section of this Policy. (10) Third-Parties must inform the University’s IT Cyber Security team (cyber@mq.edu.au) of Relevant Cyber Security Incidents within 72 hours of detection. (11) Third-Parties should agree to abide by the University’s cyber security Policies. (12) Prior to entering into a contract or agreement, Third-Parties should be evaluated per the Procurement Policy and the selection criteria outlined in the ‘Third-Party Acquisition Criteria’ Section of this Policy. (13) Selection criteria of Third-Parties must be re-evaluated when expanding an existing relationship to include different products or services. (14) Cyber security clauses within contracts with Third-Parties providing services or technology related products to the University should be reviewed by the IT Cyber Security team, the Procurement team and the Office of General Counsel before execution. (15) Decisions regarding the engagement of a Third-Party should be made in conjunction with the relevant business unit, the Cyber Security team, the Procurement team and the Office of General Counsel, once the risks of engaging the Third-Party have been determined and the contract has been reviewed. (16) A register of the University’s Third-Parties should be established, maintained and regularly reviewed. (17) The Cyber Security Team should develop, maintain and regularly review A Third-Party cyber security questionnaire. (18) Prior to entering into a contract or agreement, the Area that is engaging a supplier should assess, evaluate, and manage risks associated with Third Parties in accordance with the Risk Management Policy and Enterprise Risk Management Framework (ERMF). (19) Risk assessments should consider the information outlined in the ‘Third-Party Risk Assessment Considerations’ Section of this Policy. (20) Third-Parties should be re-assessed periodically, or when an existing agreement/contract expands to include additional/different products or services. (21) Third-Parties should be monitored for non-conformance against the agreed security requirements by the Area responsible for their engagement. (22) If a Third-Party has been identified as non-conforming, the engaging Area should mitigate the risks associated with the identified non-conformance. The IT Cyber Security team will: (23) When a Third-Party relationship is terminated, the relevant Information Technology team will action the following to maintain the security of its IT Resources: (24) Third-Parties must provide the University with timely access to any data held on its behalf: (25) Any exemption to this Policy must be sought from the Chief Information Security Officer (CISO). (26) Breaches of this Policy will be managed in accordance with the applicable provisions of the Staff Code of Conduct and other relevant policy instruments. (27) The following selection criteria should be considered when evaluating a prospective Third-Party: (28) The Third-Party Risk Register should include, at a minimum, the following: (29) To effectively manage risks posed by Third-Parties, the following should occur: (30) Third-Party Risk Assessment considerations include: (31) Third-Party contracts and service level agreements should clearly specify cyber security requirements that pertain to the product/service. Where applicable, contracts or agreements should specify, at a minimum: (33) The following definitions apply for the purpose of this Policy: Third-Party Cyber Risk Management Policy
Section 1 - Purpose
Scope
Background
Section 2 - Policy
Third-Party Acquisition
Third-Party Risk Management
Third-Party Risk Assessment
Monitoring Third-Parties
Contract termination
Compliance and Exemptions
Section 3 - Procedures
Third-Party Acquisition Criteria
Third-Party Risk Register
Third-Party Risks
Third-Party Risk Assessment Considerations
Third-Party Contract Requirements
Top of PageSection 4 - Guidelines
Top of PageSection 5 - Definitions