(1) If someone is in immediate danger or requires urgent medical attention, use the Emergency Assistance contacts below: (2) Also refer to the Campus Security Emergencies webpage. (3) This Policy specifies the University’s approach to and processes for managing critical incidents. (4) The purpose of this Policy is to: (5) This Policy forms part of and supports the implementation of the MQ Group Emergency Management framework. (6) Subject to the facility and location exclusions specified in clause 8, this Policy applies to the management of critical incidents that occur at: (7) Unless the critical incident is under the direction and control of the operator of another location, this Policy applies to the management of a critical incident that results from an incident at another location where this affects: (8) Critical incidents at the following facilities owned by the University are directed and controlled in accordance with the plans and procedures of the lessees or operators of those facilities and are not included in the scope of this Policy: (9) This Policy provides the framework for the management of risks associated with critical incidents. The management of specific types of incidents may be subject to their own policies, procedures and plans listed in the table below, which should be referred to in conjunction with this Policy. Any of these types of incidents may be classified as a critical incident under this Policy. (10) The University's critical incident management capability is designed and implemented to include the following core elements: (11) The University has established and maintains a MQ Group Emergency Planning Committee (GEPC), chaired by the Vice-President, Finance and Resources. The GEPC is responsible for overseeing and maintaining the MQ Group Emergency Management Framework and its constituent plans, emergency management planning and preparation, training, review and compliance. (12) The University uses a risk-based, critical incident classification and escalation process in alignment with the University's Risk Assessment Matrix to define the level of response required by the University to manage incidents, as follows: (13) The University will maintain a trained and competent Critical Incident Management Team (CIMT) to control the University's strategic response and provide executive decisions and strategic direction relating to a critical incident. An incident response team, with appropriate expertise and training, will also be activated for each critical incident (e.g. Emergency Response Team (ERT) in the case of an emergency). (14) The CIMT comprises: (15) The CIMT may also comprise additional expert stakeholders as required depending on the nature of the incident. (16) The ERT comprises: (17) The ERT may also comprise additional expert stakeholders as required depending on the nature of the emergency, including: (18) The University will complete annual training and testing of the University's CIMT and associated systems or capabilities. (19) The Vice-Chancellor is the University’s Critical Incident Lead and is responsible for leading the CIMT and overseeing the implementation of the MQ Group Critical Incident Management Plan. (20) The Chief Risk Officer is the University’s CIMT Coordinator and is responsible for: (21) Responsibilities for managing specific incidents are specified in the University or relevant controlled entity’s Delegations of Authority Register, the MQ Group Emergency Management framework and its constituent plans, and the policies specified in clause 9. (22) Any incident at the University, or affecting its operations, staff, students or other members of the University community, has the potential to start as or escalate into a Level 3 (critical) incident. Incident types include, but are not limited to: (23) Incidents are reported through a variety of mechanisms depending on the nature of the incident. Mechanisms include: (24) A preliminary classification of all reported incidents as Level 1, 2 or 3 is made by the incident report receiver according to the risk-based classifications specified in clause 12. (25) The incident report receiver will urgently direct incidents with a preliminary Level 2 or 3 classification to the relevant incident response team. (26) The incident response team will: (27) The CIMT Coordinator and Leader will evaluate the reported incident and, where the incident is determined to be a Level 3 critical incident, will activate the CIMT. (28) Where appropriate the CIMT Leader may consult: (29) The CIMT will: (30) The release of any personal information to external parties must comply with the University’s Privacy Policy. (31) After managing the initial response to a critical incident, the CIMT will review and refine, as necessary, any plans to manage the incident and put in place a recovery strategy. (32) When an incident disrupts a critical activity or process, the University's business continuity processes will be implemented. (33) Depending on the circumstances, the CIMT may be disestablished by the CIMT Leader and the matter referred to the relevant manager to enable effective continuation of services and planning for restoration to full recovery and return to business as usual. (34) The CIMT Coordinator will ensure that all actions, decisions, and accountabilities relating to a critical incident are managed in accordance with the University’s Records and Information Management Policy on behalf of the CIMT. (35) The CIMT Coordinator or their nominee will maintain up-to-date confidential incident records that will be available to members of the CIMT and other persons authorised by the CIMT Coordinator or CIMT Leader on a need-to-know basis. (36) The CIMT will consider the need to establish an Incident Investigation Team in a timely manner to investigate the incident, identify its cause and contributing factors, and develop recommendations to prevent a recurrence. The composition and size of the team will depend on the nature and complexity of the critical incident. (37) The Incident Investigation Team will develop a report, in consultation with the CIMT, that includes: (38) As soon as practicable after a critical incident, the CIMT will review and evaluate the effectiveness of the treatment and management of the critical incident. The review will be informed by the Incident Investigation Team report that includes recommendations for managing similar future critical incidents and training needs. (39) The CIMT Coordinator will report all critical incidents to the GEPC, including recommended corrective actions and lessons learnt. (40) The CIMT will also review the University’s critical incident processes at least annually and propose revisions as appropriate for implementation through the GEPC. (41) Responses to critical incidents will be overseen and monitored by the University Council through the Vice-Chancellor. (42) Nil. (43) The following definitions apply for the purpose of this Policy:Critical Incident Management Policy
Emergency Assistance
For immediate help on the North Ryde Campus - (02) 9850 9999
For immediate help at other locations - 000
For after-hours support and assistance for students - 1800 CARE MQ (1800 2273 67)
For students overseas on exchange or placement - International SOS +61 2 9372 2468Section 1 - Purpose
Scope
Top of Page
Section 2 - Policy
Responsibilities
Section 3 - Procedures
Reporting and classifying incidents
Responding to critical incidents
Recovering from a critical incident
Records of critical incidents
Learning and adapting from a critical incident
Section 4 - Guidelines
Section 5 - Definitions
View Document
This is not a current document. To view the current version, click the link in the document's navigation bar.
Incident type
Policies, procedures, plans
a.
Health and safety
Standard procedures established within University faculties and portfolios to manage specialised health and safety incidents (including laboratory, chemical, biological, nanotechnology, gas, electrical, laser, ionising radiation, workshop) (see WHS Hub)
b.
Student wellbeing
c.
Staff wellbeing
d.
Physical security
e.
Cyber security
f.
Approved University travel
g.
Privacy
h.
Fraud and corruption