| Information security procedure | 1303 | | | 15/01/2026 5:02:28 AM | 15/01/2026 5:02:28 AM | and continually reviews appropriate security controls with guidance on ICT security compliance with Queensland Government’s Information and cyber security policy (IS18 | STS_ListItem_850 | | | | | | | | | | | | https://ppr.qed.qld.gov.au | html | False | | aspx | | https://ppr.qed.qld.gov.au/policiesandprocedures | {DCCED526-0D6E-492A-B287-511646658A80} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js | 846;16 | 846 |
| Information security guideline | 6349 | | | 15/01/2026 4:05:00 AM | 15/01/2026 4:05:00 AM | are guided by Queensland Government's Information and cyber security policy (IS18) and are articulated through the department's Information security procedure and this document | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | | | Table of contents;Introduction;Policy, planning and governance;Aim;Rationale;Roles and responsibilities;Controls;Resources;Further advice;Asset management;Aim;Rationale;Roles and responsibilities;All employees;Controls;Employees must apply an information security classification to information or information assets they create in accordance with the Information asset and recordkeeping procedure.;Employees must determine appropriate means of information handling, storage, transfer and disposal commensurate with the information security classification. ;Information asset custodians must ensure an appropriate level of security is employed for information assets they have carriage of.;Employees must report security incidents where information security has been – or is likely to be – breached.;Employees must report all suspicious emails and inappropriate online behaviour immediately to their supervisor, manager, principal or above. | 16EF56C1;6D115BF0;0554DBF9;238784EC;10A303FA;6C127241;5DD52538;5D51C011;017CEA5B;77B9C58A;2CDC45DB;12A281A1;4AA16F6B;2E3C2B39;1AE29AA0;0252BF99;3B8D1165;2DE12E1B;32B28731;05F94449 | | | | | https://ppr.qed.qld.gov.au | docx | False | | docx | | https://ppr.qed.qld.gov.au | {0992DD5D-DB67-486A-BA53-DFC6DB5479AF} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js | 852;1 | 852 |
| Information management, privacy and security policy | 1301 | | | 2/04/2026 5:05:14 AM | 2/04/2026 5:05:14 AM | to the implementation of information and cyber security helps the department to maintain to key aspects of the QGEA as they relate to information management, privacy and security | STS_ListItem_850 | | | | | | | | | | | | https://ppr.qed.qld.gov.au | html | False | | aspx | | https://ppr.qed.qld.gov.au/policiesandprocedures | {B5127CA7-82D5-495B-B3A6-CC5A5BEB827C} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js | 846;16 | 846 |
| Conducting surveys procedure | 917 | | | 26/03/2025 5:33:59 AM | 26/03/2025 5:33:59 AM | of data occurs in accordance with information security, privacy and right to information no cost' for the service) requires cyber security and information privacy assessment via the | STS_ListItem_850 | | | | | | | | | | | | https://ppr.qed.qld.gov.au | html | False | | aspx | | https://ppr.qed.qld.gov.au/policiesandprocedures | {7D45E879-472E-499C-BD64-A4E12E96FE60} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js | 846;16 | 846 |
| Information asset and recordkeeping procedure | 1300 | | | 24/02/2026 4:56:55 AM | 24/02/2026 4:56:55 AM | information in accordance with Information and cyber security policy (IS18), to make full and accurate | STS_ListItem_850 | | | | | | | | | | | | https://ppr.qed.qld.gov.au | html | False | | aspx | | https://ppr.qed.qld.gov.au/policiesandprocedures | {1EB01801-732D-4679-A687-69F01E9A50A7} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js | 846;16 | 846 |
| Use of ICT systems procedure | 873 | | | 24/02/2026 4:56:58 AM | 24/02/2026 4:56:58 AM | safeguard privacy, confidentiality and security obligations including protecting the ICT email ‘spam’ is reported to Cyber Security (operational.security@qed.qld.gov.au | STS_ListItem_850 | | | | | | | | | | | | https://ppr.qed.qld.gov.au | html | False | | aspx | | https://ppr.qed.qld.gov.au/policiesandprocedures | {192F3E4A-30E6-4F62-B11F-DF6644B03652} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js | 846;16 | 846 |
| Identity (ID) and access management guideline | 6464 | | | 15/01/2026 3:50:00 AM | 15/01/2026 3:50:00 AM | for the department's information security classifications Information security procedure and Information security classification and handling guideline (DoE To view a copy of this | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | | | | | | | | | https://ppr.qed.qld.gov.au | docx | False | | docx | | https://ppr.qed.qld.gov.au | {E86AFCBE-E609-48FC-82DA-7B562F3CA241} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js | 852;1 | 852 |
| Use of ICT facilities and devices guideline | 6746 | | | 3/12/2025 1:23:00 AM | 3/12/2025 1:23:00 AM | introducing and using content security software to protect users and the department's ICT to the department's ICT network and a security breach has been detected or the device is | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | | | Introduction and scope;Network monitoring ;Use regarded as inappropriate;Notification process for detection of inappropriate use;Limited personal use ;Scope of limited personal use for employees;Examples of limited personal use | 17B9789D;54351BF9;6551E3B4;59BA41F8;307DAECD;1BA80D97;726C7C36 | | | | | https://ppr.qed.qld.gov.au | docx | False | | docx | | https://ppr.qed.qld.gov.au | {BC8C4E8B-B0A5-4E6A-ACAA-1F4695705A22} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js | 852;1 | 852 |
| Department of Education risk appetite statement | 7019 | | | 4/07/2025 2:59:54 AM | 4/07/2025 2:59:54 AM | safety • workplace health and safety • security of confidential and personal information (information security) • our integrity (fraud and corruption We will accept a higher level | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | | | | | | | | | https://ppr.qed.qld.gov.au | pdf | False | | pdf | | https://ppr.qed.qld.gov.au | {C0B32445-8D23-4CA9-8BD1-B6C1110B43EF} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_PDF.js | 848;15 | 848 |
| Privacy data breach and complaints procedure | 38692 | | | 24/02/2026 4:22:05 AM | 24/02/2026 4:22:05 AM | Version number
1.0 | Version effective 27 January 2026 Ethics and integrity > Complaints and allegations | Technology and information management | STS_ListItem_850 | | | | | | | | | | | | https://ppr.qed.qld.gov.au | html | False | | aspx | | https://ppr.qed.qld.gov.au/policiesandprocedures | {43E1844C-8604-4F23-98F2-DB7B62AF7785} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js | 846;16 | 846 |