content-left-bg.png
content-right-bg.png

Search results

MainZone

 

 

ICT asset management procedure1529128/11/2024 2:02:09 AM28/11/2024 2:02:09 AMrecording and writing-off the department's ICT assets. This procedure aligns with the requirements for ICT asset management as defined in the ensure software is registered and/or STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx2621750https://ppr.qed.qld.gov.aupdfFalsepdfhttps://ppr.qed.qld.gov.au{31AF6983-5BA5-4610-ACED-647210D3D087}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_PDF.js848;15848
Use of ICT systems procedure906624/04/2025 2:17:38 AM24/04/2025 2:17:38 AMaccess to and use of the school's ICT facilities provide guidance for use of their ICT facilities and devices within the classroom STS_ListItem_8500https://ppr.qed.qld.gov.auhtmlFalseaspxhttps://ppr.qed.qld.gov.au/policiesandprocedures{192F3E4A-30E6-4F62-B11F-DF6644B03652}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js846;16846
Information security procedure873517/04/2025 3:22:47 AM17/04/2025 3:22:47 AMAbide by the department’s Use of ICT facilities and devices guideline and the Code of Conduct for the Queensland Public Service when using ICT systems and devices STS_ListItem_8500https://ppr.qed.qld.gov.auhtmlFalseaspxhttps://ppr.qed.qld.gov.au/policiesandprocedures{DCCED526-0D6E-492A-B287-511646658A80}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js846;16846
Advice for state schools on acceptable use of ICT facilities and devices1513423/04/2025 4:22:00 AM23/04/2025 4:22:00 AMSchool-specific ICT responsible use procedure – a template to assist schools in creating an ICT responsible use procedure ICT and the curriculum STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx10548454ICT and the curriculum;Personal mobile device access;Student access to the department's ICT services, facilities and devices;School-specific ICT responsible use procedure;Community access to state school ICT facilities and devices7C8BEC48;1A667C06;2DAA9F7B;7386A06C;394355D00https://ppr.qed.qld.gov.audocxFalsedocxhttps://ppr.qed.qld.gov.au{EF75AD46-A518-4915-96A8-4461DA63A187}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js852;1852
Community user guideline for hiring school facilities1498122/08/2024 6:04:39 AM22/08/2024 6:04:39 AMfor state schools on acceptable use of ICT facilities devices, which supports the Use of ICT systems procedure, access to a school’s ICT infrastructure should be supervised and not STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx3456870https://ppr.qed.qld.gov.aupdfFalsepdfhttps://ppr.qed.qld.gov.au{1446DDAF-43D8-459E-8EB5-814C5711CDBC}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_PDF.js848;15848
Fact Sheet 1 - Conducting a security risk assessment1500726/09/2024 6:24:41 AM26/09/2024 6:24:41 AMmajor events; • in response to critical incidents; • in response to changes in the school security risks, principals should consider the impact of a security incident on STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx37101050https://ppr.qed.qld.gov.aupdfFalsepdfhttps://ppr.qed.qld.gov.au{069B6478-6721-4906-AB63-5CE662D2ABF5}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_PDF.js848;15848
Continuity, disaster and emergency management policy871425/10/2024 1:33:30 AM25/10/2024 1:33:30 AMCommission Chief Executive Directive: Critical Incident Response and Recovery 10/14, which to determine its contribution to critical incident reserve pools based on the department's STS_ListItem_8500https://ppr.qed.qld.gov.auhtmlFalseaspxhttps://ppr.qed.qld.gov.au/policiesandprocedures{A9F905BF-50A3-423D-91F7-6EF90F2720A6}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js846;16846
Business continuity management procedure1522724/01/2022 1:52:49 AM24/01/2022 1:52:49 AMPage 1 of 13 Uncontrolled copy. Refer to the Department of Education Policy and Procedure Register at https://ppr.qed.qld.gov.au/pp/business-continuity-management-procedure to STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx4875910https://ppr.qed.qld.gov.aupdfFalsepdfhttps://ppr.qed.qld.gov.au{FBBF7D8E-8419-4F6F-B9C1-F8EDEC66AAFE}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_PDF.js848;15848
New and updated policies and procedures907516/05/2025 4:48:19 AM16/05/2025 4:48:19 AMThe following table outlines policies and procedures that have been developed, updated or decommissioned in the last six months Administrative updates such as hyperlink changes are STS_ListItem_850400https://ppr.qed.qld.gov.auhtmlFalseaspxhttps://ppr.qed.qld.gov.au/pprupdates{4B35CE2E-1C28-471B-B845-C7B38F7EA174}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js846;16846
Information security guideline1529714/04/2025 5:07:00 AM14/04/2025 5:07:00 AMICT Sustainability, ITB 8. Incident reporting 16 department is required to implement to ensure secure information and ICT business systems STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx243692Table of contents;Introduction;Policy, planning and governance;Aim;Rationale;Roles and responsibilities;Controls;Resources;Further advice;Asset management;Aim;Rationale;Roles and responsibilities;All employees;Controls;Employees must apply an information security classification to information or information assets they create in accordance with the Information asset and recordkeeping procedure.;Employees must determine appropriate means of information handling, storage, transfer and disposal commensurate with the information security classification. ;Information asset custodians must ensure an appropriate level of security is employed for information assets they have carriage of.;Employees must report security incidents where information security has been – or is likely to be – breached.;Employees must report all suspicious emails and inappropriate online behaviour immediately to their supervisor, manager, principal or above.16EF56C1;6D115BF0;0554DBF9;238784EC;10A303FA;6C127241;5DD52538;5D51C011;017CEA5B;77B9C58A;2CDC45DB;12A281A1;4AA16F6B;2E3C2B39;1AE29AA0;0252BF99;3B8D1165;2DE12E1B;32B28731;05F944490https://ppr.qed.qld.gov.audocxFalsedocxhttps://ppr.qed.qld.gov.au{0992DD5D-DB67-486A-BA53-DFC6DB5479AF}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js852;1852

~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js
~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js
~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js