content-left-bg.png
content-right-bg.png

Search results

MainZone

 

 

Information security procedure1234515/01/2024 4:02:40 AM15/01/2024 4:02:40 AMPage 1 of 8 Uncontrolled copy. Refer to the Department of Education Policy and Procedure Register information security classification framework (QGISCF) by applying the appropriate STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx7092670https://ppr.qed.qld.gov.aupdfFalsepdfhttps://ppr.qed.qld.gov.au{E14B53A8-EC59-415B-95C1-62C6A3456471}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_PDF.js848;15848
Identity (ID) and access management guideline122742/02/2021 3:27:00 AM2/02/2021 3:27:00 AMQueensland Government Information Security Classification Framework (QGISCF The QGISCF sets the minimum requirements, processes and direction for information asset STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx9130https://ppr.qed.qld.gov.audocxFalsedocxhttps://ppr.qed.qld.gov.au{E86AFCBE-E609-48FC-82DA-7B562F3CA241}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js852;1852
Information security guideline1234315/01/2024 2:36:00 AM15/01/2024 2:36:00 AMRestructure of headings and format for ease of use Changed wordings to reflect new ICT Procedure that replaced the Maintaining the Security of Department Information and Systems STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx41516Table of contents;Introduction;Policy, planning and governance;Aim;Rationale;Roles and responsibilities;Controls;Resources;Further advice;Asset management;Aim;Rationale;Roles and responsibilities;All employees;Controls;Employees must apply an information security classification to information or information assets they create in accordance with the Information asset and recordkeeping procedure.;Employees must determine appropriate means of information handling, storage, transfer and disposal commensurate with the information security classification. ;Information asset custodians must ensure an appropriate level of security is employed for information assets they have carriage of.;Employees must report security incidents where information security has been – or is likely to be – breached.;Employees must report all suspicious emails and inappropriate online behaviour immediately to their supervisor, manager, principal or above.16EF56C1;6D115BF0;0554DBF9;238784EC;10A303FA;6C127241;5DD52538;5D51C011;017CEA5B;77B9C58A;2CDC45DB;12A281A1;4AA16F6B;2E3C2B39;1AE29AA0;0252BF99;3B8D1165;2DE12E1B;32B28731;05F944490https://ppr.qed.qld.gov.audocxFalsedocxhttps://ppr.qed.qld.gov.au{0992DD5D-DB67-486A-BA53-DFC6DB5479AF}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js852;1852

~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js
~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js
~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js