content-left-bg.png
content-right-bg.png

Search results

MainZone

 

 

Information security procedure130315/01/2026 5:02:28 AM15/01/2026 5:02:28 AMVersion number 1.5 | Version effective 15 January 2026 Abide by the department’s Use of information security classification framework (QGISCF) by applying the appropriate STS_ListItem_850https://ppr.qed.qld.gov.auhtmlFalseaspxhttps://ppr.qed.qld.gov.au/policiesandprocedures{DCCED526-0D6E-492A-B287-511646658A80}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js846;16846
Identity (ID) and access management guideline646415/01/2026 3:50:00 AM15/01/2026 3:50:00 AMQueensland Government Information Security Classification Framework (QGISCF The QGISCF sets the minimum requirements, processes and direction for information asset STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspxhttps://ppr.qed.qld.gov.audocxFalsedocxhttps://ppr.qed.qld.gov.au{E86AFCBE-E609-48FC-82DA-7B562F3CA241}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js852;1852
Information security guideline634915/01/2026 4:05:00 AM15/01/2026 4:05:00 AMMinor changes to business units and broken links Restructure of headings and format for ease of use Changed wordings to reflect new ICT Procedure that replaced the Maintaining the STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspxTable of contents;Introduction;Policy, planning and governance;Aim;Rationale;Roles and responsibilities;Controls;Resources;Further advice;Asset management;Aim;Rationale;Roles and responsibilities;All employees;Controls;Employees must apply an information security classification to information or information assets they create in accordance with the Information asset and recordkeeping procedure.;Employees must determine appropriate means of information handling, storage, transfer and disposal commensurate with the information security classification. ;Information asset custodians must ensure an appropriate level of security is employed for information assets they have carriage of.;Employees must report security incidents where information security has been – or is likely to be – breached.;Employees must report all suspicious emails and inappropriate online behaviour immediately to their supervisor, manager, principal or above.16EF56C1;6D115BF0;0554DBF9;238784EC;10A303FA;6C127241;5DD52538;5D51C011;017CEA5B;77B9C58A;2CDC45DB;12A281A1;4AA16F6B;2E3C2B39;1AE29AA0;0252BF99;3B8D1165;2DE12E1B;32B28731;05F94449https://ppr.qed.qld.gov.audocxFalsedocxhttps://ppr.qed.qld.gov.au{0992DD5D-DB67-486A-BA53-DFC6DB5479AF}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js852;1852

~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js
~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js
~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js