Fact Sheet 1 - Conducting a security risk assessment | 15007 | | | 26/09/2024 6:24:41 AM | 26/09/2024 6:24:41 AM | Refer to https://ppr.qed.qld.gov.au/pp/school-security-procedure to ensure you have the most current version of this document The Department of Education (the department) is | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | 2398 | 94 | | | | | | 0 | https://ppr.qed.qld.gov.au | pdf | False | | pdf | | https://ppr.qed.qld.gov.au | {069B6478-6721-4906-AB63-5CE662D2ABF5} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_PDF.js | 848;15 | 848 |
Information security procedure | 8735 | | | 25/11/2024 2:29:46 AM | 25/11/2024 2:29:46 AM | Version number
1.3 | Version effective 25 November 2024 This procedure provides all ICT users with their obligations to protect the department’s information and data | STS_ListItem_850 | | | | | | | | | | | 0 | https://ppr.qed.qld.gov.au | html | False | | aspx | | https://ppr.qed.qld.gov.au/policiesandprocedures | {DCCED526-0D6E-492A-B287-511646658A80} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js | 846;16 | 846 |
Advice for state schools on acceptable use of ICT facilities and devices | 15134 | | | 3/10/2024 1:52:00 AM | 3/10/2024 1:52:00 AM | learn to use ICT with confidence, care and consideration, understanding its possibilities or have implemented the Bring Your Own 'x' (BYOx) (DoE employees only) process also need | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | 7181 | 257 | ICT and the curriculum;Personal mobile device access;Student access to the department's ICT services, facilities and devices;School-specific ICT responsible use procedure;Community access to state school ICT facilities and devices | 7C8BEC48;1A667C06;2DAA9F7B;7386A06C;394355D0 | | | | 0 | https://ppr.qed.qld.gov.au | docx | False | | docx | | https://ppr.qed.qld.gov.au | {EF75AD46-A518-4915-96A8-4461DA63A187} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js | 852;1 | 852 |
Information security guideline | 15297 | | | 3/10/2024 1:53:00 AM | 3/10/2024 1:53:00 AM | Restructure of headings and format for ease of use Changed wordings to reflect new ICT Procedure that replaced the Maintaining the Security of Department Information and Systems | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | 1272 | 51 | Table of contents;Introduction;Policy, planning and governance;Aim;Rationale;Roles and responsibilities;Controls;Resources;Further advice;Asset management;Aim;Rationale;Roles and responsibilities;All employees;Controls;Employees must apply an information security classification to information or information assets they create in accordance with the Information asset and recordkeeping procedure.;Employees must determine appropriate means of information handling, storage, transfer and disposal commensurate with the information security classification. ;Information asset custodians must ensure an appropriate level of security is employed for information assets they have carriage of.;Employees must report security incidents where information security has been – or is likely to be – breached.;Employees must report all suspicious emails and inappropriate online behaviour immediately to their supervisor, manager, principal or above. | 16EF56C1;6D115BF0;0554DBF9;238784EC;10A303FA;6C127241;5DD52538;5D51C011;017CEA5B;77B9C58A;2CDC45DB;12A281A1;4AA16F6B;2E3C2B39;1AE29AA0;0252BF99;3B8D1165;2DE12E1B;32B28731;05F94449 | | | | 0 | https://ppr.qed.qld.gov.au | docx | False | | docx | | https://ppr.qed.qld.gov.au | {0992DD5D-DB67-486A-BA53-DFC6DB5479AF} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js | 852;1 | 852 |