content-left-bg.png
content-right-bg.png

Search results

MainZone

 

 

Fact Sheet 1 - Conducting a security risk assessment1500726/09/2024 6:24:41 AM26/09/2024 6:24:41 AMRefer to https://ppr.qed.qld.gov.au/pp/school-security-procedure to ensure you have the most current version of this document The Department of Education (the department) is STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx2398940https://ppr.qed.qld.gov.aupdfFalsepdfhttps://ppr.qed.qld.gov.au{069B6478-6721-4906-AB63-5CE662D2ABF5}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_PDF.js848;15848
Information security procedure873525/11/2024 2:29:46 AM25/11/2024 2:29:46 AMVersion number 1.3 | Version effective 25 November 2024 This procedure provides all ICT users with their obligations to protect the department’s information and data STS_ListItem_8500https://ppr.qed.qld.gov.auhtmlFalseaspxhttps://ppr.qed.qld.gov.au/policiesandprocedures{DCCED526-0D6E-492A-B287-511646658A80}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js846;16846
Advice for state schools on acceptable use of ICT facilities and devices151343/10/2024 1:52:00 AM3/10/2024 1:52:00 AMlearn to use ICT with confidence, care and consideration, understanding its possibilities or have implemented the Bring Your Own 'x' (BYOx) (DoE employees only) process also need STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx7181257ICT and the curriculum;Personal mobile device access;Student access to the department's ICT services, facilities and devices;School-specific ICT responsible use procedure;Community access to state school ICT facilities and devices7C8BEC48;1A667C06;2DAA9F7B;7386A06C;394355D00https://ppr.qed.qld.gov.audocxFalsedocxhttps://ppr.qed.qld.gov.au{EF75AD46-A518-4915-96A8-4461DA63A187}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js852;1852
Information security guideline152973/10/2024 1:53:00 AM3/10/2024 1:53:00 AMRestructure of headings and format for ease of use Changed wordings to reflect new ICT Procedure that replaced the Maintaining the Security of Department Information and Systems STS_ListItem_DocumentLibraryhttps://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx127251Table of contents;Introduction;Policy, planning and governance;Aim;Rationale;Roles and responsibilities;Controls;Resources;Further advice;Asset management;Aim;Rationale;Roles and responsibilities;All employees;Controls;Employees must apply an information security classification to information or information assets they create in accordance with the Information asset and recordkeeping procedure.;Employees must determine appropriate means of information handling, storage, transfer and disposal commensurate with the information security classification. ;Information asset custodians must ensure an appropriate level of security is employed for information assets they have carriage of.;Employees must report security incidents where information security has been – or is likely to be – breached.;Employees must report all suspicious emails and inappropriate online behaviour immediately to their supervisor, manager, principal or above.16EF56C1;6D115BF0;0554DBF9;238784EC;10A303FA;6C127241;5DD52538;5D51C011;017CEA5B;77B9C58A;2CDC45DB;12A281A1;4AA16F6B;2E3C2B39;1AE29AA0;0252BF99;3B8D1165;2DE12E1B;32B28731;05F944490https://ppr.qed.qld.gov.audocxFalsedocxhttps://ppr.qed.qld.gov.au{0992DD5D-DB67-486A-BA53-DFC6DB5479AF}~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js852;1852

~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js
~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js
~sitecollection/_catalogs/masterpage/Display Templates/Search/Item_Default.js