| Information security procedure | 7006 | | | 2/07/2025 11:27:03 PM | 2/07/2025 11:27:03 PM | Version number
1.4 | Version effective 18 March 2025 Abide by the department’s Use of ICT information security classification framework (QGISCF) by applying the appropriate | STS_ListItem_850 | | | | | | | | | | | 0 | https://ppr.qed.qld.gov.au | html | False | | aspx | | https://ppr.qed.qld.gov.au/policiesandprocedures | {DCCED526-0D6E-492A-B287-511646658A80} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Default.js | 846;16 | 846 |
| Identity (ID) and access management guideline | 14177 | | | 2/02/2021 3:27:00 AM | 2/02/2021 3:27:00 AM | Queensland Government Information Security Classification Framework (QGISCF The QGISCF sets the minimum requirements, processes and direction for information asset | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | 1009 | 50 | | | | | | 0 | https://ppr.qed.qld.gov.au | docx | False | | docx | | https://ppr.qed.qld.gov.au | {E86AFCBE-E609-48FC-82DA-7B562F3CA241} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js | 852;1 | 852 |
| Information security guideline | 14188 | | | 14/04/2025 5:07:00 AM | 14/04/2025 5:07:00 AM | Restructure of headings and format for ease of use Changed wordings to reflect new ICT Procedure that replaced the Maintaining the Security of Department Information and Systems | STS_ListItem_DocumentLibrary | | | https://ppr.qed.qld.gov.au/attachment/Forms/AllItems.aspx | 3949 | 203 | Table of contents;Introduction;Policy, planning and governance;Aim;Rationale;Roles and responsibilities;Controls;Resources;Further advice;Asset management;Aim;Rationale;Roles and responsibilities;All employees;Controls;Employees must apply an information security classification to information or information assets they create in accordance with the Information asset and recordkeeping procedure.;Employees must determine appropriate means of information handling, storage, transfer and disposal commensurate with the information security classification. ;Information asset custodians must ensure an appropriate level of security is employed for information assets they have carriage of.;Employees must report security incidents where information security has been – or is likely to be – breached.;Employees must report all suspicious emails and inappropriate online behaviour immediately to their supervisor, manager, principal or above. | 16EF56C1;6D115BF0;0554DBF9;238784EC;10A303FA;6C127241;5DD52538;5D51C011;017CEA5B;77B9C58A;2CDC45DB;12A281A1;4AA16F6B;2E3C2B39;1AE29AA0;0252BF99;3B8D1165;2DE12E1B;32B28731;05F94449 | | | | 0 | https://ppr.qed.qld.gov.au | docx | False | | docx | | https://ppr.qed.qld.gov.au | {0992DD5D-DB67-486A-BA53-DFC6DB5479AF} | | | ~sitecollection/_catalogs/masterpage/Z1/Skins/CUESearch/DisplayTemplates/Item_Word.js | 852;1 | 852 |