Information Security

Information that is fit for purpose, secure, available, and accessible, and complies with applicable laws and regulations, enables staff to make everyday decisions and assists the department to realise its strategic objectives.

Changes since previous version

2021 Dec 07 - updated contact details in policy statement.

Document history

2020 Dec 01 - rescinded implementation document: Information Security Policy Guidelines.

2020 Sep - minor policy update. Change in responsibility and delegation in line with the creation of the Chief Information Security Officer.

2020 Apr - minor updates to text and contact details.

Superseded documents

This policy replaces the rescinded Information Security Policy PD/2013/0453.

  1. Policy statement
    1. The department is committed to ensuring an appropriate level of security is applied to protect the confidentiality, integrity and availability of its information, and the safety of the people about whom that information relates.
    2. All departmental information assets, in electronic, paper, audio or video form, whether located in schools, corporate units or other locations, will be secured according to the information’s level of sensitivity, criticality and risk.
      These assets may include:
      • data, as described in the Enterprise Data policy
      • information held and maintained by the department for, or on behalf of, other government agencies or private entities
      • information held and maintained for the department by external parties
      • information and communications technology (ICT) infrastructure owned or leased by the department and any ICT connecting to, or residing on, the department’s ICT infrastructure.
    3. The department protects its information assets by:
      • Identifying information assets that are critical and/or sensitive and classifying them in accordance with the security classification framework, as directed by the Enterprise Data policy.
      • Performing risk assessments in accordance with the Enterprise Risk Management policy.
      • Applying appropriate information security controls to reduce risks to an acceptable level. Controls will be described in various information security standards, procedures and guidelines.
      • Continually improving the Information Security Management System (ISMS) including information security processes, techniques and controls.
    4. The department’s information assets must be protected in the design, development and implementation of its processes and business operations.
      This requirement applies to locations where departmental information is stored temporarily or permanently. This includes but is not restricted to the department’s schools and other departmental worksites; and non-departmental sites and private residences (only in relation to any departmental information assets at those locations).
  2. Audience and applicability
    1. This policy applies to all departmental staff (fulltime, casual, temporary or contractors) and parties that access or use the department’s information assets.
  3. Context
    1. Information that is fit for purpose, secure, available, and accessible, and complies with applicable laws and regulations, enables staff to make everyday decisions and assists the department to realise its strategic objectives.
    2. The implementation of an Information Security Policy and an Information Security Management System (ISMS), along with effective governance, enables the department to identify, manage and achieve its information security objectives.
    3. This Policy supports the Department of Customer Service directive that all agencies appropriately protect information by establishing an Information Security Management System (ISMS). The ISMS meets the following Standards for Information Security:
      • ISO/IEC 27001 ISMS Requirements.
      • ISO/IEC 27002 ISMS Code of Practice.

      An ISMS is a framework and methodology used to manage information security risks.

    4. This policy is guided by the following relevant legislation, memoranda, circulars and departmental policies:

      • NSW State Records Act 1998
      • NSW Privacy and Personal Information Protection Act 1998
      • NSW Health Records and Information Privacy Act 2002
      • NSW Workplace Surveillance Act 2005
      • NSW Cyber Security Policy
      • NSW Government Information Classification, Labelling and Handling Guidelines 2015
      • Code of Conduct policy
      • Enterprise Data policy
      • Enterprise Risk Management policy
      • Business Continuity Management policy
      • Privacy Management Plan
      • Privacy Code of Practice
      • Communication Devices and Associated Services policy.
  4. Responsibilities and delegations
    1. Secretary

      The Secretary is responsible for establishing auditable governance and management accountabilities for the Information Security Management System and related activities; and for establishing appropriate monitoring and auditing measures to ensure these accountabilities are discharged effectively.

    2. Chief Information Officer

      The department's Chief Information Officer (CIO) is responsible for the management and maintenance of the infrastructure on which the department's enterprise data and metadata resides. The CIO also ensures that the department’s data is managed securely in line with the department’s Information Security Policy.

    3. Chief Information Security Officer
      The Chief Information Security Officer (CISO) is responsible for defining and implementing an information security plan for the protection of the department’s information and systems. The CISO is also responsible for the management and maintenance of the Information Security Management System.

    4. Management

      All managers, including school principals, are responsible for ensuring that this policy and associated standards and procedures are effectively communicated and implemented throughout all areas of their control.

    5. Staff

      All staff are responsible for:

      • familiarisation with the Information Security Policy and the relevant standards and procedures
      • exercising duty of care to protect information assets
      • reporting suspected breaches, in accordance with incident management procedures.
  5. Monitoring and review
    1. The Chief Information Security Officer monitors the implementation of this policy, regularly reviews its contents to ensure relevance and accuracy, and updates it as needed.
  6. Contact
    Information Security Unit
    1300 32 32 32 (select option 5)

Return to top of page Back to top