Information Security Policy
Information that is fit for purpose, secure, available, and accessible, and complies with applicable laws and regulations, enables staff to make everyday decisions and assists the department to realise its strategic objectives.
December 2020 - Policy maintenance, which may include but not limited to, updated contact details, business unit or position titles, typographical, text and style changes and repairing hyperlinks. Implementation document titled - Information Security Policy Guideline rescinded.Superseded Documents
This policy replaces the rescinded Information Security Policy PD/2013/0453.Document History
September 2020 – Minor policy update. Change in responsibility and delegation in line with the creation of the Chief Information Security Officer.
April 2020 - minor updates to text and contact details.
- Policy statement
- The department is committed to ensuring an appropriate level of security is applied to protect the confidentiality, integrity and availability of its information, and the safety of the people about whom that information relates.
- All departmental information assets, in electronic, paper, audio or video form, whether located in schools, corporate units or other locations, will be secured according to the information’s level of sensitivity, criticality and risk.
These assets may include:
- data, as described in the Enterprise Data Policy
- information held and maintained by the department for, or on behalf of, other government agencies or private entities
- information held and maintained for the department by external parties
- information and communications technology (ICT) infrastructure owned or leased by the department and any ICT connecting to, or residing on, the department’s ICT infrastructure.
- The department protects its information assets by:
- Identifying information assets that are critical and/or sensitive and classifying them in accordance with the security classification framework, as directed by the Enterprise Data Policy.
- Performing risk assessments in accordance with the Enterprise Risk Management Policy.
- Applying appropriate information security controls to reduce risks to an acceptable level. Controls will be described in various information security standards, procedures and guidelines.
- Continually improving the Information Security Management System (ISMS) including information security processes, techniques and controls.
- The department’s information assets must be protected in the design, development and implementation of its processes and business operations.
This requirement applies to locations where departmental information is stored temporarily or permanently. This includes but is not restricted to the department’s schools and other departmental worksites; and non-departmental sites and private residences (only in relation to any departmental information assets at those locations).
- Audience and applicability
- This policy applies to all departmental staff (fulltime, casual, temporary or contractors) and parties that access or use the department’s information assets.
- Information that is fit for purpose, secure, available, and accessible, and complies with applicable laws and regulations, enables staff to make everyday decisions and assists the department to realise its strategic objectives.
- The implementation of an Information Security Policy and an Information Security Management System (ISMS), along with effective governance, enables the department to identify, manage and achieve its information security objectives.
- This Policy supports the Department of Customer Service directive that all agencies appropriately protect information by establishing an Information Security Management System (ISMS). The ISMS meets the following Standards for Information Security:
- ISO/IEC 27001 ISMS Requirements.
- ISO/IEC 27002 ISMS Code of Practice.
An ISMS is a framework and methodology used to manage information security risks.
This policy is guided by the following relevant legislation, memoranda, circulars and departmental policies:
- NSW State Records Act 1998
- NSW Privacy and Personal Information Protection Act 1998
- NSW Health Records and Information Privacy Act 2002
- NSW Workplace Surveillance Act 2005
- NSW Cyber Security Policy
- NSW Government Information Classification, Labelling and Handling Guidelines 2015
- DoE Code of Conduct Policy
- DoE Enterprise Data Policy
- DoE Enterprise Risk Management in the Department of Education Policy
- DoE Business Continuity Management Policy
- DoE Privacy Management Plan
- DoE Privacy Code of Practice
- DoE Communication Devices and Associated Services Policy.
- Responsibilities and delegations
The Secretary is responsible for establishing auditable governance and management accountabilities for the Information Security Management System and related activities; and for establishing appropriate monitoring and auditing measures to ensure these accountabilities are discharged effectively.
- Chief Information Officer
The department's Chief Information Officer (CIO) is responsible for the management and maintenance of the infrastructure on which the department's enterprise data and metadata resides. The CIO also ensures that the department’s data is managed securely in line with the department’s Information Security Policy.
Chief Information Security Officer
The Chief Information Security Officer (CISO) is responsible for defining and implementing an information security plan for the protection of the department’s information and systems. The CISO is also responsible for the management and maintenance of the Information Security Management System.
All managers, including school principals, are responsible for ensuring that this policy and associated standards and procedures are effectively communicated and implemented throughout all areas of their control.
All staff are responsible for:
- familiarisation with the Information Security Policy and the relevant standards and procedures
- exercising duty of care to protect information assets
- reporting suspected breaches, in accordance with incident management procedures.
- Monitoring and review
- The Chief Information Security Officer monitors the implementation of this policy and reviews its contents for relevance and accuracy at least every two years.
- Information Security Unit
0436 863 441
- Information Security Unit