(1) This Procedure outlines information security classification requirements for information at The University of Queensland (UQ) and should be read in conjunction with the Information Management Policy and Information Governance and Management Framework. This Procedure applies to: (2) This Procedure aims to: (3) Information Stewards must set or endorse an overall information security classification for each information entity they are assigned to. (4) The UQ community must classify information at the time of creation or capture, according to section 3 of this Procedure and direction from the relevant Information Steward. (5) UQ information must be managed appropriately in accordance with its information security classification, in compliance with the Data Handling Procedure. (6) For Microsoft 365 documents and emails, staff must ensure the correct sensitivity label is applied in accordance with the relevant information security classification. If not updated, the ‘OFFICIAL’ label will be applied by default. Read more about sensitivity labels. (7) The UQ community is responsible for applying information security classifications to UQ information they create or capture. (8) Information security classifications are based on confidentiality and ensures the information is only accessible to authorised individuals. Individuals must consider the risks associated with unauthorised or inappropriate disclosure of the information. (9) All information at the University must be assigned one of the classifications in the table below. If a collection of information contains elements with different security classifications, the collection should be classified and handled based on the highest (most confidential) classification level of information within the collection. (10) For more examples and guidance regarding information security classification, visit the data at UQ webpage. (11) Additional or alternate security classifications and controls may apply to information as part of the terms of a contract or agreement (e.g. data sharing agreement). (12) Staff (including contractors) and HDR candidates must adhere to the research data management classifications and controls that are specified in the relevant contractual agreements or ethics approvals. (13) They must also define additional or alternate classifications and associated controls in a research data management plan (to be stored in UQRDM) for the following types of information: (14) See the Research Data Management Policy for more information. (15) Information security classifications must be periodically reviewed in line with clause 22 (Manage and Maintain) of the Data Handling Procedure. Information must also be reclassified if its confidentiality changes, or if the information was incorrectly classified. Reclassified information must be managed in accordance with its new classification in compliance with the Data Handling Procedure. (16) The roles below are a summary of key information governance and management roles and responsibilities. Refer to the Information Governance and Management Framework for a comprehensive list. (17) The Vice-Chancellor is accountable for ensuring the collection and management of UQ’s information and records in accordance with relevant legislative, regulatory and policy obligations. (18) The CIO is accountable for developing, maintaining and implementing information management capabilities, policies, procedures and technical standards to protect UQ’s information. (19) Members of the UQ community are responsible for: (20) Information Stewards are responsible for the following (for the information entity/entities they are assigned to): (21) The Senior Manager, Data Strategy and Management is responsible for: (22) The Data Strategy and Governance Team supports the Manager, Data Strategy and Governance to maintain and implement this Procedure. The team is also responsible for: (23) The Data Strategy and Governance team will: (24) Staff must review the information security classification for of documents, data sets and collaboration spaces in compliance with clause 22 (Manage and Maintain) of the Data Handling Procedure. (25) The Data Strategy and Governance team maintains UQ’s information entity catalogue which records: (26) For research projects, information management roles and responsibilities should be captured as a research data management record in UQ RDM. Research data management plans should also be stored in UQ RDM where possible. (28) Information Governance and Management Framework (31) Privacy Management Policy (32) Research Data Management Policy. (33) Queensland Government - Information Security Policy (IS18:2018) (34) Queensland Government Information Security Classification Framework (35) Queensland State Archives - Records Governance Policy (36) Queensland State Archives - University Sector Retention and Disposal Schedule (37) Queensland State Archives - General Retention and Disposal Schedule (GRDS).Information Security Classification Procedure
Section 1 - Purpose and Scope
Top of PageSection 2 - Process and Key Controls
Section 3 - Key Requirements
Information Security Classifications
Additional or Alternate classifications
Research projects
Information Reclassification
Section 4 - Roles, Responsibilities and Accountabilities
Vice-Chancellor
Chief Information Officer (CIO)
UQ community
Information Stewards
Senior Manager, Data Strategy and Management
Data Strategy and Governance Team
Top of PageSection 5 - Monitoring, Review and Assurance
Section 6 - Recording and Reporting
Section 7 - Appendix
Definitions
Term
Definition
Data
refer to the Information Management Policy.
Information
refer to the Information Management Policy.
Personal information
Information entity
Information domain
UQ community
Data breach
where data is lost, or accessed or disclosed without authorisation, either accidentally or due to malicious activity.
Harm
refer to the Enterprise Risk Management Framework’s risk matrix for examples of consequences and their rating (from insignificant to critical), noting that this does not typically cover consequences for individuals or other impacted organisations. Serious harm typically involves consequences rated as major and critical. The Office of the Australian Information Commissioner also provides guidance regarding serious harm in relation to personal data breaches.
Related Policies and Procedures
Supporting Material
View current
This is the current version of the approved document. You can provide feedback on this document to the Enquiries Contact - refer to the Status and Details tab from the menu bar above.
Information security classification
Description
Examples
UNOFFICIAL
Information that is not related to UQ study or work.
• Personal holiday itinerary
• Email for personal dinner reservation
PUBLIC
Information that if lost, or accessed or disclosed without authorisation, either accidentally or due to malicious activity (data breach), would have an insignificant impact.
The information is authorised for public access – however it may not be made available to the public.
• University strategy
• Published course outline
• Academic calendar
• Published research data
• UQ staff contact information (name, UQ email, UQ phone)
OFFICIAL
(Default for all information)
Information that if subject to a data breach, would be unlikely to cause harm to UQ, another organisation or an individual if released publicly.
The information has a restricted audience, and access must only be authorised based on academic, research or business need (e.g. specific teams).
• UQ student contact information (name, UQ email, UQ phone)
• Organisational unit processes and procedures
• Team leave calendar
SENSITIVE
(Default for research projects)
Information that if subject to a data breach, could reasonably be expected to cause harm to UQ, another organisation or an individual if released publicly.
The information has a restricted audience, and access must only be authorised based on strict academic, research or business need (e.g. specific individuals or groups).
• Student and staff personal information (e.g. Tax File Numbers, passport details, address, bank account details)
• Organisational financial data
• Exam material
• Exam results
• Unpublished research data
PROTECTED
Information that if subject to a data breach, could reasonably be expected to cause serious harm to UQ, another organisation or an individual if released publicly.
The information has a restricted audience, and access must only be authorised based on very strict academic, research or business need (e.g. only the individuals required).
• Medical data
• Personal data regarding persons under the age of 18
• Credit card data
• Commercially significant research results
• National security information
refer to the Privacy Management Policy.
refer to the Information Management Policy.
refer to the Information Management Policy.
refer to the Information Management Policy.