(1) Cyber security enables confidentiality, integrity and availability of information by providing protection against malicious and accidental threats. Cyber security threats take advantage of weaknesses in technology, people and processes to harm information. The University of Queensland (UQ or the University) manages cyber security risk to safeguard its mission and protect the interests of the people whose personal information it holds. (2) This Policy establishes UQ’s cyber security risk management and responsibilities, and is based on the principle that ‘cyber security is everyone’s business’. Management of cyber security risk requires a concerted effort across all of UQ and cannot be considered just an aspect of information technology. (3) UQ’s approach to cyber security is informed by the Queensland Government Information Security Policy (IS18:2018). (4) This Policy is broad and applies to parties at UQ that hold or process UQ information, including: (5) Consumers using UQ networks or services must comply with this Policy, irrespective of location or device ownership (e.g. consumers with personally owned computers). Exceptions to this Policy must be approved by the Chief Information Officer. (6) UQ’s ISMS supports the UQ Cyber Security Strategy, which seeks to mitigate risk and protect UQ's critical information against increasingly aggressive and sophisticated cyber threats whilst continually adapting to UQ’s rapidly evolving needs. The key components of the ISMS are: (7) The key platforms of the framework are information management, cyber security risk management and cyber security incident management, as explained below. (8) Information management is critical to robust cyber security. Underpinning the cyber security framework, UQ’s Information Management Framework facilitates identification, management and governance of information assets. It mandates the security classification of information assets which provides the basis for consistent, risk-based protection. (9) Systems storing or processing UQ information must meet the minimum technical controls outlined in the Application Security Controls Standard. Where a system is external to UQ (hosted by a third party), it is the responsibility of the Contract Manager to ensure the system meets these standards. (10) Cyber security controls seek to reduce cyber security risk by either reducing the likelihood or impact of an incident, or both. UQ will continue to identify and treat cyber security risk via the following measures: (11) A cyber security incident is an event involving an actual or potential malicious actor that threatens the confidentiality, integrity or availability of UQ information assets (electronic or paper) or otherwise contravenes the University’s Cyber Security Policy (this Policy). The source of a cyber security incident may be accidental, malicious or significant exposure to a known threat. (12) The Cyber Security Incident Response Procedure details how incidents are managed and aims to comply with applicable legal requirements, minimise harm to impacted individuals, and minimise damage and risk to UQ. (13) Incidents should be reported immediately to IT support. (14) Security testing will be performed against systems, processes and people to determine UQ’s vulnerability to cyber threats. The results of these test processes will only be used to measure and improve service quality and UQ’s protection against cyber threats. (15) Consumers are responsible for reporting potential cyber security incidents to IT support, including those of an accidental nature such as a lost laptop or device. (16) UQ staff and contractors are responsible for: (17) IT managers manage relevant cyber security risks and are accountable for compliance with relevant cyber security standards. (18) IT staff are responsible for: (19) The Security Architect is responsible for: (20) The Chief Information Officer is responsible for: (21) The ITGC will approve cyber security procedures, local operating procedures, and standards. (22) The SITC provides guidance and governance of the provision and direction of University-wide information technology and cyber security strategy, reporting to the University Senior Management Group on these areas. (23) Enterprise Risk, within the Governance and Risk Division, facilitates the effective management of risk at UQ. It is responsible for providing the Enterprise Risk Management Framework and risk appetite statements for cyber security. (24) Unless otherwise stated in a contract or agreement with UQ, Contract Managers are responsible for ensuring suppliers or partners processing UQ information are: (25) The Chief Information Officer will review this Policy at least every three years to ensure it aligns with UQ’s cyber security strategy and industry best practice. (26) Information Technology Services will assess the ongoing maturity of UQ’s cyber security practices and review this Policy in response to significant cyber security incidents and changes in UQ’s cyber security strategy and applicable legislation. (27) Information Technology Services will drive compliance with the Policy through: (28) Internal Audit will provide independent oversight, review and assurance on the effectiveness of cyber security controls to manage risk and meet compliance requirements. (29) The IT Security Architect is accountable for the maintenance of cyber security metrics for periodic reporting to stakeholders. The metrics will cover the following aspects of UQ’s cyber security management: (30) Quarterly cyber security reports will be provided to the Senate Risk and Audit Committee. (31) Under the Privacy Act 1988 (Cth), UQ must report to the Australian Information Commissioner breaches of certain private data likely to cause serious harm, unless remediation occurs before any serious harm results from the breach. In UQ’s case, this is limited to breaches involving tax file numbers and metadata collected under the Telecommunications (Interception and Access) Act 1979 (Cth). Additional notification obligations may be imposed under contracts entered into by the University. (32) Information Management Policy (33) Cyber Security Incident Response Procedure (34) Cyber Security Framework (UQ login required) (35) Cyber Security Risk Management Procedure (UQ login required)Cyber Security Policy
Section 1 - Purpose and Scope
Scope
Section 2 - Principles and Key Requirements
Information Security Management Systems (ISMS)
Cyber Security Framework
Information Management
Cyber Security Risk Management
Cyber Security Incident Management
Cyber Security Vulnerability Testing
Section 3 - Roles, Responsibilities and Accountabilities
Consumers
IT Management and Staff
Security Architect
Chief Information Officer
Information Technology Governance Committee (ITGC)
Strategic Information Technology Council (SITC)
Enterprise Risk
Contract Managers
Top of PageSection 4 - Monitoring, Review and Assurance
Ongoing Review
Internal Audit
Section 5 - Recording and Reporting
Mandatory Reporting of Private Data Breaches
Section 6 - Appendix
Related Policies and Procedures
View current
This is the current version of the approved document. You can provide feedback on this document to the Enquiries Contact - refer to the Status and Details tab from the menu bar above.