|
The Tasmanian Government Information Security Policy1. PurposeThe purpose of the Policy is to provide a consistent approach to managing information security risks across Government. 2. ScopeThis Policy applies to Tasmanian Government agencies as custodians of information on behalf of the Crown. 3. Policy PrinciplesThis Policy is based upon the following information security policy principles: Availability: information is accessible and usable to authorised entities. Integrity: the accuracy and completeness of information is protected. Confidentiality: information is not made available or disclosed to unauthorised individuals, entities or processes. Proportionality: measures to protect information are relative to the risk of loss or failure of availability, integrity and confidentiality. 4. Tasmanian Government Information Security PolicyAgencies MUST apply this Policy in accordance with the Policy Principles. The Policy is mandatory and is to be applied across the following seven areas: 1. Information Security Governance and ManagementThe Head of each agency MUST convene an Information Security Committee composed of senior management, or assign the role to an existing senior management committee. This Committee is responsible for ensuring the Policy is applied. 2. Risk ManagementEach agency MUST conduct regular information security risk assessments and implement appropriate risk management strategies that are proportionate to the level of identified risk. 3. Resource ManagementEach agency MUST maintain and apply appropriate protective policies and procedures for resources including:
4. Identity and Access ManagementEach agency MUST ensure authorised access and prevent unauthorised access to information assets. Each agency MUST ensure that the identities of employees and others who wish to access agency services are assessed using the Tasmanian Government Identity and Access Management Toolkit in accordance with the National Identity Security Strategy that was endorsed by COAG in April 2007. 5. Personnel and AwarenessTo minimise the risk of information misuse, each agency MUST ensure staff understand the information security roles and responsibilities assigned to them. Agencies MUST also ensure that these roles and responsibilities are appropriate for level of duties performed by the staff member. 6. Incident ManagementEach agency MUST have a structured approach to managing information security incidents and events that have potential to breach information security policy or compromise operations. 7. Business Continuity ManagementEach agency MUST have a structured approach, based on an information security risk assessment, to managing business continuity to ensure the uninterrupted availability of all resources that support essential business activities. 5. Application of the PolicyThe Tasmanian Government Information Security Policy Manual contains Procedures that provide detail on how the Policy is to be applied including mandatory and recommended requirements. 6. Responsibilities
|
![]() ![]()
Document key
|