Information security
Information security
The University is committed to ensuring its’ information is always managed securely and in accordance with the best practice requirements of the. The standard requires that the University’s records are protected from unauthorised or unlawful access, destruction, loss, deletion or alteration.
The University’sData Classification Standardprovides the framework for the protection of University information based on its’ sensitivity as defined by type, importance and usage. This framework is further informed by both theRecord Security Guidelineand the.
RAMS data classification
When capturing records to the University’s recordkeeping system RAMS, the information being captured can be mapped to one of the UNSW Data classification levels: Unclassified, Private, Sensitive and Highly Sensitive; to define its sensitivity and to enable controls appropriate to the level of sensitivity to be put in place.
These controls are applied in RAMS through the use ofAccess Control, an opt-in method of specifying access rights to electronic records captured within the system. Access Control is based on organisational units or pre-defined Access Groups, and provides the primary means by which to control access to University records in RAMS.
This process of data classification should be an inherent part of the capture of records, whenever creating a new records container, or when records of a higher sensitivity are to be captured to a container, or evidence of a new business activity is required to be captured.
Record classification
This table maps the University’s Data classifications against the required controls in RAMS, whether transmission of this information by email is appropriate and how frequently the security controls of this information should be reviewed. More information on these Data Classifications is available.
Personal information
Passwords
It is not permitted to capture records containing passwords to RAMS. RAMS must not be used for the capture and storage of passwords.
In line with UNSW’s Cyber Security guidelines on Identity and Access Management, passwords must never be stored in clear text. Please refer to thewhich establishes the minimum standards related to user account management, including passphrase management.
In particular, section3.3.3.Account passphrases must not be stored in clear text, displayed on the screen in clear text, printed in clear text, or transmitted in clear text. [Risk: Medium, High. Role: IO].
For advice on best practice management of passwords, please contact Cyber Security.
Personal information
Personal information is defined as, “Information or an opinion about an individual whose identity is apparent or can be reasonably be ascertained from the information or opinion”.
Special consideration needs to be given to the management of personal information contained in records being captured and managed using the University’s business systems. This information will frequently be classified asSensitive, sometimesHighly Sensitive, and should always be destroyed as soon as it is appropriate to do so. Capture and correct classification within RAMS ensures this is managed at a system level.
-
The following table can be used to guide an initial classification of commonly found types of personal information:
Data type
Description
Preliminary classification
Student data
Personally identifying information about students, including items such as Tax File Number (TFN), and contact information, courses and programs.
Sensitive
Staff data
Personally identifying information about staff, including items such as Tax File Number (TFN), contact information, and bank account details.
Sensitive
Patient data
Personally identifying information about patients, any medical treatments and results.
Highly sensitive
Legacy RAMS Security Controls
Security Levels
Security Levels provided the primary method for restricting access to hardcopy University records. Any document has an inherent level of security based on its content. Any container would inherit the security level of its most restricted content, as would all other records within the same container.
To view records of a certain security level, a staff member is required to have the same, or a higher level of security applied to their profile.
-
Security level
Scope notes
equivalent
Restricted
The Restricted classification is for those records documenting staff grievances, privacy issues, FOI requests and legal advice. Information which could:
- Compromise Legal professional privilege.
- Breach staff confidentiality in the complaint resolution procedure.
- Compromise information provided under Freedom of Information requests.
Private Protected
The Protected classification is for those records that relate to Audit requirements. Information which could:
- Substantially undermine the financial viability of UNSW.
- Facilitate the commission of serious crime.
- Seriously impede the development or operation of UNSW and major Government policies.
Sensitive
Highly Protected
The Highly Protected classification is for those records that relate to the governance of the University, industrial relations matters, controlled entities and commercial research ventures and highly sensitive commercial business documents or contracts. Information which could:
- Threaten life directly
- Seriously prejudice public order
- Substantially damage the University or state or national finances or economic and commercial interest.
Highly Sensitive
Security Caveats
Security Caveats provided a secondary means for the restriction of hardcopy records. The Security Caveats that may be applied to hardcopy records can be seen below. They enable a container to be restricted to a specific subset of staff based on role, such as limiting access to Human Resources (HR) records to HR staff only.
Their primary use at UNSW is for the control of access to hardcopy legal, personnel and student records.
A security caveat may be applied with a Security Level, and a user seeking access to the record would be required to meet both sets of criteria (Security Level, Security Caveat) to locate and to view the container.
All staff members receive automated access to relevant Security Levels and Caveats based on their position. Any staff member wishing to confirm their access may contactrecords@unsw.edu.aufor further information.
-
Security caveat
Acronym
Scope notes
Commercial-in-Confidence
CIC
For hardcopy commercially sensitive records only
Governance-in-Confidence
GIC
For hardcopy records of UNSW Council, Academic Board and associated Committees only
Legal-in-Confidence
LIC
For hardcopy Legal Files only
Personnel-in-Confidence
PIC
For hardcopy Personnel files only
Security-in-Confidence
SIC
For hardcopy security-related files only
Student-in-Confidence
STIC
For hardcopy Student files only
Have a question?
Contact the Records Team on02 9385 2861or emailrecords@unsw.edu.au/ Contact the Archives Team on02 9385 2906or emailarchives@unsw.edu.au