(1) This Policy defines the principles to ensure that the University of Wollongong’s (the University) Information Technology (IT) Resources are appropriately secured. (2) The University has established an Information Security Management System (ISMS) aligned to the ISO/IEC 27001:2022 Information Security Standard, and a set of Security Objectives, to implement these principles. (3) This Policy applies to: (4) The University’s IT Resources must be securely managed, maintained and protected. This is achieved through the University’s Policy Framework and the ISMS Local Protocols, including, but not limited to: (5) The University is committed to the following Information Security Objectives: (6) The Chief Information Digital Officer has the following responsibilities: (7) The Associate Director Cyber Security has the following responsibilities: (8) The Risk, Audit and Compliance Committee has the following responsibilities: (9) Staff who manage any IT resource have the following responsibilities:Information Security Policy
Section 1 - Purpose of Policy
Section 2 - Application and Scope
Top of PageSection 3 - Policy / Procedure / Guideline
Top of PageSection 4 - Principles
Top of PageSection 5 - Roles and Responsibilities
Chief Information Digital Officer
Associate Director Cyber Security
Risk, Audit and Compliance Committee
Staff with Responsibility for Managing any IT Resource
Top of PageSection 6 - Definitions
Word/Term
Definition (with examples if required)
Affiliate
Business Continuity
The processes and information assets required to maintain the University’s core services to its stakeholders.
Contract/Agreement
Legally binding document establishing the minimum requirements to which both parties of the contract must adhere.
Cyber security
The practice of defending computing devices, networks and stored data from unauthorised access, use, disclosure, disruption, modification, or destruction.
Governance
For the purposes of this Policy, governance means the rules outlining which individual, role or group can approve what actions or documents throughout the University.
Incident
An information security event which may impact the confidentiality, integrity or availability of an information asset.
Information
Any digital or physical raw, processed, organised, presented or structured data created, stored or used by the University.
Information Asset
i. a physical device such as a laptop;
ii. a physical server;
iii. virtual server;
iv. a cloud system;
v. a database;
vi. an application; or
vii. a file.
a. Computing facilities;
b. Collaboration hardware and software;
c. Artificial intelligence capabilities; and
d. Communications facilities. (Examples include, but are not limited to, telephones, facsimiles, mobile telephones, computers, tablets, printers, photocopiers, other devices, email, internet access, network infrastructure, web services and cloud services.)
Information Technology (IT) Resources
IT Resources are also known as the University’s information and information assets.
Monitoring
An information asset (IT system or person) watching an information asset (IT system) for anomalous activity.
Remote/Teleworking
Accessing the University’s information assets or performing work on behalf of the University while not physically present on the University’s controlled sites or campuses.
Staff
All people employed by the University including conjoint appointments, whether on continuing, permanent, fixed term, casual or cadet or traineeship basis.
Supplier/Third Party/Vendor
Any legal entity or contractor provider, legally distinct from the University, which provides services to the University.
University Network
User
A person assigned a user account by the University or a person who is otherwise authorised to use the University’s IT Resources.
User Account
An identity assigned to a user, with an associated username, for the purpose of accessing IT Resources that require authentication by the user. Also referred to as account throughout this document.
View Current
This is the current version of this document. To view historic versions, click the link in the document's navigation bar.
Affiliate means any individual who is not an employee of the University but is formally appointed or engaged to perform duties or functions on behalf of the University, or who has a recognised association with the University. This includes, but is not limited to:
• holders of University Honorary Awards (e.g., Emeritus Professors, Honorary Doctors, University Fellows);
• individuals appointed under the University’s Appointment of Visiting and Honorary Academics Policy;
• consultants, contractors, and agency staff;
• volunteers and work experience students;
• office holders in University entities, boards, committees, or foundations; and
• individuals affiliated through formal education or research partnerships.
Any process or technology used to deliver business objectives or services.
An information asset is, but not limited to:
For the purposes of this policy, information assets are the University’s:
The network infrastructure used by the University including all network services on main campus and satellite campuses with trusted access to the University’s services.
The connections can be physical (e.g. cables) or remote/wireless.