Information security
Information security
The University is committed to ensuring its鈥 information is always managed securely and in accordance with the best practice requirements of the听. The standard requires that the University鈥檚 records are protected from unauthorised or unlawful access, destruction, loss, deletion or alteration.
The University鈥檚听Data Classification Standard听provides the framework for the protection of University information based on its鈥 sensitivity as defined by type, importance and usage. This framework is further informed by both the听Record Security Guideline听and the听Handling Research Material and Data Procedure.
RAMS data classification
When capturing records to the University鈥檚 recordkeeping system RAMS, the information being captured can be mapped to one of the UNSW Data classification levels: Unclassified, Private, Sensitive and Highly Sensitive; to define its sensitivity and to enable controls appropriate to the level of sensitivity to be put in place.
These controls are applied in RAMS through the use of听Access Control, an opt-in method of specifying access rights to electronic records captured within the system. Access Control is based on organisational units or pre-defined Access Groups, and provides the primary means by which to control access to University records in RAMS.
This process of data classification should be an inherent part of the capture of records, whenever creating a new records container, or when records of a higher sensitivity are to be captured to a container, or evidence of a new business activity is required to be captured.
Record classification
This table maps the University鈥檚 Data classifications against the required controls in RAMS, whether transmission of this information by email is appropriate and how frequently the security controls of this information should be reviewed. More information on these Data Classification Standards is available听here.
Personal information
Passwords
It is not permitted to capture records containing passwords to RAMS. RAMS must not be used for the capture and storage of passwords.
In line with UNSW鈥檚 Cyber Security guidelines on Identity and Access Management, passwords must never be stored in clear text. Please refer to the听听which establishes the minimum standards related to user account management, including passphrase management.
In particular, section听3.3.3.听Account passphrases must not be stored in clear text, displayed on the screen in clear text, printed in clear text, or transmitted in clear text. [Risk: Medium, High. Role: IO].
For advice on best practice management of passwords, please contact Cyber Security.
Personal information
Personal information is defined as, 鈥淚nformation or an opinion about an individual whose identity is apparent or can be reasonably be ascertained from the information or opinion鈥.
Special consideration needs to be given to the management of personal information contained in records being captured and managed using the University鈥檚 business systems. This information will frequently be classified as听Sensitive, sometimes听Highly Sensitive, and should always be destroyed as soon as it is appropriate to do so. Capture and correct classification within RAMS ensures this is managed at a system level.
-
The following table can be used to guide an initial classification of commonly found types of personal information:
听Data type
Description
Preliminary classification
Student data
Personally identifying information about students, including items such as Tax File Number (TFN), and contact information, courses and programs.
Sensitive
Staff data
听Personally identifying information about staff, including items such as Tax File Number (TFN), contact information, and bank account details.
Sensitive
Patient data
听Personally identifying information about patients, any medical treatments and results.
Highly sensitive
听
Legacy RAMS Security Controls
Security Levels
Security Levels provided the primary method for restricting access to hardcopy University records. Any document has an inherent level of security based on its content. Any container would inherit the security level of its most restricted content, as would all other records within the same container.
To view records of a certain security level, a staff member is required to have the same, or a higher level of security applied to their profile.
-
听
Security level
Scope notes
Restricted
The Restricted classification is for those records documenting staff grievances, privacy issues, FOI requests and legal advice. Information which could:
- Compromise Legal professional privilege.
- Breach staff confidentiality in the complaint resolution procedure.
- Compromise information provided under Freedom of Information requests.听
Private Protected
听The Protected classification is for those records that relate to Audit requirements. Information which could:
- Substantially undermine the financial viability of UNSW.
- Facilitate the commission of serious crime.
- Seriously impede the development or operation of UNSW and major Government policies.听
Sensitive
Highly Protected
听The Highly Protected classification is for those records that relate to the governance of the University, industrial relations matters, controlled entities and commercial research ventures and highly sensitive commercial business documents or contracts. Information which could:
- Threaten life directly
- Seriously prejudice public order
- Substantially damage the University or state or national finances or economic and commercial interest.听
听Highly Sensitive
Security Caveats
Security Caveats provided a secondary means for the restriction of hardcopy records. The Security Caveats that may be applied to hardcopy records can be seen below. They enable a container to be restricted to a specific subset of staff based on role, such as limiting access to Human Resources (HR) records to HR staff only.
Their primary use at UNSW is for the control of access to hardcopy legal, personnel and student records.
A security caveat may be applied with a Security Level, and a user seeking access to the record would be required to meet both sets of criteria (Security Level, Security Caveat) to locate and to view the container.
All staff members receive automated access to relevant Security Levels and Caveats based on their position. Any staff member wishing to confirm their access may contact听records@unsw.edu.au听for further information.
-
听
Security caveat
Acronym
Scope notes
听Commercial-in-Confidence
CIC
For hardcopy commercially sensitive records only
听Governance-in-Confidence
GIC
For hardcopy records of UNSW Council, Academic Board and associated Committees only
听Legal-in-Confidence
LIC
For hardcopy Legal Files only
听Personnel-in-Confidence
PIC
For hardcopy Personnel files only
听Security-in-Confidence
SIC
For hardcopy security-related files only
听Student-in-Confidence
STIC
For hardcopy Student files only
Have a question?
Contact the Records Team on听02 9385 2861听or email听records@unsw.edu.au听/ Contact the Archives Team on听02 9385 2906听or email听archives@unsw.edu.au