Policy Feedback
Step 1 of 4: Enter your comments on individual clauses
In step 1 provide your comments on specific content. Select (comment icon ) to open a comment box to type your feedback then click "save comment" to close the comment box. In step 2 you will provide general comments.
Important tips to avoid losing your comments or corrupting your entries:
- AVOID jump between web pages or applications while commenting – open a new browser window if you need to to switch
- ONLY log comments for one policy at a time.
- DON'T leave your submission half way through. If you need to take a break, submit your current set of comments. You can go back in and start a new comments , just jump to where you left off.
(1) These information security principles assist the University of New England (UNE) to achieve its goals and objectives safely, securely, and without disruption from a cyber-attack. (2) These principles apply to all information systems and services provided by UNE including those delivered through third party service providers. (3) We observe this principle by: (4) We observe this principle by continually improving our compliance with: (5) We observe this principle by: (6) We observe this principle by: (7) We observe this principle by: (8) We observe this principle by: (9) The UNE Security Council exercises good governance of information security, and ensuring the effective application of this Rule and its principles. (10) The Chief Information Officer (CIO) is accountable for managing information security at UNE. (11) The Vice-Chancellor and Chief Executive Officer (VC&CEO), pursuant to Section 29 of the University of New England Act 1993 (NSW), makes this Rule. (12) The Policy Steward, the CIO, is authorised to make associated documents for the operation of this Rule, that are consistent with this Rule. (13) Notwithstanding the other provisions of this Rule , the VC&CEO may approve an exception to this Rule where the VC&CEO determines the application of this Rule would otherwise lead to an unfair, unreasonable or absurd outcome. Approvals by the VC&CEO under this clause must: (14) (15) This Rule operates as and from the Information Security Rule
Section 1 - Overview and Scope
Section 2 - Principles
Principle 1 – Technology Resilience
Principle 2 – Standards Compliance
Principle 3 – Enable and Empower Business
Principle 4 – Identify and Manage Business Risk
Principle 5 – Situational Awareness
Principle 6 – Shared Common Core
Top of PageSection 3 - Quality Assurance
Section 4 - Authority and Compliance
Authority
Compliance