Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) The purpose of this policy is to: (2) This policy acts as a base to support a mandated set of minimum security and technology standards that protect RMIT from technology-based threats to data, systems, personal information and health and safety. (3) This policy outlines the information technology and security principles that underpin RMIT’s approach to information technology management. It also details the responsibilities for senior officers as system owners and business owners, and for all users of RMIT information technology. (4) This policy applies to all: (5) Alignment with RMIT Strategy - RMIT Information Technology Strategy aligns IT investment and initiatives with RMIT’s strategic objectives and priorities. (6) Optimise allocation of IT investments and resources – RMIT strategically allocates IT investments and resources across the enterprise. (7) Maintain adequate and effective information security capability – RMIT ensures it has an adequate and effective information security capability that matches the nature of threats to its IT assets, allowing RMIT to operate smoothly. (8) Implement security controls and undertake systematic testing – RMIT applies appropriate security controls prescribed in the NIST Framework 800-53 to safeguard its IT assets based on their security classification, and regularly tests these controls to ensure their effectiveness. (9) Third party security and resilience capability - RMIT evaluates the information security and resilience capabilities of third parties that manage RMIT IT assets, based on the potential impact of a security incident and/or business continuity incident on those assets. (10) Compliance with the Risk Management Policy – RMIT enforces accountability to manage technology and information security risks in line with the Risk Management Policy. (11) RMIT publishes standards and procedures to implement principles in this policy. (12) Infrastructure and Information Technology Committee (‘IITC’) considers, endorses, and monitors progress against the Information Technology strategy in accordance with RMIT Strategic Plan. (13) Business Owners and System Owners are identified for all IT assets including the IT assets managed by third parties. (14) All users of RMIT information technology are responsible for: (15) Business Owners are responsible for ensuring that: (16) System Owners are responsible for ensuring that: (17) The Chief Information Officer (CIO) is responsible for: (18) ITS monitors compliance with this policy and related obligations. (19) Breaches of this policy will be managed in accordance with the RMIT Compliance Breach Management Procedure. (20) This policy will be reviewed every three years and undertake a major review every five years in line with the Policy Governance Framework. (21) This policy is to be read in conjunction with other RMIT policy documents which include but are not limited to the following: (22) Refer to the following documents which are established in accordance with this policy: (23) The Chief Information Officer has delegated authority to create or amend resources enforceable under this policy.Information Technology and Security Policy
Section 1 - Purpose
Top of PageSection 2 - Overview
Section 3 - Scope
Top of PageSection 4 - Policy
Information Technology and Security Principles
Information Technology and Security Governance
Responsibilities
Compliance
Review
Section 5 - Procedures and Resources
Section 6 - Definitions
Term
Definition
IT asset
Any information technology asset managed by RMIT or on behalf of RMIT. This includes software, hardware and the protection of information assets in digital format under custodianship of RMIT.
Technology resilience capability
Totality of resources, skills and controls which provide the ability and capacity to maintain technology resilience.
Information security capability
Totality of resources, skills and controls which provide the ability and capacity to maintain information security.
Business Owner
The individual responsible for the business functions that rely on the IT assets. The Business Owner ensures that the IT assets meet the needs of the business and are used in accordance with any relevant policies and regulations.
System Owner
The individual responsible for the overall ownership and management of a specific IT asset. They have the authority and accountability for the IT asset's operation, maintenance, and performance. The System Owner ensures that the system is designed, implemented, and operated according to the established ITS Policy, standards, and requirements.
Security classification
Data/information classification defined in line with the Information Governance Policy.
Service classification
Category of business service determined prior to the development of solution architecture in line with the Disaster Recovery Standard.