Comments

Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

 

Information Technology and Security Policy

Section 1 - Purpose

(1) The purpose of this policy is to:

  1. foster collaboration through shared accountability for information technology (‘IT’) investments, projects, risks, service decisions and performance
  2. align funding, prioritisation of IT projects and resource allocation in line with the RMIT strategy and business objectives
  3. encourage continuous service improvements of IT service performance
  4. take measures to be resilient against information security incidents (including cyber-attacks) by maintaining adequate and effective information security capability
  5. manage information technology risks and cybersecurity risks in line with the Risk Management Policy, and
  6. comply with applicable state, federal and international laws governing IT assets.
Top of Page

Section 2 - Overview

(2) This policy acts as a base to support a mandated set of minimum security and technology standards that protect RMIT from technology-based threats to data, systems, personal information and health and safety.

(3) This policy outlines the information technology and security principles that underpin RMIT’s approach to information technology management. It also details the responsibilities for senior officers as system owners and business owners, and for all users of RMIT information technology.

Top of Page

Section 3 - Scope

(4) This policy applies to all:

  1. students, staff, contractors, visitors and any other parties who have access to the IT assets of RMIT University and its controlled entities (‘RMIT’)
  2. IT assets owned, leased, operated, or under the custodial care of RMIT or third parties operated on behalf of RMIT. 
Top of Page

Section 4 - Policy

Information Technology and Security Principles

(5) Alignment with RMIT Strategy - RMIT Information Technology Strategy aligns IT investment and initiatives with RMIT’s strategic objectives and priorities.

(6) Optimise allocation of IT investments and resources – RMIT strategically allocates IT investments and resources across the enterprise.

(7) Maintain adequate and effective information security capability – RMIT ensures it has an adequate and effective information security capability that matches the nature of threats to its IT assets, allowing RMIT to operate smoothly.

(8) Implement security controls and undertake systematic testing – RMIT applies appropriate security controls prescribed in the NIST Framework 800-53 to safeguard its IT assets based on their security classification, and regularly tests these controls to ensure their effectiveness.

(9) Third party security and resilience capability - RMIT evaluates the information security and resilience capabilities of third parties that manage RMIT IT assets, based on the potential impact of a security incident and/or business continuity incident on those assets.

(10) Compliance with the Risk Management Policy – RMIT enforces accountability to manage technology and information security risks in line with the Risk Management Policy.   

Information Technology and Security Governance

(11) RMIT publishes standards and procedures to implement principles in this policy.

(12) Infrastructure and Information Technology Committee (‘IITC’) considers, endorses, and monitors progress against the Information Technology strategy in accordance with RMIT Strategic Plan.

(13) Business Owners and System Owners are identified for all IT assets including the IT assets managed by third parties. 

Responsibilities

(14) All users of RMIT information technology are responsible for:

  1. ensuring that they understand and adhere to the standards, procedures and principles established by this policy in the context of their role
  2. reporting and responding to incidents impacting systems, process, data, and cyber bullying or harassment as instructed
  3. reporting all actual or suspected information security breaches immediately
  4. engaging ITS for all procurement related to IT assets to ensure alignment with RMIT strategy, policies and standards.

(15) Business Owners are responsible for ensuring that: 

  1. ITS is engaged for all procurement related to IT assets
  2. appropriate security classification levels, service classification levels and storage options are defined for IT assets under their ownership
  3. where IT assets are managed by third parties, third parties have adequate security and resilience capabilities.

(16) System Owners are responsible for ensuring that:

  1. compliance with the information technology standards and related resources published and communicated by Information Technology Services (ITS)
  2. Business Owners are consulted to define appropriate security classification, service classification and storage options
  3. relevant technology and information security risks are identified, analysed, assessed and actioned
  4. relevant risk-based technology and security controls are identified, implemented and are operating effectively
  5. third parties managing IT assets of RMIT have implemented adequate security and technology resilience controls relevant to the risks.

(17) The Chief Information Officer (CIO) is responsible for:

  1. establishing and overseeing delivery of the Information Technology Strategy and Information Security Strategy
  2. prioritising IT investments, initiatives, and resource allocation to optimise IT investments and resource allocation
  3. overseeing delivery of Technology Strategy, Information Security Strategy, IT investments and initiatives
  4. establishing and operationalising IT and security governance processes, technology operating model and policy framework to deliver reliable responsive and user-centric IT services
  5. ensuring adequate and effective technology resilience capability including maintaining information security capability to ensure continued sound operation of RMIT
  6. ensuring systematic controls testing program is set up to provide assurance on the design and operating effectiveness of the controls
  7. ensuring that RMIT has robust mechanisms in place to detect and respond to information security incidents in a timely manner
  8. ensuring that educational activities to raise awareness and educate users on how to reduce the risks of cyber security incidents have been delivered. 

Compliance

(18) ITS monitors compliance with this policy and related obligations.

(19) Breaches of this policy will be managed in accordance with the RMIT Compliance Breach Management Procedure.

Review

(20) This policy will be reviewed every three years and undertake a major review every five years in line with the Policy Governance Framework.

Top of Page

Section 5 - Procedures and Resources

(21) This policy is to be read in conjunction with other RMIT policy documents which include but are not limited to the following:

  1. Information Governance Policy
  2. Privacy Policy.

(22) Refer to the following documents which are established in accordance with this policy:

  1. Information Technology - Acceptable Use Standard
  2. Information Technology - User Device Security Standard.

(23) The Chief Information Officer has delegated authority to create or amend resources enforceable under this policy.

Top of Page

Section 6 - Definitions

(Note: Commonly defined terms are in the RMIT Policy Glossary. Any defined terms below are specific to this policy).
Term Definition
IT asset Any information technology asset managed by RMIT or on behalf of RMIT. This includes software, hardware and the protection of information assets in digital format under custodianship of RMIT.
Technology resilience capability Totality of resources, skills and controls which provide the ability and capacity to maintain technology resilience.
Information security capability Totality of resources, skills and controls which provide the ability and capacity to maintain information security.
Business Owner The individual responsible for the business functions that rely on the IT assets. The Business Owner ensures that the IT assets meet the needs of the business and are used in accordance with any relevant policies and regulations.
System Owner The individual responsible for the overall ownership and management of a specific IT asset. They have the authority and accountability for the IT asset's operation, maintenance, and performance. The System Owner ensures that the system is designed, implemented, and operated according to the established ITS Policy, standards, and requirements.
Security classification Data/information classification defined in line with the Information Governance Policy.
Service classification Category of business service determined prior to the development of solution architecture in line with the Disaster Recovery Standard.