Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) This procedure provides guidance for individuals on how to: (2) According to the Information Governance Policy, an individual assumes the role of an Information Custodian when RMIT Information is in their possession. Information Classification provides a mechanism for Information Custodians to meet specific responsibilities and accountabilities to protect Information in their custodianship. (3) Authority for this document is established by the Information Governance Policy. (4) This procedure applies to all (5) This procedure applies to all individuals who create, use, manage, handle or process (6) The (7) RMIT is legally and contractually obliged to manage its Information. Classification enables Information to be managed properly throughout its lifecycle, in accordance with legislative compliance and RMIT policy. It protects Information from unauthorised access, use and disclosure, and supports openness and collaboration. (8) Information Classification provides context for information management and security. Provision and protection of Information in digital format is defined according to role-based access controls established by the Information Technology and Security Policy, which address baseline cyber security requirements for managing access on an approved, need-to-know basis. (9) Individuals are responsible for understanding what constitutes Information Custodianship at RMIT, as defined by the Information Governance Policy, and for the proper treatment of Information across its lifecycle, as outlined in the Data and Information Lifecycle Management Procedure. (10) Handling and protecting Information must occur whether Information is at rest or in use. (11) Handling and protecting Information depends on its Information Classification, physical and cyber security requirements, context and risk. The table below provides some recommendations for the handling of Information based on Security Classification. (12) Information in non-digital format must be handled with equivalent levels of diligence as Information in digital format. (13) Where it is feasible, duplicating of Information should be avoided and Information containing Personally Identifiable Information (PII) should be de-identified. (14) Information Custodians should refer to Schedule 1 for definitions and examples of Security Labelling. (15) Information Custodians should take care in applying the appropriate Security Label as there are implications for having an unreasonable security classification: (16) The application of Security Labels is a two-step process: (17) In general, the most confidential Information element determines the Security Classification of the Information. (18) Management Classifications are metadata that enable the proper management of Information across the Information lifecycle. These metadata designations are optional and assist RMIT to identify Information, subject to internal governance, personal privacy, legal privilege, and/or records management obligations. (19) A Management Classification may be applied to Information to distinguish which RMIT policy it is governed by. Parts A, B and C of the Data and Information Lifecycle Management Procedure define the governance and lifecycle of RMIT Information as follows: (20) A Management Classification may be added to identify Information subject to obligations under the Privacy Policy. (21) A Management Classification adds context and helps differentiate between confidentiality requirements for Security Classification and obligations outlined in the Privacy Policy. For example: (22) A Management Classification may be applied to identify Information under Legal Privilege. (23) RMIT University is a public institution and must comply with the Public Records Act 1973. A Management Classification may be applied to enable records management compliance and the identification of Institutional Data and Research Data subject to retention classes in Section 5 of the Records Retention and Disposal Standard. (24) A Management Classification may be applied to identify the Information Domain of Institutional Information and Information Trustee(s) accountable for the Information.Information Classification and Handling Procedure
Section 1 - Context
Section 2 - Authority
Section 3 - Scope
Section 4 - Procedure
Overview
Information Handling
Information Classification
Part 1: Mandatory Security Classification
Part 2: Optional Management Classification
Internal Governance
Personal Privacy and Legal Privilege
Public Records Compliance
Institution Data Information Domain
Section 5 - Definitions
Handling Information
‘Handling’ Information in digital and non-digital formats includes, but is not limited to, the creating, collecting, accessing, viewing, using, storing, transferring, mailing, managing, preserving, disposing, or destroying that Information.