(1) The purpose of this policy is to: (2) Information technology and security principles underpin RMIT’s approach to information technology management. (3) This policy is the foundation for RMIT’s information technology and security program and supports the University’s Information Technology Strategy. It provides principles to support a mandated set of minimum security and operational standards that protect RMIT from technology-based threats to data, systems, personal information and health and safety. (4) This policy applies to all: (5) RMIT information systems, tools and hardware are a shared resource for the benefit of RMIT authorised users only, to be used fairly, securely, lawfully and for legitimate University purposes. (6) Access to RMIT Information will be available only to those with a legitimate need related to the business and operations of the University and its entities. (7) Information generated by RMIT users relating to University business or operations remains the property of RMIT and is accessible by authorised RMIT staff after termination of the account holder’s employment. (8) Information technology systems and solutions will be designed, sourced, implemented, and operated in ways that are secure, sustainable, cost effective and aligned to University strategy. (9) All users of RMIT information technology have a responsibility to: (10) All RMIT Information technology designers, implementors and operators have a responsibility to: (11) Information Technology Services has a responsibility to ensure: (12) The Chief Information Security Officer (CISO) has a responsibility to: (13) Risk, Audit and Compliance is authorised to assess compliance with this policy and related obligations at any time. (14) Breaches of this policy will be managed in accordance with the RMIT Compliance Breach Management Procedure. (15) RMIT and third parties, must comply with all relevant global information security and related regulations and legislation. (16) Third parties, including cloud services providing information technology or software services or resources, must have an information technology policy in place that provides no lesser security controls than RMIT’s policy. (17) Contractual arrangements with third parties must include security terms approved by the Office of the Chief Information Security Officer. (18) This policy will be reviewed at least once every three years in accordance with the Policy Governance Framework. (19) Refer to the following documents which are established in accordance with this policy: (20) Local ITS Cybersecurity Standards (resources) are available via the Cybersecurity Standards website. Resources enforceable under this policy may be amended or added to at any time with the endorsement of the Chief Information Officer.Information Technology and Security Policy
Section 1 - Purpose
Top of PageSection 2 - Overview
Section 3 - Scope
Top of PageSection 4 - Policy
Information Technology and Security Principles
Responsibilities
Compliance
Review
Section 5 - Procedures and Resources
Section 6 - Definitions
Information technology resources
Includes RMIT systems that hold RMIT information and ICT assets owned or licensed by RMIT, or on behalf of RMIT by a third party.
IT Business Partner
Role in ITS that works with university stakeholders to engage and deliver ICT services in the most effective way.
ICT asset
Any hardware or data used for or related to information technology or communication.
View Document
This is not a current document. To view the current version, click the link in the document's navigation bar.
(Note: Commonly defined terms are in the RMIT Policy Glossary. Any defined terms below are specific to this policy).