(1) The purpose of this policy is to: (2) This policy acts as a base to support a mandated set of minimum security and technology standards that protect RMIT from technology-based threats to data, systems, personal information and health and safety. (3) This policy outlines the information technology and security principles that underpin RMIT’s approach to information technology management. It also details the responsibilities for senior officers as system owners and business owners, and for all users of RMIT information technology. (4) This policy applies to all: (5) Alignment with RMIT Strategy - RMIT Information Technology Strategy aligns IT investment and initiatives with RMIT’s strategic objectives and priorities. (6) Optimise allocation of IT investments and resources – RMIT strategically allocates IT investments and resources across the enterprise. (7) Maintain adequate and effective information security capability – RMIT ensures it has an adequate and effective information security capability that matches the nature of threats to its IT assets, allowing RMIT to operate smoothly. (8) Implement security controls and undertake systematic testing – RMIT applies appropriate security controls prescribed in the NIST Framework 800-53 to safeguard its IT assets based on their security classification, and regularly tests these controls to ensure their effectiveness. (9) Third party security and resilience capability - RMIT evaluates the information security and resilience capabilities of third parties that manage RMIT IT assets, based on the potential impact of a security incident and/or business continuity incident on those assets. (10) Compliance with the Risk Management Policy – RMIT enforces accountability to manage technology and information security risks in line with the Risk Management Policy. (11) RMIT publishes standards and procedures to implement principles in this policy. (12) Infrastructure and Information Technology Committee (‘IITC’) considers, endorses, and monitors progress against the Information Technology strategy in accordance with RMIT Strategic Plan. (13) Business Owners and System Owners are identified for all IT assets including the IT assets managed by third parties. (14) All users of RMIT information technology are responsible for: (15) Business Owners are responsible for ensuring that: (16) System Owners are responsible for ensuring that: (17) The Chief Information Officer (CIO) is responsible for: (18) ITS monitors compliance with this policy and related obligations. (19) Breaches of this policy will be managed in accordance with the RMIT Compliance Breach Management Procedure. (20) This policy will be reviewed every three years and undertake a major review every five years in line with the Policy Governance Framework. (21) This policy is to be read in conjunction with other RMIT policy documents which include but are not limited to the following: (22) Refer to the following documents which are established in accordance with this policy: (23) The Chief Information Officer has delegated authority to create or amend resources enforceable under this policy.Information Technology and Security Policy
Section 1 - Purpose
Top of PageSection 2 - Overview
Section 3 - Scope
Top of PageSection 4 - Policy
Information Technology and Security Principles
Information Technology and Security Governance
Responsibilities
Compliance
Review
Section 5 - Procedures and Resources
Section 6 - Definitions
Term
Definition
IT asset
Any information technology asset managed by RMIT or on behalf of RMIT. This includes software, hardware and the protection of information assets in digital format under custodianship of RMIT.
Technology resilience capability
Totality of resources, skills and controls which provide the ability and capacity to maintain technology resilience.
Information security capability
Totality of resources, skills and controls which provide the ability and capacity to maintain information security.
Business Owner
The individual responsible for the business functions that rely on the IT assets. The Business Owner ensures that the IT assets meet the needs of the business and are used in accordance with any relevant policies and regulations.
System Owner
The individual responsible for the overall ownership and management of a specific IT asset. They have the authority and accountability for the IT asset's operation, maintenance, and performance. The System Owner ensures that the system is designed, implemented, and operated according to the established ITS Policy, standards, and requirements.
Security classification
Data/information classification defined in line with the Information Governance Policy.
Service classification
Category of business service determined prior to the development of solution architecture in line with the Disaster Recovery Standard.
View Document
This is the current version of this document. You can provide feedback on this policy document by navigating to the Feedback tab.
(Note: Commonly defined terms are in the RMIT Policy Glossary. Any defined terms below are specific to this policy).