Skip navigation

Policy: Information technology security

Purpose

To establish the framework for information technology (IT) security, systems, and operations that support the core functions of the University.

Overview

ANU is committed to ensuring appropriate security for all data, equipment, and processes within its domain of ownership and control.

Scope

The policy applies to all members of the University community who have been granted access to IT and information infrastructure, including but not limited to ANU staff, students, VaHAs, contractors and affiliated organisations.

Definitions

Authorised user: a person who has been permitted access to all or part of the information infrastructure of the University by a responsible officer, as defined in the Information Infrastructure and Services Rule 2015.

Availability: the period for which information assets are available, which ensures their availability for their intended use.

Confidentiality: the process of limiting information access and disclosure to authorised users, in order to protect data and information from unauthorised access or use.

Data: includes raw data, micro data, unorganised facts or data sets in any format.

Information: data that is processed, organised, structured or presented in a given context so as to make it useful in any format.

Information infrastructure: includes buildings, permanent installations, information services, fixtures, cabling, and capital equipment that comprises the underlying system within or by which the University:

  • holds, transmits, manages, uses, analyses, or accesses data and information; and
  • transmits electronic communication.

Information security: preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation, and reliability can also be involved.

Information security risk: associated with the potential that threats will exploit vulnerabilities of an information asset or group of information assets and thereby cause harm to an organisation.

Integrated Communication Network (ICN): the University network infrastructure including the following network sites – Acton Campus, ANU UniLodge, Hume Library Store, Gowrie Hall, Mount Stromlo Observatory, Siding Spring Observatory, North Australia Research Unit, University House Melbourne, ANU Medical School remote sites and hospitals, and ANU Exchange sites.

Password: the primary means of authenticating user access to ANU information services and systems.

System owner: the senior member of staff with delegated responsibility for information assets including defined responsibilities for the security of the data, information and application component of the asset, determining appropriate classification of information, defining access rights, and ensuring that information asset risk is identified and managed. System owners are a Service Division Director or an equivalent management position.

University provided storage infrastructure: data storage systems that are provided by the University and supported by Information Technology Services (ITS).

User: a person (wherever located) who accesses the information infrastructure. This includes services intended for public use.

VaHA: Visiting and Honorary Appointments; formerly referred to as Persons of Interest (POIs).

Policy statement

  1. This policy and related documents draw their authority from the Information Infrastructure and Services Rule 2015.
  2. The University requires external network interconnectivity and the internet for its research, teaching and learning, public policy, outreach, and administration activities.
  3. The University is committed to providing a secure information infrastructure that protects the integrity and confidentiality of information without compromising its availability.
  4. The University implements a framework for the management of information security and incident response.
  5. Information security applies to all forms of information and data, be they digital, print, or other and includes the management of the software and/or communications technology systems and networks for storing, processing, and communicating information.
  6. ANU is committed to ensuring the security of all information technology, data, equipment, and processes within its ownership and control.
  7. The University remains the owner of University data regardless of the ownership of the device.
  8. The University reserves the right to refuse, prevent or withdraw access to authorised users and/or particular devices or software.
  9. The University reserves the right to modify user access to data, in line with the Infrastructure security classification standard.

University responsibilities

  1. The University takes appropriate action to protect, preserve, and keep available and accessible, its IT and information infrastructure, including the managed end-to-end network.
  2. The University provides and is responsible for:
  1. identifying, managing and mitigating risk across the University's IT and information infrastructure;
  2. coordinating all information security activities required to ensure the security of IT and information infrastructure;
  3. providing network security to protect the University's information sources, electronic resources, intellectual property, and network access;
  4. applying security updates to software and operating systems to minimise security vulnerabilities; and
  5. ensuring periodic audits of areas to ensure compliance with relevant policies and procedures.

System owner responsibilities

  1. All information technology systems have a system owner. System owners:
  1. ensure systems and applications are documented, classified, and secured in accordance with the Infrastructure security classification standard;
  2. identify and manage disaster recovery and business continuity requirements for their systems;
  3. ensure that all changes to infrastructure are managed through the Change Advisory Board and that only authorised changes are made;
  4. ensure that risk management, including risk assessment and mitigation, is undertaken with respect to the information assets within areas under their control;
  5. ensure periodic reviews of information assets are conducted to maintain the required security level as specified in the Infrastructure security classification standard;
  6. ensure that authorised users are aware of their obligation to operate in accordance with this policy and its related procedural documentation, and receive adequate support and training to do so; and
  7. advise the ITS Cyber Security Team of any exceptional circumstances that warrant non-patching of servers hosting their systems.

User responsibilities

  1. Users:
  1. protect information infrastructure resources from unauthorised access, modification, destruction, or disclosure;
  2. maintain compliance with University policies, procedures, rules and standards governing IT and information assets;
  3. report suspected or known security incidents and/or breaches to the ITS Cyber and Digital Security Team by emailing it.security@anu.edu.au; and
  4. keep University information and data secure.
  1. Users are required to assist and support the University in carrying out its legal and operational obligations, including co-operating with ITS should it be necessary to access or inspect University data stored on a personal device.

Breaches

  1. The University investigates unauthorised use of the University’s IT and information infrastructure.
  2. Identified breaches of this policy and related documents are investigated under the following:

Legislation, standards, and regulations

  1. To enable better practice within its policy and procedural frameworks, the University recognises, and is consistent with, the following standards and regulations:
  • Australian National University Act 1991
  • Australian Government Protective Security Policy Framework
  • Public Governance, Performance and Accountability Act 2013
  • Public Governance, Performance and Accountability Rule 2014
  • Commonwealth Crimes Act 1914
  • Privacy Act 1988
  • Telecommunications Act 1997
  • Telecommunications Regulations 2001
  • Telecommunications (Interception and Access) Act 1979

Information

Printable version (PDF)
Title Information technology security
Document Type Policy
Document Number ANUP_000421
Version 13
Purpose This policy establishes the framework for Information Technology (IT) security, systems, and operations that support the core functions of the University, and outlines the responsibilities of the University, owners, and users of IT, infrastructure, and systems.
Audience Staff, Students, Alumni, Affiliates
Category Administrative
Topic/ SubTopic Information Technology - Security
 
Effective Date 2 Apr 2019
Review Date 5 Apr 2022
 
Responsible Officer Director, Information Technology Services
Approved By: Vice-Chancellor
Contact Area Information Technology Services
Authority Information Infrastructure and Services Statute 2012
Information Infrastructure and Services Rule 2015
AS ISO/IEC 27002:2015
Australian National University Act 1991
Australian Government Protective Security Policy Framework
Public Governance, Performance and Accountability Act 2013
Public Governance, Performance and Accountability Rule 2014
Australian Government Department of Finance and Deregulation Finance Circular No. 2009/08
Crimes Act 1914 (Cth)
Privacy Act 1998
Telecommunications Act 1997
Telecommunications Regulations 2001
1504249908
Delegations