logo

Information Security Policy for University of Southern Queensland

   

Added on  2022-10-10

10 Pages2776 Words284 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the Student
Name of the Organization
Author Note
Information Security Policy for University of Southern Queensland_1

INFORMATION SECURITY1
Answer to Question (a)
Information is considered to be an important asset of the university and this
particularly because of the fact that within a university which is basically an organization
driven by the knowledge where various information relates to teaching, research,
management as well as administration. The organization which has been selected is
University of Southern Queensland This particular policy which will be developed will be
hugely concerned regarding all the various information which are held by the University of
Southern Queensland and utilised by all the members of it within their respective official
capabilities like the students and the staffs. The policy will be particularly defining all the
various responsibilities of each and every person with respect to the particular kind of
utilisation of information and all the processing systems of the information (Collins, 2016).
All the various members of the University of Southern Queensland are greatly held
responsible for all the information handled by all of them. Failing towards complying with
this particular policy will be directly resulting in actions which will be disciplinary.
Policy
Information must be well protected in a specific line with all the various laws which will
be greatly relevant and the policies of the University of Southern Queensland, mainly all
those which will be directly related to the protection of data and the information freedom.
Information must be made totally available for all of those who have been legitimating
requirement for it.
Information must be well categorised as the proper availability level involving the open,
private and the most confidential one.
The particular integrity of information must be well maintained and information must be
proper, constant and totally complete with all other kinds of information.
Information Security Policy for University of Southern Queensland_2

INFORMATION SECURITY2
All the various University members who will be possessing the access to all the specific
information must be hugely responsible towards handling it properly as per the
classification will be done.
The staffs of the University of Southern Queensland must be entirely held responsible for
making sure that proper processes as well as systems are utilised for processing.
Information must be well protected against any kind of access which will be totally
unauthorised.
There must be the production of agreements of service level and that must be well tested
for making sure that all various important services of information are made totally
available within all the levels of service which have been well defined (Bojanc and
Jerman-Blažič 2013).
The particular compliance with this particular kind of policy will be considered to be
compulsory for all the associated members of the university which have been utilising the
information of the University of Southern Queensland. All the various kinds of breaches
of the security controls of information must be properly reported to and must be properly
examined by the security officer of security.
There is also another policy as well which must be maintained in the conjunction with all
the security policies of the University of Southern Queensland which will be related to the
utilisation of information. This policy will be involving:
Policy for the protection of data
Policy for the information freedom
Regulations for the utilisation of the facilities of IT at the university
Policy for the proper examination of the various computers or systems within the
university.
Policy upon the utilisation of systems and devices of mobile
Information Security Policy for University of Southern Queensland_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security And Assessment of Risk
|10
|2256
|21

Big Data Security and Privacy Protection
|7
|2165
|488

INFORMATION SECURITY.
|10
|2601
|1

Software Estimation Techniques Project 2022
|8
|2653
|19

Cyber Security Assessment 2022
|10
|2116
|38

Organizations complying with GLBA Assignment 2022
|7
|1731
|23