260 likes | 282 Views
Department of Police and Emergency Management Information Security. Overview. DPEM Framework Governance and Information Security Information Security Classification in Recordkeeping systems. DPEM Framework. Information Security Policy Manual Acceptable Use Reference Guide. DPEM Framework.
E N D
Department of Police and Emergency Management Information Security
Overview DPEM Framework Governance and Information Security Information Security Classification in Recordkeeping systems
DPEM Framework Information Security Policy Manual Acceptable Use Reference Guide
DPEM Framework Information Security Manual A suite of twenty-one policies Acceptable User reference Guide
Implementation Plan Acceptable Use Reference Guide informs the implementation plan in DPEM Gap analysis matching policies to the Tasmanian Government Information Security Manual
Implementation Plan This will ensure compliance with the Tasmanian Government Information Security Manual and personnel have a basic understanding of responsibilities
Information Security Governance The Information Security Governance policy and guidelines defines information security roles and responsibilities within the Department of Police and Emergency Management.
Information Security Classification Identify Information assets Business Systems Owner and Custodian for each system Classify each system
Types of information use din DPEM Ready Reference for Information Security Classification Information Used in the Department of Police and Emergency Management Public InformationInformation authorised for unlimited public access such as department websites. The integrity of public domain information must be ensured before its release.Examples:PublicationsAnnual ReportsCommunity Alerts Non-public Information Unclassified InformationInformation that is not in the public domain, but does not need to be classified.Examples:Procedure manuals, departmental memos to general staff, policy documents Security Classified Information Non-National National* HIGHLY PROTECTEDWitness/VIP Protection IDM TOP SECRET PROTECTED (& CABINET-IN-CONFIDENCE)Investigation/ prosecution files SECRET CONFIDENTIAL X-IN-CONFIDENCEPersonnel files, Tender evaluations, complaints and allegations PROTECTED *National Security Classified Information based on the Commonwealth Protective Security Policy Framework (PSPF). The Counter Terrorism Unit has been assigned responsibility for National security information handled and processed within DPEM.
Information Security Classification Policy and Guidelines Applies to all DPEM information, paper-based, electronic and includes information held in databases Observes the “need-to-know” principle Includes procedures for manual handling disclosure and circulation of information and guidelines for courier services Classification criteria and examples of information in each information security category
Information Security Classification In practice the default classification will be UNCLASSIFIED UNCLASSIFIED documents / records will be labeled as such to indicate that they have been security classified Records classes identified in the disposal schedule provide a framework for setting security classification
Information Security in Recordkeeping Systems Physical Records - Security Classification will be applied at file level and all documents will inherit this classification Electronic Records - Information security classification may be applied at file or document level
Information Security in Recordkeeping Systems Default information security classification will also be applied for certain domains HR documents - staff in confidence Procurement – commercial –in-confidence Other areas may routinely produce information with a Law enforcement-in-confidence or Public Classification
Responsibility for setting classification Records staff will apply appropriate information security classification when creating a file in TRIM, and all documents / records will inherit the information security classification from file End users will be required to select an information security classification when registering a document in record keeping systems other than TRIM
Protective Marking System In TRIM – A TRIM word add-in has been trialled. This automatically populate templates with TRIM metadata and the security classification be automatically populated onto documents when they are assigned to a file in TRIM Security on documents is inherited from the file Hence the importance of completing the TRIM audit
Other Systems Develop procedures for marking information/documents generated from or in other systems Include a reporting template with the protective marking system labels on all system development and enhancements in future Label documents from legacy systems manually eg with stamps for all Protected and Highly Protected information conduct a risk assessments
Handling Standards for Manual TransmissionIn-Confidence – Protected - Highly Protected Develop detailed procedures/check lists for records staff for the management of mail and physical documents These procedures should also apply to files that are being sent to other agencies eg. the courts or the DPP Procedures for the physical receipt of Security Classified Information should also developed
Receiving Security Classified Information Ensure the document or package was transmitted in accordance with the manual handling standards Report any signs of tampering Sign and Return receipt accompanying the documents/file to the originator or Receipt in the relevant system by changing the assignee or intended destination
Acceptable Use Guidelines Prioritise policies for implementation Governance Policy Risk Management Information Security Classification Physical Security Incident Management What is the minimum level that will meet the mandatory requirements Document and mitigate risks
So Far … DPEM Information security policies developed Established the DPEM Information Security Committee Information Security Review completed and risks documented Gap analysis completed Policies prioritised for implementation Business Systems Owner and Custodians Register (Asset Register) collated Audit of TRIM objects underway Trialed word add-in for the protective marking system Awareness raising presentations with staff underway
Issues Generally information security is not embedded in work practices Classification level and access review required Nationally classified information Over-classification Audit trails for classified documents / files
Angela Males Department of Police and Emergency Management Telephone: 6230 2218 email: angela.males@police.tas.gov.au