Guidelines for the implementation of the Public Governance, Performance and Accountability (Protective Security Policy) Order 2015 Contents Part 1 – Introduction ............................................................................................................................... 1 1. Purpose ....................................................................................................................................... 1 1.1 Applicability......................................................................................................................... 1 1.2 Objectives and scope .......................................................................................................... 1 1.3 The legislative framework ................................................................................................... 1 1.4 Use of specific terms in these Guidelines ........................................................................... 2 Part 2 – Governance Arrangements ....................................................................................................... 6 2. Protective security policy ............................................................................................................ 6 2.1 3 Governance arrangements ................................................................................................. 6 Protective security plan .............................................................................................................. 7 Part 3 – Personnel, Information and Physical Security Arrangements ................................................... 8 4 Personnel security....................................................................................................................... 8 4.1 Personnel security Policy .......................................................................................................... 8 4.2 Suitability for employment ....................................................................................................... 8 4.3 Security clearances ................................................................................................................... 9 4.4 Waiver of an eligibility requirement for a security clearance .................................................. 9 4.5 Active monitoring of clearance holders .................................................................................. 11 4.6 Annual health check (confirmation of ongoing suitability to access official resources)......... 12 4.7 Sharing of information ............................................................................................................ 12 4.8 Reportable changes of personal circumstances ..................................................................... 13 4.9 Actions on separation of personnel ........................................................................................ 13 5 Confidentiality of information ................................................................................................. 14 6 Information security................................................................................................................. 14 6.1 Access to Commonwealth resources ...................................................................................... 14 6.2 Temporary access to classified information ........................................................................... 15 6.3 Security classifications ............................................................................................................ 16 6.4 ICT systems and networks....................................................................................................... 17 7 Physical security ........................................................................................................................ 17 7.1 Security of facilities ................................................................................................................. 18 7.2 Physical security of information.............................................................................................. 18 7.3 Minimum requirements for protecting security classified information ................................. 18 7.4 Integration of security measures during planning/modification of facilities ......................... 19 7.5 Developing agency alert levels and guides ............................................................................. 19 Part 4 – Reporting ................................................................................................................................. 21 8 Reporting security incidents ..................................................................................................... 21 8.1 Examples of security incidents ................................................................................................ 21 8.2 Procedures for ensuring staff report and record security incidents....................................... 22 8.3 Reporting security incidents to ASIO ...................................................................................... 22 8.4 Reporting cyber security incidents to ASD .............................................................................. 22 9 Annual reporting on compliance .............................................................................................. 23 Annexure A – Template deed of confidentiality for execution by an employee .................................. 24 Annexure B – Template deed of confidentiality for execution by a contractor .................................. 27 Annexure C – How to select an appropriate protective marking ......................................................... 32 Annexure D – Security violations and breaches ................................................................................... 33 Annexure E – Abbreviations and acronyms .......................................................................................... 34 2 Part 1 – Introduction 1. Purpose 1 These Guidelines are issued by the Attorney-General’s Department to assist accountable authorities of corporate Commonwealth entities (entities) and directors of wholly-owned Commonwealth companies (companies) meet their obligations under the Public Governance, Performance and Accountability (Protective Security Policy) Order 2015 (the GPO). 2 These Guidelines provide assistance and better practice guidance for entities and companies to manage their protective security risks and arrangements. 3 These Guidelines should be read in conjunction with other relevant documents, including the Australian Government’s Protective Security Policy Framework’s (PSPF) suite of documents which can be found at www.protectivesecurity.gov.au and the Australian Government’s Information Security Manual. 4 These Guidelines are available on the Attorney-General’s Department website at www.protectivesecurity.gov.au. 1.1 5 1.2 Applicability These Guidelines apply to entities and companies and are intended for accountable authorities of entities, the directors of companies and their personnel. Objectives and scope 6 The appropriate application of protective security by entities and companies ensures the operational environment necessary for the secure conduct of Government business. Managing security risks proportionately and effectively enables Government entities to provide the necessary protection of the Government’s people, information and assets. 7 These Guidelines set out the Commonwealth’s expectation for better practice in the protective security of Commonwealth resources and Commonwealth personnel. The Guidelines aim to establish and maintain protective security arrangements that provide for: 8 1.3 9 the capacity of the entity or company to function the safety of persons connected with the entity or company the safeguarding of information and assets held by the entity or company, and public confidence in the Government. In applying these Guidelines, entities and companies should take into account their individual circumstances. These Guidelines are not intended to cover all types of risk. For example, where fraud or other internal or external entity risks are concerned, these Guidelines should be considered as a useful starting point to be used in conjunction with other appropriate guidance materials (i.e. the Commonwealth Fraud Control Framework). The legislative framework The GPO is prepared under subsections 22(1) and 93(1) of the Public Governance Performance and Accountability Act 2014(PGPA Act) 1 10 The GPO aligns with the requirements contained in section 15 and 16 of the PGPA Act for accountable authorities to establish and maintain an appropriate system of risk oversight, management and internal control. 11 Guidance materials, including these Guidelines, provide better practice to assist accountable authorities and directors to meet their obligations under the GPO. 12 If a conflict arises between these Guidelines and legislation (including legislative instruments), the legislation takes precedence. 1.4 Use of specific terms in these Guidelines 13 In these Guidelines the following terms are used: ASIO-T4 Protective Security (ASIO-T4): a protective security advisory service for Government clients, contactable at t4ps@t4.gov.au Australian Government Security Classification System: means the Commonwealth’s process for assessing the value, and protecting the confidentiality of, Commonwealth information or Commonwealth assets using the following security classifications: (a) PROTECTED (b) CONFIDENTIAL (c) SECRET (d) TOP SECRET The Australian Government Security Classification System also provides the following dissemination limiting markers (DLMs). DLMs are markings for information where disclosure may be limited or prohibited by legislation, or where it may otherwise require special handling: (a) “For Official Use Only” (FOUO) (b) “Sensitive: Cabinet” (which must also carry the classification PROTECTED as a minimum) (c) “Sensitive: Personal” (d) “Sensitive: Legal” (e) “Sensitive” Australian Government Security Vetting Agency (AGSVA): is a centralised government agency providing vetting services on behalf of Australian Government agencies (apart from exempt agencies) and some state and territory agencies. Accountable authority: the person or group of persons who has responsibility for, and control over, an entity’s operations as set out in section 12 of the PGPA Act. Baseline: as a security clearance, allows access to Commonwealth resources classified PROTECTED. Commonwealth assets: physical assets held by the entity or company in their own right, or on behalf of, the Commonwealth (whether or not the assets belong to the Commonwealth). Commonwealth information: information held by the entity or company in their own right, or on behalf of, the Commonwealth (whether or not the information belongs to the Commonwealth). 2 Commonwealth personnel: (a) a person who holds office under laws of the Commonwealth (b) directors of an entity or company, or the Commonwealth (c) employees of an entity, company, or the Commonwealth (d) contractors or subcontractors of an entity, company or the Commonwealth (e) a person subject to the direction of an entity or company or the Commonwealth. Commonwealth resources: means Commonwealth information or Commonwealth assets. Company: a wholly-owned Commonwealth company as set out in section 90 of the PGPA Act. CONFIDENTIAL: The CONFIDENTIAL security classification is used when the compromise of confidentiality of information could be expected to cause significant damage to the national interest. Eligibility: a requirement for a security clearance indicating that an applicant has: (a) Australian citizenship (b) a checkable background, and (c) agreed to safeguard Commonwealth resources from harm. Entity: a corporate Commonwealth entity as set out in section 22 of the PGPA Act. ICT system: an information communication technology system. Mandatory requirement: the high level requirements contained in the core policy documents of the Protective Security Policy Framework (PSPF), referred to as governance (GOV), personnel security (PERSEC), information security (INFOSEC) and physical security (PHYSEC). National interest: includes matters that have or could have an impact on Australia including: a. Australian national security b. Australian international relations c. relations between one or more of the following: i. the Commonwealth ii. the States iii. the Territories iv. the interests of the Australian Government and Australian people and organisations d. law enforcement operations where compromise could hamper or prevent national crime prevention strategies or investigations or endanger personal safety e. Australian economic well-being f. Australian heritage or cultural interests. National security: has the same meaning as security in section 4 of the Australian Security Intelligence Organisation Act 1979. Need to know: means a need to access information based on an operational requirement. 3 Negative Vetting Level 1: as a security clearance, allows access to Commonwealth resources classified PROTECTED, CONFIDENTIAL and SECRET. Negative Vetting Level 2: as a security clearance, allows access to Commonwealth resources classified PROTECTED, CONFIDENTIAL, SECRET and TOP SECRET. Personnel security policy: a set of measures that manages the risk to people, information and assets when applied in conjunction with governance, information and physical security controls. PGPA Act: the Public Governance, Performance and Accountability Act 2013. Positive Vetting: as a security clearance allows access to PROTECTED, CONFIDENTIAL, SECRET, TOP SECRET and certain types of caveated and code-word Commonwealth resources. PROTECTED: the PROTECTED security classification is used when the compromise of the confidentiality of information could be expected to cause damage to the national interest. Protective security policy: a set of controls that ensures the operational environment necessary for the secure conduct of Government business. Protective Security Policy Framework or PSPF: the Australian Government’s protective security requirements for the protection of its people, information and assets, available from www.protectivesecurity.gov.au SECRET: the SECRET security classification is used when the compromise of the confidentiality of information could be expected to cause serious damage to the national interest. Security breach: a security breach is the accidental or unintentional failure to observe an entities or companies protective security policies or procedures other than those categorised as a security violation Security clearance: an acknowledgement by the Australian Government Security Vetting Agency that a person is suitable to access security classified information, the level of classification dependent on the clearance level granted which allows entities to authorise ongoing access to applicable security classified information on a need to know basis. Security incident: is a security violation or security breach and that may be required to be reported to ASIO, and other relevant agencies, depending on the nature of the incident. Security plan: a plan which sets out how an entity or company will manage security risks. Security violation: means a deliberate, reckless or negligent act or omission that leads, or could reasonably be expected to lead, to: a. the loss, damage, corruption or disclosure of Commonwealth information held, controlled or accessed by the entity or company; or b. the loss, damage or corruption or disclosure of the existence of, a classified Commonwealth asset held, controlled or accessed by the entity or company. Suitability: means a. in relation to a person’s employment, means the person is able to demonstrate the required qualifications and experience for the position, including satisfaction of any entity or company specific requirements; and b. in relation to a person’s security clearance, means the Australian Government Security Vetting Agency has established to the appropriate degree of satisfaction 4 that the person possesses and demonstrates the appropriate level of integrity, with any doubts about the person’s suitability for access to security classified resources resolved in favour of the national interest. TOP SECRET: the TOP SECRET security classification is used when the compromise of the confidentiality of information could be expected to cause exceptionally grave damage to the national interest. 5 Part 2 – Governance Arrangements 2. Protective security policy 14 To successfully deliver the GPO, entities and companies need to foster a positive attitude towards protective security to support a strong culture of security. 15 Clause 7 of the GPO requires entities and companies to prepare, maintain and implement a protective security policy. This clause aligns with mandatory requirement GOV-5 of the PSPF. 16 This policy should complement and support other entity or company operational procedures and include provision for governance arrangements, personnel security, physical security and information security. 17 An entity or company’s protective security policy can be included within other entity or company business or governance policies. 18 A protective security policy should set out operational practices to ensure the security of Commonwealth resources and personnel. 19 When developing a protective security policy, entities and companies are to ensure that the operational practices are appropriate having regard to: 2.1 the functions and operations of the entity or company - in adhering to clause 7, entities and companies should consult the Australian Standard for Risk Management AS/NZS ISO 31000:2009 and the Australian Standards HB 167:2006 Security risk management. the value, importance and sensitivity of the resources to which they relate - in adhering to this requirement, entities and companies should apply business impact levels when determining the consequences of compromise of confidentiality or loss of integrity or availability of entity or company resources, or harm to their people. Further guidance regarding the application of business impact levels is available in the Australian Government Protective security governance guidelines – Business impact levels. Security classifications applying to Commonwealth resources - in adhering to this requirement, entities and companies must apply the Australian Government Security Classification System (AGSCS), required by clause 15(1) of the GPO. Further guidance regarding the application of the AGSCS is set out at in Section 9 of these Guidelines. The operational practices of entities and companies must be appropriate having regard to the threat level and National Terrorism Public Alert System level of alert. Further guidance regarding the development of alert levels is available in the Australian Government Better practice guide—Developing agency alert levels. Governance arrangements 20 An entity or company’s governance arrangements should specify the relationship between protective security and the components of an entities or companies operational governance, including, but not limited to: fraud control security components of employee and public safety security requirements in contracts assigning security management roles audit and compliance reporting 6 3 processes for policy exceptions review and amendment business continuity and disaster recovery, and security violation and breach investigation and management arrangements. Further information may be obtained from the Australian Government Protective Security Governance guidelines – Reporting incidents and conducting security investigations. Protective security plan 21 Under clause 8 of the GPO, entities and companies must prepare, maintain and implement a security plan. The security plan may be a component of an entity or company’s other operational plans. This clause aligns with mandatory requirement GOV-4 of the PSPF. 22 A security plan should set out an entity or company’s individual protective security requirements and mitigation strategies according to the threat levels and risk to Commonwealth resources or Commonwealth personnel. In addition the plan should outline the practical steps that can be taken that will minimise these risks and address any residual risk. 23 An entity or company should develop site security plans for each individual entity or company site. The entity or company should assess each site separately so that the controls applied address the specific risks at each site. 24 Further guidance regarding the development of a security plan is available in the Australian Government Protective security better practice guide – Developing agency protective security policies, plans and procedures. 7 Part 3 – Personnel, Information and Physical Security Arrangements 4 Personnel security 4.1 Personnel security Policy 25 In accordance with clause 9 of the GPO, entities and companies must prepare, maintain and implement a personnel security policy, including: assessing and managing the ongoing suitability for engagement of Commonwealth personnel in relation to the security of Commonwealth resources security clearance requirements use of temporary access arrangements, and actions on separation of personnel. 4.2 Suitability for employment 26 Entities and companies should consider employment screening for all Commonwealth personnel including the need for agency-specific checks. For further guidance see section 7 of the Australian Government personnel security guidelines – Agency personnel security responsibilities. 27 Entities and companies should record the results of the employment screening for successful applicants and any additional agency specific screening relating to each person. 28 Entities and companies should have processes to monitor and evaluate the ongoing suitability of personnel through: performance management periodic suitability checks and declarations self-reporting by personnel reporting of concerns by other personnel, and contract management see section 8 of the Australian Government personnel security guidelines – Agency personnel security responsibilities for further guidance. 29 Entities and companies should have policies and procedures to allow the exchange of information about personnel suitability to access Commonwealth resources between personnel, managers, human resources and their security areas. 30 Entities and companies should base the personnel security component of their performance management program on their personnel security risk assessments. For more information on personnel security risk management see section 3 of the Australian Government Personnel security guidelines – Agency personnel security responsibilities. 31 As part of an entity or company’s personnel security risk assessment entities and companies should identify the periodic checks required to confirm a person’s ongoing suitability to access entity or company resources. 32 Entity or company performance assessments should identify personnel who display behavioural concerns including disregard for entity or company security policies and procedures. 8 4.3 Security clearances 33 In accordance with clause 10 of the GPO, entities and companies must identify, record and review: positions within the entity or company that require security clearances, and the levels of security clearance required. 4.3.1 Identifying and recording positions that require a security clearance 34 Personnel requiring ongoing access to Commonwealth security classified resources are to hold a security clearance at the appropriate level. 35 Entities or companies may use security clearances as an assurance measure in addition to their employment screening and entity or company specific controls for positions where the entity or company risk assessment deems the security clearance process is to apply. 36 An accountable authority or director is to decide if a role or position requires a security clearance. 37 An accountable authority or director may require that all entity or company personnel in a particular category be cleared to a specified level. Factors that may influence this decision include: the nature of the entity’s or company’s business an entity’s or company’s risk assessment the need to access the entity or company’s security classified information or resources or ICT systems, or the need for increased levels of assurance of employees’ suitability to perform particular roles. 38 Entities and companies are to maintain a register of positions that require a clearance. Before advertising a position, entities and companies are to identify: if the position requires a security clearance the level of clearance required whether the clearance is for access to Australian Government security classified information or to give a level of assurance, and when the requirement for a security clearance will be reassessed. 39 Entities and companies should periodically reassess the security clearance requirement for positions, at least each time the position becomes vacant and before it is advertised. 40 For further guidance, please refer to section 11 of the Australian Government Personnel Security guidelines – Agency personnel security responsibilities 4.4 Waiver of an eligibility requirement for a security clearance 41 Entities and companies are to confirm all clearance subjects are eligible, by confirming citizenship and checkable background requirements, prior to requesting a security clearance. 42 Under clause 10(3) of the GPO, entities and companies may waive an eligibility requirement for a security clearance with respect to citizenship or a checkable background. This provision aligns with mandatory requirement PERSEC 5 of the PSPF, as applicable to entities and companies. 9 Accountable authorities and directors need to be aware that granting an eligibility waiver, does not guarantee that a clearance will be granted by AGSVA. 43 As set out in clause 10(3)(a) of the GPO, an eligibility requirement may be only be waived where an exceptional operational requirement exists. An exceptional operational requirement will vary according to the entity or company’s unique requirements. 44 Accountable authorities and directors need to be aware of the inherent risks posed from a malicious trusted insider when granting eligibility waivers. An accountable authority or director’s decision to waive an eligibility requirement is to be based on a thorough analysis of the risks to the Australian Government and the possible impact on the national interest. 45 Accountable authorities and directors need to be aware that by granting a waiver, they are taking on a risk that may be detrimental to the Australian Government. If the documents supporting the waiver do not fully detail the risks to the National Interest, mitigations and any residual risks, AGSVA may reject the request for security clearance. 46 An eligibility waiver is role-specific, non-transferable, finite and subject to review. The waiver will only apply while the clearance holder remains in the position for which the clearance was granted. Waivers are to be reassessed on a yearly basis. 47 For further guidance, please refer to section 12.of the Australian Government Personnel Security guidelines – Agency personnel security responsibilities 4.4.1 Non-Australian citizens 48 Entities or companies may only grant an eligibility waiver with respect to citizenship where: it has been identified that there is no Australian citizen who could fill the position, and the entity or company understands and agrees to manage the risk. 49 Entities and companies should prepare a waiver assessment which should: include details of the exceptional circumstances that precludes the position being filled by an Australian citizen include the person’s visa status and whether they are actively seeking Australian citizenship consider the threat assessment from ASIO on the clearance subject’s country or countries of citizenship detail the entity or company’s plan to ensure the clearance subject does not access ‘Australian Eyes Only’ (AUSTEO) or third country ‘EYES ONLY’ material confirm consultation with third parties whose information may be accessed by the person who is subject to the waiver (either foreign or other Australian agencies) and, in the case of foreign agencies, agreement in the absence of an existing bilateral agreement allowing information exchange confirm specific approval from the originating or controlling agency whose TOP SECRET information may be accessed by the person who is subject to the waiver on a case by case basis confirm the date of issue of the waiver and the length of time it is to apply. 10 4.4.2 Uncheckable backgrounds 50 A ‘checkable background’ exists when AGSVA has validated information provided by a clearance subject from independent and reliable sources. A clearance subject is considered to have an ‘uncheckable background’ when AGSVA cannot complete the minimum checks and inquiries for the relevant checking period, or the checks and inquiries do not provide adequate assurance about the clearance subject’s life or background. 51 AGSVA may advise an entity or company that a clearance subject has an uncheckable background and provide an opportunity for the entity or company to grant an eligibility waiver with respect to that uncheckable background. If the entity or company wishes to grant an eligibility waiver for uncheckable backgrounds, the entity or company should prepare a waiver assessment which: includes details of the uncheckable background and an assessment of the impact of the period of uncheckability against the whole person considers potential conflicts of interest confirms that there are no known concerns about the individual contains confirmation of consultation with third parties that provide information that the person may access confirms the date of issue of the waiver and the length of time it is to apply. 4.4.3 Conditions for clearances subject to an eligibility waiver 52 Clearances granted with eligibility waivers will be subject to strict conditions. These may include, but are not limited to: the continuation of the eligibility waiver being conditional on the applicant taking Australian citizenship as soon as they are eligible where the subject has indicated they are actively seeking citizenship or do not have a valid reason not to seek citizenship the entity or company not allowing non-Australian citizens granted a waiver access to ‘Eyes Only’ information unless it includes the person’s country of citizenship and they have a need to know the entity or company not granting access to security classified information from a foreign government without the written agreement of that foreign government or as outlined in the provisions of any information sharing agreements, and the entity or company limiting access to security classified information to that required to perform the specific duty identified in the waiver. 53 Sponsoring entities and companies are to ensure a person subject to a waiver follows any conditions placed on the clearance. Sponsoring entities or companies are to advise AGSVA of any non-compliance with conditions of the waiver. 54 AGSVA will cease a clearance where the clearance subject does not adhere to the conditions of the waiver. 55 The sponsoring entity or company is to undertake a new waiver and risk assessment and advise AGSVA if a clearance subject changes duties. 4.5 Active monitoring of clearance holders 56 Clearance maintenance is a joint responsibility of the sponsoring entity or company, AGSVA and the individual clearance holder. The purpose of clearance maintenance is to ensure the ongoing 11 suitability of an individual to hold a security clearance. It is an ongoing process throughout the life of a security clearance. 57 AGSVA is responsible for the periodic review of clearance holders’ suitability (revalidations) and conducting any reviews for cause when specific issues or concerns arise that may affect a person’s ongoing suitability to hold a clearance. 58 Entities and companies are responsible for their security clearance holders (including Contractors). Entities and companies are to: provide security awareness training and security clearance specific briefings. For further information on security awareness training see section 8.2 of the Personnel security guidelines – Agency personnel security responsibilities advise and remind clearance holders of their ongoing obligation to report changes of circumstances and contacts that are suspicious, on-going, unusual or persistent. For further information see the Personnel security guidelines – Agency personnel security responsibilities provide ongoing supervision and management of clearance subjects including their suitability to access official resources notify the vetting agency of other issues of security concern relating to the ongoing suitability of clearance holders, including security incidents and any concerns relating to integrity, and manage any additional specific clearance maintenance requirements agreed by the vetting agency and the sponsoring entity or company as a condition of the security clearance. 4.6 Annual health check (confirmation of ongoing suitability to access official resources) 59 Entities and companies are to annually require: clearance holders to confirm that they have reported to their entities or companies security section: - all changes of circumstances - any suspicious, on-going, unusual or persistent contacts clearance holders to complete any required security awareness training, and managers responsible for personnel to confirm they have reported any concerns about the clearance holders. 60 Entities and companies are to report any security concerns they have as to the ongoing suitability of their clearance subjects to AGSVA. 61 The annual health check does not replace an entity or company’s ongoing responsibility for their performance management including code of conduct investigations. 62 For further information on the annual health check see section 14 of the Personnel security guidelines – Agency personnel security responsibilities. 4.7 Sharing of information 63 Entities and companies are to provide AGSVA with any information about the suitability of a person to hold a security clearance. This includes but is not limited to: negative results of entity or company specific checks (organisational suitability) 12 any changes of circumstances that may affect an individual’s ongoing suitability to hold a security clearance suspicious, on-going, unusual or persistent foreign contacts incident and investigation results, and where a breach of the code of conduct has been established or a security violation proven or personnel management concerns that may call into question the integrity of the person. 64 Entities and companies should not use the clearance review process to deal with personnel management problems (e.g. underperformance). However, if it is likely that such concerns could affect a person’s suitability to hold a clearance, line managers should notify their security section who in turn may notify AGSVA. 65 AGSVA is to advise entities and companies of any suitability concerns raised about clearance subjects and any pending or active reviews for cause. In such cases and based on a risk assessment the sponsoring agency is to determine whether to limit or suspend the clearance subject’s access to security classified resources. 4.8 Reportable changes of personal circumstances 66 Entities and companies are to require their clearance holders to advise their security section of any reportable changes in personal circumstances. For further details on what is a reportable change of circumstance see section 14.2 of the Personnel security guidelines – Agency personnel security responsibilities. 67 Entities and companies are to also require personnel to advise the entity or company of changes in personal circumstances of other clearance holders if they have concerns that may be relevant to a clearance holder’s suitability. 68 The entity or company is to then advise AGSVA of any notified reportable changes in circumstances. 4.9 Actions on separation of personnel 69 Under clause 9 of the GPO, entities and companies must have policies to manage security related matters when a person leaves the employment of, or terminates their relationship with the entity or company. 70 Entities and companies need to consider the risks to the ongoing confidentiality, integrity and availability of their resources by personnel who are terminating their employment or are taking long term leave. 71 Prior to separation or long term leave entities and companies should: as part of exit procedures, confirm with the employee their ongoing confidentiality requirements, including the use of intellectual property where a security clearance is held, inform AGSVA of the employee’s cessation including whether there are any outstanding issues of a protective security nature consider conducting an audit to determine whether the employee has forwarded any proprietary information without approval (particularly when an employee is moving into a private sector position) retrieve ICT equipment or physical assets that are issued to the employee, in particular any portable devices, and 13 recover any corporate credit cards. 72 Upon separation or long term leave entities and companies should have in place procedures to: change any shared account passwords that were known by the employee remove access to agency ICT systems including any special access arrangements and have processes in place to cancel that access (for example: administrator access, TOP SECRET networks, ASNET) disable any remote access to the ICT systems, including email and telephone voicemail remind remaining staff of their responsibility to report any contact by previous employees with a suspicious, persistent or unusual interest in their work or that of the agency in general revoke physical access to facilities and retrieve keys and/or access cards, and change any combinations of locks—e.g., doors, safes or security containers to which the staff member had access. 73 If the person leaving the entity or company holds a security clearance, entities and companies are to, where appropriate: obtain an assurance that individuals are aware of their ongoing obligations in respect to national security and confidentiality identify any departing staff that represent a security risk report any identified risks and any significant security concerns associated with a clearance holder’s separation to AGSVA where applicable, notify compartment holders and organise a debrief from those compartments, and where clearance holders depart suddenly without obtaining assurances of an individual’s ongoing obligations, undertake a risk assessment to identify any security implications relating to the departure and report those vulnerabilities as appropriate. See section 8 – reporting security incidents. 74 For further information about separation of personnel and contractors see section 9 and 14.4 of the Personnel security guidelines: Agency personnel security responsibilities. 5 Confidentiality of information 75 Under clause 12 of the GPO, entities and companies must ensure that all Commonwealth personnel agree that they are responsible for safeguarding against the loss or misuse of, or compromise of, Commonwealth resources for which they are responsible. 76 In circumstances where Commonwealth personnel will have access to Commonwealth resources, entities and companies should consider requiring such personnel to execute a signed confidentiality agreement in the form contained in Annexure A or Annexure B as relevant. 6 Information security 6.1 Access to Commonwealth resources 77 Entities and companies should develop information security policies that include reasons for: classification and business impact levels 14 information and ICT access, including ICT systems development and implementation email and internet use, and removal of information from entity or company premises. 78 In accordance with clause 13 of the GPO, entities and companies must ensure that Commonwealth resources are accessed by individuals on a need to know basis and where necessary, have the required security clearance. 79 Entities and companies are to provide information on the ‘need to know’ principle to all personnel as part of their security awareness training. 80 Entities and companies are to ensure that the following principles of good information security practice are applied including that: information can only be released to organisations and individuals with a demonstrated need to know information is stored and processed away from public access the removal of information from entity or company premises is on the basis of identified need the disposal of information is by secure means, and the transmission and transfer of information is by means which deter unauthorised access—for example, external mail is sealed and electronic transmission is in accordance with the Information Security Manual requirements. 6.2 Temporary access to classified information 81 Under clause 14 of the GPO, temporary access can be provided to Commonwealth personnel who do not hold a security clearance in the circumstances set out in clauses 14(1) (a) to 14(1) (d) of the GPO. 82 There are two types of temporary access arrangements: short term access – allows an employee access to Australian Government classified resources where they do not hold a clearance at an appropriate level and are not being assessed for a clearance or are yet to submit a completed clearance pack and, provisional access – allows access to Australian Government classified resources while a clearance subject is undergoing a clearance after they have submitted a completed clearance pack. 83 Temporary access allows limited, supervised access to security classified resources and is not a security clearance. 84 Temporary access provisions are not to apply to positions where security clearances are used only as a measure of assurance. 85 Entities and companies are to base any decision to approve temporary access on a documented risk assessment. 86 Entities and companies should conduct a risk assessment of the person for whom temporary access is proposed, which should consider any existing mitigating factors—e.g. holding a security clearance at a lower level, employment screening or any entity or company specific checks. 87 Prior to granting temporary access the sponsoring entity or company is to confirm with AGSVA that there are no known concerns about the person for whom temporary access is proposed. 15 88 AGSVA is to advise the entity or company of any existing or prior limitations on the person requiring access. 89 If advised of any concerns by AGSVA, the sponsoring entity or company is to base any decision to allow (or if already allowed, to continue) the clearance subject’s temporary access to security classified information and resources on a documented risk assessment. 90 The sponsoring entity or company is to deny or withdraw temporary access to security classified resources if concerns cannot be mitigated to a level acceptable by the entity or company or other affected parties. 91 Sponsoring entities and companies are to advise AGSVA of any approved temporary access. AGSVA is to record the access on the clearance subject’s personal security. 92 For information about providing temporary access to TOP SECRET classified resources see section 7 of the Australian Government Personnel Security Protocol. 93 For further information on temporary access see section 10 of the Personnel security guidelines Agency personnel security responsibilities. 6.3 Security classifications 94 Entities and companies are to apply security classification levels as set out in the GPO. Entities and companies should develop their own classification guides to assist their personnel in classifying their entity and company information. 95 Further guidance is available in the Australian Government Protective security governance guidelines – Business impact levels and the Australian Government’s Protective security better practice guide – Developing an agency classification guide. 6.3.1 Protective markings 96 Information that needs protection is to be assigned a protective marking showing the level and protection required. There are three types of protective markings: security classifications dissemination limiting markers (DLMs), and caveats. 97 Information is to be protectively marked if its compromise could damage the national interest, organisations or individuals, or requires protection under the Privacy Act 1988 (Cth) and the Archives Act 1983 (Cth) or other legislation. Once information has been identified as requiring some form of protection and special handling, a protective marking is to be assigned to the information. The marking indicates: that the confidentiality of the information needs protection, and the level of protective procedures that are to be provided during the use, storage, transmission, transfer and disposal of the information. 98 A summary guide on identifying information requiring a protective marking is at Annexure C of these Guidelines. 99 Further guidance is available in the Australian Government Information Security guidelines – Australian Government security classification system and Australian Government Protective security governance guidelines – Business impact levels. 16 6.3.2 Foreign government information 100 Where information is provided in accordance with a bilateral or multilateral security instrument for the reciprocal protection of exchanged official or classified information, it is to be given the equivalent Australian protective security marking or in accordance with the agreement. See section 6 of the Australian Government Information Security guidelines – Australian Government security classification system. 6.4 ICT systems and networks 101 Under clause 16 of the GPO, entities and companies must implement security measures for all stages of ICT system development, including when new ICT systems are implemented. The measures should be appropriate, having regard to the assessed security risk of the information holdings contained within, or passing across, ICT networks infrastructures and applications. This clause aligns with mandatory requirement INFOSEC 6 of the PSPF, as applicable to entities and companies. For further guidance, see the Australian Government Information Security Management Protocol. 102 Entities and companies should use section 12 of the AS/NZS ISO/IEC 27002:2006 Information technology—Security techniques—Code of practice for information security when developing their operational security management procedures and measures. The Australian Government Information Security Manual (ISM) prepared by Australian Signals Directorate should be consulted for further information regarding operational security management procedures and controls. 6.4.1 Operational information security management 103 Under clause 16 of the GPO, entities and companies must ensure: ICT systems and network tasks are managed securely and consistently the use of application whitelisting the patch of applications and operating systems as soon as reasonably practicable giving consideration to the criticality of the patch, and administrative privileges are minimised. 104 The requirement under clause 16 of the GPO aligns with mandatory requirement INFOSEC 4 of the PSPF, as applicable to entities and companies. Under INFOSEC4, entities and companies must implement the mandatory Top 4 Strategies to Mitigate Targeted Cyber Intrusions as detailed in the Controls manual of the ISM. For further guidance, see the Information Security Management Protocol. 7 Physical security 105 Entities and companies must have policies and procedures in place to ensure the safety of personnel, clients and Australian Government resources that are appropriate and meet their business needs. 106 Entities and companies should inform their personnel of their physical security policies and procedures covering: measures operating in the entity’s or company’s work environment and how they provide security functions and resources that the measures are designed to protect 17 how their measures interact and support governance, personnel and information security measures the security responsibilities of the personnel working in each work area and location the requirement to report security issues or incidents in work areas, and any consequences of failing to adhere to policies and procedures. 7.1 Security of facilities 107 Under clause 17(2) of the GPO, entities and companies must implement physical security measures that minimise the risk of Commonwealth resources being accessed, used, removed or made inoperable without appropriate authorisation. This sub clause aligns with the PHYSEC mandatory requirements of the PSPF. 108 Entities and companies are to ensure that their facilities containing Commonwealth resources provide a level of protection commensurate with the assessed business impact of the compromise, loss of integrity, or unavailability of the resources, both during and outside working hours. For further information see the Australian Government Physical security management guidelines – Security zones and risk mitigation control measures. 109 An entity or company’s physical security policy should cover: entity or company and visitor access arrangements site specific policies where there are different roles/risks in facilities security and safety of people – in conjunction with other entity or company safety policies working outside of entity or company facilities (remotely), and physical security of information and ICT systems. 7.2 Physical security of information 110 Entities and companies are to provide physical protection of hardcopy and electronic information in accordance with the business impact resulting from the compromise, loss of integrity or unavailability of the information. 111 ‘Aggregation’ is a term used to describe the compilation of classified or unclassified Commonwealth information that may require a higher level of protection than the individual pieces of information in the compilation. This is because the compilation of information generates a greater value, and the consequence of compromise, loss of integrity, or unavailability creates an increase in the business impact level. 112 Entities and companies are to implement physical security measures to mitigate the risks associated with the impact of loss, compromise or unavailability of aggregations of information. Further information may be obtained from the Australian Government protective security governance guidelines—Business impact levels. 7.3 Minimum requirements for protecting security classified information 113 Entities and companies are required to comply with the security requirements set out in the Australian Government physical security management guidelines—Security zones and risk mitigation control measures for protecting security classified information, valuable physical assets, or the aggregation of information and physical assets, where the compromise, loss of availability, or loss of integrity of that material would cause extreme or catastrophic impact to the national interest. 18 114 Entities and companies holding TOP SECRET information are also required to comply with: ASIO Technical Note – Physical Security of Secure Areas/SR1 Rooms, and supplement to the Technical Note – Physical Security of TOP SECRET Areas (accessible on a need to know basis by contacting pspf@ag.gov.au). 115 If for any reason, an entity or company cannot meet these requirements, it is required to first obtain approval from ASIO-T4, as well as the originator of the material, to hold any TOP SECRET information or aggregation of information, the compromise, loss of integrity or unavailability of which would cause a catastrophic impact for each site used. 7.3.1 Use of SCEC approved products 116 The Security Construction and Equipment Committee (SCEC) tests and approves security products that primarily focus on protecting security classified information were the compromise, loss of integrity or unavailability of which would result in a business impact level of high or above, products that prevent widespread loss of life, and other security products that require specialist testing. These approved items are listed in the SCEC Security Equipment Evaluated Products List. 117 Entities and companies are to use SCEC-approved equipment for the protection of official information as identified in the Australian Government physical security management guidelines—Security zones and risk mitigation control measures. 7.4 Integration of security measures during planning/modification of facilities 118 Under clause 17(3) of the GPO, entities and companies must ensure that they fully integrate protective security measures early in the process of planning, selecting, designing or modifying its facilities. This sub clause aligns with mandatory requirement PHYSEC 3 of the PSPF as applicable to entities and companies. 119 Entities and companies are required to follow the detailed guidance in Australian Government physical security management guidelines—Security zones and risk mitigation control measures to determine how they should apply the security zones categories to treat their risks and integrate their security control measures. 120 To achieve the consistent security zone standards, entities and companies are required to apply the control measures, the control components and individual elements detailed in Tables 4 and 5 of Australian Government physical security management guidelines—Security zones and risk mitigation control measures. Entities and companies are to certify the application of these measures and accredit the security zones as detailed in these guidelines. 7.5 Developing agency alert levels and guides 121 Alert level guides provide advice to employees on the measures used by an entity or company to mitigate emergencies and heightened threat levels. Alert levels should take an ‘all hazards’ approach as physical and environmental threats may have the same, or greater, impact on an agency’s ability to function as the traditional security threats. 122 Protective security measures should provide assurance in information and asset sharing arrangements, as well as mitigate the risks to entity or company personnel and resources. Alert levels allow entities and companies to scale the controls used to mitigate risks as the risks increase or decrease. 123 The source of an entity’s or company’s physical security risks can be categorised into three areas: 19 Event – an event is an important happening or incident impacting on the entity’s or company’s ability to function such as a weather event (e.g. storm) or an emergency event (e.g. fire). Threat – a threat is a declared intent to inflict harm on entity or company staff or property. Activity – an activity is an action by one or more people likely to have a negative impact on physical security (e.g. protest activity, filming in the vicinity of premises). 124 If an entity’s or company’s protective security or safety measures are damaged or breached by an event or activity, or there is credible evidence to support a threat, then the response might be an escalation in agency alert level. 125 Entity or company specific alert levels should be based on possible sources of risk to the entities or companies physical security identified in their security risk assessment. The number of alert levels an entity or company needs will be determined by their risk sources and operating environment. 126 For further information on developing alert levels see the Protective security better practice guide: Developing agency alert levels. 20 Part 4 – Reporting 8 Reporting security incidents 127 Under clause 18 of the GPO, entities and companies must report, as soon as reasonably practicable, security violations, as follows: if the violation relates to information communications technology—to the Director of the Australian Signals Directorate asd.assist@defence.gov.au or 1300 292 371 if the violation relates to national security—to the Director-General of Security on (02) 6249 6299, and if the violation impacts on Commonwealth resources originating from, or a person employed by, or subject to the direction of, another entity or company—to the accountable authority or directors of the other entity or company. 128 Entities and companies should report any suspected criminal activity to the Australian Federal Police or to their State or Territory Police. If entities or companies are in doubt about where they should report they should contact the national security hotline on 1800 123400 or hotline@nationalsecurity.gov.au . 129 If a security incident relates to a security clearance subject, entities and companies should report it to AGSVA through the Change of Circumstance Notification Form. 130 Entities and companies should assess the harm from any security breach or violation to determine the impact on the Australian Government of the actual or suspected loss, compromise or disclosure. The Business Impact Levels Guidelines can assist entities in identifying the business impacts arising from the compromise of confidentiality, integrity or availability of Commonwealth resources or harm to individuals or organisations. 131 Entities and companies should report any security breaches that have a business impact level of very high or above; or if multiple breaches occur. 132 Annexure D will assist entities and companies in differentiating between a violation and a security breach. 8.1 Examples of security incidents 133 Examples of security incidents that Commonwealth personnel should report to entity or company security staff are: criminal actions such as actual or attempted theft, break and enter, vandalism, fraud or assault natural occurrences such as fire or storm damage, which may compromise agency security incorrect handling of protectively marked information, such as failure to: o provide the required protection during transfer or transmission resulting in a data spill on an electronic information network or system o store security classified information in an appropriate security container o correctly secure security containers, or o hold appropriate authorisation to access official information sharing official information with a person who is not authorised to access it sharing computer passwords or other access control mechanisms 21 any unauthorised use of official resources, and any deliberate non-compliance or circumvention of an entities or companies security policies. 8.2 Procedures for ensuring staff report and record security incidents 8.2.1 Entity or company protective security policy 134 The entity’s or company’s protective security policy and procedures should make provisions for reporting and recording security incidents by: requiring Commonwealth personnel to report security violations or breaches including formal procedures and mechanisms to make it easy to report security violations or breaches requiring the entity or company to maintain records of any reported violation or breach and any other security incidents, and including procedures for dealing with security violations or breaches. 8.3 Reporting security incidents to ASIO 135 Entities and companies are required to report to ASIO any security violations and security breaches that involve suspected: espionage sabotage acts of foreign interference attacks on Australia’s defence system politically motivated violence promotion of communal violence, or serious threats to Australia’s territorial and border integrity. 136 Dependent upon the assessment, ASIO will either: recommend the entity continue with its own investigation and advise ASIO of the outcome, or conduct the investigation, in close consultation with the agency, and possibly in conjunction with the Australian Federal Police (AFP). 137 The agency should strictly observe the need to know principle in relation to the details of a security violation or major security breach and the fact that it has occurred until ASIO advises otherwise. 8.4 Reporting cyber security incidents to ASD 138 Entities and companies are required to report suspected cyber security incidents to ASD including: suspicious or seemingly targeted emails with attachments or links any compromise or corruption of information unauthorised hacking 22 any viruses any disruption or damage to services or equipment, and data spills. 139 Entity or company ICT security policies and plans should require early contact with ASD to avoid inadvertently compromising any investigation into a cyber security incident. 140 Further information on security incidents and reporting can be obtained from the Australian Government Protective Security Governance Guide – Reporting Incidents and Conducting Security Investigations. 9 Annual reporting on compliance 141 Under clause 19 of the GPO entities and companies are to submit a self-assessment of their compliance with the GPO for the year ending 30 June to their relevant portfolio Minister. Reports are to be submitted no later than 31 August of each year. Reports received after this dates will be recorded as non-compliant. 142 The first annual report is due 31 August 2017, and thereafter annually. 143 Based on the sensitivity of the report, compliance with the GPO can be incorporated into other reporting to the relevant Minister. 144 The annual report must identify: any provisions of the GPO that the entity or company has not complied with during the period covered by the report the circumstances in which the non-compliance occurred the reasons for the non-compliance, and details of the risk based measures taken or to be taken to address the non-compliance, including, where relevant, measures taken to ensure that such failures do not re occur and timeframes for implementing measures. 145 The annual report must also state the numbers and levels of security clearances granted subject to: citizenship waivers, and uncheckable background waivers. 146 Entities and companies must report to: their portfolio Minister, and the Secretary, Attorney General’s Department via email to pspf@ag.gov.au. 147 Entities and companies must also report any cyber security incidents to the Director of ASD and national security issues to the Director-General Security, as detailed in section 9. 148 For further information on reporting see the Australian Government – Protective security governance guidelines – Compliance reporting. 23 Annexure A – Template deed of confidentiality for execution by an employee1 DEED OF CONFIDENTIALITY DEED OF CONFIDENTIALITY THIS DEED IS MADE ON THE DAY OF 201[ ] This Deed is made by: [insert full name of person or company] [insert ABN] (the Confidant) RECITALS i. In the course of the Confidant’s employment by the Commonwealth, a Confidant may become aware of Confidential Information belonging to or in the possession of the Commonwealth, or which is made available to the Confidant by the Commonwealth. ii. Improper use or disclosure of confidential information would severely damage the Commonwealth's ability to perform its governmental or statutory functions and the rights of other parties. iii. The Confidant agrees that it is necessary to take all reasonable steps (including the execution of this Deed) to ensure that the Confidential Information is kept confidential. AGREED COVENANTS 1. INTERPRETATION 1.1. In the interpretation of this Deed unless the contrary intention appears or the context otherwise requires or admits, the following expressions shall have their respective meanings: ‘Confidential Information' means information that; 1.1.1. is by its nature confidential; 1.1.2. is designated by the Commonwealth as confidential; 1.1.3. the Confidant knows or ought to know is confidential; or 1.1.4. is provided to the Confidant in support of the Activity after this Deed has been signed. This includes, but is not limited to, any information which the Confidant knows or ought to know is not to be made public, but does not include information which: 1.1.5. is or becomes public knowledge other than by breach of any obligation of confidentiality owed to the Commonwealth; or 1.1.6. 1 is required to be disclosed by law. Entities and companies should seek independent legal advice prior to utilising this template. 24 ‘the Confidant’ means the person which receives Confidential Information and executes this Deed. ‘the Commonwealth’ means the Commonwealth Government of Australia, as represented by the [insert name of entity or company]. 1.2. Unless the contrary intention appears: 1.2.1. the clause and clause headings are for reference only and have no effect in limiting or extending the language of the provisions to which they refer 1.2.2. words in the singular include the plural and vice versa 1.2.3. words importing a gender include any other gender 1.2.4. a reference to a person includes a partnership and a body whether corporate or otherwise 1.2.5. a reference to a clause or a clause heading is a reference to a clause or clauses in this Deed, and 1.2.6. whether a word or phrase is given a particular meaning, other parts of speech and grammatical forms of that word or phrase have corresponding meanings. 2. DISCLOSURE 2.1. Disclosure can be made by the Confidant to any person within the Commonwealth as represented by the corporate Commonwealth entity or wholly-owned Commonwealth company set out in clause 1.1 but only if it is necessary and essential for Confidant to carry out his duties as an employee of the Commonwealth. 3. NON-DISCLOSURE 3.1. In circumstances other than those outlined in clause 2, the Confidant must not disclose Confidential Information to any person or party without the prior written consent of the Commonwealth. 3.2. The Commonwealth may grant or withhold its consent in its absolute and unfettered discretion. 3.3. If the Commonwealth grants its consent, it may impose conditions on that consent. 3.4. If the Commonwealth grants consent subject to conditions, the Confidant must comply with those conditions. 3.5. The obligations of the Confidant under this Deed shall not be taken to have been breached where the Confidential Information is legally required to be disclosed. 4. COMMONWEALTH MAY ENFORCE DEED 4.1. The Confidant agrees that the obligations in this Deed are for the benefit of the Commonwealth, and that the Commonwealth may enforce the obligations herein. 5. NO EXCLUSION OF LAW OR EQUITY 5.1. This Deed must not be construed to exclude the operation of any principle of law or equity intended to protect and preserve the confidentiality of the Confidential Information. 6. WAIVER 6.1. No waiver by the Commonwealth of one breach of any obligation or provision herein contained or implied shall operate as a waiver of another breach of the same or of any other obligation or provision herein contained or implied. 25 6.2. None of the provisions hereof shall be taken either at law or in equity to have been varied, waived, discharged or released by the Commonwealths unless by the Commonwealth’s express consent in writing. 7. GOVERNING LAW 7.1. The law applying in the Australian Capital Territory applies to this Deed.2 7.2. The courts of the Australian Capital Territory have exclusive jurisdiction to decide any matter. Executed as a Deed SIGNED, SEALED AND DELIVERED by: Name of Signatory Signature Name of Witness Signature 2 This template deed has been prepared to meet the requirements of the Australian Capital Territory jurisdiction. This template deed can be used in other jurisdictions without modifying the template. If entities or companies choose to change the jurisdiction to their own State and Territory, there may be different legal requirements and legal advice should be sought. 26 Annexure B – Template deed of confidentiality for execution by a contractor 3 DEED OF CONFIDENTIALITY DEED OF CONFIDENTIALITY THIS DEED IS MADE ON THE DAY OF 201[ ] This Deed is made by: [insert full name of person or company] [insert ABN] (the Confidant) RECITALS i. In the course of the Activity, a Confidant may become aware of Confidential Information belonging to or in the possession of the Commonwealth, or which is made available to the Confidant by the Commonwealth. ii. Improper use or disclosure of Confidential Information would severely damage the Commonwealth's ability to perform its governmental or statutory functions and the rights of other parties. iii. The Confidant agrees that it is necessary to take all reasonable steps (including the execution of this Deed) to ensure that the Confidential Information is kept confidential. AGREED COVENANTS 1. INTERPRETATION 1.1. The Confidant agrees that the obligations and restrictions contained in this Deed apply to the employees, agents and contractors (personnel) of the Confidant and that the Confidant must ensure that its personnel do not breach any part of this Deed. Definitions 1.2. In the interpretation of this Deed unless the contrary intention appears or the context otherwise requires or admits, the following expressions shall have their respective meanings: ‘Activity’ means [insert for example – the Confidant and the Commonwealth have agreed that the Confidant will provide services to the Commonwealth in accordance with the contract for [insert] dated [insert]]. ‘Confidential Information' means information that; 3 1.2.1. is by its nature confidential; 1.2.2. is designated by the Commonwealth as confidential; 1.2.3. the Confidant knows or ought to know is confidential; or Entities and companies should seek independent legal advice prior to utilising this template. 27 1.2.4. is provided to the Confidant in support of the Activity after this Deed has been signed. This includes, but is not limited to, any information which the Confidant knows or ought to know is not to be made public, but does not include information which: 1.2.5. is or becomes public knowledge other than by breach of any obligation of confidentiality owed to the Commonwealth; or 1.2.6. is required to be disclosed by law. ‘the Confidant’ means the person or entity which receives Confidential Information and executes this Deed. ‘the Commonwealth’ means the Commonwealth Government of Australia, as represented by the [insert name of entity or company]. 1.3. Unless the contrary intention appears: 1.3.1. the clause and clause headings are for reference only and have no effect in limiting or extending the language of the provisions to which they refer 1.3.2. words in the singular include the plural and vice versa 1.3.3. words importing a gender include any other gender 1.3.4. a reference to a person includes a partnership and a body whether corporate or otherwise 1.3.5. a reference to a clause or a clause heading is a reference to a clause or clauses in this Deed, and 1.3.6. whether a word or phrase is given a particular meaning, other parts of speech and grammatical forms of that word or phrase have corresponding meanings. 2. DISCLOSURE 2.1. Disclosure can be made by the Confidant to any person within the Confidant’s organisation (as applicable) but only if it is necessary and essential for the Activity. 2.2. By disclosing any Confidential Information to the aforementioned persons, it is the Confidant’s responsibility to ensure they have been briefed on the content of this Deed. 3. NON-DISCLOSURE 3.1. In circumstances other than those outlined in clause 2, the Confidant must not disclose Confidential Information to any person or party without the prior written consent of the Commonwealth. 3.2. The Commonwealth may grant or withhold its consent in its absolute and unfettered discretion. 3.3. If the Commonwealth grants its consent, it may impose conditions on that consent. In particular, but without limiting the generality of the preceding sentence, the Commonwealth may require that the Confidant procure the execution of a Deed in these terms, or such other terms as it may see fit, by the person to whom the Confidant proposes to disclose the Confidential Information. 3.4. If the Commonwealth grants consent subject to conditions, the Confidant must comply with those conditions. 28 3.5. The obligations of the Confidant under this Deed shall not be taken to have been breached where the Confidential Information is legally required to be disclosed, or where disclosure by the Confidant is permitted for the purposes of the Activity as outlined in clause 2. 4. COMMONWEALTH MAY ENFORCE DEED 4.1. The Confidant agrees that the obligations in this Deed are for the benefit of the Commonwealth, and that the Commonwealth may enforce the obligations herein. 5. NO EXCLUSION OF LAW OR EQUITY 5.1. This Deed must not be construed to exclude the operation of any principle of law or equity intended to protect and preserve the confidentiality of the Confidential Information. 6. WAIVER 6.1. No waiver by the Commonwealth of one breach of any obligation or provision herein contained or implied shall operate as a waiver of another breach of the same or of any other obligation or provision herein contained or implied. 6.2. None of the provisions hereof shall be taken either at law or in equity to have been varied, waived, discharged or released by the Commonwealths unless by the Commonwealth’s express consent in writing. 7. GOVERNING LAW 7.1. The law applying in the Australian Capital Territory applies to this Deed.4 7.2. The courts of the Australian Capital Territory have exclusive jurisdiction to decide any matter. Executed as a Deed SIGNED, SEALED AND DELIVERED for and on behalf of [INSERT] (ABN [INSERT]) in accordance with the requirements of section 127 of the Corporations Act 2001 (Cth) by: 4 This template deed has been prepared to meet the requirements of the Australian Capital Territory jurisdiction. This template deed can be used in other jurisdictions without modifying the template. If entities or companies choose to change the jurisdiction to their own State and Territory, there may be different legal requirements and legal advice should be sought. 29 Name of Director Signature Name of Director/Secretary Signature Dated [or if by an individual] SIGNED, SEALED AND DELIVERED by: Name of Signatory Signature Name of Witness Signature Dated 30 [or if by a partnership] SIGNED, SEALED AND DELIVERED by: Name of Partner Signature Name of Partner Signature In the presence of: Name of Witness Signature of Witness Dated 31 Annexure C – How to select an appropriate protective marking 32 Annexure D – Security violations and breaches Type of incident Definition Security Violation A deliberate, negligent or reckless action that leads, or could lead, to the loss, damage, corruption or disclosure of official resources Security Breach An accidental or unintentional failure to observe the protective security mandatory requirements Examples Examples are: espionage or suspected espionage loss of material classified CONFIDENTIAL or above, or significant quantities of material of a lower classification actual or suspected compromise of material at any level including tampering with security containers or systems actual or suspected hacking into any information and communications technology (ICT) system loss, compromise, suspected compromise, theft or attempted theft of classified equipment compromise of keys to security locks or of combination settings recovery of previously unreported missing classified material or equipment unauthorised disclosure of official or classified information, significant loss or compromise of cryptographic keying material or a significant breach of ICT systems as assessed by ASD actual or attempted unauthorised access to an alarm system covering a secured area where security classified information is stored loss, theft, attempted theft, recovery or suspicious incidents involving weapons, munitions, explosives, or hazardous materials whether nuclear, chemical, radiological or biological, or continuous breaches involving the same person or work area where the combination of the incidents warrants an investigation. Examples are: access passes or identification documents lost or left insecure failure to swipe access card (tailgating) leaving sensitive information on an unattended desk failing to lock computers before leaving a desk leaving entrance doors unlocked after hours security classified material left in UNCLASSIFIED waste bins, or security classified material not properly secured or stored. 33 Annexure E – Abbreviations and acronyms AGD Attorney-General’s Department AGSCS Australian Government Security Classification System AGSVA Australian Government Security Vetting Agency ASD Australian Signals Directorate ASIO Australian Security Intelligence Organisation ASIO-T4 DLM ASIO – T4 Protective Security Dissemination Limiting Marker GPO Government Policy Order, namely the Public Governance, Performance and Accountability (Protective Security Policy) Order 2015 ISM Australian Government Information Security Manual PGPA Act Public Governance, Performance and Accountability Act 2013 (Cth) PSPF Protective Security Policy Framework 34