Information Security Classification and Handling Guideline This guideline supports the Information Management (IM) procedure. Information security classifications Unless otherwise defined by any existing or superseding state or federal laws and/or legislation or policies, these information classifications are used within the Department of Education and Training1: Consequences, if released in an inappropriate manner Classification Description Public Information authorised to be made publicly available, or able to be released to the public, for example: address of a school name of principal of a school a departmental policy statement a departmental media release typical information on the department's website. No adverse effect is expected to result, if the information is widely circulated. Whilst public information has no confidentiality requirements it is still important to ensure its accuracy and completeness (integrity) prior to its release. Unclassified Non-sensitive information that is created or received within the department, is used internally and comprises of the bulk of information used within the department, for example: name of a successful bidder for a project names Parent & Citizens' Association (P&C) office holders at a school names of teachers teaching certain courses at a school typical information on department's internal website (intranet). The release of this information should not cause damage to the state, the department, commercial entities, or members of public. However, consideration of these factors needs to take place before a decision is made to make this information public. Approval from an information owner or manager needs to be given before unclassified information is made public. X-inconfidence Sensitive and confidential information that is created or received within the department. Access must be restricted to authorised persons on a 'need to know' basis. If released inappropriately, it might cause limited damage to the department or others. Examples include: personal details student results, disciplinary absence details, attainment details, medical details reason why an employee is absent rehabilitation records of an employee details of commercial transaction with the department. This information must be marked with the 'X' being replaced for example, staff-in-confidence, executivein-confidence, security-in-confidence, commercial-inconfidence and audit-in-confidence. In-confidence may be used as a general label where the need-toknow audience is not able to be clearly articulated in a label. Excludes Cabinet-in-confidence which is classified as protected. The inappropriate release of information in this category could: cause distress and inconvenience to individuals, and/or private entities result in limited financial loss to a party, or limited damage to a party's standing or reputation result in a breach of statutory restrictions on disclosure of information result in a breach of proper undertakings to maintain confidence of information provided by third parties prejudice an investigation of a crime. 1 Queensland Government Information Security Policy – Mandatory Clauses 2.2.2 Nov 2010, v1.0.2 Uncontrolled copy. Refer to the Department of Education and Training Policy and Procedure Register at http://ppr.det.qld.gov.au to ensure you have the most current version of this document. Page 1 of 7 Classification Description Consequences, if released in an inappropriate manner Protected (includes Cabinet-inconfidence) Very sensitive and confidential information that, in the event of unauthorised and/or premature disclosure, might cause damage to one or more parties for example: release of a security code for access to employee's personal information release of details of rates charged for work quoted in a tender to another competing tenderer after the tender has closed release of information about an employee's performance appraisal. Cabinet-in-confidence is to be applied to information, policies, bills and other types of submissions to the Queensland Cabinet. The inappropriate release of information in this category could: endanger an individual and/or private entity result in release of personal or commercially sensitive information to third parties cause financial loss to any party cause damage to any party's standing or reputation cause distress to any party threaten government agencies' systems, or agencies' capacity to conduct their business facilitate commission of a serious crime or hinder its detection impede an investigation of a crime. Highly protected Information that requires a substantial degree of protection as compromise of the information could cause serious damage to the state, the government, commercial entities or members of the public, for example: release of information about a tender price before the tender is closed, which could lead to substantial loss if it allowed a competitor to place a lower bid release of a student's location, when that student is under a child protection order release of details about a criminal investigation into a sexual abuse complaint at a school. The inappropriate release of information in this category could: cause a serious risk to any party's personal safety, including death result in release of personal, political or commercially sensitive data to third parties cause substantial financial loss to any party result in substantial distress being caused to any party create a significant threat to government agencies' systems or agencies' capacity to conduct their business assist in commissioning of a serious crime or hinder its detection. Detailed application and handing of the information security classifications is available within the Queensland Government Information Security Classification Framework (QGISCF) and the section below. Uncontrolled copy. Refer to the Department of Education and Training Policy and Procedure Register at http://ppr.det.qld.gov.au to ensure you have the most current version of this document. Page 2 of 7 Handling of information according to its information security classification Information security classification Item Action Public Unclassified In-confidence (excludes Protected Highly protected Stored in a locked drawer or filing cabinet. Label document or folder with classification, or affix label to magnetic media, if possible. Stored in a locker or secure container. Label document or folder with classification, or affix label to magnetic media, if possible. cabinet-in-confidence) Removable storage media including: paper documents files backup tapes removable hard drives CDs DVDs USB flash drives flash memory cards memory sticks. Storage Stored on departmental premises. No specific security requirements. No specific security requirements. Stored in a locked drawer or filing cabinet. Label document or folder with classification, or affix label to magnetic media, if possible. Stored outside of departmental premises. No specific security requirements. No specific security requirements. Stored securely e.g. locked Media must not be sent outside drawer or locked filing cabinet of departmental premises or in secure storage area. without the permission of the 'information owner'. Stored in a locker or container approved by permission of the 'information owner'. No specific security requirements. No specific security requirements. Send in a sealed envelope Send in a sealed envelope with with instructions for the item to instructions for the item to only only be opened by the be opened by the addressee. addressee. Must be hand delivered in a sealed envelope directly to the addressee. Sent outside of No specific departmental security premises (e.g. requirements. posted via Australia Post, courier, or hand delivery). No specific security requirements. Send in a sealed opaque Send in a sealed opaque envelope, padded bag or box. envelope, padded bag or box, with instructions for the item to be opened by the addressee only. Send in a sealed opaque envelope, padded bag or box by registered mail or courier, with instructions for the item to be opened by the addressee only. Carried outside of departmental premises. No specific security requirements. Must be carried securely e.g. in locked brief case or bag. Must be carried in a sealed envelope in a locked brief case or bag with the contents of any electronic media encrypted using approved encryption method. Transmission Sent within departmental premises. No specific security requirements. Must be carried in a sealed envelope in a locked brief case or bag, unless the contents of the media are encrypted using approved encryption method. Uncontrolled copy. Refer to the Department of Education and Training Policy and Procedure Register at http://ppr.det.qld.gov.au to ensure you have the most current version of this document. Page 3 of 7 Information security classification Item Action Public Unclassified In-confidence (excludes Protected Highly protected cabinet-in-confidence) Disposal Mobile information processing devices including: laptop computers PDAs notebook computers tablets mobile phones with text capability and other high level devices. Also applies to personally owned devices e.g. laptops, PDAs, notebooks, tablets, PCs Paper-based items. No specific security requirements. Recycle paper where a scheme exists. No specific security Items should be pulped or requirements. shredded. Recycle paper where a scheme exists. Items should be shredded with a crosscut shredder. Items should be shredded with a crosscut shredder. Optical media, including CD's, DVD's. Render disk unreadable by scratching surface or other means. Render disk Disks should be physically unreadable by destroyed or shredded. scratching surface or other means. Disks should be physically destroyed or shredded. Disks should be physically destroyed or shredded. Cartridge tapes. Degauss tape. Degauss tape. Degaussed prior to re-use. Tapes should be physically destroyed. Tapes should be physically destroyed. Removable hard drives, USB and other flash drives, memory sticks etc. Delete information prior to re-use. Delete information prior to re-use. If possible, information must be removed before return, using an Australian Signals Directorate recommended wiping program/procedure. If possible, information must be removed before return, using an Australian Signals Directorate recommended wiping program/procedure. If possible, information must be removed before return, using an Australian Signals Directorate recommended wiping program/procedure. Used on departmental premises. No specific security requirements. No specific security requirements. Access to device, file or record must be password protected. Device to be password protected and file or record to be encrypted using encryption functions and protocols approved by the Manager, Operational Security. Device to be password protected and file or record to be encrypted using encryption functions and protocols approved by the Manager, Operational Security. Used outside of departmental premises. No specific security requirements. No specific security requirements. Access to device, file or record must be password protected. Device to be password protected and files or records are to be encrypted using an approved encryption method. Device to be password protected and files or records are to be encrypted using an approved encryption method. Storage Uncontrolled copy. Refer to the Department of Education and Training Policy and Procedure Register at http://ppr.det.qld.gov.au to ensure you have the most current version of this document. Page 4 of 7 Information security classification Item Action Public Unclassified In-confidence (excludes Protected Highly protected Device to be password protected and files or records are to be encrypted using an approved encryption method. Device to be password protected and files or records are to be encrypted using an approved encryption method. cabinet-in-confidence) Transmission Carried outside of departmental premises. No specific security requirements. No specific security requirements. Access to device, file or record must be password protected. No specific security requirements. No specific security requirements. Information must be removed Information must be removed using an approved program or using an approved program or process. process. Information must be removed using an approved program or process. Used on departmental premises. No specific security requirements. No specific security requirements. Access to the device, file or record must be password protected. Access to the device and file or record must be password protected. Used outside of departmental premises. No specific security requirements. No specific security requirements. Device and file or record to be Information must be removed password protected. using an approved program or process. Information must be removed using an approved program or process. Undertaken on departmental premises. No specific security requirements. No specific security requirements. Employee repairing the item is to sign a non-disclosure agreement, and be made aware of the need to keep the information secure. Employee repairing the item is to sign a non-disclosure agreement, and be made aware of the need to keep the information secure. Employee repairing the item is to sign a non-disclosure agreement, and be made aware of the need to keep the information secure. Undertaken outside of departmental premises. No specific security requirements. No specific security requirements. Employee repairing the item is to sign a non-disclosure agreement, and be made aware of the need to keep the information secure. Employee repairing the item is to sign a non-disclosure agreement, and be made aware of the need to keep the information secure. Only use a repairer with secure data recovery and repair processes. Employee repairing the item is to sign a non-disclosure agreement, and be made aware of the need to keep the information secure. Only use a repairer with secure data recovery and repair processes. Disposal Removable media or mobile devices. Non mobile devices and non-removable storage media including: desktop computers PCs. It is not recommended that official or 'business' records, or sensitive information, be stored on internal hard drives of these machines e.g. on 'C' drive. Storage Access to the device and file or record must be password protected. Repair Uncontrolled copy. Refer to the Department of Education and Training Policy and Procedure Register at http://ppr.det.qld.gov.au to ensure you have the most current version of this document. Page 5 of 7 Information security classification Item Action Public Unclassified In-confidence (excludes Protected Highly protected cabinet-in-confidence) Warranty replacement of storage media or devices containing storage media. No specific security requirements. No specific security requirements. If possible, information must be removed before return, using an Australian Signals Directorate wiping program/procedure. Only use a repairer with secure data recovery and repair processes. If possible, information must be removed before return, using an Australian Signals Directorate wiping program/procedure. If information cannot be removed appropriately the storage media should be destroyed. If possible, information must be removed before return, using an Australian Signals Directorate wiping program/procedure. If information cannot be removed appropriately the storage media should be destroyed. Information must be removed before disposal. Re-format hard drive/s. Information must be removed before disposal. Re-format hard drive/s. If possible, information must be removed before return, using an approved wiping program. If information cannot be removed appropriately the storage media should be destroyed. The media or equipment is to be physically destroyed by cutting, breaking, bashing or burning and disposed of as classified waste. The media or equipment is to be physically destroyed by cutting, breaking, bashing or burning and disposed of as classified waste. No specific security requirements. No specific security requirements. Access to the file or record Information must be encrypted must be restricted by using an approved encryption password protection or access method. control. Information must be encrypted using an approved encryption method. Approval of the 'information owner' is required before the information is placed on the internet. Application subject to security audit, prior to implementation. Information must be encrypted Information not to be made using encryption functions and available via the internet. protocols approved by the Manager, Operational Security. Information not to be made available via the internet. Disposal Disposal of media / information equipment. Electronic Transmission transmission including: Within departmental emails instant messaging text messages facsimile documents. Remember that emails, text messages and faxes may be departmental documents, and suitable records need to be kept. WAN or school LAN. Outside departmental No specific WAN or school LAN. security requirements. Uncontrolled copy. Refer to the Department of Education and Training Policy and Procedure Register at http://ppr.det.qld.gov.au to ensure you have the most current version of this document. Page 6 of 7 Information security classification Item Action Public Unclassified In-confidence (excludes Protected Highly protected cabinet-in-confidence) Refer to the Information Management (IM) Procedure recordkeeping section. Extranets. No specific security requirements. Approval of 'information owner' required before information is placed on extranets. Extranet will be subject to security audit, prior to implementation. Information must be encrypted Information not to be made using an approved encryption available via extranet. method. Information not to be made available via extranet. Wireless. No specific security requirements. Wireless network to be secured in accord with the Mobile Telecommunications Facilities procedure. Wireless network to be secured in accord with the Mobile Telecommunications Facilities procedure. Information not to be made available via wireless network. Information not to be made available via wireless network. Faxes. No specific security requirements. May be transmitted in May be transmitted in the the clear (i.e. unclear (i.e. un-encrypted) on encrypted). internal networks only. Faxes should not be used for protected information. Faxes should not be used for highly protected information. Mobile phones. No specific security requirements. May be transmitted in Mobile phones should not be the clear (i.e. unused to discuss classified encrypted) information. Mobile phones should not be used to discuss classified information. Mobile phones should not be used to discuss classified information. Security and licence This document has an information security classification of public. © The State of Queensland (Department of Education and Training) 2013 Unless otherwise noted below, materials included in this paper are licensed under a Creative Commons Attribution 3.0 Australia licence. To view a copy of this licence, visit http://creativecommons.org/licenses/by/3.0/au/ Last review date: 7 April 2014 Final TRIM Ref: 14/32951 Uncontrolled copy. Refer to the Department of Education and Training Policy and Procedure Register at http://ppr.det.qld.gov.au to ensure you have the most current version of this document. Page 7 of 7