PSPF Glossary of terms - Protective Security Policy Framework

advertisement
Protective Security Policy Framework
Glossary of security terms
Amended
December 2014
Version 1.3
© Commonwealth of Australia 2011
All material presented in this publication is provided under a Creative Commons Attribution 3.0
Australia (http://creativecommons.org/licenses/by/3.0/au/deed.en ) licence.
For the avoidance of doubt, this means this licence only applies to material as set out in this
document.
The details of the relevant licence conditions are available on the Creative Commons website
(accessible using the links provided) as is the full legal code for the CC BY 3.0 AU licence
(http://creativecommons.org/licenses/by/3.0/legalcode ).
Use of the Coat of Arms
The terms under which the Coat of Arms can be used are detailed on the It's an Honour
(http://www.itsanhonour.gov.au/coat-arms/index.cfm) website.
Contact us
Inquiries regarding the licence and any use of this document are welcome at:
Commercial and Administrative Law Branch
Attorney-General’s Department
3-5 National Cct
BARTON ACT 2600
Telephone: (02) 6141 6666
copyright@ag.gov.au
Document details
Security classification
Unclassified
Dissemination limiting marking
Nil—Publicly available
Date of next review
July 2017
Authority
Protective Security Policy Committee
Author
Protective Security Policy Section
Attorney-General’s Department
Document status
Approved 1 June 2012
Amended November 2014
i
Amendments
No.
Date
Location
Amendment
1.
July 2012
Attorney-General’s
certificate
Amendments to wording of definition
2.
July 2012
Adverse security
assessment
Amendments to wording of definition
3.
July 2012
Prescribed administrative
action
4.
July 2012
Qualified security
assessment
5.
July 2012
For Official Use Only
Definition added
6.
June 2014
Sponsoring agency
Definition added
7.
June 2014
Whole person
Definition added
8.
June 2014
Manager
Definition added
9.
December 2014
National interest
Definition updated to include national economic
wellbeing
10.
December 2014
Throughout
Update definitions relating to personnel security
11.
December 2014
PROTECTED, CONFIDENTIAL
and SECRET
Update to reflect impact on the national interest,
organisations and individuals
12.
December 2014
TOP SECRET
Update to reflect impact on the national interest
Definition added
Amendments to wording of definition
ii
1.
Purpose
The purpose of this document is to define the terms, abbreviations and acronyms used in the
Protective Security Policy Framework.
2.
Terms and definitions
Term
Definition
Access
Obtaining knowledge or possession of information (including verbal,
electronic and hard-copy information) or other resources, or
obtaining admittance to an area.
Access control system
A system designed to limit access to facilities to authorised people
whose identify has been verified.
Accreditation
A procedure by which an authoritative body gives formal recognition,
approval, and acceptance of the associated residual security risk with
the operation, of a system.
Accountable material
Particularly sensitive information requiring strict access and
movement control – there are many types of information that could
constitute accountable material, but Cabinet documents are always
to be treated as accountable material.
Active
in reference to security
clearances
A maintained security clearance that is sponsored by an Australian
Government agency, and being maintained by a clearance holder and
sponsoring agency.
Adverse security assessment
An assessment from ASIO, in writing, that contains a
recommendation about a prescribed administrative action that
would be prejudicial to the interests of the person. For example, a
recommendation that a person should not be given access to
security classified material.
Agency
(also Australian Government
agency)
Includes all Australian Government non-corporate Commonwealth
entities, corporate Commonwealth entities or companies under the
Public Governance Performance and Accountability Act 2013 or other
bodies established in relation to public purposes.
Agency head
The head of any Australian Government department, authority,
agency or body.
Agency security adviser (ASA) The officer responsible for day-to-day management and operation of
the agency’s protective security.
Agency security management Employees who are responsible for the day-to-day protective
personnel
security functions within that agency, e.g. they may undertake duties
such as security risk reviews and audits, security awareness programs
for agency staff, they may be involved in the preparation of agency
security plans, and may provide advice on security risk management.
Agency security plan
The plan of action that articulates how an agency will manage its
security risks.
1
Term
Definition
Agency specific character
checks
Employment screening and ongoing suitability assessments
undertaken by an agency as part of its personnel security
management to address specific agency risks.
Agreement
An instrument, agreement, treaty between the Australian
Government and another government; or arrangement or MOU
between an Australian Government agency and a foreign agency for
the exchange and protection of information. Also see bilateral
agreement, government sponsored instrument and multilateral
agreement.
Aggregation
A term used to describe a compilation of classified or unclassified
official information or assets.
Annual health check
(also Annual confirmation of
suitability)
in reference to personnel
security
The annual confirmation by a manager about each employee they
are responsible for, including information regarding:

Whether the relevant employee:
- has reported any changes in circumstances
- is suitable to have continued access to official resources

any previously un-actioned security concerns
Assessing officer
A competent person who conducts personnel security clearances in
accordance with the procedures outlined in the PSPF.
Asset
An item that has a value to an agency—including personnel,
information and physical assets. Also see official resources.
Attached staff
APS employees from any agency, and ADF personnel, who are posted
overseas and who work mainly from the chancery premises (building
or office of a diplomatic or consular mission managed by DFAT).
Attorney-General’s certificate A certificate from the Attorney-General that prohibits or limits the
disclosure of grounds contained in the assessment or the fact there is
an assessment for reasons that disclosure would be prejudicial to the
interests of security.
Audit
An examination and verification of an agency’s systems and
procedures, measured against a predetermined standard.
Australian Government
agency
See agency.
Australian Government
The Australian Signals Directorate’s document suite that details
Information Security Manual controls, principles and rationale for information security on ICT
(ISM)
systems.
Australian Government
Protective Security Manual
(PSM)
Australia’s protective security policy until it was replaced by the
PSPF.
Australian Government
resources
The collective term used for Australian Government people,
information and assets.
2
Term
Definition
Australian New Zealand
Counter Terrorism
Committee (ANZCTC)
An inter-governmental committee that coordinates a cooperative
framework to counter terrorism. The committee meets biannually
and comprises representatives from the Australian (Commonwealth,
state and territory) and New Zealand Governments.
Australian Privacy Principles
(APPs)
Contained in Schedule 1 of the Privacy Act 1988 (Cth), the APPs
regulate the handling of personal information by Australian
Government agencies and some private sector organisations
Authorised agency
in reference to security
vetting
A Commonwealth agency authorised to undertake security vetting
and grant security clearances to meet the agency’s business needs.
Authorised persons
(also Specified persons)
in reference to contracting
Persons employed by a contractor to an agency, who are authorised
by the agency to carry out work or perform duties under the contract
with the agency.
Authorised Commonwealth
Officer
(also person authorised)
Section 89 of the Crimes Act 1914 (Cth) allows for the appointment
of Authorised Commonwealth Officers by a Minister to direct a
person to leave Commonwealth premises.
A person authorised in writing by a Minister or the public authority
under the Commonwealth occupying a premises may also direct a
person to leave premises occupied or in use by the public authority
under the Commonwealth under the Public Order (Protection of
Persons and Property) Act 1971 (Cth).
Availability
in reference to information
The desired state that allows authorised users to access defined
information for authorised purposes at the time they need to do so.
Baseline security clearance
Security clearance required for ongoing access to security classified
information at the PROTECTED level, or where a level of assurance is
required of a person’s suitability to perform a role.
Bilateral agreement
An agreement between the Australian Government, or an Australian
Government agency, and the government, or agency, of another
country that provides for the reciprocal exchange of usually security
classified information. The agreement also sets out the agreed
handling requirements. Also see multilateral agreement and
government sponsored security instrument.
Breach
See security breach.
Briefings
Additional specific training required prior to a person being given
access to certain Codeword or compartmented information or
sensitive sites.
Business continuity planning
(BCP)
The development, implementation and maintenance of policies,
frameworks and programs to assist agencies manage a business
disruption, as well as build agency resilience. It is the capability that
assists in preventing, preparing for, responding to, managing and
recovering from the impacts of a disruptive event.
3
Term
Definition
Business impact level
The level of impact on an agency’s ability to operate or on the
national interest, organisations or individuals, resulting from the
compromise of confidentiality, loss of integrity or loss of availability
of people, information or assets.
Business information
See Official information.
Cabinet documents
Material agencies prepare that is intended for submission to the
Cabinet (generally Cabinet submissions and attached material,
including audio visual presentations); and documents dealing with
Cabinet meetings (business lists, Cabinet minutes and notes taken by
Cabinet note takers). For further information refer to the Cabinet
Handbook.
Cabinet-in-Confidence
A legacy protective marking replaced by Sensitive: Cabinet.
Cancel
in reference to vetting
decisions
Circumstances where a security clearance is initiated, but not
completed by the vetting agency as:
 the sponsorship of the clearance was removed at the request of
the sponsoring agency
 the sponsorship or clearance requirement could not be
confirmed, or
 the clearance subject was non-compliant with the clearance
process.
Caveat
See security caveat.
Ceased
in reference to security
clearances
Circumstances where a security clearance:
 has been denied or revoked
 may have time-based conditions on when a clearance subject or
holder can reapply for a security clearance, or where the
clearance subject or holder is ineligible to hold or maintain a
security clearance.
Certification
Formal procedure by which an accredited or authorized person or
agency assesses and verifies (and attests in writing by issuing a
certificate) the attributes, characteristics, quality, qualification, or
status of individuals or organizations, goods or services, procedures
or processes, or events or situations, in accordance with established
requirements or standards. See Audit.
Change of circumstance
A change to an employee’s personal circumstances (i.e. change of
address, marriage/divorce, overseas travel) that may influence how a
person behaves or may make them vulnerable to coercion by an
external party.
Class A secure room
A room constructed and secured in accordance with ASIO
specifications – doors are fitted with two endorsed combination
locks; for further information refer to ASIO Technical Note 7-06 –
Class A Secure Room available to agency security advisers from the
Protective Security Policy community on GovDex.
Class A security container
A steel-lined concrete-strengthened container secured with an
endorsed combination lock manufactured to ASIO-approved
specifications; for further information refer to the SEC or SEEPL.
4
Term
Definition
Class B secure room
A room constructed and secured in accordance with ASIO
specifications – doors are fitted with one endorsed combination lock;
for further information refer to ASIO Technical Note 8-06 – Class B
Secure Room available to agency security advisers from the
Protective Security Policy community on GovDex.
Class B security container
A security container manufactured to ASIO-approved specifications;
for further information refer to the SEC or SEEPL.
Class C secure room
A room constructed and secured in accordance with ASIO
specifications and locked using one lock endorsed for the protection
of security classification information; for further information refer to
ASIO Technical Note 9-06 – Class C Secure Room available to agency
security advisers from the Protective Security Policy community on
GovDex.
Class C security container
A security container manufactured to ASIO-approved specifications;
for further information refer to the SEC or SEEPL.
Classification system
See security classification system.
Classified document register
(CDR)
A register that includes details of all accountable material produced,
received or sent; including TOP SECRET security classified documents,
and other security classified documents as required by agencies’
information security policies.
Clear desk policy
A policy requiring a person to ensure that official information and
other valuable resources are secured appropriately when the person
is absent from their workstation or work place.
Clear screen policy
A supplementary policy to the clear desk policy that requires a
person to ensure that information on ICT equipment is secured
appropriately when the person is absent from the work station, e.g.
by locking the ICT equipment.
Clearance
See security clearance.
Clearance process
in reference to personnel
security
The process of assessing a person’s suitability for access to security
classified information.
Codeword
A type of security caveat – a codeword is a word that indicates that
the information it covers is in a special ‘need-to-know’ category.
Those with a need to access the information will be cleared and
briefed about the significance of this type of information. See also
security caveat and source codeword.
Compromise or misuse
The means by which harm could be caused to resources, especially
loss, damage, corruption or disclosure of information, whether
deliberate or accidental.
5
Term
Definition
Communications security
(COMSEC)
All measures (including the use of cryptographic security,
transmission security, emission security and physical security
measures) applied to protect government telecommunications from
unauthorised interception and exploitation and to ensure the
authenticity of such telecommunications.
COMSEC officer
The person in an agency who is responsible for authorising and
controlling cryptographic access.
CONFIDENTIAL
A security classification that shows that compromise of
confidentiality of official information could cause significant damage
to the national interest, organisations or individuals.
Confidential information
Information provided with an expectation of confidentiality and that
it will only be used by and made available to people with a genuine
need-to-know. The meaning is broader than, and is not to be
confused with, CONFIDENTIAL security classified information.
Confidentiality
in reference to information
The limiting of official information to authorised users for approved
purposes - the confidentiality requirement is determined by
reference to the likely consequences of unauthorised disclosure of
official information. The Australian Government’s security
classification system has been developed to help agencies identify
information that has confidentiality requirements.
Conflict of interest
An interest or obligation, either inside or outside Australia, that could
interfere with, or hinder, a person’s performance of their duties; or
be perceived to interfere or hinder a person’s performance of their
duties.
Contact
See Security contact.
Contact Reporting Scheme
A scheme administered by ASIO that assists in identifying intelligence
or hostile activity directed against Australia and its interests,
government employees and contractors, and people who hold an
Australian Government security clearance. See the Australian
Government personnel security guidelines—Agency personnel
security responsibilities.
Contract
A legally enforceable agreement in which the parties to the contract
set out the terms and conditions of the agreement, the rights and
obligations or responsibilities of each party and the agreed outcomes
of the relationship.
Contracted service provider
(also contractor)
A person or business entity that has contracted with an agency for
the performance of services for, or supply of goods to, that agency.
Control
(also counter-measures)
A measure used to protect official information from compromise of
confidentiality, or mitigate an identified threat to an agency’s people,
information or assets.
6
Term
Definition
Crime prevention through
environmental design
(CPTED)
A multi-disciplinary approach to deterring opportunistic criminal
behaviour through environmental design using features including
natural surveillance (includes direct and indirect presence), access
control and territorial reinforcement—that is the design of clear
boundaries and use of landscaping features to define desired
movement areas and delineate borders.
Cryptographic information
(CRYPTO)
Information relating to keying material and cryptosystems used for
the protection of information. See the ISM for further details on
cryptographic requirements.
Competitive tendering and
contracting (CTC)
A process of selecting the preferred provider of goods and services
from a range of bidders by seeking offers and evaluating these
against pre-determined selection criteria.
Culture of security
See security culture.
Cyber espionage
Espionage using ICT equipment.
Data
See electronic information.
Day extenders
See tele-worker.
Deed of Confidentiality
A commitment not to disclose confidential information that is the
property of the Australian Government to any other party without
authorisation.
Denial of service
Deliberate compromise of the availability of IT systems.
Delegate
A person authorised by another person to act on their behalf.
Deny
in reference to vetting
decisions
A determination by a vetting agency that a clearance subject is not
eligible to hold an Australian Government security clearance at one
or more clearance levels.
Designated security
assessment position (DSAP)
A legacy term that refers to the definition of ‘designated position’ in
section 85ZL of the Crimes Act 1914 (Cth)
Disaster recovery plan (DRP)
Planning and implementation of procedures for the recovery of
essential systems that have a significant impact on an agency’s ability
to deliver its key outcomes.
Dissemination limiting
marker (DLM)
A protective marker that indicates access to official information
should be limited. It is applied to official information that has a low
to medium business impact from compromise of confidentiality—
that is the level of harm does not require security classification—and
should not be made public without review, or there may be a
legislative reason for limiting access.
Disposal Authority
A legal document issued by the National Archives of Australia to
authorise the disposal of Australian Government records – it
specifies classes of records and the minimum length of time they
should be kept.
Document
Anything on which information is recorded by any means, including
words, symbols, images or electro-magnetic impressions.
7
Term
Definition
Double enveloping
The use of two new opaque envelopes (an inner and an outer
envelope) to help protect security classified information in transit
from unauthorised access and, in the event of unauthorised access,
provide evidence of this to the recipient.
Duress alarm
An alarm that enables people to call for a security or police presence
in response to a threatening incident.
Electronic access control
system (EACS)
An electronic system to control access to agency facilities which
includes access control devices, control panel, monitoring station and
the policies and procedures to limit access to personnel with verified
identities.
Electronic information
Data or information stored or generated electronically including
metadata.
Eligibility waiver
An agency head’s decision to waive a security clearance eligibility
requirement based on a thorough analysis of the risks to the
Australian Government and the possible impact on the national
interest, organisations and individuals. This decision to waive the
eligibility is not a guarantee that the person will be found suitable for
a security clearance.
Emergency access
See Short term access
.
Emergency management
A range of measures designed to manage risks to agencies from
disasters and emergencies. Emergency management involves
developing and maintaining arrangements to prevent or mitigate,
prepare for, respond to, and recover from emergencies and
disasters.
Employment screening
Screening undertaken by an agency prior to employment of staff or
engagement of contractors to meet agency suitability criteria.
Employee
See personnel.
Employee Undertaking
See Deed of Confidentiality.
Encryption
The process of transforming data into an unintelligible form to
enable secure transmission.
Espionage
A government or individual obtaining information that is considered
secret or confidential without the permission of the holder of the
information. Espionage is illegal.
Evaluated product list (EPL)
A list of ICT security products, certified against internationally
recognised common criteria, for use by Australian and New Zealand
government agencies.
Event
Includes both planned and unplanned activities run by, or on behalf
of, an Australian Government agency.
Event attendees
All people attending an event including delegates, speakers, visitors
and support staff.
8
Term
Definition
Event manager
The person in overall control of an event—this may be an agency
employee or outsourced provider.
Event security officer (ESO)
The agency officer, or contractor responsible for the security of
people—attendees, staff and the public; information and assets at an
event.
Exceptional circumstances
Where the exception is critical to the agency meeting its outcomes
and the risks to the agency can be mitigated or managed in another
way.
Expired
in reference to security
clearances
A security clearance that:

is outside the revalidation period and is not sponsored by an
Australian Government agency

is a PV clearance and did not have an annual security appraisal
completed within a two year period

cannot be reactivated and reinstated, and

reverts to an initial security clearance assessment process if an
Australian Government agency provides sponsorship after the
end of the revalidation period.
Exposure
The degree to which a resource is open to, or attracts, harm.
External integrated system
(EIS)
A system that may be integrated or interoperable with a Security
Alarm System, e.g. CCTV, building management systems, EACS.
Facility
A building, part of a building, or complex of buildings, in which an
agency, or a particular agency function, is located. This can include
contractors’ premises.
Facility security inspection
An inspection of a contractor’s premises addressing the criteria
established in the contract between the contractor and the
Australian Government, to ensure that a secure environment
appropriate to the performance of the contracted function can be
provided by the contractor.
Firewall
A program or device designed to prevent unauthorised access to or
from a network or system.
Fit and proper person checks See agency specific character checks.
For Official Use Only
A DLM used to identify information when its compromise may cause
limited damage to the national interest, organisations or individuals.
Such information should be given some protection from
unauthorised access, but it does not require a security classification.
This DLM is not used with a Sensitive DLM.
Foreign government
Any government external to Australia. This also includes multinational or supra-national government and non-government
organisations, e.g. the North Atlantic Treaty Organisation, the
European Union and Interpol.
9
Term
Definition
Foreign government
information (FGI)
Information received and identified under the terms of a bilateral or
multilateral agreement as FGI, or information provided to the
Australian Government by a foreign government or governments,
with the expectation the information, the source of the information,
or both, will be held in confidence.
Fraud
Dishonestly obtaining a benefit or causing a loss by deception or
other means.
Full exclusion
An exclusion granted under the Spent Convictions Scheme that
requires all criminal offences to be declared. Also see Partial
Exclusion and No Exclusion.
Government information
See official information.
Government sponsored
security instrument
An agreement between the Australian Government and another
country’s government that provides for the reciprocal protection of
exchanged security classified information See bilateral agreement
and multinational agreement.
Grant
in reference to vetting
decisions
A determination by a vetting agency that a clearance subject is
eligible and suitable to hold an Australian Government security
clearance.
Grant - conditional
in reference to vetting
decisions
A determination by a vetting agency that the clearance subject is
eligible and suitable to hold an Australian Government security
clearance with conditions and/or maintenance requirements
attached to the clearance.
Harm
Any negative consequence, such as compromise of, or damage to, or
loss of, an asset.
Hazard
A source of potential harm –including threats.
Holders of high office
Includes current and former Governors-General and Prime Ministers,
Australian Government Ministers and those Senators and Members
assessed as being under threat.
Home-based work
The ability for an employee to carry out his or her duties while based
at his or her place of residence, subject to agency approval.
HIGHLY PROTECTED (HP)
A legacy non-national security protective marking that is no longer in
use.
ICT equipment
Any device that can process, store or transmit electronic
information—e.g. computers, multifunction devices and copiers,
landline and mobile phones, digital cameras, electronic storage
media and other radio devices.
ICT system equipment
A subset of ICT equipment that is used to maintain an ICT system—
for example, servers, communications network devices such as PABX,
gateways and network infrastructure such as cabling and patch
panels—this equipment is normally continuously operational.
10
Term
Definition
ICT facility
A building, a floor of a building or a designated space on the floor of
a building used to house or process large quantities of data, e.g.
server and gateway rooms, datacentres, back up repositories,
storage areas for ICT equipment, and communications and patch
rooms.
ICT system
A related set of hardware and software used for the processing,
storage or transmission of information and the governance
framework in which it operates.
In confidence
In reference to FGI
An exchange of foreign government information that was explicitly
or implicitly understood by the provider and the receiver to be not
for distribution, except where mutually agreed or understood. See
Freedom of Information Act 1982 (Cth)—Section 33 (b).
Inactive
in reference to security
clearances
A security clearance that is within the revalidation period, however
the clearance:
 is not sponsored by an Australian Government agency
 is not being maintained by the clearance holder for a period
greater than six months due to long term absence from their
role
 for the positive vetting level is within re-evaluation period but is
unsponsored; however, an annual security check was
completed within the last two years
 can be reactivated or reinstated provided the clearance is
sponsored by an Australian Government agency before the end
of the revalidation period, and
 cannot be reactivated until all change of circumstances
notifications covering the period of inactivity have been
assessed by a vetting agency.
Incident reporting
A scheme whereby security incidents (which can include security
infringements, breaches, violations, contacts or approaches) are
reported to a central point in the agency, usually the ASA – this
enables the agency undertake investigations, advise other affected
agencies and to collect statistics on its security vulnerabilities.
Ineligible
in reference to vetting
decisions
A determination by a vetting agency that a clearance subject is not
eligible for an Australian Government security clearance as they do
not hold Australian citizenship and/or have a checkable background.
Information
(also information assets or
information resources)
Documents and papers; electronic data; the software or systems
and networks on which the information is stored, processed or
communicated, intellectual information acquired by individuals and
physical items from which information regarding design, components
or use could be derived.
Information security
(INFOSEC)
All measures used to protect official information from compromise,
loss of integrity or unavailability. See also communications security.
Information Security Manual See Australian Government Information Security Manual.
(ISM)
11
Term
Definition
Information technology
security adviser (ITSA)
The officer responsible for information technology security
management across an Australian Government agency.
Infringement
See security infringement.
Integrity
in reference to information
The assurance that information has been created, amended or
deleted only by the intended authorised means – integrity relates to
information and communications technology (ICT) systems.
Intruder resistant area
A legacy term for an area secured so that it is suitable for handling,
storing and processing security classified material up to and including
SECRET, w This term has been replaced by Security Zone Two.
Jurisdictional
Relating to Australian state or territory governments.
Limited higher access
in reference to personnel
security
A legacy term for a type of temporary access that allowed a person
to access security classified information one level higher than
allowed by his or her existing clearance on a temporary basis only.
Now covered in Short term access
.
Logical access controls
ICT measures used to control access to ICT systems and their
information—this could involve using user identifications and
authenticators such as passwords.
Malware
Malicious software designed to disrupt computer operation, gather
sensitive information, or gain unauthorised access to computer
systems.
Metadata
Descriptive information about the content and context used to
identify information – for more information see the AGLS Metadata
Standard available from the National Archives of Australia.
Mobile computing and
communications
Work from a non-fixed location using portable computing/
communications devices.
Mobile employees
Employees who work at multiple locations using their mobile
computing device, as their primary ICT device.
Multilateral agreement
An agreement between the Australian Government, or an Australian
Government agency, and the governments, or agencies, of multiple
countries that provides for the reciprocal exchange of usually
security classified information. The agreement also sets out the
agreed handling requirements Also see bilateral agreement and
government sponsored security instrument.
12
Term
Definition
National interest
A matter which has or could have impact on Australia, including:
National security

national security

international relations

law and governance, including:
- interstate/ territory relations
- law enforcement operations where compromise could
hamper or prevent national crime prevention strategies
or investigations, or endanger personal safety

economic wellbeing

heritage

culture.
A term used to describe the safety of Australia from espionage,
sabotage, politically motivated violence, promotion of communal
violence, attacks on Australia’s defence system, acts of foreign
interference or serious organised crime, as well as the protection of
Australia’s borders.
National security information A legacy term used to identify official information whose
compromise could affect the security of the nation including
information about security from espionage, sabotage, politically
motivated violence, promotion of communal violence, attacks on
Australia’s defence acts of foreign interference or serious organised
crime, as well as the protection of Australia’s borders.
Natural justice
(also procedural fairness)
The right of a person to expect that any decision being made about
them is made by an unbiased decision maker and based on open and
fair decision-making processes, which allows the person the
opportunity to respond.
National Threat Assessment
Centre (NTAC)
A section of ASIO that provides assessments of threats to Australia’s
national security.
Negative vetting
in reference to security
clearances
An evaluation process that relies on the absence of information to
the contrary in order to assess the subject’s suitability for a security
clearance – see also Positive vetting.
Need-to-go
Access to an area should be limited to those who require access to
do their work, e.g. cleaners—they do not have a need-to-know but
they do have a need to go in order to do their work.
Need-to-know
Refers to a need to access information based on an operational
requirement.
Need-to-share
Making information available to government personnel,
organisations and individuals who need it to do their jobs or support
government programs.
Network infrastructure
The infrastructure used to carry information between workstations
and servers or other network devices, e.g. cabling, junction boxes,
patch panels, fibre distribution panels and structured wiring
enclosures.
13
Term
Definition
No exclusion
There is no exclusion to the Spent Convictions Scheme. The scheme
applies to all criminal offences and a person only needs to provide
details of applicable offences. Also see full exclusion and partial
exclusion.
Non-national security
information
A legacy term used to identify official information whose
compromise does not threaten national security but could otherwise
threaten the national interest, or interests of individuals, groups, or
commercial entities.
Non-prejudicial security
assessment
An assessment from ASIO in respect of a negative or positive vetting
security clearance that results in a notification in writing to the
agency from the Director-General of Security stating that it is not
making a recommendation against the proposed granting of a
security clearance.
Official information
Any information generated by an Australian Government agency for
an official purpose, including unclassified information, sensitive
information and security classified information.
Official resources
See Australian Government resources.
Originator
in reference to information
The person, or agency, responsible for preparing or creating official
information or for actioning information generated outside the
Australian Government—this person, or agency, is also responsible
for deciding whether, and at what level, to protectively mark that
information.
Outsourcing
Contracting out a service or function performed by an agency.
Overwriting
in reference to electronic
information
Low level reformatting, followed by multiple overwriting with zero
(0) and one (1) numerals in random patterns to make the
information difficult to recover from electronic media.
Paragraph grading indicators Markings used to indicate the security classification of individual
paragraphs.
Partial exclusion
An exclusion granted under the Spent Convictions Scheme that
requires all specified types of offences to be declared. Also see Full
exclusion and No exclusion.
Partially secure area
A legacy term for an area secured so that it is suitable for processing
and handling security classified information up to and including
SECRET level. This term has been replaced by Security Zones.
Perimeter intrusion detection A Security alarm system , or part there of that covers areas external
system (PIDS)
to a building envelope.
Personal information
Information or an opinion (including information forming part of a
database), whether true or not, and whether recorded in a material
form or not, about an individual whose identity is apparent, or can
reasonably be ascertained, from the information or opinion. For
further details, see the Privacy Act 1988 (Cth). Also see Sensitive
personal information.
14
Term
Definition
Personal identity verification The method(s) used to verify a person’s identity prior to being given
(PIV)
access to facilities, information or assets. Normally identity is
verified using something a person:
 has – something in the person’s possession (e.g. identity pass)
 knows – a person’s knowledge (e.g. password), or
 is – a person’s physical attributes (e.g. biometrics).
Personal security file (PSF)
A file containing Sensitive: Personal information and other personal
information used to make a decision on a person’s suitability to hold,
and continue to hold, a security clearance. This includes details of
any security infringements, breaches or violations by the person.
Personnel
(also employee or staff)
Any member of an agency’s staff or contracted service provider’s
staff used to service agency contracts, or other people who provide
services to the agency or access agency information or assets as part
of agency sharing initiatives.
Personnel security
The management of personnel to assist in the protection of an
agency’s people, information and assets. It includes initial and
ongoing screening, and ongoing education and evaluation of
personnel.
Personnel security clearance
See security clearance.
Physical asset
An item of economic, commercial or exchange value that has
a tangible or material existence. It does not include personnel,
official information and assets that contain official information.
Physical security
The part of protective security concerned with the provision and
maintenance of a safe and secure environment for the protection of
agency employees and clients as well as physical measures designed
to prevent unauthorised access to official resources and to detect
and respond to intruders.
Planned event
An event that allows relevant agencies sufficient lead-time to
consider, discuss and implement security arrangements. Also see
event.
Politically motivated violence Includes acts or threats of violence or unlawful harm that are
intended or likely to achieve a political objective, whether in
Australia or elsewhere, including acts or threats carried on for the
purpose of influencing the policy or acts of government, whether in
Australia or elsewhere. Refer the Australian Security Intelligence
Organisation Act 1979 (Cth).
Portable storage device
in reference to electronic
information
See removable electronic and optical media
Positive vetting
A system of security checking that attempts to examine and
independently verify all relevant aspects of a subject’s suitability for
a security clearance—positive vetting is more intensive than negative
vetting.
15
Term
Definition
Position of Trust (PoT)
A position which involves duties that require a higher level of
assurance than that provided by normal agency employment
screening and to which additional screening is specified.
Prescribed administrative
action
Action that relates to or affects an individual’s access to information
or a place or a thing which is controlled or limited on security
grounds. See section 35(1) of the Australian Security Intelligence
Organisation Act 1979 (Cth).
Privacy
in reference to personal
information
People have a right to expect that:

personal information held about them is accurate and
available for their inspection

if their personal information is not accurate then it will be
subject to amendment

their personal information is properly safeguarded and
protected
They must also be kept fully informed of the uses to which their
personal information may be put. For further details, see the Privacy
Act 1988 (Cth) and the Australian Privacy Principles.
Private client facilities
Facilities belonging to private industry clients which can be used by
agency personnel to undertake agency work.
Procedural fairness
See natural justice.
PROTECTED
A security classification that shows that compromise of
confidentiality of official information could cause damage to the
national interest, organisations or individuals.
Protective marking
An administrative label assigned to official information that not only
shows the value of the information but also defines the level of
protection to be provided during use, storage, transmission, transfer
and disposal of the official information—protective markings include
security classifications, dissemination limiting markers and caveats.
Protective security
A combination of procedural, physical, personnel, and information
security measures designed to protect people, information and
assets from security threats.
Protective security audit
An audit (or system of checking for compliance to predetermined
standards) on the protective security arrangements in place in an
agency.
Protective security plan
See agency security plan.
Protective Security Policy
Committee (PSPC)
The Australian Government interdepartmental committee that
advises the Attorney-General on protective security.
Protective Security Policy
Framework (PSPF)
The Australian Government’s protective security requirements for
the protection of its people, information and assets (replaced the
PSM).
Protective Security Manual
(PSM)
See Australian Government Protective Security Manual . The
precursor to the PSPF.
16
Term
Definition
Provisional access
A form of temporary access that can be approved after a person
submits all information required for a security clearance, but before
the clearance is finalised to allow that person to access security
classified information on a limited basis only. See temporary access.
Public domain information
Information that is authorised for unlimited public access and
circulation (for example, agency publications or web sites).
Qualified locksmith
A practicing locksmith possessing a Certificate III Engineering
(Locksmithing) or Certificate III (Locksmithing), or higher tertiary
qualification. Practicing locksmiths also need to be licenced in the
jurisdictions they operate.
Qualified security assessment An assessment from ASIO, in writing, that contains information that
is or could be prejudicial to a person but does not recommend that
prescribed administrative action be taken or not taken.
Reactivation
in reference to security
clearances
The administrative process used to reinstate a security clearance that
has not expired when sponsored by a new agency. Reactivation may
include a change of circumstance assessment or a full clearance
revalidation.
Reasonable
in law
Just, rational, appropriate, ordinary or usual in the circumstances. It
may refer to care, cause, compensation, doubt (in a criminal or civil
trial), and a host of other actions or activities. Similarly a reasonable
act is that which might fairly and properly be required of an
individual.
Reasonably practicable
in reference to WHS law
A judgment as to what is reasonably practicable is based on a
consideration of the following general issues: severity of the hazard,
probability of the risk, current knowledge regarding the hazard and
the risk, availability of suitable hazard control/elimination methods,
and cost of such control/elimination methods.
Regional location
Any location away from an agency’s central office or major
operational centres.
Releasability indicator
A type of security caveat – a releasability indicator can indicate that
access to the information is restricted to certain nationalities (e.g.
AUSTEO means ‘Australian Eyes Only’); it can also indicate which
other countries the originator will allow to have access (e.g. ‘REL
GBR, NZL’ means information may be passed to the United Kingdom
(Great Britain) and New Zealand but not other countries); see also
Security caveat.
Removable electronic and
optical media
Storage media that is easily removed from a system and is designed
for removal, and is not an integral part of the infrastructure – for
example magnetic tapes, CD/DVDs, microfilms, removable hard
drives, etc.
Residual risk
The remaining level of risk after any risk treatments have been
implemented.
Resources
See official resources.
RESTRICTED
A legacy national security classification that is no longer in use.
17
Term
Definition
Request for tender
A request to suppliers for information and a quote to perform
clearly defined works or supply certain goods.
Revalidation
in reference to security
clearances
Periodic reassessment of a security clearance subject’s continued
suitability to access security classified information by assessing any
relevant change of circumstances and determining whether any
security concerns have arisen.
Right of access
in reference to contracting
The right of the agency (or its agent, nominee, employee or auditor)
to have access, for purposes associated with the contract including
security reviews and audit requirements, security performance
monitoring and any additional reviews referred to in the contract, to
any premises of the contractor, to any site used in connection with
the contract, and to equipment, software, data, documentation and
records maintained by it and relevant to the performance of the
contract.
Risk
The chance of something happening that will affect objectives – it is
measured in terms of event likelihood and consequence.
Risk acceptance
An informed decision to accept a risk.
Risk analysis
The systematic process to understand the nature and level of risk.
Risk appetite
Statements that communicate the expectations of an agency’s
senior management about the agency’s risk tolerance – these
criteria help an agency identify risk and prepare appropriate
treatments, and provide a benchmark against which the success of
mitigations can be measured.
Risk avoidance
A decision not to become involved in a risk situation.
Risk management
The culture, processes and structures that are directed towards
realising potential opportunities whilst managing potential adverse
effects.
Risk mitigation
(also risk minimisation, risk
reduction, risk treatment)
Actions taken to lessen the likelihood, negative consequences, or
both, associated with a risk.
Risk rating
A rating that indicates how significant each identified potential risk
is to an agency – the risk rating may be expressed qualitatively or
quantitatively.
Risk transfer
Shifting the responsibility or burden for loss to another party
through legislation, contract, insurance or other means.
Safe hand
A method of transferring an article in such a way that the article is in
the care of an authorised officer or succession of authorised officers
who are responsible for its carriage and safekeeping—the purpose
of sending an article via safe hand is to establish an audit trail that
allows the sender to receive confirmation that the addressee
received the information.
18
Term
Definition
Sanitisation
The process of removing certain elements of information that will
allow the protective marking that indicates the level of protection
required for security classified information to be removed or
reduced—this can refer to both electronic media and hard copy
information. Information that is not destroyed needs the
originator’s approval to be released at a lower level. Also see
overwriting.
SCEC Endorsed Type 1
security alarm system
Alarm system endorsed by SCEC to protect SECRET or TOP SECRET
information or aggregations of information where compromise
would have an extreme or catastrophic impact on national security.
SECRET
A security classification that shows that compromise of
confidentiality of official information could cause serious damage to
the national interest, organisations or individuals.
Secretaries Committee on
National Security (SCNS)
The committee provides advice to the National Security Committee
of Cabinet on matters of national security. Membership includes
the Secretaries of the Departments of the Prime Minister and
Cabinet, Defence, Foreign Affairs and Trade, and the AttorneyGeneral’s Department, the Chief of the Australian Defence Force
and the Director-General of the Office of National Assessments.
Secure Area
A superseded term for an area secured so that it is suitable for
processing and handling security classified information up to and
including TOP SECRET level. This term has been replaced by Security
Zone Four and Security Zones.
Security alarm system (SAS)
A SAS is the combination of intrusion detection devices, control
panel, monitoring station and the policies and procedures needed to
ensure an appropriate response to any alarms.
Security assessment
in reference to security
clearances
An assessment sought from ASIO for a person undergoing a negative
or positive vetting security clearance—a Commonwealth agency
must formally request any assessments from ASIO.
Security approach
(also security contact)
A situation where a person is approached on an unsolicited basis by
another person or organisation with the intent of obtaining
information which may affect the national interest, organisations or
individuals for which they do not have a need-to-know.
Security audit
An examination and assessment of the agency’s security procedures
undertaken by a competent authority or ANAO.
Security breach
An accidental or unintentional failure to observe the protective
security mandatory requirements. See also security infringement
and violation. Additional detail is available in the Australian
Government protective security governance guidelines—Reporting
incidents and conducting security investigations.
19
Term
Definition
Security caveat
An additional marking (i.e. additional to the protective marking)
warning the user that the information has special handling
requirements in addition to those indicated by the protective
marking. Caveats are not classifications in their own right and must
not appear without a protective marking. There are four kinds of
caveats: codewords, source codewords, releasability indicators and
special-handling caveats.
Security classification system A set of procedures for identifying official information whose
compromise could have a business impact level of high or above for
the Australian Government – it is the Government’s mechanism for
protecting the confidentiality of information generated by it or
provided to it by other governments and private entities; the
security classification system is implemented by assigning protective
markings (such as TOP SECRET, PROTECTED, etc); the protective
marking not only shows the value of the information but also
indicates the minimum level of protection it must be afforded to
safeguard it from compromise.
Security classified document
register
See classified document register.
Security classified
information / resources
Official information, or resources, that if compromised could have a
high, or above, impact on the national interest, organisations or
individual. See the Information security management guidelines—
Australian Government security classification system.
Security clearance
A documented determination by an authorised vetting agency that
an employee is suitable to access security classified information (on
a need-to-know basis) relative to the level of clearance granted.
Security Construction
The Australian Government interdepartmental committee that
Equipment Committee (SCEC) approves protective security products and endorses protective
security services. The SCEC reports to the PSPC.
Security culture
The characteristics and attitudes of an agency and individuals that
establish security as a high priority, and security risks receive the
attention warranted by their impact on operational capability.
Security equipment
catalogue (SEC)
The catalogue of SCEC approved security products (to be
progressively replaced by the Security equipment evaluated product
list (SEEPL)).
Security equipment
The list of SCEC approved security products for the protection of
evaluated product list (SEEPL) valuable information and assets, and the prevention of widespread
loss of life.
Security executive
in reference to protective
security
The agency Senior Executive Service officer (or equivalent)
responsible for protective security functions in that agency.
20
Term
Definition
Security-in-depth
(also defence-in-depth)
A multi-layered system, in which security counter-measures are
combined to support and complement each other. This makes
unauthorised access difficult, for example physical barriers should
complement and support procedural security measures and vice
versa.
Security incident
A security infringement, breach, violation, contact or approach from
those seeking unauthorised access to official resources, or any other
occurrence that results in negative consequences for the Australian
Government.
Security infringement
Any incident that violates internal protective security procedures
outlined in internal agency protective security procedures, other
than those that can be categorised as a security breach or security
violation. Additional detail is available in the Australian Government
protective security governance guidelines—Reporting incidents and
conducting security investigations.
Security investigation
An investigation carried out to establish the cause and extent of a
security incident that has, or could have, compromised the
Australian Government – the overall purpose of a security
investigation is to prevent the incident from happening again by
making improvements to the agency’s systems or procedures.
Additional detail is available in the Australian Government protective
security governance guidelines—Reporting incidents and conducting
security investigations.
Security plan
See agency security plan.
Security review
See security risk review.
Security risk
Any event that could result in the compromise, loss of integrity or
unavailability of official information or resources, or deliberate harm
to people measured in terms of its likelihood and consequences.
Security risk criteria
Statements that communicate the expectations of an agency’s
senior management about the agency’s security environment –
these criteria help an agency identify security risk and prepare
appropriate security treatments, and provide a benchmark against
which the success of the security plan can be measured. See also
Risk appetite.
Security risk review
The process used to determine risk management priorities by
evaluating risk against predetermined criteria, in the context of an
agency’s protective security arrangements.
Security violation
A deliberate, negligent or reckless action that leads, or could lead, to
the loss, damage, corruption or disclosure of official information or
resources. Additional detail is available in the Australian
Government protective security governance guidelines—Reporting
incidents and conducting security investigations.
Security Zones
A method of assessing the security of areas used for protecting
people, or handling and storing information and physical assets
based on security controls.
21
Term
Definition
Security Zone One
Unsecured areas including out of the office working arrangements.
Security Zone Two
Low security area with some controls and access control for visitors.
Security Zone Three
Security area with higher level security controls than Security Zone
Two, strict control of visitors on a needs basis and access to
employees controlled.
Security Zone Four
Security area with higher level of controls than Security Zone Three,
and strict visitor and employee access controls on a needs basis.
Security Zone Five
Security area with the highest level of controls, strict visitor and
employee access controls on a needs basis.
Sensitive information
Information that may be exempt from disclosure under the Freedom
of Information Act 1982 (Cth) Part IV.
Sensitive
Dissemination limiting marker applied to information that is covered
by a specific secrecy provision of an Act and may be exempt from
the Freedom of Information Act 1988 (Cth).
Sensitive: Personal
Dissemination limiting marker applied to all sensitive personal
information as defined in the Privacy Act 1988 (Cth).
Sensitive: Legal
Dissemination limiting marker applied to information where legal
privilege applies as defined in the Evidence Act 1995 (Cth).
Sensitive: Cabinet
Dissemination limiting marker assigned to all documents prepared
for consideration by Cabinet, including documents in preparation.
Cabinet information must also be security classified at a minimum
PROTECTED.
Sensitive personal
information
Personal information defined as ‘sensitive information’ in the
Privacy Act 1988 (Cth).
Short term access
in reference to personnel
security
A form of temporary access used where access to security classified
information is required by a person who does not have the
appropriate security clearance.
Site
The discrete, separate physical location of an agency’s facility(ies).
Site planning
in reference to physical
security
A determination as to which physical control measures are to be
applied at a site to mitigate agency and site specific risks.
Site security plan
A plan that documents measures to reduce to an accepted level the
identified risks to the agency’s functions and resources at a
designated site.
Source codeword
A type of security caveat—ie, a word or set of letters used to
identify the source of certain information without revealing it to
those who do not have a need-to-know. People who need to access
this information must be cleared and briefed about the significance
of this type of information. See also codeword and security caveat.
22
Term
Definition
Special-handling caveat
A type of security caveat—ie, a collection of various indicators such
as operation codewords, instructions to use particular
communications channels and ‘EXCLUSIVE FOR (named person)’.
See also security caveat.
Special event
A planned event of such a nature that the national interest is served
by the Australian Government’s involvement in whole-ofgovernment coordination of security, normally through Emergency
Management Australia (EMA) in the Attorney-General’s
Department. Also see event and planned event.
Specified persons
See Authorised persons.
Spent conviction
A conviction for a Commonwealth, state, territory or foreign offence
which satisfies all of the following conditions:
 a statutory or regulatory exclusion does not apply
 it is 10 years since the date of the conviction (or 5 years for child
offenders)
 the individual has not re-offended during the 10-year (5-year for
child offenders) waiting period, and
 the individual was not sentenced to imprisonment, or was not
sentenced to imprisonment for more than 30 months.
Spent Convictions Scheme
A scheme that aims to prevent discrimination on the basis of old
convictions, see Part VIIC of the Crimes Act 1914 (Cth).
Sponsoring agency
in reference to personnel
security
The agency that sponsors a security clearance and is responsible for
the ongoing clearance maintenance.
Spying
See espionage.
Statement of Requirements
(SOR)
A description of the activity or function to be contracted out in
terms of required outputs and outcomes.
Sub-contractor
A contractor who contracts to provide goods or services to another
contractor.
Suitability indicators
in reference to personnel
security
Suitability indicators for a security clearance include maturity,
responsibility, tolerance, honesty and loyalty, also see the Australian
Government personnel security guidelines—Vetting Practices.
T4 Protective Security
(T4 or ASIO-T4)
The section within ASIO responsible for providing protective security
advice and services including testing of physical security equipment
for SCEC.
Technical surveillance
counter-measures
Measures taken to detect the presence of technical surveillance
devices and hazards and to identify technical security weaknesses
that could aid in the conduct of a technical penetration of the
surveyed facility.
23
Term
Definition
Tele-centre
A location separate to the employee’s home and remote from the
agency’s normal business premises that provides access to an office
environment and may provide remote access to agency ICT systems.
These facilities may be provided on an agency specific or shared
basis.
Tele-worker
An employee that undertakes tele-work, including:

Casual tele-workers—Casual tele-workers take advantage of
tele-working to meet a short-term or intermittent
requirement. Unless there is a formal tele-work agreement
then they should be considered mobile employees

Full-time tele-workers—Full-time tele-workers operate
primarily from a remote, fixed location. This could be either
the tele-worker's own home or a remote office/tele-centre

Part-time tele-workers—Part-time tele-workers may spend
part of their time working in a fixed remote location and part
of their time in the office, and

Day extenders—Day extenders may work a regular day in the
office and then may log in from a fixed remote location,
normally from home, to continue to work or meet a shortterm or intermittent requirement.
Tele-work
(also telework,
telecommuting)
Paid work conducted away from an agency’s offices in a fixed
location, which requires at least periodic connection to the
employer’s ICT network. Tele-work is distinguished from mobile
computing by having a controlled environment and little need for
portability of equipment. Tele-work is subject to a formal agreement
between the agency and the employee.
TEMPEST
The investigation of compromising emanations from electronic
equipment such as computers – also the term used for such
compromising emanations.
Temporary access
in reference to personnel
security
A temporary arrangement that in exceptional circumstances provides
limited access to security classified information to people who are
yet to be issued with an appropriate security clearance – there are
two types of temporary access: Provisional access and Short term
access
.
Tendering
The act of a potential contractor offering to perform services or
supply goods for a specified cost.
Thin client technology
Technology which allows remote access to information without
storing any information on the host computer.
Third party interest
in reference to competitive
tendering and contracting
Any legal or equitable right, interest, power or remedy (no matter
the degree) in favour of any person other than the agency or the
contractor in connection with the contract, including any right of
repossession, receivership, control or power of sale, and any
mortgage, charge, security or other interest.
24
Term
Definition
Threat
A source of harm that is deliberate or has intent to do harm.
Threat assessment
Evaluation and assessment of the intentions of people who could
pose a hazard to a resource or function, how they might cause
harm, and their ability to carry out their intentions—threats need to
be assessed to determine what potential exists for them to actually
cause harm.
TOP SECRET
A security classification that shows that compromise of
confidentiality of official information could cause exceptionally
grave damage to the national interest.
Unclassified
in reference to information
Official information that is not expected to cause harm and does not
require a security classification; it may be un-labelled or it may be
marked ‘Unclassified’. This type of information represents the bulk
of official information.
Unauthorised access
in reference to information
Access to official information that is not based on a legitimate needto-know, sanctioned by government policy or agency direction, or
an entitlement under legislation.
Unauthorised access
in reference to facilities or
assets
Access to official facilities or assets that is not sanctioned by
government policy or agency direction, or an entitlement under
legislation.
Unauthorised disclosure
in reference to official
information
The communication or publication of official information where it is
not based on a legitimate need-to-know, sanctioned by government
policy or agency direction, or an entitlement under legislation.
Unplanned event
An event that occurs on short notice, is routine or otherwise does
not allow, or require, for detailed planning, including security
planning. Also see event.
Unsecured area
A legacy term for an area that does not meet the required physical
security measures to be classified as an intruder resistant, partially
secure or secure area. Replaced by Security Zones.
Vetting
Checking and assessment action to develop a realistic and informed
evaluation of a person’s suitability to hold a security clearance.
Vetting agency
The Australian Government Security Vetting Agency (AGSVA),
authorised agencies and State and Territory vetting agencies.
Violation
See security violation.
Virus
in reference to ICT systems
See malware.
Vulnerability
in reference to risk
management
The degree of susceptibility and resilience of an agency to hazards.
Vulnerability
in reference to ICT systems
and information
A flaw, bug or misconfiguration that can be exploited to gain
unauthorised access to a network or information.
25
Term
Definition
Waiver
in reference to personnel
security
See eligibility waiver.
Whole person
Using all available information about the factors that affect a
person’s character, from their past and present, to make an
assessment of the person.
X-IN-CONFIDENCE
A legacy non-national security classification that is no longer in use.
26
3.
Abbreviations
AAT: Administrative Appeals Tribunal
ABDC: Australian Bomb Data Centre
AFP: Australian Federal Police
AGSVA: Australian Government Security Vetting Agency, located within the Department of Defence
ANAO: Australian National Audit Office
ANZCTC: Australian New Zealand Counter Terrorism Committee
APPs: Australian Privacy Principles
ASA: Agency security adviser
ASD: Australian Signals Directorate
ASIO: Australian Security Intelligence Organisation
ASIO-T4 or T4: ASIO-T4 Protective Security
APSC: Australian Public Service Commission
Archives Act: The Archives Act 1983 (Cth)
BCP: Business continuity plan
CCTV: Closed circuit television
CDR: Classified Document Register
COMSEC: Communications security
CPNI: Centre for the Protection of National Infrastructure (UK Government)
CPTED: Crime prevention through environmental design
Crimes Act: The Crimes Act 1914 (Cth)
CRYPTO: Cryptographic information
CTC: Competitive tendering and contracting
DFAT: Department of Foreign Affairs and Trade
DIO: Defence Intelligence Organisation
DRP: Disaster recovery plan
DSAP: Designated security assessment position
27
DSB: Diplomatic Security Branch (part of the Department of Foreign Affairs and Trade)
EACS: Electronic access control system
EIS: External integrated system
EPL: Evaluated product list
FOI Act: The Freedom of Information Act 1982 (Cth)
FGI: Foreign government information
Finance (Alt DoFD): Department of Finance and Deregulation
ICT: Information and communications technology
INFOSEC: Information security
ISM: Australian Government Information Security Manual (previously known as ASCI 33)
ITSA: Information technology security adviser
Malware: Malicious software
NTAC: National Threat Assessment Centre (in ASIO)
OH&S Act: the Occupational Health and Safety Act 1991 (Cth) replaced by the Work Health and
Safety Act 2011 (Cth)
PERSEC: Personnel security
PGPA Act: Public Governance, Performance and Accountability Act 2013 (Cth)
PHYSEC: Physical security
PIDS: Perimeter intrusion detection system
PIV: Personal identity verification
PoT: Position of Trust
PSF: Personal Security File
PSM: Australian Government Protective Security Manual (precursor to the PSPF)
PSPC: Protective Security Policy Committee
PSPF: Protective Security Policy Framework
RFT: Request for Tender
SAS: Security alarm system
SCEC: Security Construction Equipment Committee
28
SCNS: Secretaries Committee on National Security
SEC: Security equipment catalogue
SEEPL: Security equipment evaluated product list
SIGINT: Signals intelligence
SOR: Statement of requirements
T4 or ASIO-T4: ASIO-T4 Protective Security
TSCM: Technical surveillance counter-measures
WHS Act: The Work Health and Safety Act 2011 (Cth)
29
Download