Status and Details
This page contains information about the status, approval and a summary of the changes from the previous version of the document. Please note that the Unit Head listed on this page is the current owner of this policy and may not reflect the University position/staff member who owned this policy at the time of publication.
3 August 2016 - policy amended to reflect the change of the 'Audit and Risk Management Committee' to 'Audit and Risk Committee'.Digital Information Security Policy
Status
Historic
Indicates if this version of the document is in effect (Current), yet to come into effect (Future), or expired (Historic).
Effective Date
8th February 2016
This is the date on which this version of the document came into effect.
Review Date
8th October 2017
The next review of this document is scheduled to commence on this date.
Approval Authority
Vice-Chancellor and President
The noted authority approved this is version of the document.
Approval Date
3rd February 2016
This is the date on which this version of the document was approved by the authorised authority.
Expiry Date
11th April 2017
This is the date on which this version expires. It may still apply, conditionally, after this date.
Unit Head
Scott Snyder
Chief Information and Digital Officer
s.snyder@westernsydney.edu.au
This is the officer generally responsible for day to day administrative matters.
Author
Anita King
45701708
This is the author of record for this version of the document.
Enquiries Contact
Anita King
IT Assurance Specialist
45701708
General enquiries should be directed to the officer/area listed.
Summary of Changes from Previous Version
8 July 2016 - policy amended to reflect the official name change of the University concurrent with the change to the University's Act and By-Law.
This policy has been completely revised to better align with the current structure and nomenclature in use with Information Technology Digital Services at the University. The policy better defines the Terms of Reference for the Digital Security Steering Committee and key attributes of an Information Security Management System (based upon industry best practices). Further, Digital is now included in the title of the policy to limit the scope of applicability to only those that are computerised.
Clauses Amended
Policy: All
Procedure: All