I(a) How does your agency adhere to the separation principle? Example documentation to consider:
|
I(b) How does your agency’s audit program (internal and external) ensure the continued security of data?Example documentation to consider:
|
EITHER: Provide that your agency complies with the Australian Government Protective Security Policy Framework, or that it has to comply because it is subject to the Financial Management Accountability Act) OR ANSWER THE FOLLOWING QUESTIONS: |
I(c) Do employees (including contractors) undergo police checks upon employment?Example documentation to consider:
|
I(d) How is access to your agency’s premises controlled?Example documentation to consider:
|
I(e) How is your agency’s Internet gateway secured? Example documentation to consider:
|
I(f) Does your agency have an Information Security Policy and procedural plan (including protective control of data, secure ICT access and documented procedures)?Example documentation to consider:
|
For more information see Data security
Return to Applying for accreditation or
Continue to Criterion II - Demonstrate safe data access