![]() ![]() (optional) information management markers (IMM) (if any).caveats or other special handling instructions (if any) then.foreign government information markings (if any). ![]() classification (or the dissemination limiting marker).The labels should be placed at the centre top and bottom of each page and if there is more than one label, for example a protective marking and a caveat, these need to be separated by a double forward slash (//). Text-based labels are the preferred method using capitals, bold text, large font and a distinctive colour (red preferred), for example PROTECTED. The originator must clearly label security classified information, including emails (and associated metadata), unless impractical for operational reasons. Table 3: Security clearances required for ongoing access to PROTECTED, SECRET and TOP SECRET informationĪgencies must ensure that people requiring access to caveated information meet all clearance and suitability requirements imposed by the originator and caveat owner. To reduce the risk of unauthorised disclosure, agencies must ensure access to sensitive and security classified information or resources is only provided to people with a need-to-know. When disclosing security classified information or resources to a person or organisation outside of government, agencies must have in place an agreement or arrangement, such as a contract or deed, governing how the information is used and protected. NSW agency staff who handle PROTECTED, SECRET and TOP SECRET information must be security vetted. NSW agencies should handle this information according to the Australian Government requirements, including having the appropriate security clearances. The BIL tool can be found here.įigure 9: Security classifications and BIL To assess which security classification to apply, a business impact levels (BIL) tool has been created as part of the Protective Security Policy Framework (PSPF) and should be considered when determining if information requires a security classification. Some NSW agencies will have their own PROTECTED, SECRET and TOP SECRET information. PROTECTED, SECRET and TOP SECRET are national security classifications and are subject to a memorandum of understanding between all states and the Australian Government. A security classification (PROTECTED, SECRET and TOP SECRET) is only applied to information (or assets that hold information, such as laptops, USBs) if it requires protection because the impact of compromise of the information or asset would be high, extreme or catastrophic. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |