University information has been classified into four high level categories that are detailed in the UniSA's information security policies and guidelines:
UniSA Staff need to be mindful of 'soft' copies (electronic copies - accessed and/or reading on a screen) of the University's data is secure (whether on/off campus or UniSA owned/personal device) and be aware that security can also be breached when 'hard' copies of data are photographed from your screen/desk or 'collected' by another party from a printer.
A clear desk assist in clear thinking, enables you and your colleagues to find items quickly, and promotes a more professional image to visitors. Maintaining a clutter-free workspace can also help to reduce workplace accidents and falls.
Tips on how to keep your desk and surrounding workspace clear of paper and clutter include:
A clear screen works in a similar way to a clear desk and allows you to think more clearly:
ISTS have developed a policy for workstations that can protect you and the University by automatically locking your workstation after 5 minutes of inactivity.
It is recognised that some workstations may be used in a way that is not compatible with this policy. If a workstation needs to be exempted from the policy raise a call with the IT Help Desk, stating your business case, machine blue plate and the location of the computer. Our Security team will then review the request and if the business case is sound an exemption will be enabled for that workstation.
If you walk away from your workstation and do not lock it or log off, it poses a security risk to you and the University as someone could use your workstation in an unauthorised way to:
The easiest way to prevent unauthorised access to your workstation is to lock it when you are away. Locking the workstation will not shut down any program or close any files that you are working on. All you have to do to get back in is enter your password and you can pick up where you left off.
Hold down the Windows key and press the L key.
Theft or misuse of devices leaves the University susceptible to exploitation of any data the devices may hold.
Every time you leave your desk ensure any mobile devices (such as USBs, external hard drives and mobile phones) are locked away or taken with you.
UniSA Staff are STRONGLY ADVISED AGAINST storing any confidential data on portable storage devices.
UniSA's information security policies requires staff to use encryption or equally strong measures on sensitive data stored in mobile or portable computing devices, and confidential data must not be downloaded to mobile computing or storage devices unless approval has been obtained from the relevant data owner.
NOTE: If you access your email or other UniSA data on your mobile and it is lost or stolen (regardless of whether or not its UniSA owned or personal), you must call the IT Help Desk ((08) 8302 5000) IMMEDIATELY to ensure your account remains secure.
Confidential or Restricted information left lying around in printer trays may be picked up and/or used maliciously by someone who shouldn't have access to that information.
All printers should be cleared of papers as soon as they are printed. This helps ensure sensitive documents are not left in printer trays for the wrong person to pick up.
By default UniSA Staff DO NOT get local administrative access to devices they are the primary user of.
If a staff member believes they require a local administrator account on the PC they are using they can complete Local Admin Access request for consideration.
If a staff member requires remote desktop access to a PC or device they must complete Remote Desktop Access request for consideration.
Local admin is granted via the Appian form located here:
https://bpi.unisa.edu.au/suite/sites/privileged-access-request
Local admin requests consist of several sections:
Section 1 - Details:
Section 2 - Business case:
A business case justification relates to the justification you have for requiring local admin access.
The justification must include:
Requests that do not meet the above requirements are likely to be declined by ISTS.
Section 3 - Justification:
The request must include all known applications and the estimated number of weekly escalations they require.
This should be truthful and serve to represent why elevated privileges are required.
If you are only elevating privileges once a week for a single application, this would not be representative of a reasonable request.
Additionally, ITHD can connect to your machine and provide access as needed - there must be a justification as to why this is not a reasonable alternative to elevated privileges.
Section 4 - Endorsements:
You must select a line manager to endorse this request.
This will be your direct manager, or anyone above that person in the management hierarchy of your business unit.
Section 5 - Terms and Conditions:
Terms and conditions are provided and must be read and accepted.
If these terms are accepted and subsequently breached, it is considered a breach of the Acceptable Use Policy.
Section 6 - Review:
This provides an opportunity to review your submission before it reaches your manager for approval, and ISTS for subsequent approvals.