(1) This Procedure ensures the integrity and stability of the University’s computing and network environment, Information Technology (IT) will regularly conduct audits on systems at Victoria University. (2) HESF: 2.1 Facilities and Infrastructure, 3.3 Learning Resources and Support and 7.3 Information Management. (3) This Procedure applies to all staff, students, contractors, visitors and other authorised users of Information and Communication Technology (ICT) facilities and services. (4) University-owned ICT computers and devices. (5) Personal (BYOD) equipment and devices located on University premises. (6) Nil. (7) See the Information Security Policy. (8) Information Technology Services (IT) staff have the authority to conduct a security audit on any system at Victoria University (VU). (9) IT security audits may be conducted on all computers and communication devices owned or operated by the University as well as any computer and communications devices that are present on the University premises, but may not be owned or operated by the University. (10) IT Security audits may be conducted to: (11) Prior to conducting an audit, personnel performing the IT security audit must be aware of the relevant state, federal and international laws that may be pertinent to their investigation. (12) Authorisation to conduct an IT security audit must be obtained as required according to the authority requirements for the type of security audit to be performed. (13) Any access as required will be granted to authorised personnel for the purpose of performing an audit. This access may include: (14) A record of all IT security audits will be maintained by the IT Security Office and made available when required to a University Lawyer or Privacy Officer. If required, a final report detailing the outcome of the IT security audit is to be completed. (15) Nil.Information Security - IT Security Audit Authorities Procedure
Section 1 - Summary
Section 2 - HESF/ASQA/ESOS Alignment
Section 3 - Scope
Section 4 - Definitions
Section 5 - Policy/Regulation
Section 6 - Procedures
Part A - Summary of Roles and Responsibilities
Roles
Responsibility
Director / Senior Manager
IT Staff
a. Adhere to the Information Security Policy and associated procedures when conducting IT security audits.
Procedures
Section 7 - Supporting Documents and Information
View Document
This is the current version of this document. To view historic versions, click on the 'Historic Versions' tab above.
a. Inform IT staff involved in an audit of their responsibilities under the Information Security policy and associated procedures.
b. Maintain a record of all IT Security audits conducted.
c. Provide authorisation of IT Security audits to be conducted as required.