(1) Information Technology (IT) staff have the authority to conduct a security audit on any system at Victoria University (VU). (2) IT security audits may be conducted on all computers and communication devices owned or operated by the University as well as any computer and communications devices that are present on the University premises, but may not be owned or operated by the University. (3) IT Security audits may be conducted to: (4) The following security audits may be conducted by an IT staff member: (5) The scope of this Procedure: (6) Nil (7) Nil (8) Prior to conducting an audit, personnel performing the IT security audit must sign-off to confirm that they are aware of the relevant state, federal and international laws that may be pertinent to their investigation. (9) Authorisation to conduct an IT security audit must be obtained as required according to the authority requirements for the type of security audit to be performed. (10) Any access as required will be granted to authorised personnel for the purpose of performing an audit. This access may include: (11) Conduct IT Security Audit according to the specific purpose of the type of audit. IT Security audit types: (12) See References: IT Security Audit Types for details on each of the IT security audits including a description, the purpose of the audit, inclusions and exclusion. (13) A record of all audits will be maintained by the IT Security Office and made available, when required to a University Lawyer or Privacy Officer. If required, a final report detailing the outcome of the security audit is to be completed. (14) NilInformation Security - IT Security Audit Authorities Procedure
Section 1 - Purpose / Objectives
Top of PageSection 2 - Scope / Application
Top of PageSection 3 - Definitions
Section 4 - Policy Statement
Section 5 - Procedures
Roles/Responsibilities
Roles
Responsibility
ICT Security Manager
a. Inform IT staff involved in an audit of their responsibilities under the IT Security policy and associated procedures. b. Review IT Security Audit Authorities as part of a document review or as required. c. Maintain a record of all IT Security audits conducted.
Senior Management
a. Inform IT staff involved in an audit of their responsibilities under the IT Security policy and associated procedures. b. Provide authorisation for IT Security audits to be conducted as required.
IT Staff
a. Adhere to the ICT Security policy and associated procedures when conducting IT security audits.
Procedures
Section 6 - Guidelines
View Document
This is not a current document. To view the current version, click the 'Current Version' tab above.