SharePoint

​Principle 4 Access

Alignment with this principle will ensure that agency records and associated metadata can be easily located and retrieved for the required amount of time. Access to and movement of records will be controlled and monitored to protect against inappropriate use.


 Requirements:

  • Records access must be monitored for security breaches
  • Access must be managed in accordance with:
    • Organisational security policy/model
    • Tasmanian Government Information Security Manual
    • Relevant legislation
    • Organisational change
  • Records accessibility must be maintained during and after:
    • System migration
    • Government administrative change
    • Transfer of Custody
  • Access to systems, and the records in them, must be maintained for the required retention periods
  • Access provisions must be included in outsourcing documentation

 
To access the required document, simply click on the hyperlink in the Name field. Documents can also be sorted by the filters at the top of each column.

 
  
  
  
  
  
  
4AdviceAdvice 11 Short term Retrieval of State Records13/07/200517/05/2017Under Review
4AdviceAdvice 15 Transfer and Provision of Access to Cabinet Records26/09/200526/09/2005Under Review
4AdviceAdvice 23 Government agencies using records in the History Room14/05/201214/05/2012Under Review
4AdviceAdvice 33 Implementing Info Security Classification Part 1 - Overview31/03/201431/03/2014Under Review
4AdviceAdvice 33 Implementing Info Security Classification Part 2 - The Security Classification process30/03/201430/03/2014Under Review
4AdviceAdvice 33 Implementing Info Security Classification Part 3 - Security Classification controls30/03/201430/03/2014Under Review
4AdviceAdvice 33 Implementing Info Security Classification Part 4 - Establishing accountability30/03/201430/03/2014Under Review
4AdviceAdvice 34 Implementing Information Security Classification in EDRMS30/05/201330/05/2013Under Review
4AdviceAdvice 35 Implementing Information Security Part 1 - A Step by Step Approach30/11/201330/11/2013Under Review
4AdviceAdvice 35 Implementing Information Security Part 2 - Developing an IS Plan30/11/201330/11/2013Under Review
4AdviceAdvice 35 Implementing Information Security Part 3 - IS Governance30/11/201330/11/2013Under Review
4AdviceAdvice 35 Implementing Information Security Part 4 - IS Policy30/11/201330/11/2013Under Review
4AdviceAdvice 37 Keeping Digital Records Accessible31/05/201331/05/2013Under Review
4AdviceAdvice 44 Cloud Computing Information Security Considerations31/01/201431/01/2014Under Review
4AdviceAdvice 61 How to review your records holdings31/08/201431/08/2014Under Review
4AdviceAdvice 62 Help We are moving31/08/201431/08/2014Under Review
4AdviceAdvice 63 Government Administrative Change Part 1 - Management of Records Handbook30/08/201430/08/2014Under Review
4AdviceAdvice 63 Government Administrative Change Part 2 - Advice for senior management30/08/201430/08/2014Under Review
4AdviceAdvice 65 What to do if your Agency is Closed or Privatised31/07/201431/07/2014Under Review
4AdviceAdvice 68 Migrating Records from Network Drives to EDRMS31/08/201531/08/2015Under Review
4ChecklistChecklist A Quick Guide to Identifying Records for Transfer during GAC30/08/201430/08/2014Under Review
4ChecklistChecklist Data Collection for Transition and Recovery Planning30/08/201430/08/2014Under Review
4ChecklistChecklist Government Administrative Change Project Tasks30/08/201430/08/2014Under Review
4ChecklistChecklist Information Security Policy Implementation30/11/201330/11/2013Under Review
4GuidelineGuideline 04 Agency Determination of Access Restrictions31/07/200531/07/2005Under Review
4GuidelineGuideline 12 Short Term Retrieval of State Archives13/07/200513/07/2005Under Review
4GuidelineGuideline 16 Managing Inter-agency Transfer of Personnel Records11/06/200911/06/2009Under Review
4GuidelineGuideline 20 Records required for legal proceedings31/12/201231/12/2012Under Review
4TemplateAdvice 35 Template Information Security Policy30/11/201330/11/2013Under Review