Menu
Logmaster is a NHVR accredited electronic work diary that is compliant for use on Apple and Android smartphones and tablets. Click this banner to see our accreditation.
Logmaster
All Logmaster people must identify the classification of information at creation and record that classification with the information, or the system processing, transmitting or storing that information.
Logmaster documents have an appropriate section and metadata for classification that must be used when initially creating documents, updating them and from then on managing that document throughout its lifecycle. For example, for Microsoft Office documents, spreadsheets, diagrams and presentations, the classification should be recorded in the document header/footer.
Logmaster has a default classification of UNCLASSIFIED for all emails or other messages for normal business purposes, except when using email and messaging services to transfer SENSITIVE, SENSITIVE:PERSONAL SENSITIVE and SENSITIVE:LEGAL information, in which case there are specific measures deployed to protect the sensitivity and integrity of information when transmitting over email and messaging systems. When communicating with Government departments/agencies protective markings must be used to designate the classification of the data.
The following requirements are applicable to email within Logmaster:
Inventory and Maintenance of Important Assets
Logmaster will maintain a register of all important assets, so that the risk to these assets can be managed and monitored. This register may take the form of an application, document or database, but must be protected from unauthorised access, modification or loss.
Logmaster defines important information assets as those that are classified as SENSITIVE, SENSITIVE:PERSONAL or SENSITIVE:LEGAL and assigns ownership to these assets. Information owners are accountable for:
LOGMASTER defines important IT assets as those that are:
Ownership and accountability is assigned to senior management as follows:
Handling of information assets
Information and IT assets classified as SENSITIVE, SENSITIVE:LEGAL and SENSITIVE:PERSONAL must not be stored within LOGMASTER IT systems unless specific provision has been made for the security of these assets, based on the risks on how those assets will be used.
Logmaster will identify the risk to SENSITIVE, SENSITIVE:LEGAL or SENSITIVE:PERSONAL information assets and implement adequate security controls to manage the risk to these assets and the IT systems that these assets reside on. These security controls are intended to make sure that LOGMASTER meets it legal and shareholder obligations to:
All IT systems that use SENSITIVE, SENSITIVE:LEGAL and SENSITIVE:PERSONAL information will be classified according to the information that they process and clearly marked as such so that they are handled appropriately throughout their lifecycle.
Retention and Archiving of classified information assets
It is an important legislative and often a regulatory requirement that information assets are retained for specific periods of time in specific formats. There are mandatory obligations on retention periods applicable to all manner of information assets including clinical records, corporate records, security logs and health information.
Business managers must seek legal advice to ascertain the compliance requirements with relevant state and federal legislation (for example, compliance with government data retention laws.
The information assets also cover the following specific raw log files:
To maintain an efficient and cost-effective system, it is essential to transfer to off-site/offline as they become inactive. On site holdings include records pertaining to the current year’s work plus one year previous.
The ability to retrieve archived materials is essential. For example, when upgrading hardware and software the ability to read, retrieve, and produce copies of stored records must be maintained, either by retaining old hardware and software; or migrating stored information onto the new system, ensuring maintenance of record integrity.
Disposal of classified information assets
Records disposal should be managed to eliminate records which are no longer required in an authorised, systematic manner. In particular, personal information must be destroyed or permanently de‐identified by secure means, if it is no longer needed for any purpose for which the information may be used or disclosed under the Privacy Act 1988 (Cwth).
Disposal of hard copy and electronic records must be authorised before processing. At the time records are due for destruction the appropriate disposal authority must be forwarded to the relevant custodian for approval. Prior to final disposal it must be verified that no records that are pending disposal relate to any actual or reasonably anticipated claim, litigation, subpoena, search warrant or other formal information gathering notice.
All copies of records that are authorised for destruction, including security copies, preservation copies and backup copies, should be destroyed. A record of disposal actions, once they have been carried out, is to be maintained.
Information or documents that do not need to be placed on an official file may be disposed of when they are no longer required.
Hard copy documents are to be disposed of in the secure disposal bin or shredded if they contain confidential, sensitive or proprietary business information. (DUS-Destroy under supervision).
The physical disposal of hard copy records is contracted to an authorised disposal company and is carried out under secure conditions to preserve the confidentiality of any information they contain.
It is important to maintain the integrity of the information asset which includes maintaining metadata about the information, who used it, and how it was used.
These information assets must be date and times stamped and protected from:
Even though in most cases an investigation does not directly require legal intervention, it is important that the integrity of evidence such as manual logs, automatic audit trails and intrusion detection tool outputs be protected.
When storing raw audit trails onto media it is important that it is done in accordance with relevant retention requirements as documented by the Cybersafe Statutory and regulatory requirements.
The rights of Logmaster shareholders and committees to request access to information pertaining to the records and affairs of Logmaster are governed by the Logmaster Shareholders’ Agreement.
LOGMASTER Shareholders’ Agreement
Quality Policy
Governance Policy
Privacy Policy
Security Policy
Version 2 | Original Policy Development | Jan 2021 |
Version 2 | Policy Approved by CGU Exec | May 21 |
Version 2 | Policy Implemented | May 21 |
V2 | Revision Date | Oct 2022 |