Skip to Content
From Monday 12 September 2020, OVIC's website will no longer be supported in Internet Explorer (IE).
We recommend installing Microsoft Edge, Google Chrome, Safari, Firefox, or Opera to visit the site.

OVIC Information Security Incident Notification Scheme

What is the scheme?

The information security incident notification scheme has been developed to centrally coordinate notification of information security incidents (incidents) within Victorian government. It is established under Element E9.010 within the Victorian Protective Data Security Standards (VPDSS) that states:

The organisation notifies OVIC of incidents that have an adverse impact on the confidentiality, integrity, or availability of public sector information with a business impact level (BIL) of 2 (limited) or higher.

Where information assets have been assessed as BIL 2 or higher, organisations should notify OVIC of any incidents that compromise the confidentiality, integrity and/or availability (CIA) of that material.

If the information has not been assessed and/or assigned a BIL rating yet, but an incident occurs, we strongly encourage you to contact OVIC to discuss.

For more information on how to assess an information asset refer to VPDSF Practitioner Guide: Assessing the Security Value of Information.

What is an information security incident?

An information security incident is defined as

‘one or multiple related and identified security events that can harm/damage an organisation, its assets, individuals or compromise its operations. Information security incidents may take many forms, such as compromises of electronic information held on government systems and services and include information in physical formats (e.g., printed, photographs, or recorded information either audio or video) and verbal discussions.’

Information security incidents can take the form of privacy breaches.

Who can notify OVIC when an incident occurs?

OVIC will accept notifications from anyone. The representative may be an information security lead (ISL), privacy officer, Chief Information or Security Officers (CIO, CISO), legal officer or public sector body Head.

For representatives submitting a notification on behalf of their organisation, please follow your incident management authorisation process to avoid duplicate submissions for the same incident.

What sort of incidents should I notify OVIC of?

Under element E9.010, VPS organisations should notify OVIC of incidents that have an adverse impact on the confidentiality, integrity or availability of public sector information with a business impact level (BIL) of 2 (limited) or higher.

This includes information with a protective marking of OFFICIAL: Sensitive, PROTECTED, Cabinet-In-Confidence or SECRET. Refer to your organisation’s BIL table or the VPDSF BIL table to assess the potential business impact level.

Incidents may take many forms. They are not just limited to compromises of electronic information held on government systems and services, but also include compromises of information held in physical formats (e.g., printed, photographs, recorded information either audio or video) or unauthorised verbal discussions. For example, the following scenarios would qualify as an incident:

  • leaving a sensitive hard copy document on public transport
  • someone tailgating personnel into a secure area where sensitive documentation is kept, and/or
  • a sensitive conversation being overheard in a public cafe by a member of the public.

If the incident is of a criminal nature, or involves fraud/corruption, please follow your organisation’s policy on reporting these types of incidents to the relevant bodies.

The table below provides further examples of the types of incidents that OVIC should be notified about.

wdt_ID Examples of incidents affecting public sector information Control area Security attribute
21 Sending an email to incorrect email recipient People/process Confidentiality
23 Hard copy document/file left on public transport People/ process Confidentiality/ Availability
24 Tailgating into a secure area and accessing documents left on someone’s desk Process Confidentiality
25 Ransomware installed on a desktop restricting access to information Technology Availability
26 Incorrect protective marking placed on a document leading to mishandling of information People Confidentiality
27 A break-in to a facility and stealing information Process Confidentiality/ Availability
28 A conversation being held in a public area that can be easily overheard People Confidentiality
29 Viewing information on an unlocked screen by someone who does not have a ‘need-to-know’ Process Confidentiality
30 Looking at documents left on a printer People Confidentiality
31 Incorrectly disposing of hard copy documents in recycling bin People/ process Confidentiality
32 Documents found in an unused cabinet/vacated premises Process Confidentiality
33 Information found on a decommissioned laptop/computer at a second-hand store Process Confidentiality
34 Information found on a lost unencrypted USB key Process Confidentiality/ Availability
35 Personnel undertaking unauthorised activity on systems e.g., manipulating/changing data on a database People Integrity
36 Disclosing classified information at a social gathering People Confidentiality
37 Hacker exfiltrating sensitive information to an external system Technology Confidentiality
38 Outsider launching a denial-of-service attack on a website Technology Availability

Remember, your organisation’s Business Impact Level (BIL) table should be used as a guide to inform your notification obligations in relation to an incident. If the information affected by the incident has a security value of 2 (e.g., OFFICIAL: Sensitive) or higher assigned to it (regardless of the severity of the actual incident), notification is required.

For more information on how to conduct a security value assessment and determine the BIL value of the information affected in an incident please refer to Practitioner Guide: Assessing the security value of public sector information.

If public sector information does not have a BIL assigned, the business owner should be consulted to determine its security value including the potential impact of a compromise to the confidentiality, integrity and/or availability of the information.

When should I notify OVIC?

Organisations should notify OVIC of an incident as soon as practical and no later than 30 days once an incident has been identified. If a response capability is required, organisations are encouraged to seek support from:

How do I notify OVIC of an information security incident?

There are several methods to notify OVIC of an incident including:

Online web form

Access via https://incident-notifications.ovic.vic.gov.au/
Once completed, select ‘submit incident notification

Downloadable form

Access a word version of the incident notification form

Once completed, assess the content of the form and apply a corresponding protective marking. You can then submit your completed incident notification form to incidents@ovic.vic.gov.au

If your incident is marked as PROTECTED or above, please contact a member of the Information Security Unit for advice on submission options.

Phone

Call 1300 00 OVIC (1300 006 842) to discuss the incident.

What information should I provide?

OVIC, organisations and Victorian government will use the information provided in incident notifications to inform critical business decisions. To support these decisions, information must be timely, accurate and complete.

Where information about the incident is incomplete or not yet available, OVIC can receive updates from the notifying organisation as they become available.

OVIC has identified some key fields for organisations to consider when submitting their information security incident notification. The information security incident fields include:

wdt_ID Incident notification fields Description
1 Name of organisation
2 Contact details Provide the primary point of contact details for OVIC to correspond with where further information is required including name, phone number, email address.
3 When did it happen? DD/MM/YYYY
4 When did the organisation become aware of it? DD/MM/YYYY
5 The date the incident is discovered and recorded may differ from the date when it occurred
43 What happened? Summary of what happened and what are you doing about it?
44 Free text field with a short description of the incident.
45 How did it happen? For example:
46 • Who / what caused it?
47 • Was it malicious or accidental?
48 • Who accessed information in unauthorised manner?
49 Please be as specific as possible. E.g., if referring to third party, name party or describe nature of party.
50 Steps taken or proposed to contain incident
51 Steps taken or proposed to prevent future incidents
52 PRIVACY (PERSONAL INFORMATION) INCIDENTS
53 What personal information is involved? Provide details e.g., name, contact details, Information Privacy Principle (IPP) 10 categories of sensitive information.
54 What is the risk of harm to the affected individuals? • What type of harm?
55 • How serious is the risk of harm?
56 • How likely is the risk of harm?
57 Have affected individuals been notified about the incident? If not, why?
58 If so, how? What were the reactions?
59 INCIDENT NOTIFICATION SCHEME
60 What type of information was affected? For example, financial, personal, legal, health, policy, operational, critical infrastructure.
61 What is the assessed business impact level (BIL) of the affected information? What is the highest business impact level of the affected information? Select the one that applies:
62 • BIL 1 – Minor;
63 • BIL 2 – Limited;
64 • BIL 3 – Major; or
65 • BIL 4 – Serious.
66 What security attributes were affected? Select all that apply:
67 • Confidentiality (unauthorised disclosure);
68 • Integrity (unauthorised modification); and/or
69 • Availability (lost, stolen, unavailable).
70 What was the format of the affected information? Select one that applies:
71 • Hard copy;
72 • Electronic; and/or
73 • Verbal.
74 Was the incident primarily caused by people, process and/or technology control(s)? Select any that apply:
75 • People;
76 • Process;
77 • Technology; and/or
78 • No control(s) in place.
79 Who caused the incident? Select the one that applies:
80 • Internal personnel;
81 • Authorised third party;
82 • Other external; or
83 • Other/ unknown.
84 What was the threat type? Select one that applies:
85 • Accidental / Error;
86 • Failure;
87 • Malicious; or
88 • Natural.
89 For cyber incidents, is incident response assistance required by the Cyber Incident Response Service (CIRS)? Y/N
90 If you require incident response assistance and would like OVIC to send these incident details to CIRS on your behalf, please select Y.
91 Please note: OVIC do not provide a 24/7 service so if you require immediate assistance, please contact CIRS directly on 1300 278 842.
92 For incidents relating to personal information, is privacy assistance required by OVIC? Y/N
93 If you require privacy assistance, please select Y and someone from the OVIC privacy team will contact you.
94 Has this incident been recorded in your organisation’s incident register? Y/N
95 If Y please provide incident reference.
96 Has the incident been closed? Y/N

Who do I turn to for assistance when an incident occurs?

Every incident has unique characteristics and may require different approaches for resolution. The table below provides guidance where agencies or bodies can seek assistance.

wdt_ID Information security incident as a result of …. Responsible Accountable Consulted Informed
1 A lost document Organisation Organisation Organisation OVIC
2 Corrupt conduct of an individual Organisation Organisation IBAC OVIC
3 Physical access intrusion Organisation Organisation Organisation OVIC
4 Cyber intrusion Organisation Organisation Cyber Incident Response Service (CIRS) - if response assistance is required OVIC
5 Breach of personal information Organisation Organisation Organisation and OVIC - if privacy guidance is required OVIC

Download

OVIC-Information-Security-Incident-Notification-Scheme-V3.0-pdf.pdf

OVIC Information Security Incident Notification Scheme V3.0 - PDF
Size 212.73 KB

Download
OVIC-Information-Security-Incident-Notification-Scheme-V3.0-WORD.docx

OVIC Information Security Incident Notification Scheme V3.0 WORD - DOCX
Size 204.04 KB

Download
Back to top
Back to Top