Skip to main content

The Administrative Arrangements Order of 3 August 2023 transferred responsibility for protective security policy, including the Protective Security Policy Framework, from the Attorney-General's Department to the Department of Home Affairs. These Machinery of Government (MOG) changes began on 4 August 2023.

The PSPF Reporting Portal will transfer to the Department of Home Affairs on 11 June 2024. Before 11 June 2024, all entities and users must set up new authentication credentials through VANguard. You can get more information by contacting the Government Protective Security Policy section at pspf@homeaffairs.gov.au or the PSPF hotline on 02 5127 9999.

Policy 9: Access to information

  • Information security
Publication date
Last updated

Purpose

This policy details security protections that support an entity to provide timely, reliable and appropriate access to official information.

Overview

Access to OFFICIAL government information must be appropriately controlled, especially when sharing sensitive or security classified information, or disclosing information outside of government.

Entities must consider the information they share and disclose. They must have arrangements in place when sharing information with people outside government.

For people inside government, entities need to ensure the individual has the appropriate security clearance and a need to know. There are access exceptions for some Australian office holders.

Stringent protections apply to caveated information. Of particular note are the following releasability caveats:

  • Australian Eyes Only (AUSTEO)
  • Australian Government Access Only (AGAO)
  • Releasable to (REL) that limit access to resources based on citizenship.

In some limited circumstances, temporary access to classified resources may be required. Short term or temporary access may be granted after considering the security risks.

Entities must put in place measures to control access to information systems holding sensitive and classified information.

Return to the Information security page