Legal

The fine print

Legal

The fine print

Legal

The fine print

User terms and agreements

User terms and agreements

Terms and conditions

Welcome! By using our applications, you agree to these terms and conditions. Please read carefully.

Billing

Quarterly billing: You'll be billed quarterly (March, June, September, December) based on your active users and usage during that period.
Retrospective billing: You'll receive your invoice during the 3rd month of each quarter, covering the entire quarter.
Pro-rated billing: Your first invoice will be pro-rated based on the number of complete months used.

Cancellation

Cancellation process: You can cancel your service anytime in writing (email or physical) to Education Management Solutions (EMS).
Termination responsibilities: You'll be billed for any full months used since your last invoice. You're responsible for informing your staff and saving their data upon cancellation. EMS and Gieman IT Solutions are not responsible for data extraction, storage, or reporting after cancellation.
Access and data archiving: Your access will be enabled until the end of your cancellation invoice period. After this, access will be disabled, and data will be archived until the next purging cycle. Extracting data after cancellation may be possible but incurs a fee and cannot be guaranteed due to purging.

Refunds

6-week satisfaction guarantee: If unsatisfied within the first six weeks, you can cancel for free (as outlined in the cancellation section). Setup and training fees are non-refundable.

Intellectual Property

Ownership: Our applications and their associated intellectual property (coding, programming, etc.) belong solely to EMS.
Restrictions: Reproduction in any form (including for demonstrations) is strictly prohibited without permission.
Customer rights: Using our applications does not grant ownership or intellectual property rights. They are provided as a paid service.

Acceptable use: Our applications are data management tools and should not be used to store or transmit content that is:

  • Defamatory or harassing

  • Illegal or fraudulent

  • Misleading or deceptive

  • Sexually explicit

  • Malicious (viruses, worms, etc.)

  • Copyright-infringing

  • Infringing on any intellectual property

  • Deemed inappropriate by EMS

Termination rights: We reserve the right to terminate your access if your usage violates these terms.

Privacy

Your data: We value your privacy and will never sell, lease, or distribute client details to third parties. We may disclose information only if legally compelled to do so.
Data access: EMS may access user content for support, but access is restricted to authorized personnel who require it for their job duties. All EMS and Gieman IT Solutions staff are contractually obligated to safeguard your information.
Communication: We may use your contact information to inform you about products, services, and training opportunities.

Online Accessibility

Uptime efforts: We strive for 24/7 availability but cannot guarantee it due to unforeseen circumstances (network outages) or planned maintenance. We'll work to restore service as quickly as possible in any downtime event.
Compensation: We do not offer compensation for service outages, even if uptime falls below our 99.9% target.

Liability and Data Loss

Security: While we take security measures seriously, we cannot guarantee absolute protection from hacking, viruses, or other online threats.
Data backups: It is your responsibility to back up any files uploaded to our applications and regularly back up reports and work. We are not liable for any action or inaction related to our service.

Jurisdiction

Governing law: These terms are governed by the laws of Victoria, Australia.
Dispute resolution: Any disputes arising from these terms will be settled in this jurisdiction.

By using our applications, you acknowledge that you have read and understood these terms and conditions. If you have any questions, please contact us.

User terms and agreements

End user license agreement

1. Introduction

This End User Licence Agreement ("EULA") is a binding agreement between you (the "User" or "Licensee") and Education Management Solutions (the "Licensor") regarding your access to and use of the EMS360 software application (the "Application"). 



2. Grant of Licence

In consideration of the foregoing premises and the mutual covenants contained herein, the Licensor grants to the User a non-exclusive, non-transferable licence to download and install the Application on a single device for your personal, non-commercial use only.



3. Restrictions on Use

You may not:

  • Copy, modify, decompile, or reverse engineer the Application.

  • Distribute, sell, lease, rent, sublicense, or otherwise exploit the Application for commercial purposes.

  • Remove or alter any copyright or trademark notices from the Application.

  • Use the Application in any way that violates applicable laws or regulations.

4. Intellectual Property

The Application is protected by copyright and other intellectual property laws. All ownership rights in and to the Application, including but not limited to all intellectual property rights, belong to the Licensor or its licensors.

5. Disclaimer of Warranties

THE APPLICATION IS PROVIDED "AS IS" AND WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED. THE LICENSOR DISCLAIMS ALL WARRANTIES, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE LICENSOR DOES NOT WARRANT THAT THE APPLICATION WILL FUNCTION WITHOUT INTERRUPTION, ERROR OR DEFECT.

6. Limitation of Liability

IN NO EVENT SHALL THE LICENSOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR EXEMPLARY DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, DATA, OR GOODWILL) ARISING OUT OF OR RELATING TO THE USE OR INABILITY TO USE THE APPLICATION, EVEN IF THE LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

7. Term and Termination

This EULA shall be effective upon your first use of the Application and shall remain in effect until terminated by either party. The Licensor may terminate this EULA immediately upon written notice to you if you breach any provision of this EULA. Upon termination, you must cease all use of the Application and delete it from your device.

8. Governing Law and Dispute Resolution

This EULA shall be governed by and construed in accordance with the laws of England and Wales. Any dispute arising out of or relating to this EULA shall be subject to the exclusive jurisdiction of the courts of England and Wales.

9. Entire Agreement

This EULA constitutes the entire agreement between the parties with respect to the subject matter hereof and supersedes all prior or contemporaneous communications, representations, or agreements, whether oral or written.

10. Severability

If any provision of this EULA is held to be invalid or unenforceable, such provision shall be struck and the remaining provisions shall remain in full force and effect.

11. Contact Us

If you have any questions, please contact us.

BY DOWNLOADING OR INSTALLING THE APPLICATION, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THE TERMS OF THIS EULA.



User terms and agreements

Cookies policy

This Cookie Policy explains how EMS360 ("we", "us", or "our") uses cookies and similar technologies (collectively, "cookies") when you visit our website (the "Site") and interact with our services.

What are cookies?

Cookies are small data files that are stored on your device (computer, phone, tablet) when you visit a website. They typically include an anonymous unique identifier and allow a website to remember your preferences (e.g., language, font size) and improve your experience on the next visit.

What types of cookies do we use?

We use the following types of cookies on the Site:

  • Essential Cookies: These cookies are strictly necessary for the operation of our Site. They enable you to navigate the Site and use its features, such as accessing secure areas. The Site cannot function properly without these cookies.

  • Performance Cookies: These cookies collect information about how you use our Site, such as which pages you visit and how long you spend on each page. This information allows us to improve the performance of the Site and your user experience.

  • Functionality Cookies: These cookies allow the Site to remember your preferences (e.g., language, font size) and provide you with enhanced features and personalisation.

Do we use third-party cookies?

We may use third-party cookies on the Site for analytics purposes. These cookies are set by other online services that track information about your use of our Site and other websites across the internet. This information is used to analyse and improve our services.

How to control cookies

You can choose to accept or reject cookies through your browser settings. Most browsers allow you to control cookies through their preferences or settings menu.

Here are links to instructions for popular browsers:
Google Chrome: https://support.google.com/chrome/?hl=en
Mozilla Firefox: https://support.mozilla.org/en-US/kb/block-websites-storing-cookies-site-data-firefox
Apple Safari: https://support.apple.com/en-us/105082
Microsoft Edge: https://support.microsoft.com/en-us/office/enable-cookies-6b018d22-1d24-43d9-8543-3d35ddb2cb52
Please be aware that disabling cookies may limit your ability to use certain features of our site.

Changes to the cookie policy

We may update this Cookie Policy from time to time to reflect changes in our practices or comply with legal requirements. We will post the revised Cookie Policy on the site and encourage you to review it periodically.

Contact us

If you have any questions about this cookie policy, please contact us.

By using our applications, you acknowledge that you have read and understood these terms and conditions. If you have any questions, please contact us.

User terms and agreements

Privacy policy

This Privacy Policy ("Policy") explains how Education Management Solutions ("EMS", "we", "us", or "our") collects, uses, and discloses information from and about users of our applications, including EMS360 ("Applications").

Information we collect

We collect two main types of information through our Applications:

  • School configuration data: This includes identifying personal details such as email addresses, first names, and last names. This information is typically collected from your school's CASES database and used to configure the Applications for your specific needs.

  • User-submitted personal information: This includes information related to staff reviews and professional development, such as performance evaluations and training records. This information is only accessible to authorised individuals within your school or organization.

How we use your information

We use the information we collect solely to deliver and improve our services for your school. This includes:

  • Configuring the Applications to function properly within your school environment.

  • Facilitating staff review and professional development processes within the Applications.

  • Providing secure access to relevant information for authorized users within your school.

How we store your information

We take all reasonable security measures to protect your information from unauthorised access, use, disclosure, alteration, or destruction. These measures include:

  • Industry-standard encryption: We use 256-bit SSL encryption to protect your data during transmission.

  • Security safeguards: We implement various physical, electronic, and procedural safeguards to protect your information both online and offline.

  • Restricted access: Access to information is limited to authorized personnel who require it to perform their job duties.

  • Confidentiality agreements: All EMS employees are required to sign confidentiality agreements to protect your information.

Accessing your information

Users within your school can access and update their personal information directly within the EMS360 application. Additionally, users can download and export their data for their own records.

Cookies

Our website uses cookies to improve your user experience. Cookies are small text files that store information on your device. We only use cookies for the following purposes:

  • Remembering login information: We use cookies to store your login information (email address) for faster access to the applications.

  • Maintaining secure connections: Cookies help maintain secure connections to our servers.

These cookies do not contain any confidential information and are not harmful to your device. You can learn more about cookies and how to manage them at https://allaboutcookies.org/.

Reporting privacy breaches

If you suspect a privacy breach involving your information, please contact us immediately at info@edumgmt.com.au so we can take appropriate action.

Your consent

By using our applications, you consent to the collection, use, and disclosure of your information as described in this privacy policy.

Commitment to privacy

We are committed to protecting your privacy and ensuring the security of your data. If you have any questions or concerns about this Privacy Policy, please do not hesitate to contact us.

Changes to this policy

We may update this policy from time to time to reflect changes in our practices or comply with legal requirements. We will post the revised policy on our website and encourage you to review it periodically.

Security data protection policies

Security data protection policies

Keeping your data safe with EMS360

At EMS, we understand the importance of safeguarding your school's confidential information. That's why we employ robust security measures at every level to ensure your data is always protected:

Secure infrastructure
  • Australian-based cloud hosting: Your data resides in secure cloud infrastructure hosted within Australia, managed by Gieman IT Solutions (not outsourced).

  • Comprehensive monitoring: All environments are continuously monitored, logging any access attempts for added security.

Multi-layered security
  • Secure server management: Cloud-hosted servers are managed and administered by Gieman IT Solutions, ensuring expert oversight.

  • Physical security: Servers are physically located in Sydney, Australia, further safeguarding your data.

  • Encrypted backups: Regularly scheduled backups are encrypted and stored within Australia for additional protection.

User and staff security
  • Encrypted data: Passwords and other sensitive information are encrypted to prevent unauthorised access.

  • HTTPS connections: Secure HTTPS connections ensure all communication between your devices and our servers is encrypted.

  • Enterprise-grade security: We leverage industry-leading technology to protect your data at all times.

Stringent access controls

Restricted access: Access to information is limited to authorised personnel who require it for their job duties.

Employee training: EMS and Gieman IT Solutions employees:

  • Receive comprehensive training on online privacy and security measures.

  • Only access user data when necessary for support or maintenance purposes.

  • Have all access to databases and servers logged for accountability.

  • Utilise logins and passwords for administrative access.

  • Sign and adhere to strict confidentiality clauses in their employment contracts.

  • Are trained to identify and report potential privacy breaches or data misuse.

Your role in data security
  • Be vigilant: Remain aware of cyber threats and report suspicious emails or calls to us immediately.

  • Implement device security: Ensure your devices, such as computers or tablets, have appropriate security measures in place, including password protection.

    By working together, we can ensure your school's data remains safe and secure.

Security data protection policies

Data breach policy

1. Introduction

This Data Breach Policy outlines the procedures to be followed in the event of a suspected or confirmed data breach involving personal information held by Education Management Solutions. The policy aims to protect the privacy and security of individuals whose information is affected and to minimise the potential damage caused by a breach.

2. Definitions

Data breach: Any unauthorised access to, or disclosure, alteration, or destruction of personal information.

Personal information: Any information relating to an identified or identifiable individual.

3. Reporting a suspected data breach

All staff members are required to report any suspected data breaches to the designated Data Breach Response Team (DBRT) immediately. A suspected breach may include:

  • Loss or theft of a device containing personal information

  • Unauthorised access to a computer system

  • Accidental disclosure of personal information

  • Phishing attacks or suspicious emails requesting personal information

4. Data Breach Response Team (DBRT)

The DBRT is responsible for investigating and responding to all data breaches. The team will be comprised of representatives from IT, administration, and legal departments. The DBRT will be responsible for:

  • Initial assessment: Assessing the nature and scope of the breach, including the type of data affected, the number of individuals potentially impacted, and the likelihood of harm.

  • Containment: Implementing appropriate measures to contain the breach and prevent further unauthorised access.

  • Notification: Notifying affected individuals and relevant authorities (if required by law) in a timely and transparent manner. The notification should explain the nature of the breach, the steps being taken to address it, and the resources available to affected individuals.

  • Remediation: Taking steps to remediate the breach and prevent future occurrences. This may include improving data security practices, conducting security awareness training for staff, and reviewing data retention policies.

5. Communication

The DBRT will be responsible for communicating with affected individuals and relevant authorities regarding the data breach. Communication will be clear, concise, and timely.

6. Training and awareness

The school will provide regular training to staff members on data security and data breach procedures. This training will help staff to identify and report suspected data breaches.

7. Review and updates

This Data Breach Policy will be reviewed and updated periodically to reflect changes in technology, regulations, and best practices.

8. Contact us

If you have any questions, please contact us.

Security data protection policies

Information security plan

1. Introduction

This Information Security Plan (ISP) outlines the strategies and procedures Education Management Solutions will implement to protect its information assets. This plan aims to minimise risks associated with unauthorised access, disclosure, disruption, modification, or destruction of our valuable data.

2. Risk Assessment

2.1 Scope

This risk assessment covers all information assets of Education Management Solutions, including:

  • Electronic data (e.g., databases, emails, documents)

  • Paper documents

  • Hardware (computers, servers, mobile devices)

  • Software applications

  • Network infrastructure

2.2 Methodology

We will employ a qualitative risk assessment approach, considering the likelihood and impact of potential threats on our information assets.

2.3 Threats

Here are some potential threats we will consider:

  • Cyberattacks: Malware, phishing attacks, ransomware, denial-of-service attacks.

  • Unauthorised access: Physical or remote access by unauthorised personnel.

  • Human error: Accidental data loss, misuse of information.

  • Natural disasters: Fire, floods, power outages.

  • Hardware/Software failure: System malfunctions, equipment breakdowns.

2.4 Risk Matrix

A risk matrix will be developed to evaluate the likelihood and impact of each threat on our information assets. This will help us prioritise risks and allocate resources for mitigation strategies.

3. Security Controls

Based on the risk assessment, we will implement various security controls to address identified threats. These controls can be categorised as:

  • Technical controls: Firewalls, intrusion detection/prevention systems, data encryption, access controls, vulnerability management.

  • Procedural controls: Data classification policies, access control policies, password management policies, incident response plan, disaster recovery plan, security awareness training.

  • Physical controls: Secured entry points, security cameras, limited access to sensitive areas.

4. Incident Response

A documented incident response plan will guide our actions in case of a security breach. This plan will include:

  • Detection: Procedures for identifying and reporting security incidents.

  • Containment: Actions to isolate and contain the incident, minimising damage.

  • Eradication: Steps to remove the threat and restore affected systems.

  • Recovery: Procedures to restore data and systems to a functional state.

  • Reporting: Guidelines for reporting the incident to internal stakeholders and authorities (if required).

5. Data Security Policies

We will establish clear policies for handling sensitive data within our organisation, including:

  • Data classification: Classifying data based on its sensitivity to prioritise security measures.

  • Access control: Defining who has access to specific data and systems.

  • Data encryption: Encrypting sensitive data at rest and in transit.

  • Data disposal: Defining proper procedures for disposing of data that is no longer needed.

6. Roles and Responsibilities

This plan will assign clear roles and responsibilities for information security within the organisation. This may include:

  • Information Security Officer (ISO): Overall responsibility for the information security program.

  • IT security team: Implementing and maintaining technical security controls.

  • Department managers: Ensuring compliance with security policies within their departments.

  • All employees: Following security best practices and reporting suspicious activity.

7. Training and Awareness

We will conduct regular security awareness training for all employees to educate them on information security risks and best practices. This will include topics like password hygiene, phishing identification, and reporting suspicious activity.

8. Review and Update

This Information Security Plan will be reviewed and updated on a regular basis to reflect changes in our organisation's technology, threats, and regulatory requirements.

9. Conclusion

By implementing this Information Security Plan, Education Management Solutions demonstrates its commitment to protecting its valuable information assets. This plan will help us minimise risks, ensure compliance with regulations, and maintain business continuity.

Security data protection policies

Business continuity plan

1. Introduction

This Business Continuity Plan (BCP) outlines the strategies and procedures Education Management Solutions will implement to minimise downtime and ensure a swift recovery in the event of a disruption to our critical business operations. This plan aims to protect our employees, customers, and overall business integrity during unforeseen circumstances.

2. Business Impact Analysis (BIA)

A BIA will be conducted to identify critical business functions (CBFs) essential for our day-to-day operations and revenue generation. These CBFs will be prioritised based on their recovery time objective (RTO) and recovery point objective (RPO).

Recovery Time Objective (RTO): This defines the maximum acceptable downtime for a critical business function before unacceptable customer or financial impact occurs.

Recovery Point Objective (RPO): This defines the maximum tolerable period of data loss for a specific critical business function.

3. Risk assessment

We will identify potential threats that could disrupt our operations. These threats may include:

  • Natural disasters: Fire, floods, earthquakes, power outages.

  • Technological disruptions: Hardware/software failures, cyberattacks, data breaches.

  • Human error: Accidental data loss, operational mistakes.

  • Supply chain disruptions: Vendor issues, transportation disruptions.

4. Business continuity strategies

Based on the BIA and risk assessment, we will develop specific recovery strategies for each critical business function. These strategies may include:

  • Hot site: Maintaining a fully-equipped backup facility that allows immediate resumption of operations.

  • Warm site: Maintaining a secondary site with basic infrastructure, requiring additional configuration before operation.

  • Cold site: Maintaining a bare-bones backup location requiring significant setup time before operations resume.

  • Cloud backup and recovery: Utilising cloud-based storage and disaster recovery services for data and applications.

5. Incident response plan

A documented incident response plan will guide our actions in the event of a disruption. This plan will include:

  • Communication plan: Defining communication protocols for notifying employees, customers, and other stakeholders.

  • Activation procedures: Outlining steps for activating the BCP and transitioning to recovery strategies.

  • Recovery teams: Establishing response teams with designated roles and responsibilities (e.g., IT, communications, facilities).

  • Damage assessment: Procedures for evaluating the extent of the disruption and prioritising recovery efforts.

6. Testing and maintenance

The BCP will be tested regularly to ensure its effectiveness. We will conduct simulations and walkthroughs to identify potential gaps and improve the plan's functionality. The plan will also be updated periodically to reflect changes in our business environment, technology, and threats.

7. Communication and training

All employees will be informed about the BCP and their roles in the event of a disruption. Regular training will be provided on emergency procedures, communication protocols, and using backup systems.

8. Conclusion

By having a documented and tested Business Continuity Plan, Education Management Solutions demonstrates its preparedness to handle unexpected events and recover efficiently. This will minimise disruption to our operations, protect our reputation, and ensure business continuity during challenging times.

Security data protection policies

Disaster recovery plan

1. Introduction

This Disaster Recovery Plan (DRP) outlines the procedures Education Management Solutions will follow to restore critical business functions after a disaster or major disruption. This plan focuses on the rapid recovery of technology infrastructure and essential data to minimise downtime and ensure business continuity.

2. Scope

This DRP applies to all critical technology infrastructure and data supporting essential business operations. These may include:

  • Servers and network devices

  • Business applications and databases

  • User workstations and laptops

  • Critical electronic documents and records

3. Risk Assessment

We will identify potential disasters that could significantly impact our technology infrastructure and data. These may include:

  • Natural disasters: Fire, floods, earthquakes, power outages.

  • Technological disruptions: Hardware/software failures, cyberattacks, data breaches.

  • Human error: Accidental data loss, system malfunctions.

4. Recovery Strategies

Based on the risk assessment, we will develop specific recovery strategies for critical IT systems and data. These strategies may involve:

  • Data backups: Maintaining regularly scheduled backups of data on-site, off-site, or in the cloud, following the 3-2-1 backup rule (3 copies of data, 2 different media types, 1 offsite location).

  • Hot site/Warm site/Cold site: Utilising a secondary data centre location with varying levels of pre-configuration for immediate or quicker restoration of operations.

  • Cloud-based recovery: Utilising cloud storage and disaster recovery services for rapid data and application restoration.

  • System restore procedures: Documented procedures for restoring critical systems and applications from backups.

5. Incident Response

A documented incident response plan will be integrated with this DRP, outlining steps for:

  • Initial response: Securing the disaster scene, ensuring personnel safety, and initiating damage assessment.

  • Communication: Notifying key personnel, stakeholders, and potential recovery partners (e.g., cloud providers).

  • Data recovery: Implementing data restoration procedures and prioritising critical systems.

  • System recovery: Restoring critical IT infrastructure and applications.

  • Testing and recovery: Verifying system functionality and resuming normal operations.

6. Roles and Responsibilities

This DRP assigns clear roles and responsibilities to personnel in the event of a disaster. This may include:

  • Disaster Recovery Team (DRT): Leading the overall recovery effort, coordinating communication, and resource allocation.

  • IT team: Responsible for restoring IT infrastructure, systems, and data.

  • Facilities team: Ensuring the safety and security of physical infrastructure.

  • Communication team: Disseminating information to employees, customers, and stakeholders.

7. Testing and Maintenance

The DRP will be tested regularly through simulations and walkthroughs to identify weaknesses and ensure its effectiveness. The plan will also be updated periodically to reflect changes in technology, threats, and business needs.

8. Training

Regular training will be provided to all relevant personnel on their roles and responsibilities in the event of a disaster. Training will cover:

  • Disaster preparedness procedures

  • Data backup and recovery processes

  • System restoration procedures

  • Communication protocols

9. Conclusion

A well-documented and tested DRP is essential for any organisation to minimise downtime and ensure a swift recovery after a disaster. This plan demonstrates Education Management Solutions commitment to business continuity and data protection in the face of unforeseen events.

Security data protection policies

Incident response plan

1. Introduction

This Incident Response Plan (IRP) outlines the procedures Education Management Solutions will follow to identify, contain, eradicate, and recover from security incidents. This plan aims to minimise damage, ensure business continuity, and comply with relevant data protection regulations (e.g., GDPR).

2. Scope

This IRP applies to all security incidents that may compromise the confidentiality, integrity, or availability of our information assets. These may include:

  • Cyberattacks (e.g., malware, ransomware, phishing)

  • Unauthorised access (physical or electronic)

  • Data breaches

  • System outages or malfunctions

  • Human error (e.g., accidental data loss)

3. Roles and Responsibilities
  • Incident Response Team (IRT): Leads the overall incident response effort, coordinates communication, and resource allocation.

  • Security specialist: Identifies and investigates security incidents, implements containment measures, and assists with eradication and recovery.

  • IT team: Provides technical expertise for system restoration and data recovery.

  • Communications team: Drafts internal and external communications regarding the incident.

  • Legal team: Provides legal guidance and ensures compliance with data protection regulations.

  • Senior Management: Approves response strategies and is informed of major developments.

4. Incident detection and reporting
  • Employees: All employees are encouraged to report suspicious activity to the designated security contact or IT department.

  • Security systems: Intrusion detection/prevention systems (IDS/IPS) and other security tools will be used to detect potential incidents.

  • Reporting procedures: A clear and documented procedure for reporting suspected incidents will be established.

5. Incident Response Process

The IRP follows a structured approach for incident response:

5.1. Preparation:

  • Maintain up-to-date security software and systems.

  • Regularly conduct security awareness training for employees.

  • Test and update this IRP periodically.

5.2. Identification:

  • Verify the nature and extent of the incident.

  • Determine the potential impact on the organisation.

5.3. Containment:

  • Isolate compromised systems to prevent further damage.

  • Disable accounts or systems if necessary.

  • Secure evidence for investigation purposes.

5.4. Eradication:

  • Remove malware or exploit the vulnerability.

  • Change compromised credentials.

5.5. Recovery:

  • Restore affected systems and data from backups.

  • Review and improve security controls to prevent future incidents.

5.6. Reporting and Post-Incident Review:

  • Document the incident response process and lessons learned.

  • Report the incident to relevant authorities, if required by law.

  • Communicate the incident to affected stakeholders as appropriate.

6. Communication
  • Timely and clear communication throughout the incident is crucial.

  • The communications team will develop and implement communication plans for internal and external stakeholders.

  • Transparency and honesty are essential when communicating about the incident.

7. Training
  • Regular security awareness training will be provided to all employees to educate them on identifying and reporting suspicious activity.

  • The IRT will receive additional training on specific technical aspects of incident response.

8. Review and Update

This IRP will be reviewed and updated regularly to reflect changes in technology, threats, and regulations.

9. Conclusion

A well-defined and tested IRP is essential for protecting Education Management Solutions from security incidents. By following this plan, we can minimise downtime, maintain data integrity, and ensure business continuity.

Security data protection policies

Patch management standards and process

1. Introduction

These Patch Management Standards define the procedures for identifying, acquiring, testing, and deploying security patches for software applications and operating systems within Education Management Solutions. Timely patching is crucial for mitigating security vulnerabilities and protecting our information systems from cyberattacks.

2. Scope

These standards apply to all software applications and operating systems used on Education Management Solutions IT infrastructure, including:

  • Servers (physical and virtual)

  • Desktops and laptops

  • Mobile devices (if applicable)

3. Roles and responsibilities
  • IT security team: Responsible for managing the patch management process, acquiring patches, and testing them in a non-production environment.

  • System administrators: Responsible for deploying approved patches to production systems according to the defined schedule.

  • Department heads: Responsible for ensuring their users apply patches to their devices (if applicable).

  • All employees: Responsible for installing patches on their devices in a timely manner when notified.

4. Patch identification and acquisition

The IT Security Team will regularly identify new security patches released by software vendors.

Patch information will be obtained from reliable sources such as vendor websites, security advisories, and vulnerability databases.

Patches will be prioritised based on severity, potential impact, and exploitability of the vulnerabilities they address.

5. Patch testing

The IT Security Team will test critical and high-severity patches in a non-production environment before deployment to identify and address any potential compatibility issues or disruptions to system functionality.

Medium and low-severity patches may be deployed directly to production systems after a risk assessment if testing resources are limited.

6. Patch deployment

Approved patches will be deployed to production systems according to a pre-defined schedule, considering system criticality and potential downtime.

System administrators will be notified of scheduled patch deployments and any specific instructions.

For user devices (e.g., laptops), patch deployment may be automated or may require user interaction to install updates.

7. Communication and awareness

IT will communicate upcoming patch deployments to relevant stakeholders, including system administrators and department heads.

Users may be notified about upcoming patches to their devices and encouraged to install them promptly.

Regular security awareness training will educate employees on the importance of patch management and the potential risks of neglecting updates.

8. Reporting and monitoring

The IT Security Team will track patch deployment status and identify any systems that haven't been patched within the designated timeframe.

Reports will be generated to monitor patch compliance and identify any persistent issues.

Unpatched systems will be investigated, and appropriate actions will be taken to ensure timely patching.

9. Review and update

These Patch Management Standards will be reviewed and updated periodically to reflect changes in technology, threats, and industry best practices.

New technologies for automated patch deployment may be evaluated and implemented to improve efficiency.

10. Exceptions and waivers

In rare circumstances, exceptions to the patch deployment schedule may be granted for critical systems where downtime is unacceptable.

Any exceptions will require approval from the IT Security Manager and documented justification for the delay.

11. Conclusion

A well-defined and implemented patch management process is essential for maintaining a secure IT infrastructure and protecting Education Management Solutions from cyber threats. By following these standards, we can ensure timely patching of vulnerabilities and minimise the risk of successful cyberattacks.

Security data protection policies

Secure software development lifecycle process

1. Introduction

This document outlines the Secure Software Development Lifecycle (S SDL) process for Education Management Solutions. The S SDL aims to integrate security considerations throughout the software development lifecycle, minimising vulnerabilities and enhancing the overall security posture of our applications.

2. Phases of the S SDL process

The S SDL process is divided into the following phases:


Requirements gathering and analysis:

  • Security requirements are identified and incorporated into functional requirements during the initial stages of development.

  • Potential threats and vulnerabilities associated with the application are considered.

Security design and architecture:

  • Secure coding practices and secure design principles are implemented throughout the development process.

  • Secure coding standards are defined and enforced for developers.

  • Security architecture is reviewed to identify and mitigate potential security weaknesses.

Development and code review:

  • Developers receive security awareness training and follow secure coding practices.

  • Code reviews are conducted to identify and address potential security vulnerabilities.

  • Static Application Security Testing (SAST) tools are used to scan code for vulnerabilities.

  • Threat Modelling and Risk Assessment:

  • A threat model is created to identify potential threats and attack vectors for the application.

  • A risk assessment is conducted to evaluate the likelihood and impact of identified threats.

Security Testing:

  • Dynamic Application Security Testing (DAST) tools are used to simulate real-world attacks and identify vulnerabilities.

  • Penetration testing may be conducted to assess the application's security posture against advanced attacks.

  • Deployment and Post-Deployment Support:

  • Secure deployment procedures are followed to minimise the risk of introducing vulnerabilities during deployment.

  • A vulnerability management process is established to identify and address new vulnerabilities discovered after deployment.

  • Security patches are deployed promptly to address identified vulnerabilities.



3. Roles and Responsibilities
  • Software developers: Responsible for implementing secure coding practices and writing secure code.

  • Security engineers: Responsible for designing secure architectures, conducting security testing activities, and providing guidance to developers.

  • Project managers: Responsible for integrating security activities into the development process and ensuring adherence to S SDL procedures.

  • Management: Responsible for providing resources and support for the S SDL process and ensuring its effectiveness.

4. Training and Awareness

Security awareness training will be provided to all developers and other personnel involved in the software development lifecycle.

Training will cover secure coding practices, threat identification, and the importance of the S SDL process.

5. Tools and technologies

The S SDL process will utilise various tools and technologies to support security activities, including:

  • Secure coding standards (e.g., OWASP Top 10)

  • Static Application Security Testing (SAST) tools

  • Dynamic Application Security Testing (DAST) tools

  • Penetration testing tools

  • Vulnerability management tools

6. Continuous improvement

The S SDL process will be reviewed and updated periodically to reflect changes in technology, threats, and best practices.

Lessons learned from security incidents and penetration testing will be incorporated into the S SDL process to improve its effectiveness.

7. Conclusion

By implementing a comprehensive S SDL process, Education Management Solutions demonstrates its commitment to developing secure software applications. This proactive approach helps minimise security risks, protect user data, and build trust with our customers.

Additional policies

Additional policies

Third-party service providers policy

1. Introduction

This Third-Party Service Providers Policy (TPSP) outlines the principles and procedures governing Education Management Solutions engagement with third-party service providers (TPSPs). The policy aims to ensure that TPSPs meet our security, regulatory, and performance standards while protecting our sensitive information and assets.

2. Scope

This policy applies to all TPSPs engaged by the Organisation, including:

  • Cloud service providers

  • IT service providers

  • Data processors

  • Software-as-a-Service (SaaS) providers

  • Managed service providers

  • Any other external vendor with access to our data, systems, or resources

3. Selection and onboarding

The Organisation will conduct a thorough due diligence process before selecting a TPSP. This process will consider the provider's:

  • Security posture and compliance with relevant regulations (e.g., GDPR, ISO 27001).

  • Financial stability and track record.

  • Ability to meet the Organisation's specific requirements.

A formal contract will be established with each TPSP, outlining:

  • Services provided

  • Responsibilities of both parties

  • Security expectations

  • Data protection obligations

  • Service Level Agreements (SLAs)

  • Termination clauses

4. Security requirements

TPSPs must implement appropriate technical and organisational security measures to protect the Organisation's data and systems.

This may include:

  • Strong access controls (e.g., multi-factor authentication)

  • Encryption of data at rest and in transit

  • Regular security audits and penetration testing

  • Incident response procedures

  • Compliance with relevant data protection regulations

5. Data protection

TPSPs are considered data processors under data protection regulations (e.g., GDPR). They must comply with all applicable data protection laws and regulations.

The Organisation will only share the minimum amount of data necessary with TPSPs.

Data transfer agreements will be established with TPSPs located outside the Organisation's jurisdiction.

6. Performance management

The Organisation will monitor the performance of TPSPs against agreed-upon SLAs.

Regular reviews will be conducted to assess the TPSP's security posture and adherence to the TPSP Policy.

The Organisation reserves the right to terminate a relationship with a TPSP if they fail to meet expectations.

7. Communication and training

The Organisation will communicate the TPSP Policy to all relevant personnel, including those involved in selecting and managing TPSP relationships.

Employees will be trained on their responsibilities regarding data security when interacting with TPSPs.

8. Review and update

This TPSP Policy will be reviewed and updated periodically to reflect changes in the legal landscape, industry best practices, and the Organisation's risk profile.

9. Conclusion

By establishing a robust TPSP Policy and due diligence process, Education Management Solutions can mitigate risks associated with third-party relationships and ensure the security of its data and information systems. This policy demonstrates Education Management Solutions commitment to responsible data management and building trust with its stakeholders.

Education Management Solutions acknowledges all Aboriginal and Torres Strait Islander Traditional Custodians of Country and recognises their continuing connection to land, sea, culture and community. We pay our respects to Elders past and present.

Powered by Education Management Solutions | Copyright © 2024 | All Rights Reserved.

Education Management Solutions acknowledges all Aboriginal and Torres Strait Islander Traditional Custodians of Country and recognises their continuing connection to land, sea, culture and community. We pay our respects to Elders past and present.

Powered by Education Management Solutions | Copyright © 2024 | All Rights Reserved.

Education Management Solutions acknowledges all Aboriginal and Torres Strait Islander Traditional Custodians of Country and recognises their continuing connection to land, sea, culture and community. We pay our respects to Elders past and present.

Powered by Education Management Solutions | Copyright © 2024 | All Rights Reserved.