This is an HTML version of an attachment to the Official Information request 'Signal Communications'.
19/05/2025, 06:56
IT Code of Conduct
IT Code of Conduct
Item 01
Published 13/05/2025
New staff starting at DPMC are required to read and sign the Central Agencies IT Acceptable Use Policy.
The Central Agencies IT Acceptable Use Policy sets out some general principles1 in order to help you make judgements
about appropriate behaviour when using DPMC’s information and communications technology (ICT)2. Use it as guidance to
apply to a range of situations you might find yourself in. While it specifies some of your obligations it does not attempt to
cover off every eventuality. If in doubt, consult your manager or ask Central Agency Shared Services (CASS) service
desk x8300 for advice.
Principle 1: Fulfil your lawful obligations to government with professionalism and integrity.
All emails, documents and other material stored on DPMC’s ICT systems are official information. The disclosure and
handling of official information held by DPMC is subject to the Official Information Act 1982 (“OIA”), and the Privacy Act
1993 sets out principles for the collection, holding, use and disclosure of personal information. Any release of official
information should follow DPMC’s internal OIA processes, including sign-out procedures. Refer to DPMC’s OIA policy for
details.
You have a duty of care to ensure the security of information and property is effective and maintained. Refer to Central
Agencies Security Policy for further detail and guidance. In particular:

You are responsible for all activity relating to your computer user account. You must keep your password private and
never share it with anyone.
You must classify and protect official information in accordance with the Government and DPMC guidelines for
protection of official information. In particular, information classified as CONFIDENTIAL, SECRET and TOP SECRET must
not be transmitted or saved on DPMC’s ICT systems (including computers, telephones and faxes).
You must not connect equipment to, or install software on, DPMC’s ICT systems without the approval of Central
Agency Shared Services.
You must report any actual or suspected security breaches to the Business Security Officer (BSO) immediately.
You must make a permanent record of substantive business emails and other forms of communication. Refer to Central
Agencies IT Acceptable Use Policy  for guidance on using and saving emails. Y
ou must summarise substantive business
telephone calls, mobile phone texts or instant messages in a file note. 
Principle 2: Behave honestly, faithfully and efficiently, respecting the rights of the public and your
colleagues.
You must ensure your use of DPMC resources is appropriate (particularly in relation to personal use of DPMC’s resources),
lawful, and shows reasonable care.
Reasonable and limited use of DPMC’s ICT resources for personal reasons is acceptable. Use a private email account to
avoid any misconceptions that might arise from using a DPMC email address for personal messages. Use your own mobile
phone or calling card for expensive personal phone calls.
You must not make or transmit unauthorised digital or paper copies of published material that is protected by copyright or
under any other law.
Other examples of inappropriate or unlawful behaviour include, but are not limited to: harassment, libel, unauthorised
access to ICT systems, sending unsolicited “spam” email, and the transmission or display of text or graphics which may
reasonably be considered to be obscene or offensive.
Principle 3: Avoid any activities, whether connected with your official duties or otherwise, which might bring
DPMC into disrepute, or jeopardise its relationships with Ministers, clients or the general public.
All material stored on the computer system - including jokes, graphics and personal emails - is likely to be official
information for the purposes of the OIA, and may be subject to a request under the OIA. Therefore, there is scope for
considerable damage to DPMC’s reputation if any objectionable, obscene or offensive material is held on our system.
Monitoring compliance with the ICT Usage - Code of Conduct
https://cass.sharepoint.com/:u:/r/sites/Kainga-Help/SitePages/infotech/IT-Code-of-Conduct.aspx?csf=1&web=1&e=do57nv
1/2


19/05/2025, 06:56
IT Code of Conduct
All ICT usage activity at DPMC is monitored for accounting and audit purposes. Misconduct may lead to disciplinary action
or, in serious cases, dismissal or other appropriate action will be taken.
1. The principles are derived from DPMC’s Terms of Employment – Code of Conduct.
2. For example: computers, telephones, BlackBerrys, fax machines, photocopiers.
Owner: Joanna Hodgson [TSY]
Team: Technology Infrastructure
Email: N/A
Modified: 7/10/2022
Properties
ContentOwner
JH Joanna Hodgson [CASS]
Team
Information Technology
Kāinga | Help me with
Edit
Feedback
https://cass.sharepoint.com/:u:/r/sites/Kainga-Help/SitePages/infotech/IT-Code-of-Conduct.aspx?csf=1&web=1&e=do57nv
2/2




UNCLASSIFIED 
Item 02
Protective Security Policy 
Original policy approved by: 
i-Manage
4342432 
Approved by 
Brook Barrington, Chief 
reference
Executive 
Date originally approved 
1/07/2020 
Amended policy approved by: 
i-Manage
Version Number 
Contact 
Executive Director, Strategy, 
version
Governance and Engagement 
Group 
Amended 
Executive Director, 
Name 
Clare Ward 
version 
Strategy, Governance 
approved by 
and Engagement 
Signature 
Group  
Date amended 
23/04/2024 
Date for review 
23/04/2027 
version 
approved 

Objective 
1. This policy sets out the high-level principles to enable proportionate and effective management
of our security environment and identified security risks.
Principles 
2. The  Department  of  the  Prime  Minister  and  Cabinet  (DPMC)  and  National  Emergency
Management  Agency  (NEMA)  is  committed  to  maintaining  the  security  of  its  people,
information,  and  assets  through  delivery  of  the  Government’s  Protective  Security
Requirements 
(PSR). We commit to:
a) developing  a  consistent,  strong,  and  sustainable  security  culture  to  ensure  that
employees are fully informed of and engaged in active security practices;
b) incorporating  our  risk  and  security  management  processes  with  consideration  of
security,  privacy,  and  health  and  safety  principles  to  ensure  a  comprehensive
understanding  of,  and  response  to  these  critical  aspects  of  delivering  on  our  core
functions; and
c) developing our security policies, procedures, and guidelines to align with the PSR, to
ensure that we can identify and respond to changes in our security risk environment
and establish security practices that are commensurate with identified risk levels and
business needs.
DPMC: 4342432 
Page 1 of 4 
UNCLASSIFIED 

UNCLASSIFIED 
Applies to 
3. This  policy  applies  to  everyone  in  DPMC  and  NEMA,  including  permanent,  fixed-term,
secondee,  casual  and  agency  temporary  staff,  self-employed  and  independent  contractors1
(together referred to in this policy as ‘staff’), regardless of position or seniority.
4. It applies to all premises and places where employees legitimately conduct departmental
business, and all information, resources, and assets that DPMC owns or is accountable for.
Background 
5. DPMC and NEMA perform a range of functions which are exposed to a variety of potential
security  threats,  and  each  present  a  unique  security  risk  profile.  It  is  important  that  we
understand and respond to these risks in a managed and consistent way in order to protect
national interests, personal privacy and DPMC and NEMA’s reputation.
Principles of Security Management and Governance 
6. DPMC and NEMA wil :
a. maintain  a  governance  structure  that  enables  effective  management  of  a  secure
operating environment and ensures the confident and secure conduct of departmental
business
b. follow a risk-based approach to ensure the safety of staff and visitors, the protection of
departmental premises and assets, and the security of information
c. develop and maintain a protective security framework and work programme to address
priorities  and  meet  specific  business  needs.  These  wil   be  regularly  reviewed  and
updated as required and wil  enable regular reporting on organisational maturity and
security awareness
d. ensure that all staff receive security good practice education and understand security
requirements and risks relative to their role and wil  promote a culture that supports and
encourages effective security practices across the department
e. investigate  security  incidents  quickly  and  effectively  and  take  corrective  action  as
appropriate, and
f.
maintain  a  business  continuity  management  programme  to  ensure  continued
availability  of  essential  services  and  assets  during  an  emergency  incident,  or  in  the
case of heightened threat levels.
Personnel Security 
7. Our  recruitment  and  ongoing  staff  management  processes  wil   ensure  that  all  staff  are
eligible and suitable to have ongoing access to New Zealand government information and
resources at levels of classification appropriate for their role.
8. We  wil   follow  consistent  processes  for  the  application  and  granting  of  national  security
clearances and ensure that staff in these roles have appropriate security clearances and
1  For the avoidance of doubt, the reference to contractors including any Treasury staff, including permanent, fixed term, secondee, 
casual and agency temporary staff, self-employed and independent contractors, providing services to DPMC (or any departmental 
agency or functional chief executive hosted by DPMC) under the Central Agencies Shared Services (CASS) agreement. 
DPMC: 4342432 
Page 2 of 4 
UNCLASSIFIED 

UNCLASSIFIED 
briefings prior to being granted access to any information or assets. We wil  ensure ongoing 
suitability of staff to hold a clearance through the clearance management process. 
9. We wil  manage staff movements and exits to ensure any security risks are identified and
managed and that departing staff understand their ongoing security obligations.
Physical Security 
10. We wil  ensure that appropriate physical security measures are in place to provide secure
working environments for staff and visitors, and to protect the security of information and
assets.
11. We  are  committed  to  protecting  the  safety  and  security  of  all  staff,  and  wil   ensure  any
proposed security measures align with the  DPMC Health and Safety Policy and relevant
legislation.
12. We wil  respond to security threats and identified risks quickly, effectively, and professionally,
including making referrals to other agencies if appropriate.
Information Security 
13. We wil  ensure that all official information held by DPMC and NEMA is classified and handled
appropriately,  in  accordance  with  the  Protective  Security  Requirements  Classification
Handbook 
and the Classification Quick Guide.
14. All information held by DPMC and NEMA wil  be subject to effective security management
to protect national interests, personal privacy, and departmental reputation.
15. We  wil   maintain  formal processes  alongside  CASS  to  ensure the  security  of  IT  systems
used  by  DPMC  and  NEMA,  in  line  with  PSR  and  the  New  Zealand  Information  Security
Manual (NZISM).

16. We  operate  to  a  clear-desk  policy  to  ensure  all  work-related  documents  are  handled  in
accordance with the Classification Quick Guide and kept out of sight when not being used,
including  where  required  the  storage  of  official  information  in  access-controlled  lockers
and/or drawers.
17. The clear-desk policy applies to staff while working remotely offshore, at home, and shared
office spaces.
Responsibilities 
Role 
Responsibilities 
The CE has ultimate responsibility and accountability for the security of DPMC’s 
Chief Executive (CE) 
people (including staff and visitors), information and assets and ensuring the 
department maintains effective security management arrangements. 
The CSO is appointed under the delegated authority of the CE and is 
Chief Security Officer 
responsible for all security policies and oversight of protective security 
(CSO) 
practices. The CSO is also the delegated accreditation authority for all DPMC 
ICT systems. 
DPMC: 4342432 
Page 3 of 4 
UNCLASSIFIED 

UNCLASSIFIED 
Role 
Responsibilities 
The DCSO is appointed under the delegated authority of the CE and is 
Deputy Chief Security 
responsible for the ‘classified’ environment. The DCSO also provides additional 
Officer (DCSO) 
oversight of security practices and assumes responsibility for security if the 
CSO is unavailable. 
The CISO is appointed under the delegated authority of the CE and is 
responsible for leading and overseeing information security within DPMC and 
CASS Chief Information 
NEMA. 
Security Officer (CISO) 
The CISO is also responsible for ensuring compliance with information security 
policies and the NZISM.  
The ITSM is reponsible for ensuring that the department’s information security 
CASS IT Security 
objectives are met. They oversee ICT risk management and certification 
Manager (ITSM) 
processes and maintain the operational information security management 
framework. 
The Board Subcommittee supports the CSO to provide assurance to the CE 
Board Subcommittee 
and DPMC’s Executive Leadership Team of the effectiveness of the security 
work programme and progress against the implementation of PSR. 
The relevant team in SGE will be responsible for ensuring the PSR is 
Strategy, Governance and 
implemented appropriately and effectively, leading continuous improvement of 
Engagement (SGE) 
integrated security management across DPMC, and ensuring delivery of 
mandatory PSR reporting requirements. 
People leaders will ensure that all staff receive security induction and refresher 
training and understand the requirements for security incident reporting. People 
People Leaders 
leaders will promote and demonstrate good security practice and actively 
monitor identified/emerging security risks within their business group or team. 
All staff will follow DPMC/NEMA’s security policies, procedures and guidelines 
and complete security training and education as required. Staff will take all 
Staff 
necessary steps to ensure the security of themselves and others, and of 
information held by the DPMC and NEMA. 
Related policies, guidance, and information 
Protective Security Requirements  
Protective Security Framework 
DPMC Health and Safety Policy 
New Zealand Government Security Classification System 
Handling Requirements for Protectively Marked Information and Equipment 
New Zealand Information Security Manual (NZISM) 
DPMC: 4342432 
Page 4 of 4 
UNCLASSIFIED 

link to page 7 link to page 8 link to page 8 link to page 9 link to page 10 link to page 10 link to page 10 link to page 13 link to page 13 link to page 14
Treasury Corporate Policy 
Item 03
Treasury Acceptable Use of Technology Policy
Version 

Contact 
Information Technology Security 
Manager 
Status 
Current – in effect 31 August 
Approved 
Chief Information Officer 
2023 
31 August 2020 
Owner Group(s) 
Corporate Shared Services 
Owner(s) 
Chief Information Officer 
iManage 
2491514 
Due for Revision 
31 August 2025 
File Reference 
MG-0-10 
Revision History 
Register (1934553) 
Please do not make unauthorised electronic copies or new versions (drafts) of this Treasury corporate 
policy. Contact governance&[email address], to have new drafts initiated and 
recorded in the Register of Treasury Corporate Policies (1934553). 
Contents 
Purpose ....................................................................................................................................................2 
Scope ........................................................................................................................................................2 
Definitions .................................................................................................................................................2 
Principles of access and acceptable use of Technology ..........................................................................3 
User account access ............................................................................................................................ 4 
Reasonable personal use .................................................................................................................... 4 
IT devices and device connectivity ...................................................................................................... 4 
Prohibited and inappropriate use ......................................................................................................... 7 
Policy exceptions ......................................................................................................................................7 
References ...............................................................................................................................................8 
Treasury:2491514v6 
IN-CONFIDENCE 



Treasury Corporate Policy: Acceptable Use of Technology Policy 
Purpose 
This policy relates to the acceptable use of Information Technology (IT), associated applications 
(including web-enabled tools), and third party systems in the Treasury. The intention of this policy is to 
provide further detailed guidance to support the Treasury Corporate Security Policy. 
This policy outlines the minimum requirements for the acceptable use of technology, including what 
constitutes reasonable personal use of departmental IT resources. This helps to protect and manage 
the integrity of IT systems and information; to minimise productivity loss; and to protect the Treasury’s 
reputation from being adversely impacted by inappropriate IT use. 
It also aims to ensure the Treasury meets legal obligations and government policy requirements 
(including any changes to these that post-date the date of this policy) concerning the use, integrity and 
protection of information including, without limitation, state sector employment, privacy and human 
rights, health and safety, official information and public records, copyright, and prohibitions on the use 
of information that would constitute a crime. 
Scope 
This policy applies to everyone in the Treasury, including seconded, contracted and temporary staff 
and consultants and visitors, who accesses any Treasury technology, equipment, systems, 
information and data, regardless of classification (“people”). 
This policy takes into account Government Chief Digital Officer/Government Chief Information Security 
Officer (GCDO/GCISO) rules and guidance, supports the New Zealand Government Security 
Classification System and contributes to the implementation of the Government’s Protective Security 
Requirements (PSR) and New Zealand Information Security Manual (NZISM). 
Definitions 

Incident: An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or
availability of an information system or the information the system processes, stores, or transmits
or that constitutes a violation or imminent threat of violation of security policies, security
procedures, or acceptable use policies.

Information/official information: official information is any information that is held, developed,
received, collected or spoken by or on behalf of the Government.

IT Equipment: Any equipment to support the acquisition, processing and storage of information.
Treasury:2491514v6 
IN-CONFIDENCE 



Treasury Corporate Policy: Acceptable Use of Technology Policy 
Requirements of access and acceptable use of Technology 
As a condition of access to Treasury IT systems and equipment, all users agree to comply with the 
provisions set out in this policy and to seek up to date security advice on how to protect IT systems 
and official information.  
This policy is regularly reviewed, communicated, and updated according to its review schedule or 
when the security environment or business requirements change. All security procedures should be 
regularly reviewed and communicated as well. These are all designed to make security requirements 
clear and to promote security awareness. 
You must 

use IT systems and equipment appropriately and legally, in compliance with corporate policies,
and in a way that withstands public scrutiny.

keep access details such as passwords or access tokens for accessing Treasury or third-party
systems confidential and not share with any other person.

take reasonable steps to protect all the Treasury IT systems and equipment and information in
our care from loss, damage, unauthorised disclosure and misuse, and will be held personally
accountable for any carelessness or negligence.

create and retain full and accurate records as described in our Information and Records
Management Policy. All information (including emails, documents and other recorded information)
created or received by the Treasury in the course of our work is official information and a public
record as defined by the Public Records Act 2005.

not use IT systems for unauthorised duplication or dissemination of information, including
unauthorised downloading or forwarding of copyright information without the copyright holder’s
permission.

include a classification on every piece of official information you create, to protect it from risks to
privacy, policy or national security and to limit its access to only those who have a legitimate ‘need
to know’ as part of their role. There is guidance on how to do this on our Information security page
on Huihui.

use only approved Artificial Intelligence (AI) applications or systems and this must be inline with
the Government Chief Digital Officer’s (GCDO) Responsible AI Guidance for the Public Service.
Parata is currently approved for use Paerata User Guidelines 2024(4961339.2).docx - iManage
Work
Your user account activity is logged and actively monitored including through services provided by 
authorised third parties. Such third parties can access information processed by and stored on 
Treasury technology platforms when formally requested to do so by the Treasury. 
If you become aware of an actual, or suspected, security incident, then you must immediately report it 
to via the See Something - Say Something portal. This includes the loss or suspected compromise of 
IT devices, and suspicious email links or phone calls.  
Treasury:2491514v6 
IN-CONFIDENCE 



Treasury Corporate Policy: Acceptable Use of Technology Policy 
Treasury IT systems access 
Access to the Treasury IT systems must be authorised by a manager as part of the on-boarding 
process via the Shiva system. Standard user account access will be granted, unless special access 
rights or restrictions are required.    
You must 

use in a responsible manner the user accounts you’ve been granted, for Treasury IT systems
and/or third-parties, and account for all the activity relating to them

select a unique password for each account that meets the system password composition
requirements

keep all account passwords private and never share them with any other person
You must not 
• attempt to gain unauthorised access to the Treasury IT systems, or damage or alter any software
components of the Treasury’s network or systems

use anyone else’s user account
• use systems that are logged into by someone else
• use unapproved Artificial Intelligence websites or applications
Reasonable personal use 
Your personal use of Treasury-supplied systems and equipment should be reasonable, in terms of 
both frequency of use and time, and must be consistent with the Code of Conduct and the Treasury 
Security Policy. It must not interfere with your duties or work obligations or put unreasonable load on 
Treasury’s network and or systems. If you have any concerns or questions, check with your people 
leader.  
Personal use of the Treasury IT systems and devices is at your own risk. The Treasury accepts no 
liability for loss or harm to people as a result of personal use of the Treasury IT systems and devices. 
Personal use of Treasury Email accounts for external websites and third party services is not 
permitted. This is to reduce the risk of a third-party data breach.  
The Treasury does not guarantee privacy for any information created, stored or transmitted through 
personal use of the Treasury IT systems and equipment. 
IT devices and device connectivity 
Installation and use of IT equipment 
You must receive approval from the Information Technology Security Manager (ITSM) before 
connecting non-Treasury owned equipment to IT systems, networks or devices. The ITSM will conduct 
a security risk assessment prior to the equipment being connected.  
If you require a specific device in the office for health and safety reasons, talk to your manager first. 
Requests for IT equipment should then be logged in the CSS Service Portal , or to 
[email address] for non-IT equipment or a workstation assessment.  
Treasury:2491514v6 
IN-CONFIDENCE 



Treasury Corporate Policy: Acceptable Use of Technology Policy 
Personal devices (mobile phones, computers or tablets) may be connected to the Treasury Guest  
Wi-Fi (Rangatira), but must not be used for creating, storing or processing Treasury information 
except through authorised applications.  Personal devices with authorised applications must be kept 
up to date and have password/PIN protection to the same level as corporate devices. 
Authorised applications consist of the Microsoft suite but are subject to Security and CSS IT 
Management endorsement if not located under the Company Portal Application for Mobility or 
ServiceNow for Desktop Applications. All Microsoft applications will require a second level of 
verification (two factor authentication) prior to accessing, for this step the “Microsoft Authenticator” 
application should be installed. All approved applications can be found on our ServiceNow Portal for 
further guidance. 
It is ok to plug personal devices in for charging purposes. If you are unsure how to set your device  
to charge only, please check your user manual first. Please do not plug in any untrusted or suspicious 
USB or external storage devices into your work device. 
Software and protection from malicious viruses 
The Treasury systems and devices are well protected and software updates are automatically 
deployed to keep information and systems safe. You will usually receive notification messages 
to restart devices to enable updates and you must follow this instruction as soon as possible.  
You should exercise appropriate caution when visiting websites or opening email attachments, to 
minimise the risk of damage by viruses and other malicious software. There is guidance on how to 
do this safely on our Security pages on Huihui. 
If you mistakenly open a suspicious attachment, click on a link, or receive suspicious emails or phone 
calls you must notify the CSS Service Desk immediately and report the incident via See Something 
Say Something  
Only software that is authorised by CSS I&T may be installed on Treasury IT equipment. Do not 
download software or applications (including executable files) from the internet  
or saved from other electronic devices onto IT systems. You can find a list of products approved for 
use on Treasury systems on our ServiceNow Portal or within the Company Portal Application on your 
mobile phone.  
You must use only cloud and third-party services that Chief Information Officer has approved for 
creating, storing or processing the Treasury’s information. This wil  ensure that using such services will 
not expose the Treasury to excessive risk. The Treasury has developed its own Generative AI tool, 
Paerata, using Azure OpenAI within the Treasury’s Microsoft cloud environment. As Paerata has been 
developed in a way that contains inputs and outputs within Treasury’s access only, the Treasury has 
developed new guidance that is more permissive than if the tool shared information external to the 
Treasury.  Therefore, use of any other GenAI must comply with the existing Treasury guidelines: 
Safely Using Generative AI 
If you wish to use an application that does not appear on our ServiceNow Portal or Company Portal, 
please log a request via the iCAN Process where this will be reviewed by the Security and CSS IT 
Management team for possible endorsement  
The Microsoft Office 365 platform allows users to create their own applications and add-ins for existing 
applications. If you wish to develop an app or add-in, you must follow the IT Applications Development 
Policy.  
Treasury:2491514v6 
IN-CONFIDENCE 



Treasury Corporate Policy: Acceptable Use of Technology Policy 
Lost or damaged equipment 
You must report the loss or suspected compromise of any IT device to the CSS Service Desk 
immediately, tell someone more senior, and must report it to [email address]  
Send all reports of damage and requests for IT repairs to the Service Desk. Do not try to repair the 
device yourself or take it to an external provider. Contact the Service Desk to arrange to return the 
damaged device directly to them or to return a device that you no longer require. 
Working away from the office 
Treasury-approved devices, such as laptops, tablets and mobile phones, may be used for business-
related activity outside the office. Refer to our Tāne Whakapiri ‘new ways of working’ information and 
guidance on working away from the office on Huihui.  
Power down your laptop or tablet when not in use if you are taking it out of the office, to enable the 
Bitlocker encryption protection.  
You should keep Treasury devices under direct supervision when outside the office. If it is not practical 
to do so, they must be powered off and stored as securely as possible. Out of sight in the locked boot 
of car is ok for short-term storage (e.g. while shopping) but for longer periods or in high-risk areas, it is 
recommended to store them out of sight at home. 
You need to be alert to the potential for compromise of information when using equipment outside of 
the office, ensuring that it is not overlooked or overheard by unauthorised persons. An example  
is working on the train on the way to or from work where other people may be able to see the 
documents you are reading. 
You can connect to the Treasury network remotely if you can do so through a trusted Wi-Fi network.  
A trusted Wi-Fi network is one where you are confident of the security status of the connection (for 
example, your home Wi-Fi, NOT public Wi-Fi available in cafés or hotels). If the security of a Wi-Fi 
connection cannot be assured, you must hot spot off a Treasury mobile phone or your personal phone. 
Overseas travel 
Contact [email address] prior to travel to receive the necessary travel briefings and details 
of current IT security requirements and advice. The Travel page on HuiHui has some general 
information.  
You may carry Treasury devices overseas only if it is essential for business purposes and necessary 
security requirements are met, as determined by the locations travelled to and known security risks at 
the time of travel.  
Approval to take devices overseas: 
1.
Management: Approval must be granted from your people leader to ensure there is a valid
business need and costs will be covered by the organisation.
2.
Security: Approval must be granted from the Chief Information Security Officer to ensure any
country specific guidance can be issued and travel itinerary will be documented for information
security monitoring purposes.
Whilst traveling overseas you must: 

Maintain positive control of your devices and store them property and safely. When left
unattended make sure they are secure and locked in the hotel safe.
Treasury:2491514v6 
IN-CONFIDENCE 



Treasury Corporate Policy: Acceptable Use of Technology Policy 

Powering devices off when not in use and making sure that any updates are applied before
leaving.

Only connect devices to trusted wireless networks and tether/hot spot from your work phone if
you are unsure.

Carry your device as hand luggage and always know where it is when travelling.

Report any issues, ether physical or technical, when you return
It is recommended that all mobile devices are connected to a trusted Wi-Fi to reduce the 
possibility of using excessive data use. Mobile Application and Operating System updates should 
be completed whilst connected to Wi-Fi where possible.  
Prohibited and inappropriate use 
You must not disable, weaken or attempt to disable or weaken any security settings or feature on your 
authorised account/s or devices (e.g., disable the anti-malware or elevate your access privileges) 
Treasury IT systems and equipment must not be used in any of the following ways: 

in contravention of this policy.

to endanger or cause distress to any other person (such as through harassing, bullying
or otherwise intimidating behaviour).

to criticise unfairly or defame any person or business.

to solicit for personal gain or profit, where any gain or profit is more than minor.

for any illegal purposes (including but not limited to downloading music or publications).

for any purpose that is not consistent with our Code of Conduct or the Code of Conduct
for the State Services (Standards of Integrity and Conduct); or

to generate, access, or send pornographic, sexually explicit or offensive material.

To breach or attempt to breach the security of Treasury and non-Treasury systems
Policy exceptions 
Exceptions from this policy (such as temporarily seeking to transfer a file type that would normally be 
blocked or quarantined) may be granted to meet new or changed business requirements when there  
is a justifiable business purpose. Refer to the Treasury Security Policy for details of the exception 
approval process.  
All exceptions must be reviewed, risk assessed and approved by the Chief Information Officer. 
Treasury:2491514v6 
IN-CONFIDENCE 



Treasury Corporate Policy: Acceptable Use of Technology Policy 
References 

Public Records Act (2005)

New Zealand Protective Security Requirements (PSR)

New Zealand Information Security Manual (NZISM)

Code of conduct for the State Services - Standards of Integrity and Conduct

Code of Conduct Policy (Treasury:1963916)

Information and Records Management Policy (Treasury:1096384)

IT Applications Policy (currently in draft – contact [email address] )

Media Policy (Treasury:2274494)

Social Media Policy (Treasury: 4360107)

Security Policy (Treasury: 904973)

Travel Policy (Treasury:2543173)

How to Protect Official Information (Treasury:831445)

Guidelines for using Paerata, the Treasury’s GenAI tool (4961339)

Information Security on Huihui

‘Our future focused workplace’ on Huihui

Security on Huihui

Security + You module on Tipu

SeeMail help – on Huihui

Travel page on Huihui

Wellbeing Assistance Policy (3045909)

Working Remotely page on Huihui
Treasury:2491514v6 
IN-CONFIDENCE 


Document Outline