Cybersecurity policy

Intent and Scope
This cybersecurity policy (policy) provides the basis of cybersecurity management within Rubix Studios Pty. Ltd. (Company).
Effective protection of business information creates a competitive advantage, preserves the company’s reputation, and reduces the risk of negative events and incidents.
This policy aims to balance the following priorities:
Upholding the Company’s reputation as a trusted data recipient.
Maintaining storage and backup systems that meet the needs of the Company and its employees, contractors, volunteers, vendors, and anyone else who may have any access to the Company’s systems, software, hardware, data, and/or documents (collectively referred to as the Participants).
Responsibilities
This policy applies to all Participants who have access to the Company’s systems, software, hardware, data, and/or documents.
All Participants are responsible for protecting business information and systems. Where there is doubt about the security of any action, the Participants should take a cautious approach and avoid any potential risks.
The Cybersecurity Officer is responsible for implementing this policy.
Authorisation and Access
Managers should exercise caution when:
As a general rule, managers should follow a need-to-know basis. If there is any uncertainty regarding how information and documents should be shared, contact the Cybersecurity Officer.
Password and Authentication Requirements
To avoid the Participants’ work account passwords being compromised, these best practices are advised for setting up passwords:
Change passwords when there is any possibility that an existing password may have been compromised.
We encourage using a password management tool, whether integrated into a mobile app or an internet browser.
Multifactor authentication tools should be used where possible.
Email Security
Emails can contain malicious content and malware. To reduce harm, the Participants should employ the following strategies:
If the Participant is unsure that an email or any data is safe, the Participant should contact the Cybersecurity Officer.
Device Security and Using Personal Devices
Logging in to work accounts on personal devices such as mobile phones, tablets, or laptops can risk Rubix Studios Pty. Ltd. data. Rubix Studios Pty. Ltd. does not recommend accessing any Rubix Studios Pty. Ltd. data from personal devices. However, if this cannot be avoided, the Participants are obligated to keep their devices in a safe place and not expose them to anyone else.
The Participants are recommended to follow these best practice steps:
It is recommended that Internet of Things (IoT) devices be kept segregated from Company systems unless approved for use by an IT specialist.
The Participants must not use unauthorised devices on their workstations unless they have received specific authorisation from the Cybersecurity Officer.
Any devices deemed no longer suitable for use must be disposed of securely to ensure that all information is permanently removed.
Transferring Data
Data transfer is a common cause of cybercrime. The Participants should follow these best practices when transferring data:
Working Remotely
When working remotely, all cybersecurity policies and procedures must be followed.
Company Systems
When accessing the internet from any system set up by the Company:
When accessing accounts on Company systems:
General Security Requirements
Participants must not install unauthorised software. The Company may, at any time, introduce a whitelist of approved/trusted programs. If this occurs, only these programs may be used by the Participants.
Participants should stay up-to-date with any other Company-wide recommendations, such as recommended browser settings.
Participants should perform daily backups of important new/changed data, software and configuration settings.
Participants must not attempt to turn off or circumvent any security measures.
Participants must report any security breaches, suspicious activities or issues that may cause a cyber security breach to the Cybersecurity Officer immediately and await their instructions regarding the appropriate response to the breach.
Other Companies Policies
This Policy must be followed in conjunction with the Company’s Acceptable Use Policy.
Training
All Participants must maintain a working knowledge of basic cybersecurity protocols. All new Participants will be given cybersecurity training.
Disciplinary Action
If this policy is breached, one or more of the following disciplinary actions will take place:
Review
The Company will periodically review and update this policy as required to ensure its continued security. It is important for those to whom this policy applies to stay up-to-date with changes to this policy, as this is a rapidly changing area of technology.
This policy is effective from 5th May 2024.
Last updated 14th March 2025.