Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents:

Size: px
Start display at page:

Download "Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents:"

Transcription

1 Storage and Transfer of Person Identifiable Information Policy Trust Wide Policy number: ULH-IM&T-AUP03 Version: 1.1 New or Replacement: New Approved by: Executive Board Date approved: 14 th April 09 Name of author: Andrew Stocks Name of Executive Sponsor: Michael Humber Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents: Information Security Policy Computer Acceptable Use Policy Mobile Computing and Home Working Policy Relevant Legislation: Data protection Act (1988) Computer Misuse Act (1990) Relevant Standards: ISO NHS code of Practice for Information Security Management NHS N3 Statement of Compliance ULH-IM&T-AUP03 1 of 15

2 Storage and transfer of person identifiable information policy Contents Section Page 1 Introduction 3 2 Core Principles 4 3 ing and other electronic transfers of personidentifiable information 5 4 Mobile Computing Equipment 7 5 Passwords 9 6 Visitors/Third Parties 10 7 Incident Reporting 10 8 Implementation and Compliance 11 Appendix 1 Data Classifications 12 Appendix 2 Secure File Transfer 13 ULH-IM&T-AUP03 Page 2 of 15

3 1. Introduction 1.1. Rationale: Following recent concerns about public sector data protection and, in particular, the security of information being transferred between locations and organisations, the NHS Chief Executive, David Nicholson, has written to all NHS organisations with a list of requirements. One of these requirements is to ensure that all person-identifiable information being stored or transferred is properly protected against security and confidentiality breaches Purpose: To provide clear direction, support and commitment to the protection of electronic person-identifiable data (PID), through the issue and maintenance of a storage and transfer of person-identifiable information policy across the Trust. This document sets out minimum policy standards and common policy directions across the Trust for the protection of electronic person-identifiable information Scope: Personnel: The policy applies to all full-time and part-time employees of the Trust, non-executive directors, contracted third parties (including agency staff), students/trainees, secondees and other staff on placement with the Trust, and staff of partner organisations with approved access. It applies to all areas in support of the Trusts business objectives both clinical and corporate Visitors and third parties Data Classifications: Although this policy applies primarily to PID it is equally relevant to other categories of sensitive Trust data See appendix Objectives: The intention is to promote and build a level of consistency across the Trust: This policy covers all aspects of storing electronic person-identifiable information on devices, including (but not limited to): Desktop PCs. Laptops/notebook computers. Mobile/portable computers such as PDAs, mobile phones, Smartphone s, etc. Mobile computer media such as solid state memory cards, memory sticks, pen drives, USB drives, DVDs, CD-ROM, etc This policy covers all aspects of transferring electronic person-identifiable information, including (but not limited to): . FTP. Internet submissions. ULH-IM&T-AUP03 Page 3 of 15

4 1.5. All staff are required to adhere to this policy and it is the responsibility of the individual to ensure that they understand this policy. Managers at all levels are responsible for ensuring that the staff for whom they are responsible are aware of and adhere to this Policy. They are also responsible for ensuring staff are updated in regard to any changes in this Policy Failure to adhere to this policy may result in disciplinary action being taken and, in serious cases, could constitute gross misconduct. 2. Core Principles General 2.1. The Computer Acceptable Use Policy (Section 2.3) specifically prohibits the use of any privately owned equipment or media within the Trust s computer system. Therefore, ONLY Trust owned or managed equipment, or media may be connected to our computer system or used to store the Trust s data. It is unacceptable to process (including to store or transfer) person-identifiable information on non-trust equipment Confidentiality must always be maintained for all Person Identifiable Data (PID), which includes information about our patients and staff. Ethical duties of confidence must be observed and extreme caution should be exercised where (PID) is being transferred electronically ensuring that all the data is fully protected to the required standards outlined in this policy. Data (Information) Storage 2.3. All PID must be stored on Trust networked data servers (where data is both secure and backed up) unless there is an operationally essential reason for storing the data on another storage device Storage for backup purposes must only be undertaken where central storage on the Trust network is not available All PID not being held on the network is to be held in a secure (encrypted) environment Data must not be routinely stored on desktop PC hard drives unless there is an operationally essential requirement to do this (such as a stand alone PC or a software programme which will only save data to the local drive). In this case all data must be backed up and both the local hard drive and any backup media is to be encrypted using trust approved software All laptop computers must be fully encrypted using Trust approved software. Data (Information) Transfer 2.8. All files containing PID being transferred externally by any electronic means must be encrypted using a Trust approved encryption process. ULH-IM&T-AUP03 Page 4 of 15

5 2.9. In addition, all bulk PID (more than 50 individuals) MUST be encrypted when transferred electronically whether internally or external All mobile computer devices (including PDAs, mobile phones, Smartphones, etc.) used for processing PID must be fully encrypted using Trust approved software (with the exception of those devices where Trust acceptable built-in security is turned on) All USB memory sticks used for processing person-identifiable information must be fully encrypted. The Trust provides an encrypted memory stick which is the only external storage device which can be used with Trust equipment. The Trust network will be locked down so that only approved devices can be used All files transferred on any mobile computer media (such as DVDs, CD-ROM, etc.) must be encrypted using Trust approved software. Staff should use the Secure File Transfer Services for this purpose wherever possible Strong passwords must be used for all encryption software 8 characters or more in length and containing a combination of upper and lower case letters, numbers and special characters (like punctuation marks) Encryption standards: Data encryption must be to an appropriate CfH approved standard such as 256-bit Advanced Encryption Standard [AES-256] algorithm. 3. ing and other electronic transfers of person-identifiable information 3.1. The above principles apply to all forms of electronic transfer of PID including e- mail, FTP, internet submissions, etc All files containing PID being transferred externally by any electronic means must be encrypted using a Trust approved method: File encryption using trust approved software; by using NHS mail accounts. *Please note this data is only encrypted when sending from one NHS mail account to another, or to another approved government system such as; o NHS: NHSmail (*.nhs.net) o Central Government xgsi (*.x.gsi.gov.uk) GSI (*.gsi.gov.uk) GSE (*.gse.gov.uk) GSX (*.gsx.gov.uk) CJX (*.police.uk *.pnn.police.uk *.cjsm.net) SCN (*.scn.gov.uk) o Local Government GCSX (*.gcsx.gov.uk) or, by using the CfH approved Secure File Transfer Services (which can be used for up to 1 GB of data) See appendix 2 for details ULH-IM&T-AUP03 Page 5 of 15

6 3.3. All files containing PID being transferred Internal should wherever possible be stored in a secure network storage area and shared between departments using shared storage areas Internal should only be use for the transfer of PID in accordance with the Trust Acceptable Use Policy. Where internal is the only viable method of the data transfer, all bulk transfer of PID must still be encrypted and all non bulk should be anonymised where possible. As a minimum any files transferred should be password protected and if possible encrypted using the Trust approved encryption product The electronic transfer of unencrypted non-bulk person-identifiable information (including , FTP, internet submissions, etc.) within the Trust is acceptable because the risk to the information is minimised when it is being transferred within the Trust. However, in addition to Para 3.4 above, the following guidance must be adhered to: Extreme care must be taken that this information is not inadvertently sent or forwarded to recipients outside of the Trust PID should not be sent via except as part of an agreed and documented workflow or in a clinical emergency Unless a clinical emergency has arisen, or specific authority has been granted by the Caldicott Guardian, s are only to be sent to other internal addresses in the Global Address Book Only the minimum amount of data needed to identify the patient should be used. Anonymisation of data should be considered - Where possible, only use the NHS Number as the identifier Individuals are responsible for carrying out a risk assessment prior to transferring data for this purpose. Is there a safer way of passing this information that meets the users requirements; does the risk of inadvertent disclosure justify using this method of communication (ultra sensitive information should not be sent except in a medical emergency) Users are to make sure that any messages sent are part of a formal and documented workflow process. Clinical information should never be sent as an attachment between clinicians unless it is part of an agreed process Ensure that any clinical information sent conforms to the Caldicott principles. When setting up any clinical information flow using , work flows should be reviewed and if necessary approved, by the Caldicott Guardian via the Information Governance Department Never include PID within the name of a file or the Subject heading of an . This information could be overseen on a computer screen even if the file or has not been opened by the intended recipient. ULH-IM&T-AUP03 Page 6 of 15

7 Delete the file or as soon as possible once it is no longer required If storing the file or outside of Microsoft Outlook it must be properly protected as stated above when stored on the sender s and receiver s computer devices. 4. Mobile Computing Equipment 4.1. All mobile computing is to be carried out in accordance with the Trust Mobile Computing and Home-Working Security Policy. Which sates that: Sensitive or confidential data must only be removed from the Trust premises in exceptional circumstances with the consent of the data owners who are, where appropriate, required to seek advice from the Data Protection Officer and/or the Caldicott Guardian. In addition, employees must ensure that written authorisation is obtained from their Line Manager prior to taking the data away from trust premises General - When using mobile/portable computer storage media: Ensure that authority to use these devices has been granted from an appropriate senior manger and that there is a justifiable business case for transferring or storing data in this way Ensure all such media is stored in a secure environment when not in use Ensure that no one else uses them (e.g. members of your family) Keep them with you at all times when travelling USB Memory Sticks USB Memory Sticks should only be used on an exceptional basis where it is essential to store or temporarily transfer data Any PID transferred to a USB Memory Stick must remain encrypted throughout its journey and must not be transferred to any non approved other system in an unencrypted form All USB Memory Sticks and the data they contain remain the property of the Trust. When a member of staff leaves their department or Trust they are responsible for relocating any stored data appropriately and returning their empty USB Memory Stick to ICT Ops (Security and Access Services) for redistribution Data should always be removed from the USB Memory Stick when no longer required When using mobile/portable computers such as laptops, notebook computers, PDAs, etc. ULH-IM&T-AUP03 Page 7 of 15

8 Ensure any data stored is for operational reasons only and that the data is routinely backed up to a network storage area Do not use them for the storage or bulk transfers (more than 50 individuals) of PID without the express permission of the Caldicott Guardian Do not load them with any unauthorised software Ensure any security features are switched on at all times Ensure other people cannot see any information on the screen, particularly when travelling on public transport Store them in a secure environment when not in use Ensure that no one else uses them (e.g. members of your family) Do not write down any user names or passwords Keep them with you at all times when travelling. Do not leave them unattended in your vehicle, or whilst you are fetching refreshments or visiting the cloakroom - particularly if you are attending conferences in hotels, conference venues, etc Keep them out of sight when driving (for example, in the boot), to minimise the risk of anyone taking them whilst you are stationary Remove any detachable media such, as an external memory card (which must be encrypted), and carry them separately (e.g. inside a coat pocket or briefcase) Cameras and Mobile Phones/Camera Phones Taking photographs or making video records of patients or other members of the public must only be done with informed consent. This consent must be documented Users must exercise care to ensure that all cameras and/or the associated film, memory cards or memory sticks are protected from theft or loss Photographs and/or video must not be stored on these devices for any longer than is necessary. The images must be transferred to a secure location (e.g. a user s network storage facility) at the earliest opportunity, and then deleted from the portable device The Trust does not permit the use of personally owned devices for taking photographs or video of patients. ULH-IM&T-AUP03 Page 8 of 15

9 5. Passwords 5.1. Strong passwords All password used are to be in accordance with the Trust Computer Acceptable Use Policy. Encryption software is only effective if strong passwords are used. Staff are therefore required to: Change their passwords at least every 60 days if not prompted Treat all passwords as confidential and never share them with anyone Change passwords whenever the users believes it may have been compromised Employ passwords with a minimum length of 8 characters, which are to be made up of a combination of letters, numbers and special characters such ^ = $ *! When choosing passwords avoid personal names and common words which might easily be guessed or associated with them Do not use a password containing a single word that can be found in a dictionary or a combination or 2 or more such words Do not use a password containing any names or dates of birth as it could be easy to guess Combinations of words and numbers are more effective and enhance security for example goldfish25' is a more secure password than 'goldfish'. A password you can remember that is not a word is even better. One technique is to use the first letters from a sentence or rhyme, for example The Cat Sat On The Mat to give a password tcsotm and then include numbers tcsotm46 and possibly mix upper and lower case characters and add a special charcter TcsOtM23! Communicating passwords If sending an encrypted file containing PID it is unacceptable to transfer the password with the file Whenever possible send the password via a different medium. For example if sending an encrypted CD-ROM or DVD via post, telephone through the password or send it by . Never send the password in the same packaging as the disk. If sending an encrypted file by telephone through the password or send it by post. Never send the password in the body (or as an attachment) of the with the encrypted file attached If the encrypted file and password MUST be sent via the same medium send them separately and never together sending encrypted files and passwords by the same medium is strongly discouraged and should only be used as a last resort. For example, if you must send an encrypted CD- ULH-IM&T-AUP03 Page 9 of 15

10 6. Visitors/Third Parties ROM or DVD and the password by post send them in different packages. If you must send an encrypted file and the password by send them as separate s and remove all references to each other to make it harder for anyone other than the intended recipient to recognise that the two are linked Visitors will include, for example, lecturers, contractors, company representatives, etc Staff must ensure that visitors are aware of this aspect of the policy before they arrive on site: Visitors must not connect any device, including USB sticks and Laptops, or insert any media to any equipment belonging to the Trust without prior authorisation, which must be from a Head of Department or member of the Security and Access Team. Any approved connection must also be undertaken under appropriate supervision (Head of department, member of the ICT Department or Security and Access team) and may need the ICT Technical Services team to active the connection. Visitors must not, under any circumstances, copy Trust information of any description to any device or media without explicit consent. This may be regarded as theft of Trust property and result in legal action. Where possible, visitors must use stand-alone PCs or laptops for such devices or media instead of networked equipment. 7. Incident Reporting 7.1. Any loss of portable media potentially constitutes a serious breach of Trust security and should immediately be reported to line management and recorded as an incident Staff should report all information security breaches or near misses via the Trust Incident Reporting process (IR1 s). This can be done via the Trust intranet site, and, in serious cases direct to the Information Security Manager so that immediate mitigation action can be taken This is the ONLY way the Trust can put countermeasures in place to ensure that security breaches cannot happen. ULH-IM&T-AUP03 Page 10 of 15

11 8. Implementation and Compliance 8.1. Corporate oversight The Director of Operations, on behalf of the Chief Executive, will take steps to ensure that all staff adhere to this Policy Training The Associate Director of ICT will ensure that training on the use of the encryption software is available to staff who require it Monitoring The Trust will actively monitor the removal of data from the Trust network onto external storage devices such as USB data sticks. This is for the following reasons: Identify system and user problems. Monitor and investigate acceptable usage. Investigate clinical and disciplinary incidents. ULH-IM&T-AUP03 Page 11 of 15

12 Appendix 1 Personal Identifiable Information What is personal information? - Personal information is information we hold about an individual, patient, client or member of staff. It can be their name, address, or telephone number. It can also be the type of job you do, the attendances you have had at clinics and the place you went to school and or live. Personal data - Personal data means information about an individual who can be identified from that information and other information which is in, or likely to come into, the Data Controller's (The Trusts) possession. Person-Identifiable information - Can be any information that may identify an individual. It may be related to clients, staff, contractor s, student placements, and or their family and friends. It may consist but is not limited to one or more of the examples listed below: Name Date of Birth Sex Address (Including Key Codes/Door Access Codes) Telephone number Visual images Sensitive Information Some personal information is classed as Sensitive Information. This type of information is subject to further regulations under the Data Protection Act. Personal data becomes sensitive if it includes any of the following types of information about an identifiable, living individual: Racial or ethnic origin; political opinions; religious beliefs; trade union membership; physical or mental health; sexual life; commission of offences or alleged. Business Sensitive Information Business Sensitive Information, is other confidential information which may not include person identifiable data items, but its content, if disclosed, may risk the continued provision of care or compromise the Trust s operational standing or reputation. Examples of documents covered by Business Sensitive Data are: Financial Information Tenders Legal Information Complaints data Business cases ULH-IM&T-AUP03 Page 12 of 15

13 Appendix 2 Secure File Transfer (SFT) What is SFT? The SFT is a web service provided by Connecting for Health designed to allow the secure transfer of data between NHS users The SFT is designed to replace physical media transfers CD or DVD Memory sticks, USB pen drives Printouts Comparing SFT & NHSmail SFT NHSmail Data sizes suitable for transfer Up to 1GB Up to 20MB Can already encrypted or password protected zip files be sent? Yes Usually not Number of recipients per transfer Up to 10 Essentially unlimited Potential recipients for secure transfers Files retained in system Anyone on NHSmail with N3 access Deleted after 3 days (sender can specify less) Anyone on NHSmail or other trusted domains Indefinitely Please see the user guide below, or contact ICT Operations for more Information: ULH-IM&T-AUP03 Page 13 of 15

14 Secure File Transfer Users Guide Getting Started Before using the Secure File Transfer system (SFT) to send files, check the following: Make sure that you have a NHSmail account. Visit the SFT website at and register with the SFT service. (Remember to add the website to your web browser favourites). The people you are sending data to also need to have NHSmail accounts and to register with the SFT. Once you have done this, you can immediately start to use the SFT. Why do we have to have NHSmail accounts? One of the security checks that the SFT makes is making sure that the senders and recipients of data are valid NHS users. The SFT does this by checking with the NHSmail system. The SFT also sends its notification messages using NHSmail. I cannot connect to the web site If you are manually typing the SFT address into your web browser, double check that you have typed https: and not http: at the start of the web address. Also senders and recipients need to have access to the N3 network. ULH-IM&T-AUP03 Page 14 of 15

15 Sending files with the SFT 1. Using your web browser, connect to the SFT web site ( 2. Enter your address and the PIN that you received during registration If you forget your PIN, contact the Exeter helpdesk Enter the addresses of the people you are sending the files to. You can send to up to ten people at a time. 4. Enter a password to protect the file. If you provided mobile phone numbers, the SFT will text the password to those numbers. 5. You can add a comment that the SFT will send to the recipients. Also you can ask to be notified when the file is downloaded. You can also ask the SFT to delete the file sooner. 6. Tick the box that says you understand the terms and conditions, and click on the Check Steps 1-3 box. 7. Upload the file that you wish to send. You can send compressed or encrypted files or archives (and password protected ZIP files). You cannot currently send a file larger than 1GB (~1000MB). 8. Send the file. 9. You may need to send the password you used to the recipients if you did not ask the SFT to do this for you. You need to do this in a secure way. If you are unsure how to do this, contact your Information Governance Manager. Do I need to delete the file after it has been downloaded? Files uploaded to the SFT will automatically be deleted after three days. If the recipients do not download the files before this, you will need to resend them. If you wish, you can ask the SFT to delete the files sooner. Downloading files from the SFT 1. The SFT will send an to the recipients you provided with a link to click on and instructions. 2. The recipients enter their PIN (from their registration) and the file password you specified (The SFT might have sent this as a text message). 3. They can then download and save the file. ULH-IM&T-AUP03 Page 15 of 15

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Please be aware that this printed version of the Policy may NOT be the latest version. Staff are reminded that they should always refer to the Intranet for the latest version. Purpose

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information

Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Im&t directorate\policies\approved ig policiesprocedures.1 Index 1. Purpose... 3 2. Introduction... 3 3. Scope...

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

Bulk Data Transfer Guidelines

Bulk Data Transfer Guidelines Bulk Data Transfer Guidelines This procedural document supersedes: CORP/ICT 20 v.1 Bulk Data Transfer. Did you print this document yourself? The Trust discourages the retention of hard copies of policies

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Information security incident reporting procedure

Information security incident reporting procedure Information security incident reporting procedure Responsible Officer Author Date effective from 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Policies and Procedures. Policy on the Use of Portable Storage Devices

Policies and Procedures. Policy on the Use of Portable Storage Devices Policies and Procedures Policy on the Use of Date Approved by Trust Board Version Issue Date Review Date Lead Person One May 2008 Dec 2012 Head of ICT Two Dec 2012 Dec 2014 Head of ICT Procedure /Policy

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers IG Toolkit Version 8 Information Security Assurance Requirement 322 Detailed Guidance on Secure Transfers IG Toolkit Version 8 Requirement 322: Detailed guidance on secure transfers Page 1 of 7 All transfers

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

Information governance

Information governance Information governance Staff handbook RDaSH 88 02 Information governance Introduction to information governance Overview 88 03 Information governance or IG - includes information security and confidentiality,

More information

Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3

Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Paper 9 Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Please ensure that all THREE pages of this contract are returned to: Information Governance Manager, Health Informatics, Chertsey House, St Peter

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Number: THCCGCG36 Version: 01 Executive Summary This Policy defines the Security requirements for data encryption upon laptops, physical media and Secure File Transfer within the

More information

Remote Working and Portable Devices Policy

Remote Working and Portable Devices Policy Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review

More information

MOBILE COMPUTING & REMOTE WORKING POLICY AND PROCEDURE. Documentation Control. Consultation undertaken Information Governance Committee

MOBILE COMPUTING & REMOTE WORKING POLICY AND PROCEDURE. Documentation Control. Consultation undertaken Information Governance Committee MOBILE COMPUTING & REMOTE WORKING POLICY AND PROCEDURE Documentation Control Reference GG/INF/020 Date Approved 13 Approving Body Directors Group Implementation date 13 Supersedes Not Applicable Consultation

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Electronic Mail Policy Version: 5 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY

CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY POLICY NUMBER 098/Corporate POLICY VERSION 1 RATIFYING COMMITTEE Information Governance Group DATE RATIFIED May 2012 DATE OF EQUALITY & HUMAN RIGHTS

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

POLICY DOCUMENT. Policy on Mobile / Portable Computing Devices and Data Security. Release: Final Date Created: 3 March 2009

POLICY DOCUMENT. Policy on Mobile / Portable Computing Devices and Data Security. Release: Final Date Created: 3 March 2009 POLICY DOCUMENT Policy on Mobile / Portable Computing Devices and Data Security Release: Final Date Created: 3 March 2009 Owner: David Priest Compiled by: David Priest Document Reference: Page 1 of 8 Printed:

More information

USB Data Stick Procedure

USB Data Stick Procedure SH IG 41 INFORMATION SECURITY SUITE OF POLICIES Procedure for the Management of Personal Data Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review : This procedure

More information

Information Governance

Information Governance CONTROLLED Information Governance Caldicot Version-Workbok Non Caldicott Version - Workbook Version 12 January 2015 40 1 Don t Get Bitten by the Data Demon Notes Using this Workbook The objective of this

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

John Leggott College. Data Protection Policy. Introduction

John Leggott College. Data Protection Policy. Introduction John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and

More information

Information Security Policy

Information Security Policy Document reference: Version 3.0 Date issued: April 2015 Contact: Matthew Jubb Information Security Policy Revision History Version Summary of changes Date V1.0 First version finalised. February 2006 V1.1

More information

Incident reporting procedure

Incident reporting procedure Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance

More information

Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25

Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25 Information Security Policy Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25 Document Information Trust Policy Number : ULH-IM&T-ISP01 Version : 3.1 Status : Approved Issued by : Information Governance

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

University of Limerick Data Protection Compliance Regulations June 2015

University of Limerick Data Protection Compliance Regulations June 2015 University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Data Transfer Policy. Data Transfer Policy London Borough of Barnet Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Network Security Policy

Network Security Policy KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Acceptable Usage Guidelines. e-governance

Acceptable Usage Guidelines. e-governance Acceptable Usage Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

DOCUMENT CONTROL PAGE

DOCUMENT CONTROL PAGE DOCUMENT CONTROL PAGE Title: Title Version: 0.2a Reference Number: Supersedes Supersedes: IT Encryption and Security Policy and Guidelines Description of Amendment(s): Clarification of document approval

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Standard Operating Procedure. Secure Use of Memory Sticks

Standard Operating Procedure. Secure Use of Memory Sticks Standard Operating Procedure Secure Use of Memory Sticks DOCUMENT CONTROL: Version: 2.1 (Amendment) Ratified by: Finance, Infrastructure and Business Development Date ratified: 20 February 2014 Name of

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Information Governance

Information Governance Information Governance What you will learn in this session? 1. Principles of Information Governance and their application to health and social care organisations 2. Accessing Information Governance resources

More information

Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers

Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers Information Governance Toolkit Information Security Assurance Detailed Guidance on Secure Transfers Information Transfers/Flows - Security Measures 1. The outcomes of information mapping and identified

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

INFORMATION RISK MANAGEMENT POLICY

INFORMATION RISK MANAGEMENT POLICY INFORMATION RISK MANAGEMENT POLICY DOCUMENT CONTROL: Version: 1 Ratified by: Steering Group / Risk Management Sub Group Date ratified: 21 November 2012 Name of originator/author: Manager Name of responsible

More information

Bexley Safeguarding Children Board. Information Sharing and Secure Document Transfer Guidance

Bexley Safeguarding Children Board. Information Sharing and Secure Document Transfer Guidance Bexley Safeguarding Children Board Information Sharing and Secure Document Transfer Guidance All professionals who work with children and young people, or with adults who are parents or carers, should

More information

Why do we need to protect our information? What happens if we don t?

Why do we need to protect our information? What happens if we don t? Warwickshire County Council Why do we need to protect our information? What happens if we don t? Who should read this? What does it cover? Linked articles All WCC employees especially mobile and home workers

More information

Cellular/Smart Phone Use Procedure

Cellular/Smart Phone Use Procedure Number 1. Purpose This procedure is performed as a means of ensuring the safe and efficient use of cell/smart phones throughout West Coast District Health Board (WCDHB) facilities. 2. Application This

More information

Secure Transfer of Information Guidance for staff

Secure Transfer of Information Guidance for staff Secure Transfer of Information Guidance for staff Document number CCG.GOV.013.1.1 Version: 1.1 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 8 th January 2014 Name of originator /author

More information

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013 Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is

More information

your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO:

your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO: STANDARD OPERATING PROCEDURE: Safe Haven Procedure SOP NO: VERSION NO: APPROVING COMMITTEE: DATE THIS VERSION APPROVED: TW10-110 SOP 3 3 Information Governance Committee July 2013 RATIFYING COMMITTEE:

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely

GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status

More information

Personal Identifiable Data Security Policy

Personal Identifiable Data Security Policy Personal Identifiable Data Security Policy Number: THCCGCG43 Version: 01 Executive Summary This Policy defines the Security requirements for all Staff involved in handling Person Identifiable Data (PID)

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Recommending Committee: Approving Committee: Information Governance Steering Group Patient Safety & Experience Council Signature: Designation: Chief Executive Date: Version Number:

More information

Information Security Incident Reporting & Investigation

Information Security Incident Reporting & Investigation Information Security Incident Reporting & Investigation Purpose: To ensure all employees, consultants, agency workers and volunteers are able to recognise an information security incident and know how

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

Enterprise Information Security Procedures

Enterprise Information Security Procedures GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3

More information

Information Security Policy. Appendix B. Secure Transfer of Information

Information Security Policy. Appendix B. Secure Transfer of Information Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008 Document Control Information Document ID Document

More information

Acceptable Use of Information Systems Policy

Acceptable Use of Information Systems Policy Information Governance & Management Framework Acceptable Use of Information Systems Policy Version 1.3 Produced by: Customer Services & Business Transformation Inverclyde Council Municipal Buildings GREENOCK

More information

Policy Document. IT Computer Usage Policy

Policy Document. IT Computer Usage Policy Policy Document IT Computer Usage Policy ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Author IT Services Manager Version 4.1 Issue Issue Date

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

Information Technology Acceptable Usage Policy

Information Technology Acceptable Usage Policy Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly

More information

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106 UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1. Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Dublin City University

Dublin City University Dublin City University Data Protection Policy Data Protection Policy Contents Purpose... 1 Scope... 1 Data Protection Principles... 1 Disclosure of Personal Data... 2 Summary of Responsibilities... 3 Rights

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Network Password Management Policy & Procedures

Network Password Management Policy & Procedures Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL

More information

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

Acceptable Use of Information. and Communication Systems Policy

Acceptable Use of Information. and Communication Systems Policy Use of Information Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help Intu Properties plc employees,

More information