INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY

Size: px
Start display at page:

Download "INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY"

Transcription

1 Information Management & Technology Security Policy INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY POLICY NO IM&T 003 DATE RATIFIED October 2010 NEXT REVIEW DATE October 2013 POLICY STATEMENT/KEY OBJECTIVE: To protect the information assets of Lancashire Care NHS Foundation Trust Accountable Director: Policy Author: Director of Finance, IM&T & Estates IM&T Project Manager

2 Contents Page Summary of Document Changes 2 Executive Summary 3 1 Introduction Rationale Scope Principles 4 2 Definitions 4 3 Legal Compliance 5 4 Policy Management Responsibilities Staff Responsibilities Risk Management Implementation 6 5 Audit & Monitoring 7 6 Reference Documents 7 7 Appendix no.1 - Data Protection guidance for staff 8 1

3 Summary of Document Changes / Adaptations. POLICY POLICY NO IM&T 004 IM&T Security DATE RATIFIED DEC 2009 PROPOSED REVIEW DATE Oct 2011 TO SMN Document section 1.2 Scope Page 2 Nature of change. Expanded scope to define who it applies to e.g. all Trust employees, people working on behalf of the Trust etc Applicability of business functions and what the networks are used for 3.0 Legal Compliance Page 3 Added this legislation: Access to Health Records 1990 The Human Rights Act 1998 Electronic Communications Act 2000 Regulation of investigatory powers Act 2000 Health & Social Care Act Management Responsibility Page Staff Responsibility Page Risk Management Page Implementation Page Audit and Monitoring Page Reference Documents Page 6 Appendix No.1 Taking Confidential data off site Page 10 Two more bullets added to the end of the list referring to: Secure and resilient remote access to network Ensure all users are provided with security guidance and training / awareness of security responsibilities Added bullet point 4 using home IT equipment for work purpose Added last bullet adherence to policy Paragraph on monitoring the policy has been moved to section 5.0 Audit and Monitoring Added in other means of communication and access e.g. Network Governance groups, IG e-learning package and weekly e-bulletin Refer to 4.3 paragraph moved from section 4.3 Expanded ref doc s Lifecycle of records policy superseded by Corporate Records Management Policy and Records Management strategy Added in Bullet point 2 reference re application of Safeboot on laptops Use of USB Memory sticks This page can be destroyed after the release of any subsequent Summary of Changes / Adaptations statements related to this policy or after 3 months. 2

4 Executive Summary Subject Security of Information and Information Technology Applicable to All Trust staff and those authorised to use or access the networks or systems on behalf of the Trust Key Policy Issues To protect Trust information assets Management responsibilities Staff responsibilities Risk management Date Issued December 2009 Dates Policy reviewed December 2009 Next review due date October 2013 Policy written by Michelle J Brammah Consultation IM&T Team Policy reviewed by: Lead responsible for policy Monitoring arrangements Approved by Authorised by IM&T Project Manager, IT Security, Information Governance and IM&T senior management Associate Director of IM&T Internal and external audit, compliance with annual IGT submission EMT Signature Related procedural documents Data Protection Guidance 3

5 1 Introduction The objective of the Information Management and Technology (IM &T) Security Policy is to protect the data assets processed by Lancashire Care NHS Foundation Trust. The organisation has a legal and moral responsibility to protect the personal data it holds. Compliance with this policy and the associated guidance is necessary to ensure business continuity, and minimise data loss. 1.1 Rationale The NHS Information Governance Toolkit sets out responsibilities for all NHS organisations to ensure data is secure. This policy reflects the requirements of the information governance toolkit. Further information can be found at Scope This policy applies to information (data), which is stored or processed in manual filing systems, on any form of computer. This Policy applies to all Trust employees, other persons working for or on behalf of the Trust and usage by anyone granted access to the Trust network. It is applicable to all business functions and information contained on the network, the physical environment and relevant people who support the network. The networks within the Trust are used for: Storage, sharing and transmission of clinical and non clinical data and images Printing or scanning of clinical or non clinical data or images The provision of internet systems for receiving, sending and storing of clinical and non clinical data and images Remote access by mobile users a, home workers and non NHS staff Storage and transportation of data and images on removable media 1.3 Principles The key principles are: - Information assets and information processing facilities shall be protected against unauthorised access and disclosure. Statutory and legal obligations must be met. Unauthorised use of information assets and information processing facilities shall be prohibited; the use of obscene, racist or otherwise offensive statements shall be dealt with in accordance with other relevant policies published by Lancashire Care NHS Foundation Trust All breaches of information security, actual or suspected, shall be reported and investigated in line with Lancashire Care NHS Foundation Trust s published policies 2 Definitions This policy uses the terms 'data' and 'processing' as defined by the Information Commissioner. ( 4

6 3 Legal Compliance The Trust has a legal obligation to protect the data it processes. The legislation directly relating to this policy is: Data Protection Act, 1998 Access to Health Records Act 1990 Freedom of Information Act, 2000 The Human Rights Act 1998 Computer Misuse Act, 1990 Electronic Communications Act 2000 Regulation of Investigatory Powers Act 2000 Copyright, Designs and Patents Act, 1993 Health & Social Care Act Policy Every person in the organisation has a responsibility for data protection. The Trust processes very sensitive personal data and everyone has an obligation to protect this data. All employees must make themselves familiar with Data Protection Guidance. 4.1 Management Responsibilities Management must ensure that all employees are updated and informed of their security responsibilities and that an adequate confidentiality clause is contained in contracts of employment. In addition they must also: Ensure all breaches in the operation of this policy and the procedures laid down herein are dealt with promptly and in an appropriate manner. Ensure all employees have adequate opportunities to familiarise themselves with data processing systems. Ensure only authorised employees are allowed to use data processing systems with appropriate levels of access where applicable. Ensure appropriate business continuity plans are in place in the event of systems failure. Ensure adequate controls are in place for monitoring usage of data processing systems and that staff are aware of them. Ensure IT equipment is maintained and secure. Ensure that all removable media (USB pens, floppy disks etc), and confidential hard copy material, including microfiche are stored in a secure environment and are securely disposed of and that all redundant or faulty hardware is returned to the IM&T department. Patient relevant information must be dealt with in accordance with the Health Records Policy. Ensure suppliers and third party contractors comply with this policy and that a Data Processing Agreement covers any external data processing. Ensure appropriate data sharing agreements are in place with external agencies and that staff are aware of these. Provide secure and resilient remote access to Trust Information systems. 5

7 Ensure that all users of the network are provided with the necessary security guidance, awareness and appropriate training to discharge their security responsibilities 4.2 Staff Responsibilities All employees are responsible for ensuring that breaches of information security do not result from their actions and that they have made themselves familiar with their security responsibilities before handling data or using data processing systems. In addition they must also: Seek further assistance from management or the IM & T department if unclear of their responsibilities. Never share system passwords with anyone else and always log off from the computer / system when not in use. Always store Trust data on central systems; never store data where it is not backed-up or retrievable by Trust staff. Refrain from using personal home IT equipment for work purposes unless arrangements have been made with the IT Service for access to VPN (Virtual Private Network) using a secure fob. Any transfer of electronic information onto home IT equipment is strictly prohibited regardless of method used i.e. portable media or Make sure they are aware of any emergency procedures in the event of a system failure. Keep IT hardware safe and secure. Always take IT equipment back to the IM & T Department if leaving the Trust or if it is no longer needed. Always ensure that personal data copied to removable media (USB Pens, floppy disks, etc) is encrypted. If unsure how to do this check with the IM & T department. Report suspected breaches of data security using the Trust's incident reporting procedures. Failure by an employee of the Trust to adhere to the policy and any associated guidance may result in disciplinary action. 4.3 Risk Management Requirements for information security risk analysis and management can be found within ISO27001, to which the IM & T department is working toward accreditation. To ensure compliance with the IM&T Security Policy regular assessments of security will be conducted to identify security countermeasures necessary to protect against possible breaches in confidentiality, integrity and availability. 4.4 Implementation This policy will be communicated to all employees via Network Directors and Service Leads Corporate Inductions Network Governance Groups Information Governance e-learning package (available on the Trust s intranet) Intranet Weekly e-bulletin 6

8 5 Audit & Monitoring Use of the Trust's data processing systems is subject to monitoring by the IM & T department. All employees should be aware that and Internet usage is monitored to ensure compliance with legislation and policy. Implementation of the policy and all systems will be subject to periodic review by both internal and external auditors. All recommendations will be implemented unless senior Trust management gives specific dispensation. This policy will be implemented in line with NHSLA requirements to ensure the effectiveness of its implementation and staff knowledge and understanding of the content. Standard Timeframe How audited Lead Annual IGT submission IG Leads 6 Reference Documents This policy should be considered in relation to the following policies and guidance: Corporate Records Management Policy Records Management Strategy Policy For the Control And Use Of Mobile Phone Devices Health Records Service Security and Confidentiality Policy Policy for the Communication of Clinical Information via Policy for Electronic Communications Access to Health Records Policy Data Quality Policy ISO Information Security principles NHSIA Information Governance Toolkit - Information Security Workbook Requirements ITIL Standards Please refer to the Recording Service Users Details on the NHS Care Record Service and ecpa, which is available on the intranet if you are required to record clinical activity. 7

9 Appendix 1 Data Protection guidance for employees Introduction The Data Protection Act 1998 provides a legal framework for ensuring that personal information is handled properly. Firstly it requires that anyone who processes personal information must comply with the following eight principles to ensure that information is: Fairly and lawfully processed Processed for limited purposes Adequate, relevant and not excessive Accurate and up to date Not kept for longer than necessary Processed in line with the rights of the individual concerned Secure Not transferred to other countries without adequate protection. The second area covered by the Act provides individuals with important rights, including the right (with certain exemptions) to find out what personal information is held about them on computer and most paper records. In addition, the NHS also has its own Code of Practice on Confidentiality. This paper provides a general checklist of requirements/good practice in relation to the handling of personal data held by the Lancashire Care NHS Foundation Trust. It is not exhaustive and should be read in the context of the legislation itself. Obviously more detailed advice may need to be sought where specific issues arise. 8

10 Checklist of requirements/good practice Paper records Do not store any records, which contain personal data unnecessarily or for longer than necessary (check the NHS guidelines on retention of records). Files containing such information should be clearly marked Private and confidential and kept in secure locked filing cabinets or locked desk drawers with access strictly on a need to know basis. Do not leave files of this nature lying about on your desk for others to see. Where departments/individuals need to keep large volumes of such records then managers should consider installing a key entry pad on the office door or some other form of lock. Everybody should take care when opening confidential mail to ensure it is not simply left in full view on a desk or elsewhere in the office. When distributing sensitive mail internally this should be sent in sealed envelopes clearly marked Private & confidential for the personal attention of X. Where possible person-to-person delivery of such items is best. Destroying confidential records All files should be checked before discarding to ensure that they do not contain personal/sensitive data. Under no circumstances should confidential files be disposed of via general waste collection systems. Confidential files should be either shredded or sent for incineration. White sacks for confidential waste are available throughout the Trust and must not be left unsecured. Check when you are photocopying / printing that you have not accidentally discarded any confidential material or sent it to the wrong printer. Never leave personal data on the printer for any period of time. 9

11 Faxing Avoid using personally identifiable information where possible in s. Do not use people s names and other personal information in the subject strap-line (instead use, e.g., initials or ref no s). In particular do not include several pieces of personal info about the same individual (e.g. name/date of birth/address) which could allow for identity theft. Under Freedom of Information and Data Protection legislation, beware of what you write in s. Also, when forwarding an containing a string of previous messages, take care that these do not contain anything sensitive. If you have to send personal data using to an external recipient it must be encrypted. Attachments are also unsafe unless they have been encrypted; a password on a file is not sufficient. Always seek advice from the IM & T Department if you are planning to send large amounts of personal data Post is the absolute last option for sending sensitive personal data but, where the need does occur, always use recorded delivery. Always have a process in place to confirm that the delivery has reached its destination as required. Please report to your line manager/information governance lead whenever confidential data has come into your possession inappropriately and ensure that the sender is notified and rectifies their processes for the future. Double-check the fax no. Use a cover sheet stating clearly who the fax is for (an identifiable individual); who it is from (your name/phone/fax no); and marked Private & confidential. If appropriate ask for a report sheet to confirm transmission. For sensitive faxes ring ahead and make sure the intended recipient is available to receive it. Better still check whether there is a safe-haven fax facility available. Ask the recipient to ring and confirm receipt this is important. For incoming faxes, someone should be assigned responsibility for checking the fax machine. They should check the fax machine several times a day (particularly first thing in the morning and last thing at night) and ensure incoming faxes are distributed appropriately. Taking confidential data off-site This should be avoided as much as possible and line managers need to be aware of the extent of this practice to assess risk. Confidential information on laptops or other portable electronic equipment must be encrypted and kept to an absolute minimum. The IT Dept are ensuring that all laptops have full disk encryption (SafeBoot) available to store confidential and sensitive data. A password locking system is not sufficient. Where there is a need for staff to hold sensitive data on mobile devices and media other than their laptops, a Trust encrypted memory (USB) stick must be used. The IT 10

12 department are enforcing the use of USB sticks with appropriate software (Sanctuary). Should any item go missing while containing sensitive data, the user must immediately inform their line manager and complete an IR1 form. Paper records must be kept secure during transit, for example in a locked briefcase/folder etc. When driving, laptops/files etc should be kept out of sight (e.g. in a boot or under a seat). Under no circumstances should files (whether electronic or paper) containing personal data be left unattended in your car. If you are keeping information overnight then laptops/folders etc should be moved from your car to your home Keep laptops, bags etc away from main doors and front halls where they are at greater risk from opportunist burglars. Keep confidential information out of sight of family and friends (e.g. in a cupboard) Never allow friends or family to use your NHS IT equipment. Avoid doing NHS work on your home computer unless it is using the authorised secure home access system. This not only avoids the exposure of NHS systems to viruses but also avoids copies of confidential documents being left on hard drives of home computers. Miscellaneous Unless you can be sure of, or verify, the caller s identity, you should never disclose personal information over the phone. Ensure that when you are viewing person-identifiable data on a screen, that the data is not viewable by others, especially if being viewed in a public accessed area (for instance a reception). You are responsible for the safety of your IT equipment. The IM & T Department is responsible for the disposal of all IT equipment. Remember - Data Protection Is Everyone s Responsibility 11

13 Lancashire Care NHS Foundation Trust Initial Equality Impact Assessment Department/Function Person responsible Contact details IM&T Michelle J Brammah Michelle.brammah@lancashirecare.nhs.uk Name of policy/procedure/service IM&T Security Policy to be assessed Date of assessment 28 July 2009 Is this a new or existing policy/procedure/service? 1. Briefly describe the aims, objectives and purpose of the policy/procedure/service? Existing The aim of the policy is to set out requirements to protect all Trust data assets. The Trust has a legal and moral responsibility to protect personal data it holds. Compliance with the Policy is to ensure business continuity and to minimise data loss. It applies to all Trust employees, those working on behalf of the Trust and those granted access to the systems. 2. Who is intended to benefit? All Trust Users 3. What outcomes are wanted? Trust Users take responsibility for the use and security of all IM&T systems 4. Who are the main stakeholders? All Trust Users including contractors and third parties undertaking work on behalf of the Trust 5. Who is responsible for implementation? Management and employees 12

14 6. Are there concerns that there could be differential impact on the following groups and what existing evidence do you have for this? People from a Black or minority ethnic background Women or men Including trans people People with disabilities or long term health conditions Y N This policy is applicable to all employees who are authorised to access and use the Trust systems and networks. Ethnicity and background has no bearing on individual responsibility. Y There are no gender issues associated with the understanding N and implementation of this policy. The policy applies equally to men and women. Y N This Policy can be made available in audio or large print for users who have visual impairment. People with or without a religion or beliefs Y N This policy neither infers or refers to religion or a specific belief. Religion or specific beliefs have no impact on adhering to the requirements of the Policy. Lesbian, gay,bisexual or heterosexual people Y N The sexuality of an individual has no implications for complying with responsibilities outlined in the policy Older or younger people Y N There is no anticipated impact or concerns for these groups. However assistance to aid understanding can be provided by line management or IM&T advisors. 7. Could any differential impact identified above be potentially adverse? 8. Can any adverse impact be justified on the grounds of promoting equality of opportunity? 9. Have you consulted with those who are likely to be affected? 10. Should the policy/procedure/service proceed to full impact assessment? Y N No Y N No Y N No Y N No I understand the impact assessment of this policy/procedure/service is a statutory obligation and take responsibility for the completion of this process. Names of assessors: Michelle J Brammah Date of assessment: July 2009 Date of next review: October

15 14

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011) Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How

More information

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer: Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY POLICY NO IM&T 011 DATE RATIFIED January 2012 NEXT REVIEW DATE January 2015 POLICY STATEMENT/KEY OBJECTIVE: To provide an overarching framework through which Information Governance

More information

Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3

Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Paper 9 Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Please ensure that all THREE pages of this contract are returned to: Information Governance Manager, Health Informatics, Chertsey House, St Peter

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

Information Governance

Information Governance CONTROLLED Information Governance Caldicot Version-Workbok Non Caldicott Version - Workbook Version 12 January 2015 40 1 Don t Get Bitten by the Data Demon Notes Using this Workbook The objective of this

More information

Network Security Policy

Network Security Policy Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

Secure Transfer of Information Guidance for staff

Secure Transfer of Information Guidance for staff Secure Transfer of Information Guidance for staff Document number CCG.GOV.013.1.1 Version: 1.1 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 8 th January 2014 Name of originator /author

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Information governance

Information governance Information governance Staff handbook RDaSH 88 02 Information governance Introduction to information governance Overview 88 03 Information governance or IG - includes information security and confidentiality,

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

HERTSMERE BOROUGH COUNCIL

HERTSMERE BOROUGH COUNCIL HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

Remote Working and Portable Devices Policy

Remote Working and Portable Devices Policy Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Information Management Policy CCG Policy Reference: IG 2 v4.1

Information Management Policy CCG Policy Reference: IG 2 v4.1 Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

Information Security Policy. Version 2.0

Information Security Policy. Version 2.0 1 Intranet and Website Upload: Intranet Website Keywords: Electronic Document Library CCGs G Drive Location: Location in FOI Publication Scheme Information, Security, Information Governance, IG, Data Protection.

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Why do we need to protect our information? What happens if we don t?

Why do we need to protect our information? What happens if we don t? Warwickshire County Council Why do we need to protect our information? What happens if we don t? Who should read this? What does it cover? Linked articles All WCC employees especially mobile and home workers

More information

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance Information Privacy and IT Security & Compliance The information in this module in addition to the

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: Revised: Consultation: Ratified by: 1.0 Information Governance Committee Governance Committee Date ratified: 19 March 2008 Name of originator/author: David McGrath

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

How To Ensure Information Security In Nhs.Org.Uk

How To Ensure Information Security In Nhs.Org.Uk Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

Ixion Group Policy & Procedure. Remote Working

Ixion Group Policy & Procedure. Remote Working Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Data Transfer Policy. Data Transfer Policy London Borough of Barnet Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review:

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review: POLICY DOCUMENT Burton Hospitals NHS Foundation Trust INFORMATION SECURITY POLICY Approved by: Executive Management Team On: 16 January 2014 Review Date: December 2015 Corporate / Directorate Clinical

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

NHS Business Services Authority Information Security Policy

NHS Business Services Authority Information Security Policy NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA

More information

Mobile and Remote Working Policy

Mobile and Remote Working Policy Mobile and Remote Working Policy UNIQUE REF NUMBER: AC/IG/018/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

The Informatics Policy Information Governance Process

The Informatics Policy Information Governance Process Informatics Policy Information Governance Policy Ref: 3593 Policy Title Author/Contact Document Reference 3593 Pauline Nordoff-Tate, Information Assurance Manager Document Impact Assessed Yes/No Date:

More information

The Manitowoc Company, Inc.

The Manitowoc Company, Inc. The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational

More information

Information Governance Policy

Information Governance Policy Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Data Protection Policy

Data Protection Policy 1. Introduction 1.1 The College needs to keep certain information about its employees, students and other stakeholders, for example to allow it to monitor performance, achievements and health and safety.

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

Remote Access and Home Working Policy London Borough of Barnet

Remote Access and Home Working Policy London Borough of Barnet Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

Portable Devices and Removable Media Acceptable Use Policy v1.0

Portable Devices and Removable Media Acceptable Use Policy v1.0 Portable Devices and Removable Media Acceptable Use Policy v1.0 Organisation Title Creator Oxford Brookes University Portable Devices and Removable Media Acceptable Use Policy Information Security Working

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Number: THCCGCG36 Version: 01 Executive Summary This Policy defines the Security requirements for data encryption upon laptops, physical media and Secure File Transfer within the

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1. Safe Haven Procedure Final Version 1.0 (Final) Ratified By Executive Team Originator/Author Fabian Henderson Date Issued March 2009 Review Date March 2010 Target NHS East Midland Employees Safe Haven Procedure:

More information

Information Technology Acceptable Usage Policy

Information Technology Acceptable Usage Policy Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly

More information

Road to Recovery Fact Sheet

Road to Recovery Fact Sheet Road to Recovery Fact Sheet What is the American Cancer Society s Road to Recovery program? Road to Recovery is an American Cancer Society program designed to ensure that cancer patients have transportation

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Version: V1 Ratified by: Operational Management Executive Committee Date ratified: 26 September 2013 Name and Title of originator/author(s): Chris Brady, FOI, Data Protection and

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information