Standard Operating Procedure. UoM/ComputerisedSystems/SOP/1.0 Computerised Systems for Clinical Trials - Site Set Up and Initiation
|
|
|
- Shanon Rogers
- 10 years ago
- Views:
Transcription
1 APP Standard Operating Procedure Number: Title: UoM/ComputerisedSystems/SOP/1.0 Computerised Systems for Clinical Trials - Site Set Up and Initiation Version: 1.0 (11/02/2011) Effective Date Author: Lee Moffatt Reviewed by : Mike Taylor Approved By: Position: Head of IS, MHS Signature: Position: Signature: This document supersedes the following None document(s): Relevant regulations/legislation/guidelines: European Clinical Trials Directive 2001/20/EC and any other relevant European regulations or guidelines The Medicines for Human Use (Clinical Trials) Regulations 2004 and all its subsequent amendments All relevant professional guidance on the matter, including that provided by the University of Manchester Version Date Reason for change Creation st review SOP standardised When using this document please ensure that the version you are using is the most up to date either by checking on the Research Office website ( for any new versions or contacting the author to confirm the current version. UoM/ComputerisedSystems/SOP/1.0 Page 1 of 10
2 1.0 Background In order to be compliant with the European Directive on Good Clinical Practice in Clinical Trials (2001/20/EC) organisations conducting Clinical Trials of Investigational Medicinal Products must have clearly documented Standard Operating Procedures covering all aspects of conducting Clinical Trials. The SOPs also apply to all other projects that fall under the Research Governance Framework for Health and Social Care, 2 nd Edition, Department of Health A Standard Operating Procedure (SOP) is defined by ICH Harmonised Tripartite Guideline for Good Clinical Practice as Detailed, written instructions to achieve uniformity of the performance of a specific function. These SOPs are written instructions and records of procedures agreed and adopted by the University of Manchester. 2.0 Purpose This Standard Operating Procedure (SOP) describes the process of setting up computerised systems to assist with the capture and processing of data relating to Clinical Trials of Medicinal Products (CTIMP) This SOP is underpinned by the University of Manchester s IT Security Policies (see the references section for links), based on UCISA best practice, which, in turn, draws heavily on the standards BS7799 and ISO Procedure When designing a Clinical Trial it is important to consider how trial-related data will be collected, stored, processed for the duration of the trial. This is likely to include the design of any computerised systems that will be required to assist with the management of trial data. Paramount in the design will be the security of the data management system and the data itself. See: SOP Data Management See: SOP IT Security and Encryption The IT Security Checklist (Appendix 1) should be completed initially and returned to the Faculty Research Office to ensure that some fundamental aspects of data management and IT Security are being considered. Examples of areas which should be addressed are: data processing data transmission computer and data security physical security data archiving IT and information security awareness, procedures and training Faculty Information Services can arrange a site visit if required to audit existing IT systems and working processes and provide guidance around best practice in data handling, IT and information security best practices. Faculty IS will also work with trial staff to implement and support trial related computer systems. Visit arrangements can be made via the University s IT Service Desk (see the contact list section for details). UoM/ComputerisedSystems/SOP/1.0 Page 2 of 10
3 4.0 Related Procedures and references SOP for Data Management SOP for IT Security and Encryption SOP for Developing and Implementing a System Level Security Policy UoM Secure-IT website: UoM IT Security Policies (last updated January 2009) Data Protection section of the MHS Faculty intranet Contact list The University s IT Service Desk t: e: mailto:[email protected] w: MHS Faculty Research Office UoM Research Office UoM/ComputerisedSystems/SOP/1.0 Page 3 of 10
4 Appendix 1 The University of Manchester IT and Information Security Checklist for Clinical Trials Throughout this document the use of the term data means clinical trial data or other sensitive data stored or processed in an electronic format. 1. Background Information Title of the Trial Chief or Principal Investigator Data Custodian Primary site / building Other sites / buildings Do you maintain an inventory of IT equipment? If so, please provide brief details. Is your IT equipment connected to the University s network? Who provides support with respect to IT equipment used within the Trial? Do you maintain documented standard operating procedures (SOPs) with respect to IT and Information Security and data handling within the Trial Master File? UoM/ComputerisedSystems/SOP/1.0 Page 4 of 10
5 2. Data Processing Where do staff store, process and backup data? Have you considered the security implications of storing, processing and backing up data in these locations? Shared network storage store process backup security considered - comments Personal network storage (p-drive) inbox/folders External hard drive Local drive (pc/laptop) USB pen drive Optical media (CD/DVD) Non-University provided equipment (pc/laptop, external drive) Non-University provided storage (personal account) Non-University provided storage (cloud-based, eg MS Sky-Drive) Mobile devices (eg Blackberrys, iphones, other PDAs UoM/ComputerisedSystems/SOP/1.0 Page 5 of 10
6 3. Data Transmission Do staff send (/receive) data to (/from) colleagues or 3 rd parties by the following means? Have you considered the security implications of sending/receiving by these means? University system send receive security considered - comments Other university system NHS system Other system (eg Googl , Hotmail) Secure File Transfer over the Internet Postal/Courier service to send/receive USB/CD/DVD media UoM/ComputerisedSystems/SOP/1.0 Page 6 of 10
7 4. Computer and Data Security Do you employ the following IT security measures to protect against equipment/data loss or theft? Antivirus: do you have antivirus software installed and enabled on all computers and laptops? Is it configured to receive updates on a frequent and regular basis? Automatic updates/patches: are your computers and laptops (and installed software applications) configured to automatically download and install patches, updates and security fixes, as and when they become available (eg from Microsoft, Apple and other software application vendors)? Firewall: do you have a software firewall installed, active and properly configured on all computers and laptops? Block remote access: are your computers and laptops accessible via Remote Desktop from outside the University s network? Encryption: do you have disk/file level encryption tools installed on your computers, laptops, external drives and other removable media and do you use them? Note: please specify the encryption tools you use in the comments section. Passwords: are all your accounts protected by strong, secure passwords that are not written down or shared with others? Data backup: do you have a data backup policy and a standard operating procedure (SOP)? Data restore: do you regularly test that data backups can be restored? Is restored data tested for integrity? yes no / don t know comments UoM/ComputerisedSystems/SOP/1.0 Page 7 of 10
8 5. Physical Security Do you employ the following physical security measures to protect against the loss or theft of IT equipment and data? Is your IT equipment located in areas that are not easily accessed by visitors and other non-authorised staff? Is your IT equipment kept behind doors that have adequate locks? Are doors/windows locked at lunchtimes, evenings and other times when staff are absent? Are your computers, especially laptops, protected by anti-theft devices (eg security cables)? Are laptops locked away at night? Do you use specially-designed laptop safes? Are monitors/screens positioned so that data cannot be viewed casually by visitors or other non-authorised staff? Do you have a clear-desk policy to ensure the security of sensitive and confidential files when you are not working on them? Are desktops and laptops protected by a password-based screen saver? yes no / don t know comments UoM/ComputerisedSystems/SOP/1.0 Page 8 of 10
9 6. Data Archiving Have you considered the following issues with respect to the long term storage and archiving of data? Do you have an archiving/retention policy and a suitable archiving solution for the long term storage of (and access to) data? Does your archiving solution ensure long term access to data stored on intermediate storage media (eg tape, floppy disks, CDs/DVDs etc)? Does your archiving solution ensure data will be locked down once the trial is formally closed? Will someone (the archivist ), who is independent of the Trial, be responsible for the archive and will that person have appropriate control over the data? yes no / don t know comments UoM/ComputerisedSystems/SOP/1.0 Page 9 of 10
10 7. IT and Information Security Awareness, Procedures and Training The primary goal of a security awareness and training programme is to reduce security vulnerabilities and promotion good security practices. Are you familiar with the University s IT Security Policies and Guidance at: Do you fully understand your responsibility for IT and Information Security? Do you have standard operating procedures (SOPs) in respect of IT and Information Security and are they reviewed regularly? Do staff engaged on the trial understand their responsibilities with respect to IT and Information Security? Do staff know how to report an IT or Information Security incident or breach? yes no / don t know comments UoM/ComputerisedSystems/SOP/1.0 Page 10 of 10
Document Number: SOP/RAD/SEHSCT/007 Page 1 of 17 Version 2.0
Standard Operating Procedures (SOPs) Research and Development Office Title of SOP: Computerised Systems for Clinical Trials SOP Number: 7 Version Number: 2.0 Supercedes: 1.0 Effective date: August 2013
Research & Development Directorate
Research & Development Directorate Type of Document Standard Operating Procedure Name SOP10: Routine Audit Version 3.0 Author Miss Jennifer Boyle (Research Governance Co-ordinator) Version Superseded 2.4
SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Bring Your Own Device Policy
Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be
Data Encryption Policy
Data Encryption Policy Please be aware that this printed version of the Policy may NOT be the latest version. Staff are reminded that they should always refer to the Intranet for the latest version. Purpose
Frequently Asked Questions About WebDrv Online (Remote) Backup
Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks
Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview
Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block
HIPAA Privacy and Security Risk Assessment and Action Planning
HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD)
UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD) Purpose of Policy Introduction To establish how SoD faculty, staff and students will use and access the dental school s information
Computer Security at Columbia College. Barak Zahavy April 2010
Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a
Ohio Supercomputer Center
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.
Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
HIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
PII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
Network Security Policy
Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant
RD SOP17 Research data management and security
RD SOP17 Research data management and security Version Number: V2 Name of originator/author: Dr Andy Mee, R&I Manager Name of responsible committee: R&I Committee Name of executive lead: Medical Director
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
1.0 Scope. 2.0 Abbreviations. 3.0 Responsibilities
1.0 Scope This Standard Operating Procedure (SOP) has been written in order to conduct clinical studies according to the International Conference on Harmonisation of Technical Requirements for Registration
HIPAA RISK ASSESSMENT
HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
www.neelb.org.uk Web Site Download Carol Johnston
What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate
Server Security Checklist (2009 Standard)
Server Security Checklist (2009 Standard) Server identification and location: Completed by (please print): Date: Signature: Manager s signature: Next scheduled review date: Date: Secure Network and Physical
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
MSD IT High Compliance system Fact sheet
MSD IT High Compliance system Fact sheet The MSD IT High Compliance system is a service for Clinical Trials Units (CTUs) and Medical Division Departments or Units who need to securely access critical applications,
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Identity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres.
SafeMail April 2015 Secure cloud solutions with guaranteed UK data sovereignty. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. Detailing the
Managing & Validating Research Data
Research Management Standard Operating Procedure ISOP-H02 VERSION / REVISION: 2.0 EFFECTIVE DATE: 01 03 12 REVIEW DATE: 01 03 14 AUTHOR(S): CONTROLLER(S): APPROVED BY: Information Officer; NBT Clinical
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
Karen Winter Service Manager Schools and Traded Services 01823 355267 [email protected]
Somerset Services to Education Providers 2014-2015 SOUTHWEST ONE TECHNOLOGY SERVICES Service Provider: Southwest One Service Category: Academy Schools - Chargeable Contact: Karen Winter Service Manager
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information
Encryption Policy Version 3.0
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Encryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
UoM/Archiving/SOP20/2.0
Standard Operating Procedure Number: Title: UoM/Archiving/SOP20/2.0 Preparation, review and issue of SOPs Version: 2.0 () Effective Date Author: Mr Alan Carter Review Date January 2015 Reviewed by : Prof
Validating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
If you have used Outlook Web Access then you will find Zarafa Webaccess very familiar.
Zarafa Setup Guide The Zarafa server on Igaware allows you to share e-mail, calendars, contacts and tasks via Outlook, on your PDA/Blackberry/Mobile phone or through our Webaccess. The Zarafa Webaccess
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
Merthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
