Information security policy
|
|
|
- Poppy Morris
- 10 years ago
- Views:
Transcription
1 Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current and Final NHS Business Services Authority Information security policy Gordon Wanless All NHSBSA staff For information / action Last reviewed 20 March 2014 Revision details Version Date Amended by Approved by Details of amendments Initial release IGSG In 2.2 add a bullet point as follows Informing the Chief Executive to assist with the statement of internal control made by him/her. Replace the paragraph before the first bullet point in 3.3 with The IGM also carries out the duties below for all corporate directorates bar the Operations directorate, where these daily responsibilities have been delegated to each of five IS Managers, one for each division of the NHSBSA Operations directorate, whose responsibilities include:. In the second bullet point of 3.4 replace Information Governance Manager with Business Manager Insert a 3.7 covering Internal Audit a G Wanless ISF Changes to Business Unit Area IS Managers b C Dunn & C Gooday ISF Changes to sections 3, 4 and 5 to reflect PCI DSS compliance. Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 1
2 Contents 1. Introduction 2. Objectives, aim and scope 3. Responsibilities for security 4. Legislation 5. Policy framework 6. Validity of this policy 1. Introduction 1.1 Information security is fundamental to the operation of all NHS bodies, including the NHS Business Services Authority (NHSBSA), due to the sensitive and confidential patient and personal data captured, along with commercially sensitive information, and the reliance on information systems to process and transmit data to NHSBSA s stakeholders. 1.2 Information security is of paramount importance to the NHSBSA to meet the NHSBSA s primary objectives. 1.3 For the purpose of this policy, information includes data stored on computers, transmitted across networks, printed out or written on paper, sent by fax, stored on removable and other electronic media or spoken in conversation or over the telephone. 1.4 All information that is created, processed, stored or transmitted (physically or electronically) during the course of NHSBSA business activity is an asset of the NHSBSA and as such is governed by this policy. 1.5 This document defines the Information security policy for the NHSBSA. 1.6 The Information security policy applies to all business functions and covers all information systems, networks, physical environment and relevant people who support those business functions. 1.7 This document: sets out the NHSBSA's policy for the protection of the confidentiality, integrity and availability of its assets, that is hardware, software and information handled by information systems, networks and applications Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 2
3 establishes the security responsibilities for information security. 2. Objectives, aim and scope 2.1 The objectives of this policy are to ensure the security of the NHSBSA assets, primarily information assets, that is: To ensure availability: That is, to ensure that assets are available as and when required hence adhering to the organisation's business objectives. To preserve integrity: That is, to protect assets from unauthorised or accidental modification ensuring the accuracy and completeness of the organisation's assets. To preserve confidentiality: That is, to protect assets against unauthorised disclosure. 2.2 The aim of this policy is to establish and maintain the security and confidentiality of information, information systems, applications and networks owned or held by the NHSBSA by: ensuring that all members of staff are aware of and fully comply with the relevant legislation as described in this and other policies describing the principles of security and explaining how they will be implemented in the NHSBSA introducing a consistent approach to security, ensuring that all members of staff fully understand their own responsibilities creating and maintaining within the NHSBSA a level of awareness of the need for information security as an integral part of the day to day business protecting information assets under the control of the NHSBSA informing the Chief Executive to assist with the statement of internal control made by him/her. 2.3 This policy applies to all information systems (electronic or manual), networks, applications, locations and people based within the NHSBSA. Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 3
4 3. Responsibilities for security Overall responsibilities 3.1 Ultimate responsibility for information security (IS) rests with the NHSBSA Leadership Team, but on a day-to-day basis the Information Governance and Security Group (IGSG) and the Head of Internal Governance (HOIG) role within the NHSBSA will be responsible for managing and implementing IS policy and procedures. Head of Internal Governance (HOIG) 3.2 HOIG responsibilities include: Acting as a central point of contact on IS within the organisation, for both staff and external organisations. Ensuring that the appropriate IS policy for the NHSBSA is produced and kept up to date. Advising on the content and implementation of the IS Programme. Producing organisational standards, procedures and guidance on IS matters for approval by the IGSG. Co-ordinating IS activities particularly those related to shared information systems or IT infrastructures. Liaising with external organisations on IS matters, including representing the organisation on cross-community committees. Reporting to the IGSG on matters relating to IS. HOIG s responsibilities (as delegated) 3.3 The HOIG, assisted by the NHSBSA Information Security Manager, also carries out the duties below for all corporate business areas bar NHS Protect and NHS Dental Services, where these daily responsibilities have been delegated to a local IS Manager whose responsibilities include: Creating, maintaining, giving guidance on and overseeing the implementation of IS. Ensuring that risks to IS are reduced to an acceptable level by applying security counter measures identified following an assessment of the risk. Ensuring that access to the authority's assets is limited to those who have the necessary authority and clearance. Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 4
5 Providing advice and guidance to development teams to ensure that the policy is complied with. Approving system security policies for the infrastructure and common services. Approving tested systems and agreeing rollout plans. Advising the HOIG on the accreditation of systems, applications and networks. Providing a Business Unit Area point of contact on IS issues. Contacting the HOIG when: Incidents or alerts have been reported that may affect the organisation's systems, applications or networks. Proposals have been made to connect the organisation's systems, applications or networks to systems, applications or networks that are operated by external organisations. 3.4 The Business Unit Area IS Manager responsibilities are allocated to the following roles as indicated below: NHS Protect Information Security & Systems Manager NHS Dental Services Dental Services Release and Programme Manager Head of Internal Governance Line managers responsibilities 3.5 Line managers are directly responsible for: Ensuring the security of the organisation's assets (i.e. information, hardware and software) used by staff (permanent, temporary or contractor) and, where appropriate, by third parties is consistent with legal and management requirements and obligations. Ensuring that their staff (permanent, temporary or contractor) are aware of their security responsibilities in accordance with the policies of the NHSBSA. Ensuring that their staff (permanent, temporary or contractor) have had suitable IS training. All staff 3.6 All staff (permanent, temporary or contractor) or agents acting for or on behalf of the NHSBSA have a duty to: Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 5
6 safeguard hardware, software and information in their care prevent the introduction of malicious software on the organisation's IT systems report on any suspected or actual breaches in security be responsible for the operational security of the information systems they use comply with security procedures. Failure to do so may result in disciplinary action. Internal audit 3.7 The NHSBSA will regularly audit its information security management practices for compliance with this policy. The audit will: identify areas of operation that are covered by the NHSBSA s policies and identify which procedures and/or guidance should comply to the policy annually cover compliance with Payment Card Industry (PCI) Data Security Standard (DSS) follow a mechanism for adapting the policy to cover missing areas if these are critical to the management of information security, and use a subsidiary development plan if there are major changes to be made set and maintain standards by implementing new procedures, including obtaining feedback where the procedures do not match the desired levels of performance highlight where non-conformance to the procedures is occurring and suggest a tightening of controls and adjustment to related procedures. The results of audits will be reported to the IGSG. 4. Legislation and contractual compliance 4.1 The NHSBSA is obliged to abide by all relevant UK and European Union legislation. The requirement to comply with this legislation will be devolved to employees and agents of the NHSBSA, who may be held personally accountable for any breaches of security for which they may be held responsible. The NHSBSA will comply with the following legislation and other standards as appropriate: Data Protection Act 1998 Access to Health Records 1990 Access to Medical Reports Act 1988 Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 6
7 Human Rights Act 1998 Freedom of Information Act 2000 Regulation of Investigatory Powers Act 2000 Crime and Disorder Act 1998 The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 Obscene Publications Act 1959 and 1964 amendments Communications Act 2003 Protection of Children Act 1978 and 1999 amendments Copyright, Design and Patents Act 1988 Protection from Harassment Act 1997 Equalities Act 2010 Computer Misuse Act 1990 PCI DSS 5. Policy framework 5.1 Information security awareness training Information security awareness training will be included in the staff induction process. An ongoing awareness programme will be established in order to ensure that staff awareness is refreshed and updated annually. 5.2 Contracts of employment Security requirements will be addressed at the recruitment stage and all contracts of employment will contain a confidentiality clause. Security requirements will be included in job definitions. 5.3 Security control of assets Every asset (hardware, software, application or data) will have a named custodian who will be responsible for the security of that asset. 5.4 Access controls Only authorised personnel who have a business need will be given access to restricted areas containing information systems. 5.5 User access controls Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 7
8 Access to information will be restricted to authorised users who have a business need to access the information. 5.6 Computer access control Access to computer facilities will be restricted to authorised users who have a business need to use the facilities. 5.7 Application access control Access to data, system utilities and program source libraries will be controlled and restricted to authorised users who have a business need to use the applications. Authorisation to use an application will depend on the availability of a licence from the supplier. 5.8 Equipment security In order to minimise loss of, or damage to, all assets, equipment will be physically protected from security threats and environmental hazards. 5.9 Computer and network procedures Management of computers and networks will be controlled by standard procedures that have been authorised by the IGSG Security incidents and weaknesses All security incidents and weaknesses are to be reported. All security incidents will be investigated to establish their cause, operational impact, and business outcome Protection from malicious software The NHSBSA will use software countermeasures and management procedures to protect itself against the threat of malicious software. All staff are expected to adhere fully with this policy. Users must not install software on the NHSBSA s computing assets. Staff breaching this requirement may be subject to disciplinary action Removable media Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 8
9 Removable media containing software or data from external sources, or that have been used in external equipment, must be fully virus checked before being used on the NHSBSA s equipment. Users breaching this requirement may be subject to disciplinary action Monitoring system access and use An audit trail of system access and use must be maintained and reviewed on a regular basis Accreditation of information systems The NHSBSA will ensure that all new information systems, applications and networks include a security policy and plan and are approved by the HOIG before they commence operation. New information systems within the scope of PCI DSS must be penetration tested and vulnerability scanned, with issues remediated before going live System change control Changes to information systems, applications or networks must be reviewed and approved by the HOIG Intellectual property rights The NHSBSA will ensure that all information products are properly licensed and approved by the HOIG. Staff must not install software on the NHSBSA s computing assets. Staff breaching this requirement may be subject to disciplinary action Business continuity and disaster recovery plans The NHSBSA will ensure that business continuity and disaster recovery plans are produced for all critical information, applications, systems and networks Reporting The HOIG will keep the IGSG informed of the information security status of the NHSBSA by means of regular reports. Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 9
10 5.19 Policy audit This policy will be subject to audit by NHSBSA s internal auditors Further information Further information and advice on this policy can be obtained from the HOIG. 6. Validity of this policy 6.1 This policy is designed to avoid discrimination and be in accordance with the Human Rights Act 1998 and its underlying principles. 6.2 This policy must be reviewed annually under the authority of the NHSBSA Leadership Team members. Associated IS standards should be subject to an ongoing development and review programme. Final\NHSBSAIS001b - NHSBSA Information Security Policy.doc 10
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
NHS Business Services Authority Information Governance Policy
NHS Business Services Authority Information Governance Policy NHS Business Services Authority Corporate Secretariat NHSBSAIGM002 Issue Sheet Document reference NHSBSAIGM002 Document location F:\CEO\IGM\Info
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
How To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Network Security Policy
Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant
Business continuity management policy
Business continuity management policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSADPN001b S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
NHS Business Services Authority Records Management Audit Framework
NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Corporate Secretariat NHSBSARM019 Issue Sheet Document Reference Document Location Title Author Issued
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Information Governance Policy
Information Governance Policy Reference: Information Governance Policy Date Approved: April 2013 Approving Body: Board of Trustees Implementation Date: April 2013 Version: 6 Supersedes: 5 Stakeholder groups
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.
Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments
Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25
Information Security Policy Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25 Document Information Trust Policy Number : ULH-IM&T-ISP01 Version : 3.1 Status : Approved Issued by : Information Governance
Acceptable use policy
Acceptable use policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSAIGM008 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review Acceptable Use
Ulster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title IT Monitoring Policy 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information Services
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
Information Governance Policy
Information Governance Policy Version: Revised: Consultation: Ratified by: 1.0 Information Governance Committee Governance Committee Date ratified: 19 March 2008 Name of originator/author: David McGrath
Information Governance Policy
BEXLEY CARE TRUST MANAGEMENT MANUAL Title: INFORMATION GOVERNANCE POLICY Originating Department: IT DEPARTMENT Authorised by: Risk Management Committee June 2008 Reference no: CA12 Date of Issue: JANUARY
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
Human Resources Policy No. HR46
Human Resources Policy No. HR46 Maintaining Personal Files and ESR Records Additionally refer to HR04 Verification of Professional Registration HR33 Recruitment and Selection HR34 Policy for Carrying Out
NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
EA-ISP-001 Information Security Policy
Technology & Information Services EA-ISP-001 Information Security Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 13/03/2015 Document Security Level: PUBLIC Document Version: 2.41 Document Ref:
Information Governance Policy
Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
IS INFORMATION SECURITY POLICY
IS INFORMATION SECURITY POLICY Version: Version 1.0 Ratified by: Trust Executive Committee Approved by responsible committee(s) IS Business Continuity and Security Group Name/title of originator/policy
NHS Business Services Authority Information Security Incident Handling Procedure
NHS Business Services Authority Information Security Incident Handling Procedure NHS Business Services Authority Corporate Secretariat NHSBSAIS003 Issue Sheet Document reference NHSBSAIS003 Document location
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Information Governance Strategy
Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version
<COMPANY> P01 - Information Security Policy
P01 - Information Security Policy Document Reference P01 - Information Security Policy Date 30th September 2014 Document Status Final Version 3.0 Revision History 1.0 09 November 2009: Initial release.
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Information & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
Information Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit
Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
Business Continuity Policy and Business Continuity Management System
Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
Information Governance Policy
Information Governance Policy REFERENCE NUMBER IG 101 / 0v3 May 2012 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive 4.9.12 REVIEW DUE DATE May 2015 West Lancashire CCG is committed to ensuring
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
Information Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.
Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review
Information Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
Information Governance Policy
Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading
Data Protection Policy
Data Protection Policy Version: V1 Ratified by: Operational Management Executive Committee Date ratified: 26 September 2013 Name and Title of originator/author(s): Chris Brady, FOI, Data Protection and
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
An Approach to Records Management Audit
An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
Information Security Management System (ISMS) Policy
Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from
Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework
Putting Barnsley People First Barnsley Clinical Commissioning Group Information Governance Policy and Management Framework Version: 1.1 Approved By: Governing Body Date Approved: 16 January 2014 Name of
University of Liverpool
University of Liverpool Card Payment Policy Reference Number Title Version Number 1.0 Document Status Document Classification FIN-001 Card Payment Policy Active Public Effective Date 03 June 2014 Review
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment
