Remote Working - Remote and Mobile Computing Policy. Purpose 3. Strategic Aims 3. Introduction 3. Scope 5. Responsibilities 5.

Size: px
Start display at page:

Download "Remote Working - Remote and Mobile Computing Policy. Purpose 3. Strategic Aims 3. Introduction 3. Scope 5. Responsibilities 5."

Transcription

1 Brigade Order Human Resources Brigade Order 3 Part 5 Section Title Remote Working - Remote and Mobile Computing Policy Contents No. Purpose 3 Strategic Aims 3 Introduction 3 Scope 5 Responsibilities 5 Information 5 Software 6 ICT equipment 6 Loss, theft or damage 6 Remote network access 6 Storage and transmission of photographs using mobile devices 7 Managerial responsibilities and performance measures 7 Appendix A (FB426) Remote Working Guidance - Meeting between Line Manager and Remote Worker 1 of 17

2 Roles, Responsibilities and Review The Human Resources Manager and the ICT Manager are responsible for ensuring this Order is implemented across the Brigade. The Human Resources Manager and ICT Manager will be responsible for the day to day operation of the Order and will review this Order when organisational changes take place. 2 of 9

3 Brigade Order, Human Resources 3 Part 5 - Remote Working: Remote and Mobile Computing Policy Purpose To define the policy requirements in relation to the use of Shropshire Fire and Rescue Service s (SFRS s) mobile information assets. Remote working has been introduced to assist and support flexibility within SFRS. It can reduce costs by consolidating desk and office space and reduce time and travel costs e.g. an employee may, by agreement, be based from home or from a remote office (e.g. a Retained Fire Station). Remote working may also assist with partnership and community working by having staff readily available within agreed locations. Remote working can also be considered at the request of an employee in line with SFRS Flexible Working Requests (Brigade Order No 5 Part 14). Remote working offers flexibility to the organisation and employees to work, as agreed, away from the Service s main sites. It can raise productivity in that the remote worker can be more flexible and creative, with greater thinking time than in the office. They do not have to contend with noise in the workplace, telephones ringing continually, or the daily commute. This can result in effective time management and can improve their work-life balance. Remote working can raise morale, commitment and engagement within the organisation. The objective of this Order is to ensure that the information assets and information processing facilities of the Service are adequately protected with logical, physical and environmental controls when being used by employees who work in a remote or mobile capacity. Strategic Aims This Order supports: Strategic Aim 4 - to deliver a fire and rescue service, which provides value for money for our community now and into the future. Introduction For the purposes of this Brigade Order remote working is used to describe employees who are either permanently or temporarily based away from the Service s main sites (Shrewsbury HQ and Telford Training and Development Centre); working in a location that is separate from a central workplace by using telecommunication technologies. 3 of 10

4 Different options for remote working are: Mobile working employees classified as mobile workers will mostly work away from the office/base. They will have a choice of working from different locations with some requirements for office presence. This may require sharing their workspace when they are working from the office/base. Field Working employees classified as field workers will carry out their duties in an office base at retained stations or partner agencies such as councils, housing associations etc. Home working some posts will be suitable for home working as part of the contract of employment. Current employees may request home working subject to an approved business case being available. Ad hoc home working where the role demands office presence for the majority of the time but the role can be delivered to the same standards by introducing an element of flexibility. Remote working works best when: There is a clear business need to have employees based away from the Service s main sites e.g. RDS Fire Station to assist local community and partnership working. There is a specific, clearly defined and well-understood task to be completed. Uninterrupted, quiet time is needed to concentrate on the task. The employee s absence from the normal place of work can be catered for and managed. Remote Working is not advisable when: There is a clear business need to have employees based at the main Service HQ or at the Training and Development Centre, Telford. There is a need for frequent contact with colleagues/clients. There are likely to be other distractions at the remote base or at home (e.g. it is not to allow full time caring responsibilities). Access to information located in the office is frequently needed. Some jobs or activities within the Service may not be permitted under remote or mobile working e.g. financial transactions, processing of sensitive or personal data, some ICT roles All staff are required to comply with the Service s policies and procedures whether working at the Service s main sites, or working at remote sites e.g. Retained Stations, Community Hubs or working at home. 4 of 10

5 Scope This Order applies to all employees who use information assets and information processing facilities outside of their normal office environment. A mobile device is any equipment which has a self-contained power unit and can hold data; examples are (but are not limited to): Laptop computer Tablet Mobile telephone Smart Phone Mobile Data Terminal (MDT located on Service appliances). Responsibilities The ICT Manager shall approve the use of mobile devices and shall ensure that controls are made available to employees who engage in remote or mobile working, including any health and safety safeguards. The ICT department shall provide protection for all devices to ensure that data on mobile devices can be protected appropriately in line with this policy. They shall ensure that controls as defined in this policy are complied with through regular auditing. Line Managers must complete the remote working guidance form (see Appendix A) and liaise with ICT, HR and H&S officers/departments to ensure that staff are accountable for compliance with this Order. All employees who are authorised to process information assets using mobile computing techniques must use only mobile devices that have been approved. They are responsible for ensuring the integrity of the data they process and accountable for all assets that are allocated to them by the organisation. Information It is the policy of the Service to ensure that all information assets and information processing facilities used outside of a normal office environment receive appropriate protection in accordance with HMG Security Policy Framework and Government Security Classification. Such protection shall be commensurate to the value of the information assets that is determined by the Information Asset Owner based upon confidentiality, integrity and availability. Inappropriate removal of information assets and inappropriate treatment may cause breaches leading to the Service potentially suffering financial or reputational loss. The Data Protection Act has implications for remote/home working. The Information Commissioner will fine the ity for any serious breach of the Data Protection Act so it is essential employees are aware of the implications surrounding: 5 of 10

6 Ownership of data Access to data by family members and others Electronic data at home and transferring this Paper data/equipment and transferring/transporting this Software Only software authorised by the Service s ICT department shall be installed on remote and mobile equipment supplied by the Service. For the avoidance of doubt, employees may not install software without authorisation/support from ICT. ICT equipment All information processing facilities provided to employees using mobile computing shall be maintained with due diligence. Sufficient controls shall be taken to ensure that the equipment is secured at all times. Any mobile device that allows the storage of s and information must be password protected and never left unattended and logged on. Employees are accountable for unauthorised access and must protect their password at all times. If a password is suspected to have been compromised the ICT Helpdesk can be contacted for advice on changing passwords. Employees must carry and store equipment with care to reduce the chance of accidental damage. Faults with any supplied equipment shall be reported to the ICT Helpdesk immediately. ICT equipment should not be left in unattended vehicles as they are not insured under such circumstances. Employees shall not loan their mobile device or allow it to be used by others such as family and friends. Non-corporate wireless networks can be used to gain remote access to the Service s network using the equipment issued. The use of own devices is not allowed. Loss, theft or damage Loss, theft or damage to any mobile device shall be reported immediately by the employee to the ICT Helpdesk so that the equipment can be disabled. In the event of avoidable damage, an employee may be required to pay towards the cost of replacement of the mobile device. Remote network access Remote/mobile access to information assets shall be restricted to authorised employees and shall be protected by appropriate physical and logical authentication and authorisation controls. 6 of 10

7 Storage and transmission of photographs using mobile devices Photographs of incident scenes are likely to be classed as personal data and will be subject to the provisions of the Data Protection Act They shall be treated in accordance with Data Protection principles and in particular shall not be stored on a mobile device for longer than necessary, transmitted to a third party or uploaded to the Internet or social networking sites. Managerial responsibilities and performance measures Direct supervision of remote workers is not possible as managers cannot physically observe their employees performance. Also providing timely, reliable and constructive feedback is more challenging for managers of remote workers. Security and storage of documents and sensitive data (either in hard copy or electronically) and the disposal of data must all be discussed and agreed between the employee/line manager and ICT Manager. All staff are required to comply with the Service s policies and procedures whether remote working from home or at an office base. The Service stresses the importance of document and IT security including storage and transportation. Advice must be sought from the ICT Manager. The Service also stresses the importance of Health and Safety, advice must be sought from the Health and Safety Manager A breach of the organisation s rules will invoke formal disciplinary procedures (see Brigade Order HR No.10 Part 1). Employees working from a remote base will be subject to the same performance measures, processes and objectives that apply to all office based employees. The option to work remotely is at the discretion of the Manager and may be withdrawn if organisational need requires the employee to work from the Service s main sites. Where organisational need requires employees to work remotely, the Manager must meet with the employee/s concerned and together they must fully discuss the advantages and disadvantages that remote working may provide. Where an individual employee requests to work remotely, either at an agreed base or from home, the Manager must meet with the employee concerned and together they must fully discuss the advantages and disadvantages that remote working may provide. A request from an individual can be considered under the Services Flexible Working policy (see Brigade Order HR No.5 Part 14). In all cases the Manager/Employee must meet together to discuss and fully consider the following areas (see appendix): Communications - key telephone numbers and contact arrangements between Manager/Employee and colleagues. The frequency of attending Headquarters / Training and Development Centre for team meetings and/or supervision. The IT equipment and software required to enable remote working (seek advice from the ICT Manager). 7 of 10

8 Meetings meetings must only take place at a relevant work base. Meetings with colleagues or clients at home must be avoided. Whereabouts employees must be able to account for their whereabouts and must maintain an accurate electronic diary accessible by the line manager. Health and Safety It is the responsibility of the employee s manager to ensure the Health, Safety and Welfare of employees, whether working at the Service s main sites, remote bases or at home. must also be made to Health and Safety Brigade Order (BO) 8 part 7 The Health and Safety (Display Screen Equipment) Regulations 1992 amended by the Health and Safety (Miscellaneous Amendments) Regulations Completion of the Display Screen Equipment Assessment Checklist is required (H&S BO 8 part 7 Appendix A). Accident/Near Miss reporting procedures apply equally to incidents arising in the employee s remote base or home (seek advice from the H&S Manager). Confidentiality All information and paperwork belongs to the Service and it is the responsibility of employees to keep it safe. Confidential paperwork must not be left open to view. Confidential/personal information must not be processed or stored on your home PC; all work-related documents stored on a home computer must be deleted routinely as and when they are completed. When leaving the Service s employment, all information must be returned or deleted as appropriate. Working hours Normal working hours apply and it will be the responsibility of the employee to comply with working hours and to ensure that they take sufficient rest periods under the working time regulations. Working hours, patterns, contact times and availability with the employee must therefore be agreed with the line manager in advance. Employees covered by the Flexible Working Hours scheme who intend working more than a 7.4 hour day, must first gain agreement from their manager. Conditions of employment - Normal conditions of employment as set out in the employee contract apply. Sickness employees who are sick when scheduled to work from a remote base or from home must report it in the normal way (Brigade Order HR No 7 Part 1 Control and Monitoring of Sickness Absence). Insurance Employees who request to work from home are advised to inform their household insurance company that they will be undertaking work from home. Other factors to consider will include:- Ability to resolve problems and concerns at a distance with the line manager (by telephone/ ) Ability to communicate effectively with colleagues, and to function as part of a team, while operating remotely Ability to be self-motivated and to work to agreed deadlines without close supervision and in relative isolation from colleagues. 8 of 10

9 Ability to ensure own health and safety in the remote working or home environment Ability to manage time and organise work effectively and with self-discipline Flexibility in work management and approach IT skills and self-sufficiency Ability to cope with reduced social contact with colleagues Ability to create an appropriate separation between work and home life (and knowing when to stop working) Ability to arrange family commitments to provide a suitable working environment, without disruption (in cases of home working) Management responsibilities must also include:- Monitoring performance and output by setting agreed SMART objectives with suitable targets and performance measures Maintaining managerial control as appropriate during working hours Ensuring there is regular contact and communication with the employee. It is advisable to agree with the employee a minimum frequency of visits to their work base and HQ in order to keep updated of organisational developments Arranging any further training that may be required Monitoring and addressing health and safety issues Regularly reviewing the arrangement Liaising with HR if the working arrangement ceases to arrange for contracts to be varied and records updated Regularly review with HR to ensure the arrangement is working satisfactorily The Manager must keep all parties informed of remote working arrangements. In all cases advice must be sought from the HR Manager, ICT Manager and H&S Manager before any arrangement is agreed with employee/s. The Line Manager and employee must discuss and sign an agreement (see appendix) to show that the employee: Is aware of the risks and responsibilities associated with mobile computing resources If issued with SFRS equipment for mobile working, will regularly return it to the ICT department for maintenance, upgrade of software, removal of audits, and 9 of 10

10 refresh of anti-virus and other software applications Will travel to HQ/TC or specified base as and when required, for example in the event of team meetings, training, or in an event such as technology failure that will prevent mobile/remote working Will participate in a review of arrangements as and when required The signed agreement will be forwarded to the HR department to be scanned and filed on the employee s employment record. An amendment to the employee s contract of employment will be issued. 10 of 10

11 Appendix A Remote Working Guidance Meeting between Line Manager and Remote Worker AA - 1 FB426

12 Employee Name: Line Manager Remote Base e.g. Fire Station Home Address: General Information Discuss the following: 1. Options of remote working 2. Is there a clear business need to have employee based away from the SFRS main site? 3. Is there a specific, clearly defined and well understood task to be completed? 4. Will the employee have uninterrupted, quiet time needed to concentrate on the task? 5. Can employee s absence from the normal place of work be catered for and managed? Note of discussion points 1-5 above. Equipment 6. Mobile device has advice been sought from the ICT Manager? 7. Is the employee aware he/she must use only mobile devices that have been approved? 8. Is the employee aware he/she is accountable for all assets that are allocated to them by SFRS Note of discussion points 6-8 above and detail equipment loaned to employee (point 6 above) AA - 2 FB426

13 Risk Is the employee aware that: 9. Inappropriate removal of information assets and inappropriate treatment may cause breaches in confidentiality, integrity or availability leading to SFRS potentially suffering financial or reputational loss? 10. Employees who use mobile devices shall be responsible for ensuring the integrity of the data they process? Employees must only use the backup equipment provided by ICT use of USB should be avoided 11. The employee must ensure sufficient controls shall be taken to ensure that the equipment is secured at all times? 12. Faults with any supplied equipment shall be reported immediately to the ICT Helpdesk? 13. Devices must not be left unattended in a public place or in a car for any period and can be transported only when switched off? Laptops must not be transported whilst in hibernating or standby modes? Employees must carry and store equipment with care to reduce the chance of accidental damage? 14. Mobile phones and PDAs shall be locked at all times when the devise is not in use? Devices which allow the storage of s and information locals shall be password protected? 15. Remote/mobile access to information will be restricted to authorised employees and shall be protected by appropriate physical and logical authentication and authorisation controls? 16. Employees must not loan their mobile device or allow it to be used by others? 17. Loss, theft or damage to any mobile device shall be reported by the employee immediately to the ICT Manager (via Fire Control if out of hours)? 18. Avoidable damage may result in employee being required to pay towards the cost of replacement of the mobile device? Note of Risk discussion Storage Is the employee aware that:- 19 Photographs of incident scenes are likely to be classed as personal data and will be subject to the provisions of the Data Protection Act They shall not be stored on a mobile device for longer than necessary; transmitted to a third party, uploaded to the internet or to social network sites AA - 3 FB426

14 20 The employee is aware that the Data Protection Act has implications for remote/home working Note of Storage discussion Line Manager/employee responsibilities and performance measures the employee is aware that:- 21 Direct supervision is not possible. Discuss and agree a timely, reliable and constructive feedback structure. Note of Supervision Plan 22 The employee understands that he/she must comply with SFRS policies and procedures whether remote working at home or at an office base? 23 The employee understands the importance of Health & Safety and advice has been sought from the H&S manager? Note any advice received from the H&S Officer AA - 4 FB426

15 24 Has the remote working place been risk assessed? 25 The employee is aware that a breach of SFRS rules will invoke formal disciplinary procedures (Brigade Order HR No 10 Part 1)? 26 The employee is aware that remote workers will be subject to the same performance measures processes and objectives that apply to all office based employees? 27 The employee is aware that the option to work remotely is at the discretion of the manager and may be withdrawn if organisational need requires the employee to work from SFRS main sites? Discussion points/consideration must be given to the following areas: 28 Communications and meetings 29 Whereabouts 30 Health and Safety Including a DSE assessment (see Health & Safety BO No 8 Part 7) 31 Confidentiality 32 Working Hours 33 Conditions of Employment 34 Sickness 35 Insurance 36 Ability to resolve problems 37 Ability to still be part of a team 38 Ability to be self-motivated & work without close supervision/in relative isolation 39 Ability to ensure own health and safety 40 Ability to manage time and organise work effectively 41 Flexibility in work management and approach 42 IT Skills and self-sufficiency 43 Ability to cope with reduced social contact with colleagues 44 Ability to create an appropriate separation between work and home life (in case of home working) 45 Ability to arrange family commitments to provide a suitable working environment without disruption. 46 Monitor performance 47 Maintain managerial control 48 Ensure regular contact and communication (agree minimum frequency of visits to work base and HQ) 49 Training AA - 5 FB426

16 50 H&S monitoring 51 Regular reviews 52 Liaise with HR Note of discussion from points from above Any other discussion points Agree and sign below:- I am aware of the risks and responsibilities associated with remote working and mobile computing resources. If issued with SFRS equipment for mobile working, I will regularly return it to the ICT Team for maintenance, upgrade of software, removal of audits and refresh of anti-virus and other software applications. AA - 6 FB426

17 I will travel to SFRS HQ/TC or specified base as and when required, for example in the event of team meetings, training, or in an event such as technology failure that will prevent mobile/remote working. I will participate in a review of arrangements as and when required. Signed (Employee). Line Manager... AA - 7 FB426

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Cellular/Smart Phone Use Procedure

Cellular/Smart Phone Use Procedure Number 1. Purpose This procedure is performed as a means of ensuring the safe and efficient use of cell/smart phones throughout West Coast District Health Board (WCDHB) facilities. 2. Application This

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Home Working Policy Version Date Status Comments

Home Working Policy Version Date Status Comments Home Working Policy Version Date Status Comments 1.0 June 2010 Draft 1.0 August 2010 Draft Policy sent out for consultation via JCC and Corporate Bulletin Board. 1.0 November 2010 Final Resources Portfolio

More information

CHESHIRE FIRE AUTHORITY

CHESHIRE FIRE AUTHORITY CHESHIRE FIRE AUTHORITY ITEM: 4 MEETING OF : POLICY COMMITTEE DATE : 30 JANUARY 2013 REPORT OF : ASSISTANT CHIEF FIRE OFFICER, RICHARD OST AUTHOR : GRAHAM FOSTER SUBJECT : ICT USAGE AND SECURITY POLICIES

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Mobile Working Policy (Incorporating Working from Home, Remote Working & Hot Desk Arrangements) Version No.1.

Mobile Working Policy (Incorporating Working from Home, Remote Working & Hot Desk Arrangements) Version No.1. Plymouth Community Healthcare CIC Mobile Working Policy (Incorporating Working from Home, Remote Working & Hot Desk Arrangements) Version No.1. Notice to staff using a paper copy of this guidance The policies

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

HR Guide: Agile Working Version: 1.0

HR Guide: Agile Working Version: 1.0 HR Guide: Agile Working Version: 1.0 Contents Section 1 Introduction to Agile Working Section 2 What are the Aims of Agile Working Section 3 Can all employees undertake Agile Working? Section 4 How do

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Remote Working and Portable Devices Policy

Remote Working and Portable Devices Policy Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review

More information

Ixion Group Policy & Procedure. Remote Working

Ixion Group Policy & Procedure. Remote Working Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises

More information

This policy outlines different requirements for the use of PSDs based on the classification of information.

This policy outlines different requirements for the use of PSDs based on the classification of information. POLICY OFFICE OF THE INFORMATION COMMISSIONER Use of portable storage devices 1. Purpose A Portable Storage Device (PSD) is a mobile device capable of storing and transferring digital information. Examples

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Acceptable Use Guidelines

Acceptable Use Guidelines Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines

More information

Mobile Devices Security Policy

Mobile Devices Security Policy Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU

More information

Remote Access and Home Working Policy London Borough of Barnet

Remote Access and Home Working Policy London Borough of Barnet Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and

More information

Mike Casey Director of IT

Mike Casey Director of IT Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

Remote Access and Network Security Statement For Apple

Remote Access and Network Security Statement For Apple Remote Access and Mobile Working Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Remote Access and

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

16 Electronic health information management systems

16 Electronic health information management systems 16 Electronic health information management systems Section 16: Electronic information management systems The continued expansion and growth in global technologies is aiding the development of many new

More information

Subject: Remote Working

Subject: Remote Working GREATERLONDONAUTHORITY LONDONASSEMBLY Subject: Remote Working Report Number: 5 Report to: Business Management and Administration Committee Date: 11 March 2008 Report of: Head of Paid Service 1. Recommendation

More information

Information Technology Acceptable Usage Policy

Information Technology Acceptable Usage Policy Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly

More information

Data Security Policy

Data Security Policy Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:

More information

School Information Security Policy

School Information Security Policy School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...

More information

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011) Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

b. Contact for contract issues/requests (Including billing)

b. Contact for contract issues/requests (Including billing) 1. Responsibilities of the customer a. Appointed contact(s) The customer is required to provide a named contact with E-Mail address and phone contact for each of the following roles (they can be the same

More information

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Merthyr Tydfil County Borough Council. Information Security Policy

Merthyr Tydfil County Borough Council. Information Security Policy Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:

More information

Kenmore State High School Student Laptop Charter

Kenmore State High School Student Laptop Charter Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Why do we need to protect our information? What happens if we don t?

Why do we need to protect our information? What happens if we don t? Warwickshire County Council Why do we need to protect our information? What happens if we don t? Who should read this? What does it cover? Linked articles All WCC employees especially mobile and home workers

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics

More information

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Technical Standards for Information Security Measures for the Central Government Computer Systems

Technical Standards for Information Security Measures for the Central Government Computer Systems Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...

More information

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 07/01/2005 1.1 L Wyatt Update to requirements for access

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 07/01/2005 1.1 L Wyatt Update to requirements for access Page 1 Walton Centre Remote working Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 07/01/2005 1.1 L Wyatt Update to requirements for access Page 2 Table of Contents Section

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy Computer Security Policy Contents 1 Scope... 3 2 Governance... 3 3 Physical Security... 3 3.1 Servers... 3 3.2

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

REMOTE USER ACCESS & HOME WORKING POLICY HR29. Date of Board Approval: March 2012

REMOTE USER ACCESS & HOME WORKING POLICY HR29. Date of Board Approval: March 2012 REMOTE USER ACCESS & HOME WORKING POLICY HR29 Applies to: All employees Date of Board Approval: March 2012 Review Date: March 2015 1 INTRODUCTION The purpose of this Policy is to document the Authority

More information

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 This report and the work connected therewith are subject to the Terms and Conditions of the contract dated 18/06/07 between South

More information

Regulations on Information Systems Security. I. General Provisions

Regulations on Information Systems Security. I. General Provisions Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

PS177 Remote Working Policy

PS177 Remote Working Policy PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection

More information

www.neelb.org.uk Web Site Download Carol Johnston

www.neelb.org.uk Web Site Download Carol Johnston What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate

More information

Mobile Phone and Remote Access Policy

Mobile Phone and Remote Access Policy Mobile Phone and Remote Access Policy Reference No: Version: 2 Ratified by: P_IG_23 LCHS Trust Board Date ratified: 29 th July 2014 Name of originator/author: Name of approving committee/responsible individual:

More information

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review:

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review: POLICY DOCUMENT Burton Hospitals NHS Foundation Trust INFORMATION SECURITY POLICY Approved by: Executive Management Team On: 16 January 2014 Review Date: December 2015 Corporate / Directorate Clinical

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

NHS FORTH VALLEY Information Governance Remote Working Guidance

NHS FORTH VALLEY Information Governance Remote Working Guidance NHS FORTH VALLEY Information Governance Remote Working Guidance Date of First Issue 09 / 12 / 2011 Approved 12 / 09 / 2013 Current Issue Date 12 / 09 / 2013 Review Date 01 / 12 / 2015 Version V 3.2 EQIA

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

Berwick Academy Policy on E Safety

Berwick Academy Policy on E Safety Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

POLICY AND PROCEDURE FOR HOME/REMOTE WORKING

POLICY AND PROCEDURE FOR HOME/REMOTE WORKING POLICY AND PROCEDURE FOR HOME/REMOTE WORKING Homeworking Policy and Procedure Contents Page 1. Introduction 3 2. Homeworking Benefits 3 3. Eligibility for Homeworking 4 4. Management Responsibilities 4

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board

CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD Data Breach Management Policy Adopted by Cavan and Monaghan Education Training Board on 11 September 2013 Policy Safeguarding personally identifiable information

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

ENISA s ten security awareness good practices July 09

ENISA s ten security awareness good practices July 09 July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

RESEARCH COUNCIL HOMEWORKING GUIDANCE

RESEARCH COUNCIL HOMEWORKING GUIDANCE Content Introduction 1. Principles 2. Benefits of homeworking 3. Regular and frequent homeworking 4. Occasional working from home 5. Short-term homeworking arrangements 6. Related Policies 7. Insurance,

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information