Information Security Policy

Size: px
Start display at page:

Download "Information Security Policy"

Transcription

1 (Policy & Security Incident Procedure) Reference No. CR Policy Sponsor Director of Corporate Resources Policy Owner Head of Information Management Policy Author Redacted Information Security Manager Effective Date December 2013 Review Date December 2014 Revision History Version Date Comments / Reason for Amendments Amended By /09/2013 New Format Redacted Version 1.0 Page 1 of 16

2 CONTENTS POLICY...3 POLICY PURPOSE...3 SCOPE...3 PRINCIPLES...3 KEY INFORMATION...4 LEGAL / NATIONAL FRAMEWORK...5 WHO TO CONTACT ABOUT THIS POLICY/PROCEDURE...5 PROCEDURE STEP BY STEP Incident Management Breach Management Level of Breach and Sanction Change Control GUIDANCE ROLES & RESPONSIBLITIES ADDITIONAL INFORMATION Definitions Monitoring and Review...14 ADDITIONAL GUIDANCE DOCUMENTS...15 MANAGEMENT GUIDANCE...15 FREQUENTLY ASKED QUESTIONS (FAQ s)...15 FORMS / DOCUMENTS / LETTERS...15 RECORD RETENTION SCHEDULE...16 Version 1.0 Page 2 of 16

3 POLICY POLICY PURPOSE The purpose of this policy is to protect British Transport Police (BTP) information assets, whether paper-based or electronic from all threats, whether internal, external, deliberate or accidental. SCOPE This policy applies to all Police Officers, Police Community Support Officers (PCSOs), Police Staff and Special Constables; collectively termed as employees, this includes those who are on part time, fixed term, or permanent contracts and those on secondment. The policy also applies to community volunteers, members of other agencies and those acting on behalf of BTP. It is applicable in England, Scotland and Wales. PRINCIPLES The general public has a right to expect that all members of BTP will, when utilising information in connection with BTP business, ensure: That confidentiality of all BTP information, whether electronic or paper-based, is maintained and that that only authorised users with a need to know have access to it. The integrity of information is kept to a high standard and it is accurate and complete at all times. The availability of information is accessible and usable upon demand by authorised users. That information is disclosed only to those authorised to receive it. That information disclosed is used only for Police purposes. That regulatory and legislative requirements are met. The loss, damage, wrongful destruction or wrongful disclosure of information could result in substantial costs to BTP as well as a reduction in public confidence. BTP will ensure that there will be a robust procedure in place for change control when there is a requirement to implement change to Information Technology & Communication systems and processes. Version 1.0 Page 3 of 16

4 All BTP employees are personally responsible for ensuring compliance with this policy and procedure. Failure to comply with this may lead to disciplinary action being taken. KEY INFORMATION The Director of Corporate Resources through their role as the Senior Information Risk Owner (SIRO) is responsible for ensuring the confidentiality, integrity and availability of information assets and promoting robust policy and procedures throughout BTP..The Force s risk appetite is deemed to be cautious and that system tolerance is zero in view of this a security case/risk assessment report will be required to be prepared for any risk identified above medium. BTP will provide cost and risk effective protection through adequate and efficient safeguards and countermeasures, against all nature of threats to its information assets. Protection will be through an appropriate combination of personnel, physical, procedural, technical and management security controls. Security incidents can include a range of situations which could lead to damage to operational effectiveness, harm to reputation both organisationally and personally and in the most extreme cases can lead to prejudice of national security, resulting in a crime and even endangering lives. All security incidents or potential incidents must be taken seriously and investigated in a swift and proportionate manner. All security incidents whether actual or suspected must be reported in accordance with procedure section of this policy. The Information Assurance Board shall be responsible for all policies with respect to how information is gathered, stored and processed as part of any information system, whether manual or computerised. Changes to production systems include the implementation of new applications, modifications of existing applications, removing old applications, and upgrading or patching system software carry risks. From a security viewpoint there is a concern with the potential security impact if these changes are not documented or approved by management. Therefore it is important that every computing facility should have clear guidance regarding change control to operating systems, computer equipment, networks, environmental facilities (e.g. HVAC, water, plumbing, electricity and alarms) and applications The Information Security Team can offer confidential and practical advice on all maters relating to the information security. All BTP employees and contractors are personally responsible for ensuring compliance with this policy and procedure. Failure to comply with this may lead to disciplinary action being taken Version 1.0 Page 4 of 16

5 LEGAL / NATIONAL FRAMEWORK The implementation of this policy demonstrates the commitment of BTP in complying with the requirement of the Data Protection Act 1998 Principle 7, and the Association of Chief Police Officer (Scotland) Community Security Policy (ACPO(S) CSP), the Security Policy Framework and the Information Assurance Maturity Model both issued from the Cabinet Office. WHO TO CONTACT ABOUT THIS POLICY/PROCEDURE This policy is owned by Information Security Unit. Any enquires about this policy should be directed to Redacted or Redacted. Version 1.0 Page 5 of 16

6 PROCEDURE 1. STEP BY STEP 1.1. Incident Management Employees have responsibility to ensure that they do not commit or facilitate a security incident that may lead to a security breach. All employees (including contractors) must report any concerns that security policy or procedures are not being adhered to and that breaches are either being committed or there is a high likelihood they are being committed. Moreover, if there are strong grounds to believe that security breaches may occur, for example, due to vulnerable procedures or individuals, this must be reported To ensure the management of security incidents follows a recognised procedure and is reported at the earliest opportunity in order to allow for timely corrective or investigative action the following actions are required to be adhered to: Actions In the first instance personnel believing a security incident has taken place or has been identified should inform a line manager or supervisor immediately. The line manager or supervisor should conduct a local investigation and record events and decisions. If the line manager or supervisor is convinced that a security incident has occurred or has been identified then they should complete a Security Incident Reporting Form and forward it to the FISM without delay. Where the security incident involves a loss of Laptops, Radios, PDAs or Identity Cards the line manager should inform one of the Force Control Rooms with the details. This is to allow for a general broadcast to be made to ensure all employees are aware of the loss. The loss of a Radio or PDA should follow the guidelines issued with the device, this will allow for the device to be stunned as appropriate. Where a security incident is identified by the ICT Department then a security incident form should be completed by that department and sent to the Information Security Team (IST) All security incidents classified as a major or gross breach will be referred to PSD The loss of or damage to any physical asset must be reported within 24 hours to IST. The loss of information assets also need to be reported to the Force Claims Manager (Corporate Risk Team) so that potential claims can be assessed and recorded as necessary. Version 1.0 Page 6 of 16

7 All incidences of fraud or suspected fraud must be reported to the Force Claims Manager (Corporate Risk Team) so that they can ensure that the Force Insurers are informed within 14 days of discovery. The Information Security Team will ensure that the Force Claims Manager (Corporate Risk Team), Technology Department and Professional Standards Department (as appropriate) are informed of any incident which may require action by them as outlined above Breach Management To ensure that a considered and consistent approach to any information security incident is applied, this section outlines the levels of breach (e.g. minor, major, and gross) that has occurred and the types of sanction that should be considered as a consequence of any information security incident This list shown below should in no way be considered either exhaustive or definitive. Line management will need to use their judgment according to the circumstances of each individual case. For example higher sanctions may need to be considered for the loss of material in aggregate, or that which may have an obviously greater impact, such as the loss of personal/citizen s data Level of Breach and Sanction Minor breach Loss/theft/breach of one or more documents/assets protectively marked as PROTECT/RESTRICTED due to a proven negligence. Transmitting RESTRICTED material on unprotected systems (e.g. Internet, hotmail etc). RESTRICTED documents being over looked by a member of the public. Leaving a cabinet/room open at the end of the day containing PROTECT/ RESTRICTED material and/or assets or leaving unsecured documents out overnight (i.e. on desk/notice board and/or lying around photocopies, fax machines (MFDs) etc). Not wearing a pass or ID card on premises after being instructed to do so or wearing a pass/id card in public. Loss of building pass/personal ID card or keys due to proven negligence Minor breach: Disciplinary procedures which apply Disciplinary action may be taken. Formal disciplinary procedures may be instigated with an investigation undertaken before a Warning can be issued and appropriate management procedures undertaken (e.g. Management Action File Note). Any further breach must be referred to PSD. Version 1.0 Page 7 of 16

8 Major breach Loss/theft/breach of CONFIDENTIAL material/assets due to proven negligence. Significant loss (less than 100 records) or misuse of personal data (either marked PROTECT or higher). Transmitting of CONFIDENTIAL over a lower protectively marked system. CONFIDENTIAL documents being over looked by a member of the public and over looked by personnel not cleared to view such documents. Leaving a secure cabinet/room open at end of day containing CONFIDENTIAL material/assets or storing them insecurely. Persistent offence of minor/major breaches. Any attempt to hide, cover-up or fail to report a security incident of any kind. Removing CONFIDENTIAL material from official premises without proper authorisation and safeguarding. Theft/fraud. Giving logon details and password to someone else Major breach: Disciplinary/administrative procedures which apply Must be referred to PSD. Unsatisfactory Performance Procedures (UPP) or Misconduct proceedings. Possible criminal proceedings Gross breach Loss/theft/breach of SECRET and above material due to proven negligence act. Loss/theft/breach of Cryptographic material regardless of protective marking due to proven negligence. Substantial (more than 100 records) loss or misuse of personal data (either marked PROTECT or higher). Transmission of SECRET over a lower protectively marked system. Removing SECRET and above material from official premises without proper authorisation and safeguarding. SECRET documents being over looked by a member of the public. Leaving an encrypted laptop in public place together with access tokens/passwords etc. Deliberate alteration or deletion of information/assets. Serious theft or fraud Gross breach: disciplinary/administrative/criminal procedures which apply Must be referred to PSD. Criminal proceedings under Official Secrets Act, Misconduct in Public Office may apply. Version 1.0 Page 8 of 16

9 1.4. Change Control Correctly documented and authorised Change Control processes are essential for the following reasons: To ensure that changes can be properly assessed before they are authorised To ensure that only properly authorised changes are made To ensure that a proposed change is not already registered and thereby reduce possible duplicative effort To prevent conflicting changes To bring changes into effect in a controlled manner by specifying the timing of the change To rationalise similar or related changes for example by grouping changes which affect a single item or a common area To monitor the cost of changes approved and their impact on the project budget To keep track of changes and have an audit trail. In other words, who did what? When and why did they do it? What authority did they have? To assess impact of change as part of the risk control process The goals of a correctly implemented change management process are to eliminate problems and errors, and to ensure that the entire environment is stable. To meet these goals it is important to Ensure orderly change in a facility requiring a high level of systems availability, all changes must be managed in a process to control any variables possibly affecting the environment. As change can cause serious disruption however, it must be carefully and consistently controlled. Inform the computing community of change changes assumed to affect only a small subsection of BTP may actually affect a much broader cross section. Therefore the whole of the computing community should receive adequate notification of impending changes. Analyse changes the presentation of an intended change to an oversight committee or Change Control Board (CCB), with the corresponding documentation of the change, often effectively exposes the change to careful scrutiny. This analysis clarifies the originator s intended change, prior to the change being implemented, and is helpful in preventing erroneous or inadequately considered changes from entering the system. In addition this will also highlight any risks to organisation in implementing any changes. Version 1.0 Page 9 of 16

10 Reduce the impact of changes on service computing resources must be available when BTP needs them. Poor judgment, erroneous changes and inadequate preparation must not be allowed in the change process. Procedures must be in place to support the Change Control process and the following steps should be undertaken. Applying to introduce a change a method must be established for applying to introduce a change affecting the computing environment in areas covered by change procedures, these are covered by the steps and form shown below. Cataloguing the change all change requests should be entered into a change log, which provides documentation for the change itself (e.g. the timing and testing of the change). This log should be updated as the change moves through the process, providing a thorough audit trail of all changes. Scheduling the change after thorough preparation and testing by the sponsor, the change should be scheduled for review and implementation by the CCB. Implementing the change the final step in the change process is the application of the change to the hardware and software environment. Reporting to management periodically a full report summarising change activity should be submitted to the Chief Officers Group (COG). This helps ensure that senior management is aware of any problems that may have developed and any impacts on the service The following steps should be followed: Step 1 - Once a potential requirement for change is identified, a Change Request Form should be completed. Step 2 - The Change Request Form should be sent directly to the Technology Service Desk who will undertake an initial review. This may result in a rejection of the request for change, or a referral for formal registration with the Change Control Coordinator [CCC]. This should be entered into a change log. Step 3 - Once registered the CCC will refer the change request to all work stream leads for review and authorisation for an impact analysis. Step 4 - An Impact Analysis will be undertaken by work stream leads. Step 5 - The CCC circulates the change request and the impact analysis to appropriate members of the CCB for further evaluation of impact and recommendations. This board will make one of the following decisions: Accept change Version 1.0 Page 10 of 16

11 Conditional acceptance Reject change Defer pending further information/decisions Step 6 - Results will be registered on the change request log, and the originator of the change request will be notified of the result. Step 7 - Once the sponsor has thoroughly tested the process the CCB should be made aware of the proposed implementation date and any known ramifications of change should be made aware to the board. If the board agrees that the change has been thoroughly tested, it should then agree in writing the implementation schedule. All approvals and denials should be in writing with appropriate reasons if at this stage the change is rejected. Step 8 - If the change works correctly it should be noted on the change control form. When the change does not perform as expected, information should be gathered, analysed and entered on the change control form, as reference to help avoid a recurrence of the same problem possibly in the future. In addition the change request should have information to demonstrate how a failed change would affect system operations or how the system is restored until the change can be implemented at a later date Step 9 - Final sign off of the Change Control Form 2. GUIDANCE 2.1. A security incident can cover a wide range of events and may be categorised as follows Physical: The following, whilst not exhaustive, provides examples of possible security incidents involving physical assets: Loss of Identification (ID)/Warrant cards The loss/theft/breach of hard copy protectively marked material The breaching of access controls The loss/theft/breach of sensitive data or equipment e.g. Radios, PDAs Laptops etc Unauthorised access to, tampering with or use of ICT systems, equipment or accounts Unauthorised acquisition of privileges Unauthorised access to, use or disclosure of sensitive information Unauthorised changes to system hardware, firmware or software Procedural: Improper use of an ICT system, access or privileges (e.g. password sharing, inappropriate use of or accessing inappropriate web sites); Version 1.0 Page 11 of 16

12 improper handling, distribution, accounting, storage and destruction of cryptographic items or sensitive information Electronic: Malware attacks (Viruses, Worms, Trojan Horses); unauthorised disruption of service (denial of service and distributed denial of service attacks), receipt of spam, phishing attacks, etc Operational: System failures, crashes, environmental failures and operator errors may have security implications and should be treated as incidents, in addition to their potential implications for business continuity. Some ICT security incidents have been detected as a result of poor system performance The examples listed above are not exhaustive and many incidents will belong to more than one category. A breakdown of common forms of security incidents is shown at Appendix A. Other incidents may be difficult to classify and all personnel should be alert to the possibility of new types or manifestations of incident, particularly as attack methods are constantly evolving. All concerns should be brought to the attention of the FISM at the earliest opportunity 3. ROLES & RESPONSIBLITIES The Director of Corporate Resources is the Senior Information Risk Owner (SIRO), who is the representative at Senior Command Team (SCT) level and understands the strategic business goals of the organisation and how these may be impacted by failure of information systems. The SIRO also ensures that management of information risks are weighed alongside the management of the other risks facing the organisations such as financial, legal and operational risks The Head of Information Management is responsible for developing, producing, maintaining and delivering the business strategic plans for Information Management, within budget and to agreed timescales, and ensuring that all Information work streams support the strategic aims of BTP Area Commanders and Heads of Department are responsible for implementing the policy within their areas and for adherence by their staff Line Managers should be aware of the and their individual responsibilities as well as those of their staff; to ensure compliance within their area of responsibility All BTP Employees have a responsibility to adhere to this policy and procedure and to abide by the conditions of employment by maintaining the confidentiality, integrity and availability of information; and to use BTP information assets for policing purposes only. Failure to do so may lead to disciplinary action being taken. Version 1.0 Page 12 of 16

13 All BTP employees, contractors and vendors who may have cause to request a change to computing facilities must follow the procedure detailed within the Change Control Section of this policy Where security incidents are reported to the Technology Helpdesk or IST are made aware of possible security incidents they must report the matter to Information Security immediately The Force Information Security Manager has direct responsibility for maintaining the policy, providing guidance on its implementation and ensuring compliance with policies, standards and procedures together for ensuring that an adequate system for detecting, reporting and responding to security incidents is in place The Information Security Team is responsible for ensuring all security incidents are investigated in a timely manner, providing a response to information security incidents within 24 hours (critical) and 5 working days (non-critical) and to escalate, as required, those incidents that require PSD or line management intervention. 4. ADDITIONAL INFORMATION 4.1. Definitions Cautious Risk Appetite Preference for safe options that have a low degree of residual risk and may only have limited potential foe business benefit Zero system tolerance Fully acceptable residual risk status is in place, within BTP s corporate risk appetite and tolerance levels. No changes to risk treatment strategy required at the current time An Information System is any facility or practice that is used to store or process business information in any form An Asset is any information or equipment that has value either financial or operational to BTP The term Employee(s) refers to all BTP officers, Police Staff and Police Authority members The term Contractor(s) includes the main supplier of goods or services, their servants, agents and subcontractors The term Security Incident is any suspected failure or identified weakness in information security, namely: Accidental or deliberate unauthorised destruction of information. Accidental or deliberate unauthorised modification of information. Accidental or deliberate unauthorised disclosure of information. Deliberate and unauthorised unavailability of systems. Version 1.0 Page 13 of 16

14 Unauthorised access to systems or information. Misuse of data and theft of assets. Any contravention of Information Security or Vetting Policies and associated procedures. Any other event which affects security of information Confidentiality - Assurance that information is shared only among authorised persons or organisations. Breaches of confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of the information concerned (i.e. safeguards not being in place when creating and storing documents or other data, printing, copying, ing or scanning) Integrity - Assurance that the information is authentic and complete. The integrity of data is not only whether the data is 'correct', but whether it can be trusted and relied upon. Making copies of a sensitive document by scanning or photocopying, threatens both the confidentiality and the integrity of the information because that data is at risk of change/modification Availability - Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them Cryptographic items - The primary goal of cryptography is to conceal data to protect it against unauthorized third-party access by applying encryption Monitoring and Review This policy will be reviewed on an annual basis and in response to any significant changes in legislation or business purpose. Version 1.0 Page 14 of 16

15 ADDITIONAL GUIDANCE DOCUMENTS MANAGEMENT GUIDANCE This policy and procedure places certain responsibilities on line managers to ensure that employees comply with the requirements contained within this document to ensure that everyone protects all Police information and assets properly. Doing this reduces the risk of an information security incident from happening, helps protects employees and the reputation of BTP. If a manager has any questions relating to this document, please contact a member of the Information Security Team. FREQUENTLY ASKED QUESTIONS (FAQ s) Q - Does this policy document relate to me? A - Yes, everyone has responsibility for Information Security to ensure the confidentiality, integrity and availability of all information and assets within BTP are maintained and protected at all times from threats of deliberate or accidental actions by internal or external sources. Q - I think an Information security incident has happened what do I need to do? A - You need to speak to your line manager as soon as practically possible, they will help establish the facts and determine if an incident has occurred. You will be required to complete a Security Incident Form which must be sent to the Information Security Team. Q - Does this document provide me with everything I need to know regarding information security with BTP? A - No, this document must be read in conjunction with the other policy documents listed below. Q - I have identified that an IT system needs to be upgraded, what do am I required to do? A - You need to follow the change control section of this policy and complete a Change Control Request Form and send it to the Technology Department for their initial appraisal. Q - Where can I get more advice regarding my responsibilities? A - In the first instance you should speak to your line manager and for further guidance contact the Information Security Team who will be happy to provide advice and offer support. FORMS / DOCUMENTS / LETTERS Use & Management of IT and Communication Systems Policy Physical Security Measures of Buildings (including Home workers) Policy Handling Protecting and Disposing of Police Assets Policy Warrant and Identity Card Policy Security Incident Reporting Form (CR F1) Change Control Request Form (CR F1) Version 1.0 Page 15 of 16

16 Common Examples of Information Security Incidents (CR F2) RECORD RETENTION SCHEDULE Records generated as a result of this policy/procedure document will be kept for 7 years. Version 1.0 Page 16 of 16

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

06100 POLICY SECURITY AND INFORMATION ASSURANCE

06100 POLICY SECURITY AND INFORMATION ASSURANCE Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

This policy applies equally to all full time and part time employees on a permanent or fixed-term contract.

This policy applies equally to all full time and part time employees on a permanent or fixed-term contract. Discipline Policy 1. Introduction This policy set outs how Monitor will deal with employee conduct which falls below the expected standard. It is Monitor s aim to use the policy as a means of encouraging

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

ITEC Malpractice & Maladministration Policy

ITEC Malpractice & Maladministration Policy ITEC Malpractice & Maladministration Policy Version 3 1 Contents Malpractice & Maladministration Policy 3 Introduction 3 Centre s Responsibility 3 Review Arrangements 4 Definition of Malpractice 4 Definition

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

Should an investigation be undertaken into your centre, the head of centre must:

Should an investigation be undertaken into your centre, the head of centre must: Malpractice and Maladministration Policy Introduction This policy is aimed at all customers, approved centres and learners who are delivering or registered on Crossfields Institute approved qualifications

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

Disciplinary and Dismissals Policy

Disciplinary and Dismissals Policy Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary

More information

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Information Security Incident Management Policy

Information Security Incident Management Policy Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation

More information

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...

More information

Security Incident Management Policy

Security Incident Management Policy Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

TELEFÓNICA UK LTD. Introduction to Security Policy

TELEFÓNICA UK LTD. Introduction to Security Policy TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

Remote Network Access Procedure

Remote Network Access Procedure Remote Network Access Procedure Version: 1.1 Bodies consulted: - Approved by: PASC Date Approved: 20.8.13 Lead Manager: Ade Sulaiman Responsible Director: Simon Young Date issued: Aug 13 Review date: Jul

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

PROCEDURE Transaction Monitoring and Audit. Number: G 0811 Date Published: 6 June 2013

PROCEDURE Transaction Monitoring and Audit. Number: G 0811 Date Published: 6 June 2013 1.0 Summary of Changes This procedure has been amended to include the Police National Database (PND). 2.0 About this Procedure The Chief Constable will assume the responsibilities of the data controller

More information

Harper Adams University College. Information Security Policy

Harper Adams University College. Information Security Policy Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

Data Security Breach Incident Management Policy

Data Security Breach Incident Management Policy Data Security Breach Incident Management Policy Contents 1. Background... 1 2. Aim... 1 3. Definition... 2 4. Scope... 2 5. Responsibilities... 2 6. Data Classification... 2 7. Data Security Breach Reporting...

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

Corporate Information Security Management Policy

Corporate Information Security Management Policy Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

COUNCIL POLICY NO. C-13

COUNCIL POLICY NO. C-13 COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

Information Security Incident Protocol

Information Security Incident Protocol Information Security Incident Protocol Document Owner Caroline Dodge Tel: 01622-221652 caroline.dodge@kent.gov.uk Version Version 2: July 2013 Contents 1. Protocol Objectives 2. Scope 3. Protocol Statement

More information

NHS Information Risk Management

NHS Information Risk Management NHS Information Risk Management Digital Information Policy NHS Connecting for Health January 2009 Contents Introduction Roles and Responsibilities Information Assets Information Risk Policies Links with

More information

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 jmadeja@buchananassociates.com Each business is required by Massachusetts law

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer) I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

More information

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures Open Awards Malpractice and Maladministration Policy and Procedures Page 1 of 14 Open Awards Malpractice and Maladministration Policy and Procedures Policy Statement Open Awards is committed to ensuring

More information

NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities

NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities Information Governance Untoward Incident Reporting and Management Advice for Local Authorities March 2013 Contents Page 1. The Role of the NIGB.....3 2. Introduction...4 3. Background Information...6 4.

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration

More information

Information Security Incident Management Policy and Procedure

Information Security Incident Management Policy and Procedure Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Mandatory data breach notification in the ehealth record system

Mandatory data breach notification in the ehealth record system Mandatory data breach notification in the ehealth record system Draft September 2012 A guide to mandatory data breach notification under the personally controlled electronic health record system Contents

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

Incident reporting procedure

Incident reporting procedure Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance

More information

Information Management and Security Policy

Information Management and Security Policy Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

Note: Non JCQ awarding bodies have their own reporting forms and these would be used where appropriate.

Note: Non JCQ awarding bodies have their own reporting forms and these would be used where appropriate. MALPRACTICE IN ASSESSMENT POLICY 1. Policy Statement 1.1 Carshalton College is committed to ensuring that issues of malpractice in internal and external examinations and assessments are addressed. For

More information