Information Management Policy

Size: px
Start display at page:

Download "Information Management Policy"

Transcription

1 Information Management Policy Document Control Title Organisation Description Author(s) Information Management Policy London Legacy Development Corporation The Information Management Policy describes how data and information will be managed across the Legacy Corporation. Danny Budzak; Rachael Clauson Date 7 August 2014 Approvals Distribution Protective Marking Jonathan Dutton; EMT Public Not protectively marked Version Control Version Date Description Author v EMT Approved Rachael Clauson v Minor changes based on recommendations in the audit report Rachael Clauson

2 Contents 1 Executive Summary 4 2 Introduction Overview Legal, Regulatory and Policy Framework Principles of Information Management Scope Statement of Intent 8 3 Roles and Responsibilities Overview Executive Management Team (EMT) Senior Information Risk Owner Director of IT The IT and Information Services Team Information Asset Owners and Data Stewards All Personnel Civica Legal Services Procurement 10 4 Information Security Overview Information Risks Personnel Security Password Management Inactive Accounts Monitoring of Access Physical Security Control and Security of Assets Encryption Access Controls to Data Privacy Impact Assessments (PIA) Protecting the ICT Infrastructure Use of Managing Information Security Risks Reporting 14 6 Records Management Overview Standards for the Creation of Records Metadata File Paths and File Names Version Control Date Formats Folder Structure Electronic Files Paper Files Moving Data and Information outside the Offices 17 LLDC Information Management Policy v1.1 Page 2 of 22

3 6.12 Retention and Disposal Schedule 17 7 Data Management Overview Scope of Data Quality 18 8 Information Sharing Overview Stakeholders and Strategic Partners Management Overview Use of Information Management Reporting Overview Information Asset Register Finance and Corporate Services Risk Register Annual Information Governance Report Training Information Security Induction IT Induction Information Management Review and Monitoring of the Policy Review of Policy Monitoring 20 Appendix 1 Definitions 22 LLDC Information Management Policy v1.1 Page 3 of 22

4 1 Executive Summary The Information Management Policy outlines how the London Legacy Development Corporation ( the Legacy Corporation ) will organise and manage its data and information. It sets out the statutory, regulatory and policy framework with which the Legacy Corporation needs to comply, in order to deliver two key objectives: 1. To ensure that data and information reflects the Legacy Corporation s commitments to openness and transparency; and 2. To ensure that, where necessary, the security, protective marking, privacy and confidentiality of data and information is assured. The policy defines the roles and responsibilities of all members of staff. The key points are as follows: All staff must understand they are responsible for information security; All data and information must have a data steward; The data steward is responsible for ensuring the accuracy, completeness and relevance of all the data they manage on behalf of the Legacy Corporation. The Legacy Corporation generates business records such as decisions made, agreements, commitment to meet obligations, histories of projects and deliverables. These records will be managed using a retention and disposal schedule which determines which records are kept, for what length of time, and what happens to them in the long term. The section on data management outlines how data will be managed at both a macro and micro level. At a macro level, data sets will be defined with named data stewards who will understand their roles and responsibilities. These details will be recorded and maintained in the Information Asset Register. At a micro level, all staff who create data and information will do so according to a set of standards, including version control, dates, folder names and file paths. The policy outlines the protocols and process for information sharing, internally within the Legacy Corporation, as well as with external bodies. All staff who share information will be made aware of the issues relating to this, and systems will be designed where relevant, in order to facilitate information sharing. management is presented as a key topic in this policy due to the challenging business issues it raises. Any which is a business record needs to be retained, in accordance with the retention and disposal schedule. s which are not business records can be deleted. The key issue is not whether a piece of data or information is an , it is whether it is a business record. The final part of the policy looks at the type of management information which should be produced on a regular basis so the Legacy Corporation understands what data and information it has and how it is being used to support business requirements. Management information will include the number of files, types of files, content types, and volumes of data. It will include how compliance with Freedom of Information, Data Protection and other statutory requirements have been met. It will include an overview of all known data security incidents and how these were managed and resolved. LLDC Information Management Policy v1.1 Page 4 of 22

5 Key Points for All Staff Information Security Information security is the responsibility of all staff, including access to buildings, information systems, data and information. The security, privacy, protective marking, confidentiality of information must be assured. Data and information must be managed to support openness and transparency. The Legacy Corporation must comply with Freedom of Information, Environmental Information Regulations, and Data Protection legislation, ensuring that information must be disclosed when requested and that personal and sensitive personal data is protected. Records Management A record is proof that something has been agreed, has happened, has been promised, regardless of whether it is a document, a PDF, an , a hand written note. Examples include minutes of meetings, contracts, PIDs, invoices, appraisals, and reports. All business records must be managed with the retention and disposal schedule to ensure compliance with legislation, regulations and internal policies. All business records must be stored in the relevant parts of the folder structure so they are readily available to those who need them. All business records must have a minimum of data standards attached to them including versions, dates, and authors. Data Management All data and information which is produced must have a clearly defined data steward. Stewards are responsible for ensuring that the data is accurate, up to date and relevant and is maintained for the necessary retention periods. All data sets and the data stewards will be recorded in the Information Asset Register. Information Sharing Processes and protocols will be understood and followed to ensure that information can be shared within the Legacy Corporation and its stakeholders. Management Information Management information will be generated to show the number of files, volume of data, information security incidents, size of mailboxes and personal drives and costs of data storage. LLDC Information Management Policy v1.1 Page 5 of 22

6 2 Introduction 2.1 Overview The Legacy Corporation aims to promote the highest standards of information management This policy describes the Legacy Corporation s approach to managing its data and information and describes the procedures and process which must be followed by all personnel The Legacy Corporation creates and maintains a large quantity of information, in a variety of formats, including both paper and electronic. This data and information is essential for: Supporting a policy of openness and transparency Decision making Programme and project development and delivery Administrating the organisation Creating the historic record of the Legacy Corporation The management of this data and information is necessary to ensure that the Legacy Corporation: is compliant with information law; can operate effectively and efficiently; and can carry out business continuity if necessary. As a legacy organisation, the Legacy Corporation will eventually pass information to any successor organisations, or to public bodies such as The National Archive Almost all records, data and information held by the Legacy Corporation will originate as an electronic file and should therefore be primarily managed within electronic information systems. 2.2 Legal, Regulatory and Policy Framework Information will be managed in compliance with the following legal, regulatory and policy frameworks: Legal and Regulatory Framework Computer Misuse Act 1990 Copyright, Design and Patents Act 1998 Data Protection Act 1998 Environmental Information Regulations 2004 Equality Act 2010 Freedom of Information Act 2000 Privacy and Electronic Communications (EC Directive) (Amendment) Regulations 2011 Protection of Freedoms Act 2012 Public Records Act 2005 Regulation of Investigatory Powers Act (RIPA) 2000 LLDC Information Management Policy v1.1 Page 6 of 22

7 Legacy Corporation Policy Framework Acceptable Use of IT Policy Information Compliance Policy In addition, a range of legislation covers the retention and disposal of business records. This legislation is set out in the Legacy Corporation s Retention and Disposal Schedule and covers functions and business areas such as finance and human resources There are also a number of standards, such as ISO for Information Security, and ISO for Records Management, with which the Legacy Corporation is working to align itself The Legacy Corporation is also able to use the Regulation of Investigatory Powers Act (RIPA) RIPA permits the monitoring and recording of employees electronic communications (including telephone communications) for reasons such as: Establishing the existence of facts; Investigating or detecting unauthorised use of the system; Preventing or detecting crime; Ascertaining or demonstrating standards which are achieved or ought to be achieved by persons using the system (quality control and training); Ascertaining compliance with regulatory or self-regulatory practices or procedures ensuring the effective operation of the system Civica, the Legacy Corporation s managed IT service provider, may use RIPA on behalf of the Legacy Corporation to operate non-intrusive exception monitoring of personnel s use of the Legacy Corporation s computer resources including and internet use. This will not be done unless a genuine possibility of inappropriate use has been raised through exception reporting, disciplinary proceedings or a complaint If action is required as the result of inappropriate use of computer resources, then the issue will be referred to Human Resources and the relevant Line Manager for remedial action. 2.3 Principles of Information Management The key principles of information management at the Legacy Corporation are as follows. Information will be: managed as a corporate resource to support decision making, the delivery of programmes and projects and the administration of the organisation shared across the Legacy Corporation and with strategic stakeholders and partners, using formal protocols where necessary managed to ensure compliance with statutory and regulatory requirements accurate and relevant to the business purposes it supports used to support transparency and openness protected to prevent theft, loss and corruption accessible to those who need it and in formats which are usable managed using the retention and disposal schedule. LLDC Information Management Policy v1.1 Page 7 of 22

8 2.4 Scope The scope of this policy extends to all of the Legacy Corporation s data and information held both electronically and on paper. For the purposes of this policy, the term information will be used to describe both data and information, see Appendix A for definitions The policy includes all of the personnel who work for, or with the Legacy Corporation, including full-time and part-time employees, contractors, consultants, secondees, agency and temporary employees It includes all of the hardware, networks and information systems used to create, store and access electronic data and information. This includes desk top PCs, mobile devices, USB sticks, databases, websites, software and licences The policy also includes information held by third parties on behalf of the Legacy Corporation or which is shared with third parties It includes management of access to information, including the access to buildings and facilities where information is held It includes the transmission of information including electronically, verbally and by paper. 2.5 Statement of Intent The Legacy Corporation seeks to embed effective and appropriate information and records management into business processes and functions. This will be achieved through approved procedures and appropriate monitoring and controls Awareness of the policy will be raised across the Legacy Corporation on an ongoing basis through a variety of methods, such as the induction process, e- learning and the intranet. 3 Roles and Responsibilities 3.1 Overview It is the responsibility of all staff to have an understanding and awareness of information management issues, including information security, freedom of information, environmental information regulations, data protection, copyright and records management. 3.2 Executive Management Team (EMT) The EMT is responsible for: approving and endorsing this policy; providing support and leadership for the implementation of this policy; receiving and reviewing management information relating to this policy; providing guidance on how the policy continues to be aligned with corporate objectives; nominating a Senior Information Risk Owner (SIRO); and committing resources to ensure the objectives of the policy can be delivered. 3.3 Senior Information Risk Owner LLDC Information Management Policy v1.1 Page 8 of 22

9 The Executive Director of Finance and Corporate Services is the Senior Information Risk Owner (SIRO). The responsibilities of the role are to: provide the Chief Executive and EMT with an annual report on information governance with particular reference to information security, information risk and compliance; own the Legacy Corporation s information security and information risk management process; review risks escalated by stakeholders or third party suppliers; review risks and issues escalated by the any part of the business; take the lead on incident management and reporting, including lessons learned; and act on behalf of the Legacy Corporation in dealings with local and central government and other bodies on information risk and assurance. 3.4 Director of IT The Director of IT is responsible for: strategic leadership of information security; ensuring effective governance to control IT and information management activities including relevant standards, security and risk; and ensuring continued uninterrupted operation of the organisation s IT services and that service is secure from threats. 3.5 The IT and Information Services Team The IT and Information Services Team are responsible for: developing and maintaining the retention and disposal schedule to all records; developing and implementing information management standards; Freedom of Information and Environmental Information Regulations (EIR) requests and subject access requests under the Data Protection Act; ensuring compliance with data protection; maintaining the publication scheme; and maintaining the information asset register. 3.6 Information Asset Owners and Data Stewards Information Asset Owners and data stewards are recorded in the Information Asset Register. They will be responsible for ensuring that those assets are up to date, accurate, complete and held securely. 3.7 All Personnel All data and information, information systems, hardware, mobile devices, software, licences belonging to the Legacy Corporation are corporate assets. All personnel must understand and be aware of: their obligations to ensure the security of data, information, information systems, buildings, hardware and mobile devices; the processes, procedures and standards outlined in this policy; which information assets they are owners of, and the need to update and maintain the register of those assets; LLDC Information Management Policy v1.1 Page 9 of 22

10 3.8 Civica the compliance framework including freedom of information, data protection, privacy and copyright and the need to support openness, accountability and transparency; the statutory obligations to maintain records which are accurate, complete and up to date, including s; managing s so that s which are business records are moved to the relevant folders; and the need to ensure the quality of data so that it is usable and fit for purpose Civica are the Legacy Corporation s managed service provider. Civica have ISO Certification for Information Security. Their role is to: ensure that the Legacy Corporation s IT systems are functioning at optimum level; make regular back-ups of the Legacy Corporation s electronic files, including s; ensure the Legacy Corporation s files and computer systems are adequately protected against viruses, spyware, malware and external attack; update and maintain the Legacy Corporation s computer hardware, telephone equipment and network; manage and maintain the Legacy Corporation s servers and infrastructure; manage and maintain data recovery systems to ensure the Legacy Corporation s business systems can continue to be accessed if offices at Stratford are inaccessible or unusable; manage and update existing Legacy Corporation software and install new software; and provide a support service for queries and problems relating to IT hardware and software. 3.9 Legal Services Transport for London (TfL) provide the Legal services for the Legacy Corporation. A detailed Data Transfer Plan and information Sharing Protocol has been established between the two organisations to ensure that the records of the Legacy Corporation are managed effectively and in compliance with legislation Procurement All Procurement projects must ensure the inclusion of appropriate contract clauses on information security, information assurance and records management, and liaise with the Legal and Procurement team Before entering a contractual agreement, all third party agencies will be invited to partake in a risk assessment to ascertain the adequacy of their development and support environments for maintaining the security and integrity of the Legacy Corporation s data, applications and networks. 4 Information Security 4.1 Overview LLDC Information Management Policy v1.1 Page 10 of 22

11 4.1.1 Information security will be applied to manage and control risk to data, systems, people, buildings and IT hardware, infrastructure and assets. Information security processes and procedures will be monitored and updated on a regular basis Where possible, devices will be configured with password protection and encryption, so that if they are lost or stolen, any data cannot be accessed All personnel will receive awareness training on information security. Information Asset Owners will receive additional training to ensure they can maintain the information asset register and are fully aware of their responsibilities. 4.2 Information Risks Information risk management will be conducted in association with business areas to ensure risks are understood, captured, monitored and controlled by all members of staff Information risks will be recorded on the Finance and Corporate Services departmental risk register. Where necessary, risks will be escalated to the Corporate Risk Register The Legacy Corporation will regularly carry out technical risk assessment for core ICT systems and projects. 4.3 Personnel Security All personnel must sign a form to show they are aware of, and understand, the Acceptable Use of IT Policy Line managers must notify HR and IT when new personnel require access to systems, and when they leave the Legacy Corporation. Authorisation for starters and leavers must be given using the approved Legacy Corporation form IT and IS will keep an up to date register of all new starters and leavers. This will be used to ensure that all new starters receive an induction to IT and information governance and the impact of leavers on the systems are controlled An account expiry date will be set up for all temporary accounts, which will be their leaving date. Requests for extensions must be validated by their Line Manager Background verification checks will be carried out by HR for all new employees of the Legacy Corporation Line Managers should ensure that appropriate exit procedures are carried out with all personnel when they leave. The leaver notification form must be completed. All assets must be returned to the Legacy Corporation and signed off Security roles and responsibilities will be included in job descriptions where appropriate. These will include any specific responsibilities for the protection of particular assets, or for carrying out particular processes such as data protection or freedom of information All staff will be instructed not to store personal data, sensitive data or protectively marked information on laptops or home PCs which have not been encrypted to the Federal Information Processing Standard (FIPS) standard Where any personnel leave their desk unattended they should either log off from the system, or they should lock their PC screen. Each PC is set to automatically LLDC Information Management Policy v1.1 Page 11 of 22

12 lock after 15 minutes if not in use, and can only be unlocked by entering a user name and password. 4.4 Password Management The password management system will enforce the use of individual passwords to support and maintain accountability and changing the passwords will be automatically forced Staff are given instructions that passwords must be of a minimum of six characters and include a combination of upper and lower case letters, numbers and punctuation or symbol characters. Passwords cannot be changed more than once a day All personnel with access to systems will have their own unique user name and password and are instructed not to share this with anyone Passwords should not be written down Users should not log in using other users passwords. 4.5 Inactive Accounts The individual s account will be deactivated upon leaving the Legacy Corporation. Access to the contents of any inactive accounts can be authorised by the appropriate department head; however, access will usually only be limited to business records. Users will be requested to remove all personal data before leaving the organisation The contents of any inactive accounts will be deleted after a period of six months Login IDs which have not been used for twenty days will be disabled. IDs not used for ninety days will be deleted. All deleted IDs will be maintained for a period of six months and then will be removed. 4.6 Monitoring of Access Information Asset Owners (IAOs) must put in place arrangements to log activity of users in relation to protectively marked and personal information. IAOs must check that these arrangements are being followed, with particular focus on those working remotely. User activity should be collated and reported on a regular basis. 4.7 Physical Security All staff within the Corporation properties will be issued with a picture security pass that allows access to the relevant buildings. These passes should be worn when in the office Any guests visiting the building will need to be registered with the Legacy Corporation s reception the day before their visit by ing lldcreception@londonlegacy.co.uk. Visitors who are not registered will have to be collected from the ground floor by the meeting organiser. LLDC Information Management Policy v1.1 Page 12 of 22

13 4.7.3 All personnel should inform the Legacy Corporation s reception of any expected deliveries by couriers All visitors should, on arrival at the main reception to the building sign the Visitors book. On arrival at the 10 th floor LLDC reception they should be issued with a LLDC Visitors pass that they wear and display during their visit to the office. This should be returned when they leave the LLDC floor either to their host or to the receptionist Personnel should alert colleagues if they discover an unauthorised person on the premises If personnel lose their security pass, they should report this to Human Resources. 4.8 Control and Security of Assets IT and Information Services, with the IT managed service provider, will record and categorise all ICT assets including PCs, mobile devices such as Blackberrys and USB sticks, printers, laptops, software licences This inventory will be held in an asset register and will include details of how to implement disaster recovery. 4.9 Encryption Encryption will be managed through Pretty Good Privacy (PGP ) Access Controls to Data The levels of access to any set of data or information system will be determined by the relevant information asset owner The Information Asset Owner will define and document the user access rights to personal data and other sensitive or protectively marked data and information. By recording these, the Information Asset Owner is authorising an acceptable level of risk associated with those access rights Privacy Impact Assessments (PIA) Privacy Impact Assessments (PIA), as described by the Information Commissioner s Office (ICO), will be conducted for any projects involving collection or storage of personal data of members of the public A PIA will also be conducted for any project or system development that will be subject to a formal accreditation process Protecting the ICT Infrastructure All of the Legacy Corporation s data is stored centrally and securely on Civica s servers with access limited to authorised Civica personnel only. All backup media is held off-site by a specialist third party. Content on servers is backed up both weekly and monthly The Legacy Corporation s IT network systems are protected from the public domain by a series of firewalls in order to restrict access from the internet to permitted traffic. LLDC Information Management Policy v1.1 Page 13 of 22

14 Annual penetration testing and vulnerability assessments are undertaken by an independent external specialist All PCs, laptops and servers are protected by anti-virus software is scanned before it enters the Legacy Corporation s network, and again when it is placed in user s inbox. Users are instructed to report any suspicious s to the helpdesk All devices that are connected to the network are automatically scanned for viruses Use of Staff will be instructed that they must not send any data or sensitive data to personal accounts. Staff will also be made aware of the risks of sending outside the Legacy Corporation. Any s with sensitive data which are sent to third parties should be encrypted. 5 Managing Information Security Risks 5.1 Reporting Any information security incidents must be reported immediately to IT and Information Services or to a line manager, or both Information security incidents and the responses include: Type of incident Immediate action Notes Loss or theft of Blackberry Phone EE (Orange) Loss or theft of Corporation laptop Loss or theft of non-corporation laptop or PC Loss or theft of sensitive paper documents Loss or theft of notebooks Unknown persons in building IT or line manager or both IT or line manager or both Information Services or line manager or both Information Services or line manager or both Inform colleagues Laptops should NOT be used to store any Legacy Corporation information If a personal laptop has been used for work purposes, the theft or loss should be reported to IT. Staff must be aware that personal and sensitive data must not be stored on personal PCs or laptops. Sensitive paper documents should not be removed from Legacy Corporation offices Paper notebooks should NOT be used to record personal or sensitive personal data about people and then taken out of the building If you feel uncomfortable with anyone in the building talk to immediate colleagues to find out if LLDC Information Management Policy v1.1 Page 14 of 22

15 anyone knows who they are 6 Records Management 6.1 Overview There are statutory and regulatory requirements which provide a framework for the management of records. This includes determining what data and information are records, the length of time for which they should be retained, when they should be reviewed, whether they need to be transferred to The National Archives or other records repository, and the disposal process. 6.2 Standards for the Creation of Records The following section applies to the creation of business records; it does not apply to ephemeral data and information, reference materials, or materials received from third parties. 6.3 Metadata Metadata is information about a record which may not be implicit in the record itself. It provides a context in which to understand the record. The following metadata should be added to records: Title this should be concise, meaningful and not too long. Organisation this is always the London Legacy Development Corporation. Description a clear and concise paragraph or two about the content. Author- who created the resource; it could be more than one person. Version this should be changed as necessary. Approvals informs users whether the content is approved. Status describes whether the record is active, inactive or due for review. Protective marking describes any limitations on sharing. 6.4 File Paths and File Names File names need to be clear, concise and meaningful. File paths (the total number of characters from all the folders, sub-folders, and file name) which exceed 240 characters will not be usable within a Windows Explorer environment as they cannot be opened. Where possible, file names should not have spaces in them, as they will be displayed as percentage signs when published on the web. File names should be concise this makes them more usable. Recursive naming of folders should be avoided as it becomes confusing. It is acceptable, particularly for internal records, to use common abbreviations and acronyms 6.5 Version Control Version control should be managed in the following way: LLDC Information Management Policy v1.1 Page 15 of 22

16 v0.1 First draft version (this is usually the document creation) v0.2 Second draft version v0.3 Third draft version...and so on There is no need to add the term draft to this sequence, or to the document title. These version changes should be applied in a proportionate way. For example, they do not necessarily need to be updated when only one person is working on the document and opening and closing it while making changes. The first published version or public version of the document will be: v1.0 Subsequent minor changes should be recorded as: v1.1 v1.2...and so on Each significant change or major revision of a file should be recorded as: v2.0 v3.0 v4.0...and so on 6.6 Date Formats Date formats need to be applied consistently. The primary date standard is: dd mm yyyy However, there may be instances when there is a need to use the reverse date order of yyyy mm dd. 6.7 Folder Structure The structure and names of folders will be based on the business classification scheme Folder names and structure will reflect the functions, organisation, programmes, projects, policies and decision making of both the Corporation as a whole, and of each of the business areas Folder names need to be clear, concise and meaningful. Sub folders should be logical and not recursively named. 6.8 Electronic Files Electronic records must be stored in the appropriate folders on the O drive, which is managed by the Information Services team Business records must not be stored in personal drives (H drive), memory sticks, portable devices or home PCs. There may be a temporary need to use this space for work in progress, but they must be moved to the appropriate folder when they become records. LLDC Information Management Policy v1.1 Page 16 of 22

17 6.8.3 The use of portable media such as USB sticks is restricted for limited use; for example, when working away from the office. Any new records created on removable media must be transferred to the shared drive upon return to the office s which are business records must be transferred to the appropriate folders on the O drive. They will then be managed through the retention and disposal schedule. The overall policy is outlined in Section 7 below Paper Files Paper records should be filed in a corporate folder, mirroring the corresponding electronic file structure. Duplicate papers need to be removed and where a file becomes too large, a second part should be created The accumulation of paper on desks and in the offices will be monitored to ensure that this does not become an information risk or health and safety hazard or both Where paper resources are classified as records, they will be reviewed for the possible transfer to off-site storage Paper files which contain personal or sensitive data and information should be stored securely and not left unattended and should not be accessible to personnel who are not authorised to view them, for example, not left on desk tops Moving Data and Information outside the Offices Any personnel who takes paper records out of the office should keep a record of that movement All portable assets will be recorded in the Information Asset Register, with details of who they are assigned to. That person will be responsible for the data and information which is held on those devices Retention and Disposal Schedule The retention and disposal schedule outlines the main classes of records and the periods they need to be retained for. The authority for those retention periods is also stated. At end of their retention period, records will be reviewed All personnel are expected to be aware of the retention and disposal schedules and to create, manage and store their business records in a way which facilities the application of the schedule The retention and disposal schedule will be fully reviewed on an annual basis, with partial reviews based on legislative and other changes throughout the year The further retention, archiving or disposal of records will be decided through the application of the retention and disposal schedule Where paper or electronic files are to be disposed of, this will be done in a secure way Cross-cutting shredders are available for the disposal of paper. LLDC Information Management Policy v1.1 Page 17 of 22

18 Any IT equipment which is decommissioned will have the data wiped. 7 Data Management 7.1 Overview Data quality is essential to ensure that the work of the Legacy Corporation is carried out to a high standard, with minimal risks. Data quality needs to be assured so that data can be trusted, accurate, up to date and reliable. 7.2 Scope of Data Quality Data quality relates to the completeness, integrity and accuracy of data and information resources The Legacy Corporation will use the Information Asset Register and the standards described in this policy to manage and monitor data quality The Legacy Corporation will commit to ensuring the quality of data which will form part of its reporting requirements to the Mayor, Greater London Assembly, Parliament and government departments Data stewards will be established for all data sets and data repositories. The role of the data stewards will be to ensure that all data is relevant, accurate, up to date and fit for purpose; that the data is accessible to those who need it, and there is a process to update and review the data on a regular basis Data stewards will be responsible for applying the retention and disposal schedules to ensure that data is managed within the records management framework. 8 Information Sharing 8.1 Overview The Legacy Corporation has a business need to share data and information with a range of stakeholders, strategic partners, contractors, the GLA group and government departments. The sharing of data and information must be governed by a set of agreed protocols and standards. 8.2 Stakeholders and Strategic Partners The Legacy Corporation will comply with the Information Sharing Protocol which has been created for the GLA Group Where there is a specific requirement to share data with third parties and other organisations, the Corporation will create formal information sharing protocols. 9 Management 9.1 Overview LLDC Information Management Policy v1.1 Page 18 of 22

19 is a key business tool. It is used to manage work flow, exchange information about projects, to make decisions and share ideas and opinions. The content of could be a business record, and therefore needs to be managed as such. s could be disclosed as part of a Freedom of Information request and could be used in the context of a tribunal or investigation. 9.2 Use of is used for a range of activities and the content can include: Decision-making Agreements to proceed Accepting responsibility Work instructions Work Communications Personal communications Corporate administration Corporate social communications All staff should ensure that they do not create content in which could be construed as libellous or offensive. Appropriate language must be used at all time and content should be proportionate, professional and measured Where s are business records, they must be saved to the relevant folders in the file structure Personal s should be marked as such and should be deleted or moved to a folder called personal s should only be sent to the whole of the Legacy Corporation following approval by the Communications Team Links to documents should be sent, rather than attachments, wherever possible The relevant protective markings should be used where necessary. 10 Information Management Reporting 10.1 Overview The Legacy Corporation is committed to understanding the scope, volume, accuracy and reliability of its information resources. It will record and monitor a range of indicators relating to its data and information, including Freedom of Information requests, subject access requests, and information security incidents. It will record information asset owners and maintain a publication scheme to show the main classes of data it holds. It will maintain a retention and disposal schedule and keep accurate records of its records management processes, including transfer and disposal Information Asset Register The Information Asset Register will be used to record all of the data sets and information systems held by the Legacy Corporation. It will include details of the owner of the data set or information system, the content, the level of protective marking and details of personal data which is being held LLDC Information Management Policy v1.1 Page 19 of 22

20 10.3 Finance and Corporate Services Risk Register The Finance and Corporate Services Risk Register will be used to record and monitor information risks Annual Information Governance Report The Information Services Team will produce an annual information governance report for circulation to the Legacy Corporation and for publication. This will include: details of the policy framework for information management number of FOI, EIR and subject access requests volume of paper in storage information security incidents and their resolution. 11 Training 11.1 Information Security Induction All staff will receive information security induction. This will be refreshed on an annual basis Other training will be organised and delivered on a regular basis IT Induction All new starters will receive IT induction which will cover the key points of the Acceptable Use of IT Policy. This will enable new starters to clarify any points about the policy which they do not understand Information Management The Information Services Team will run regular sessions on all aspects of information management including management, retention and disposal, organising information into folders, data and information responsibilities The intranet will be used to promote and publish online training materials and resources. 12 Review and Monitoring of the Policy 12.1 Review of Policy A full review of this policy will be carried out on an annual basis. However, throughout the course of each year, amendments will be made if necessary to reflect changes in legislation and regulations and changing business requirements Monitoring The policy will be tested on a regular basis to make sure that the rules and guidelines are being followed. This will include the testing of specific procedures LLDC Information Management Policy v1.1 Page 20 of 22

21 such as the use of encryption, user rights, password control and the use of portable media Any breaches of the policy will be recorded in the information security risk register. LLDC Information Management Policy v1.1 Page 21 of 22

22 Appendix 1 Definitions Data the individual words or numbers which are used to measure quantities or to express characteristics of physical objects, people, places or time. Information data that has been organised so that it has meaning, context and structure. Information is the use of data to communicate a message or produce an outcome or change. Knowledge the use of information which has been aggregated from different sources and where the use is based on experience. Information Resources the physical holders of data and information. This includes electronic and paper files, databases, web pages. Personnel in the context of this policy, personnel means any person who works for, or with the Legacy Corporation. This includes full-time and part-time employees, Board members, contractors, consultants, suppliers, agency staff, temporary staff and volunteers. Records evidence of a decision or an activity. There are legal obligations to keep records for specific lengths of time, depending on their content. The Legacy Corporation generates business records such as decisions made, agreements, commitment to meet obligations, histories of projects and deliverables LLDC Information Management Policy v1.1 Page 22 of 22

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

OFFICIAL. NCC Records Management and Disposal Policy

OFFICIAL. NCC Records Management and Disposal Policy NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

Records Management - Department of Health

Records Management - Department of Health Policy Directive Records Management - Department of Health Document Number PD2009_057 Publication date 24-Sep-2009 Functional Sub group Corporate Administration - Records Ministry of Health, NSW 73 Miller

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

Life Cycle of Records

Life Cycle of Records Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible

More information

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

School Information Security Policy

School Information Security Policy School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...

More information

Information Governance Management Framework

Information Governance Management Framework Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective.

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective. Good Practice Audit outcomes analysis Police Forces April 2013 to April 2014 This report is based on the final audit reports the ICO completed in the Criminal Justice sector, specifically of Police forces,

More information

How To Ensure Information Security In Nhs.Org.Uk

How To Ensure Information Security In Nhs.Org.Uk Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011) Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How

More information

INFORMATION RISK MANAGEMENT POLICY

INFORMATION RISK MANAGEMENT POLICY INFORMATION RISK MANAGEMENT POLICY DOCUMENT CONTROL: Version: 1 Ratified by: Steering Group / Risk Management Sub Group Date ratified: 21 November 2012 Name of originator/author: Manager Name of responsible

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

ENISA s ten security awareness good practices July 09

ENISA s ten security awareness good practices July 09 July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

Data Security Policy

Data Security Policy Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:

More information

Information security policy

Information security policy Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current

More information

Network Security Policy

Network Security Policy Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Mapping the Technical Dependencies of Information Assets

Mapping the Technical Dependencies of Information Assets Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

West Dunbartonshire Council. Follow-up data protection audit report

West Dunbartonshire Council. Follow-up data protection audit report West Dunbartonshire Council Follow-up data protection audit report Auditors: Lee Taylor (Audit Team Manager) Jonathan Kay (Engagement Lead Auditor) Data controller contacts: Michael Butler (Data Protection/Information

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure

More information

Information governance strategy 2014-16

Information governance strategy 2014-16 Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

Corporate Policy and Strategy Committee

Corporate Policy and Strategy Committee Corporate Policy and Strategy Committee 10am, Tuesday, 30 September 2014 Information Governance Policies Item number Report number Executive/routine Wards All Executive summary Information is a key asset

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise

More information

Information Governance Policy A council-wide information management policy. Version 1.0 June 2013

Information Governance Policy A council-wide information management policy. Version 1.0 June 2013 Information Governance Policy Version 1.0 June 2013 Copyright Notification Copyright London Borough of Islington 2012 This document is distributed under the Creative Commons Attribution 2.5 license. This

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

INFORMATION GOVERNANCE POLICY & FRAMEWORK

INFORMATION GOVERNANCE POLICY & FRAMEWORK INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger

More information

Information Management Policy

Information Management Policy Title Information Management Policy Document ID Director Mark Reynolds Status FINAL Owner Neil McCrirrick Version 1.0 Author Deborah Raven Version Date 26 January 2011 Information Management Policy Crown

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Records Retention and Disposal Schedule. Information Management

Records Retention and Disposal Schedule. Information Management Records Retention and Disposal Schedule Information Management Version control Version Author Policy Approved By Approval Date Publication Date Review Due V 1.0 Information Governance Unit Philip Jones,

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date

More information

Information Governance and Assurance Framework Version 1.0

Information Governance and Assurance Framework Version 1.0 Information Governance and Assurance Framework Version 1.0 Page 1 of 19 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: Meridio Location: Approval Body: Policy and Guidance

More information

Records Management Policy & Guidance

Records Management Policy & Guidance Records Management Policy & Guidance COMMERCIALISM Document Control Document Details Author Nigel Spencer Company Name The Crown Estate Department Name Information Services Document Name Records Management

More information

University of Sunderland Business Assurance Over-arching Information Governance Policy

University of Sunderland Business Assurance Over-arching Information Governance Policy University of Sunderland Business Assurance Over-arching Information Governance Policy Document Classification: Public Policy Reference Central Register IG001 Policy Reference Faculty / Service IG 001

More information

This policy outlines different requirements for the use of PSDs based on the classification of information.

This policy outlines different requirements for the use of PSDs based on the classification of information. POLICY OFFICE OF THE INFORMATION COMMISSIONER Use of portable storage devices 1. Purpose A Portable Storage Device (PSD) is a mobile device capable of storing and transferring digital information. Examples

More information

Records Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy...

Records Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy... Council Policy Records Management Table of Contents Table of Contents... 1 Policy... 2 Policy Objectives... 2 Policy Statement... 2 Records Management Program... 2 Accountability Requirements... 3 General

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework Putting Barnsley People First Barnsley Clinical Commissioning Group Information Governance Policy and Management Framework Version: 1.1 Approved By: Governing Body Date Approved: 16 January 2014 Name of

More information

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 This report and the work connected therewith are subject to the Terms and Conditions of the contract dated 18/06/07 between South

More information

(Joint) Information Management Strategy 2014-2017. April 2014

(Joint) Information Management Strategy 2014-2017. April 2014 49 (Joint) Information Management Strategy 2014-2017 April 2014 49 50 CONTROL SHEET FOR: (Joint) Information Management Strategy Strategy Details Comments / Confirmation (Joint) Information Management

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

Information Security and Governance Policy

Information Security and Governance Policy Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2

Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2 Information security and paper-based data storage and disposal NOT PROTECTIVELY MARKED INFORMATION SECURITY POLICY Version 2.2 Title Subject Version Date Author Protective Marking Classification INFORMATION

More information

Information Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy

Information Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that

More information

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Name: Position held: Company Name: Is your organisation ISO27001 accredited: Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:

More information