SECURITY POLICY REMOTE WORKING
|
|
|
- Jason Daniels
- 9 years ago
- Views:
Transcription
1 ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices at any time (also known as remote working). Its aim is to protect residents, service users, and the Council. The policy applies to every type of remote working, covering both the remote use of electronic devices and paper documents. Policy Statement The Council will provide training and communications and ensure everyone working on Council business from outside of Council offices is aware of their responsibilities. Remote workers must comply with the policy and complete any required security training so that they are equipped to work outside of Council offices in a secure manner in compliance with the Data Protection Act The Council may at any time, and without notice, request a software and hardware audit, and ask permission to have access to, or remove, any Council owned electronic equipment used for remote working. Not covered by the Policy Additional security measures needed when accessing the Government IT Network are not included in this policy. They are described in the Remote Working Access to Government Data Policy. Those Affected by the Policy This policy applies to Councillors, employees of the Council, contractors, agency workers, and others working in a similar capacity. It applies to volunteers and partner organisations or individuals who have a need to access Council information. The policy does not cover work done by external consultants who independently use their own IT technology and information assets. Their Data Protection Act 1998 and information protection obligations must be stated in their Council work contract. Roles and Responsibilities 1. Directors, Heads of Service, Service Leads and Managers Approve requests for remote working, and ensure staff are trained and aware of the policy rules. 2. Remote Workers are responsible for: (a) submitting requests to their Council manager to authorise remote working and the use of IT facilities and information, (b) their compliance with the policy, and (c) providing access to Council equipment or information requested by the Council or its agents after a security breach or concern. 3. The Council IT Service is responsible for: (a) providing secure remote working hardware and software (b) providing remote IT network connection technology, and (c) providing advice, IT support, and monitoring compliance. Page 1 of 5 Next Review: December 2015
2 This may be delegated to an approved IT support service. Policy Compliance If you are found to have breached this policy by not complying with its rules and responsibilities you may be subject to the Council s disciplinary procedure or other action. If you are suspected of breaking the Law, you may be subject to prosecution. If you do not understand the policy or how it applies to you, seek advice from your Council manager or from the IT Security and Information Manager. Applying the Policy This section explains remote working responsibilities and the rules that apply. Authorisation Rule 1 Obtain management authorisation before working outside of Council offices. Get permission to utilise any electronic equipment, software or documents. Physical Security Rule 2 Do not take documents out of the office unless they will actually be used. Before taking legal documents out get approval from your Council manager. Rule 3 Rule 4 Rule 5 Rule 6 Rule 7 Rule 8 Be vigilant and protect Council equipment and documents when walking, when travelling on public transport, or by any other means of transport. Make sure your Council portable computer is kept separate from other Council documents, notebooks, USB memory sticks, or mobile phones when working remotely. Make sure that physical security tokens and portable computer media are kept physically separate from related computer equipment at all times. Protect Council IT equipment and documents outside of Council offices. When not in use they must be kept out of sight, or locked away if possible. When staying in hotels or other accommodation keep Council IT equipment, computer media or paper-based information protected. Use complimentary hotel security facilities if available. Any theft or loss of equipment or information must be reported to: (a) The Police if theft is suspected, and a Crime Reference Number obtained. (b) The Council s phone provider 24x7 emergency number if a phone is involved. (c) The Council manager responsible. (d) The IT Service Desk if equipment needs to be de-activated. (e) The IT Security and Information Manager by submitting a security incident. Other precautions can help to reduce the risk of theft or unauthorised access. These are offered as guidance, but are not mandatory. If Council services decide to adopt any of them they must provide appropriate support for their staff and other workers. (i) Keep bags used to carry equipment or documents locked when out of the office. A small suitcase lock is sufficient. (ii) Disguise laptops by using ordinary bags rather than laptop bags or briefcases. (iii) If possible store Council equipment and information upstairs when not at home. Page 2 of 5 Next Review: December 2015
3 (iv) When you leave your home keep Council electronic equipment and documents out of sight and not visible through windows or doors. Unauthorised Access Remote workers are responsible for preventing unauthorised access to Council equipment or information, whether electronically or on paper. Rule 9 No family members or other unauthorised persons may be given access to Council IT equipment, information or documents. Remote Storage of Data and Use of Rule 10 Council data must be stored on the Council IT network unless there is no alternative. Management authorisation must be obtained before any data is stored outside this network, e.g. stored on the Internet, on a portable electronic device, on a computer disk drive, or on portable computer media. Rule 11 Council data must not be ed to an external personal or business address, unless there are exceptional circumstances. The IT Security and Information Manager must authorise any exceptional circumstances arising from rules 10 and 11. Rule 12 Personal or sensitive personal data stored on a computer disk drive outside the Council IT network must be encrypted and access protected by a strong password. Remote Use of Paper Rule 13 Do not print information outside Council offices unless absolutely necessary. Do not leave printed Council information where it can be read by others. Rule 14 Paper documents containing personal or sensitive data must be disposed of by either (a) by using a cross-cut shredder, or (b) by returning them to the office and using the Council s confidential waste paper disposal service. Remote Access to IT Equipment Remote workers must accept responsibility for use of any accounts used to conduct Council business, and for any other access made to Council IT services. Rule 15 Protect your Council log on user identifiers, passwords, access tokens, or other access mechanisms. Never share or disclose your Council user identifier and password with anyone else. Never use anyone else s user identifier and password to gain access to Council IT facilities. Rule 16 Switch off or log off any IT equipment used remotely when it is not in use or left unattended. Technical Security Rule 17 Remote IT equipment must be connected to the Council IT network by an approved technical connection. The options are: (a) through a dedicated Council broadband line (b) through a mobile telephone connection operating on Council IT equipment (c) through a Virtual Private Network link (d) by using a non-council computer through an encrypted Internet link into the Page 3 of 5 Next Review: December 2015
4 Council IT network. Non-Council computers may only be used if protected by reputable anti-virus software receiving regular anti-virus definition updates. Reputable anti-virus software can be obtained free of charge from Microsoft and some other suppliers. It is permissible to use an existing home broadband link to access the Council IT network if it is set up securely (see the guidance in the Council s Use of Wireless Communications Security Policy). Rule 18 Access to the Internet from Council owned IT equipment should only be allowed via the Council IT network, and not directly. Rule 19 Remote workers must not install or update any hardware, software or make other changes to Council computers and electronic equipment. These changes must be carried out by the IT Service or authorised support staff. Rule 20 Council IT equipment should be connected to the IT network or Internet regularly to ensure the latest anti-virus definitions are obtained. Rule 21 Remote workers are responsible for the technical protection of the computers they use for Council business. This includes, but is not limited to, the acceptance of regular operating system patches, other software security updates, and receipt of regular anti-virus definition updates. Rule 22 If you suspect a virus infection on a Council-owned computer when working remotely you must report it as soon as possible to the IT Service Desk, or to an alternative approved IT support service. You must also inform your Council manager and submit a Security Incident Report. Failure to report a virus will be considered a serious breach of this policy. Remote Working outside of the UK IT or telephony services accessed from outside the United Kingdom (including Internet access) have significantly higher security risks. Rule 23 Written authorisation must be obtained from a Director or Head of Service before taking Council portable electronic devices outside the UK. Rule 24 Council personal or sensitive personal data must not be accessed through IT or telephony services from outside the United Kingdom. Policy Training Online policy training and knowledge testing will be offered whenever possible. Related Policies and Procedures Government GCSx IT Acceptable Usage Policy Health, Safety and Lone Working Guidance documents Remote Working Access to Government Data Policy Security Incident Reporting Policy Storage of Information Policy Supplier and Third Party IT Acceptable Usage Policy Use of Wireless Communications Policy Page 4 of 5 Next Review: December 2015
5 Related Documents and Other Information CESG Good Practice Guide 10 Remote Working Related Legal and Regulatory Obligations Data Protection Act 1998 Principle 7 - Appropriate technical and organisational measures should protect Personal Data. Information Security Management Standard ISO/IEC 27001:2005 Definitions Personal or Sensitive Information - Personal data is data relating to a living, identifiable individual. Sensitive data includes personal data and also any other data that may cause financial loss, distress, or reputation damage. Portable Electronic Device (PED) any piece of equipment that is portable and stored electronic data. This includes, but is not limited to laptops, tablet computers, handheld computers, cameras, Internet smart phone, and mobile phones. Encrypted data data that is scrambled by software using a mathematical formula to prevent it from being read by unauthorised persons. Page 5 of 5 Next Review: December 2015
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
Remote Access and Home Working Policy London Borough of Barnet
Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
Data and Information Security Policy
St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
PS177 Remote Working Policy
PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Portable Devices and Removable Media Acceptable Use Policy v1.0
Portable Devices and Removable Media Acceptable Use Policy v1.0 Organisation Title Creator Oxford Brookes University Portable Devices and Removable Media Acceptable Use Policy Information Security Working
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Ixion Group Policy & Procedure. Remote Working
Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
Remote Working and Portable Devices Policy
Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Acceptable Use Guidelines
Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:
Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011
Information Security Incident Protocol
Information Security Incident Protocol Document Owner Caroline Dodge Tel: 01622-221652 [email protected] Version Version 2: July 2013 Contents 1. Protocol Objectives 2. Scope 3. Protocol Statement
Data Transfer Policy. Data Transfer Policy London Borough of Barnet
Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).
Merthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
Enterprise Information Security Procedures
GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3
HR Guide: Agile Working Version: 1.0
HR Guide: Agile Working Version: 1.0 Contents Section 1 Introduction to Agile Working Section 2 What are the Aims of Agile Working Section 3 Can all employees undertake Agile Working? Section 4 How do
Mobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Network Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY. Processing Electronic Card Payments
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY Processing Electronic Card Payments Introduction and Policy Aim The Payment Card Industry Data Security Standard (PCI-DSS) is a worldwide information
MOBILE DEVICE SECURITY POLICY
State of Illinois Department of Central Management Services MOBILE DEVICE SECURITY Effective: October 01, 2009 State of Illinois Department of Central Management Services Bureau of Communication and Computer
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)
Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How
U09 Remote Access Policy
Plymouth City Council U09 Remote Access Policy December 2008 This document is copyright to Plymouth City Council and should not be used or adapted for any purpose without the agreement of the Council.
INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY
Information Management & Technology Security Policy INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY POLICY NO IM&T 003 DATE RATIFIED October 2010 NEXT REVIEW DATE October 2013 POLICY STATEMENT/KEY
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
INFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy
School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment
Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_00161706 Effective 2.0 1 of 7 Title: Corporate Information Technology Usage Policy
Policy LDMS_001_00161706 Effective 2.0 1 of 7 AstraZeneca Owner Smoley, David Authors Buckwalter, Peter (MedImmune) Approvals Approval Reason Approver Date Reviewer Approval Buckwalter, Peter (MedImmune)
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Data Protection Procedures
Data Protection Procedures PROCEDURE OVERVIEW: This Procedure outlines Down District Council s ( the Council ) commitment to the Data Protection Act 1998 ( the Act ) and provides a framework for the Council
Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device)
Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device) Policy Number: 422 Supersedes: - Standards For Healthcare Services No/s 1, 5, 19 New Version Date Of Reviewer Completed Date
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Don t Let A Security Breach Put You Out of Business
Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device
Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy
Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy Computer Security Policy Contents 1 Scope... 3 2 Governance... 3 3 Physical Security... 3 3.1 Servers... 3 3.2
