Information Security Policy

Size: px
Start display at page:

Download "Information Security Policy"

Transcription

1 Information Security Policy Abu Dhabi Government Version 2.0

2 This document is developed by:

3 Information Security Policy Abu Dhabi Government Version 2.0

4

5 H.H. Sheikh Khalifa Bin Zayed Al Nahyan President of the United Arab Emirates - Ruler of Abu Dhabi

6

7 H.H. General Sheikh Mohamed Bin Zayed Al Nahyan Crown Prince of Abu Dhabi - Deputy Supreme Commander of the UAE Armed Forces Chairman of Executive Council - Abu Dhabi

8

9 With the issuance of the 2nd version of the Information Security Policy, Abu Dhabi marks a new milestone of technology development, seeking the promotion of various work scopes across all sectors; in line with the high performance-based E-Government vision which provides internationally standardized services for all its users. Abu Dhabi government has attached great importance to utilizing cutting edge technology in developing and enhancing the quality of public services, and hence facilitating the overall process for users. The emirate has achieved a remarkable progress in this area; the use and sharing of electronic information have become essential practices within all government entities. Such irreversible progress necessitated the establishment of a system to ensure the confidentiality, availability and integrity of government information, which ensued in the issuance of the 1st version of Information Security Policy in The 2nd version is the fruit of an ongoing process of revision and updating of information security standards. The aim is to reflect the government s constant commitment to ensuring full protection of Abu Dhabi Government s information, along with keeping abreast of the rapid changes and development in the field of information technology. The Information Security Policy is a pivotal part of the Abu Dhabi E-Government strategy, as it aims at supporting both the design and coordination of services, as well as providing secure government information through effective policies and standards. The Policy also oversees practices of information security in government entities, and ensures that access to information systems and their sources is controlled. Moreover, the Policy constitutes a holistic framework that includes information security, both within and beyond the electronic system range. Thus, such document sets out the standards and requirements to be implemented for information security and protection. As the managing entity of the Policy, the Abu Dhabi System and Information Center will oversee the appropriate implementation of such program in order to achieve the desired objectives. All government entities are to incorporate information security as an integral part in their operational processes and activities, and ensure that security and risk related procedures are indispensable drivers of decision-making policies in this regards. We wish our endeavours will meet with success, so we can contribute to Abu Dhabi s progress and prosperity, under the wise leadership of His Highness Sheikh Khalifa bin Zayed Al Nahyan, President of the United Arab Emirates, and His Highness General Sheikh Mohamed bin Zayed Al Nahyan, Crown Prince of Abu Dhabi, Deputy Supreme Commander of the UAE Armed Forces and Chairman of the Abu Dhabi Executive Council. Dr. Ahmed Mubarak Al Mazrouei Secretary-General of the Executive Council

10

11 Document Configuration Control Version Release Date Summary of Changes Release Approval November 2008 First Draft GSEC January 2013 New version reflecting revision to security domains GSEC A review and update of this document will take place when changes require revising the Information Security Policy. Such modifications may relate to changes in roles and responsibilities, release of new legislation or technical guidance or the identification of a new policy area. The General Secretariat of the Abu Dhabi Executive Council, in consultation with appropriate parties, will approve all revisions to this Information Security Policy. When approved, a new version of the Information Security Policy will be issued, and all affected Abu Dhabi personnel will be informed of the changes. This document should be distributed to: Title Format Heads of All Abu Dhabi Electronic copy; hard copy Government Entities This document should be stored: Location Format Owner Abu Dhabi Portal Electronic copy ADSIC ADSIC Website and Office Electronic copy; hard copy ADSIC This document affects the following persons: Group All Abu Dhabi Government Entity personnel, contractors, and third party individuals directly or indirectly involved in the provision government services.

12

13 Contents Definitions CHAPTER 1 Introduction 1.1 Purpose 1.2 Scope 1.3 Compliance and Enforcement 1.4 Authorities CHAPTER 2 Information Security Domains 2.1 Information Security Governance 2.2 Information Security Risk Management 2.3 Human Resources Security 2.4 Third Party Supplier Security 2.5 Information Security Training, Awareness and Communication 2.6 Information Asset Management 2.7 Physical and Environmental Security 2.8 Information Systems Design, Development and Testing 2.9 Identity and Access Management 2.10 Information Systems Operations Management 2.11 Information Security Incident Management 2.12 Information Systems Continuity Management CHAPTER 3 Roles and Responsibilities 3.1 The General Secretariat of Abu Dhabi Executive Council 3.2 Abu Dhabi Systems & Information Centre (ADSIC) 3.3 Abu Dhabi Information Security Working Group (AD-ISWG) 3.4 Abu Dhabi Government Entities (ADGEs)

14

15 Definitions

16 Definitions Information asset Emirate Information Security Information Security Programme Information Technology Threat Availability Vulnerability Abu Dhabi Government Entities Information Security Incident Privacy Any knowledge or data, whether tangible or intangible, that has a value to the organisation, such as information or information systems. The Emirate of Abu Dhabi. Protection of information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity, availability, authentication and non-repudiation. A prioritised structuring and deployment of resources in order to achieve a defined set of Information Security capabilities. Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data. A potential cause of an unwanted incident, which may result in harm to a system or organization. Ensuring timely and reliable access to, and use of, information. A weakness within an asset, or group of assets, that can be exploited by one or more threats to manifest a risk. Any Abu Dhabi Government department, agency, institution, authority, board, centre or wholly-owned company or subsidiary; whether its budget falls within the general budget of the government or is independent of it. A single or series of unwanted or unexpected Information Security events that have a significant probability of compromising business operations or threatening Information Security. The protection of personal data that are being processed and/or stored by the Abu Dhabi government entities. 2 Information Security Policy

17 Definitions Confidentiality Integrity Chief Information Security Officer (CISO) Information Security Governance Committee (ISGC) Third Party Information Security Domains The act of preserving authorised restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. The act of guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. The Entity representative with day-to-day responsibility for managing the Entity s Information Security Programme. The CISO works on behalf of the Information Security Governance Committee in ensuring that the organisation s Information Security objectives are met. Depending upon the size of the organisation, its business processes and risk profile, the CISO role may be either full or part-time and may be augmented with additional information security personnel, as judged necessary by the Entity. The decision-making and resource allocation body with primary accountability for ensuring the Entity s Information Security programme is adequately designed, resourced, monitored and is appropriately aligned with other relevant initiatives. The ISGC should be composed of executive-level representatives equipped to provide sponsorship of the Entity s Information Security programme and will provide oversight of the work of the Chief Information Security Officer and any supporting security organisation. An individual or organisation that is recognised as being independent of the parties involved. In the context of these Standards, the term third party will normally refer to third-party (i.e. external) suppliers, unless otherwise stated. Management and functional domains that are grouped into 12 specific families (e.g. Information Security Governance, Information asset Management etc.) in order to provide the foundation for a comprehensive Information Security Programme. 3

18 Abu Dhabi Information Security Working Group (AD-ISGC) Risk An information sharing body led by the Abu Dhabi Systems and Information Centre and composed of Chief Information Security Officers of Abu Dhabi Government Entities. The AD-ISGC provides a forum for two-way communication on Information Security matters of relevance and applicability across multiple Abu Dhabi Government Entities. The AD-ISGC provides Entities with a mechanism for proposing improvements to Information Security capabilities across the government of Abu Dhabi. Exposure to danger, harm or loss that may be encountered when vulnerability is exploited by a threat. The level of impact on entity services, information assets, or individuals resulting from the potential consequences of a threat and the likelihood of that threat occurring. ADSIC Production Information System Abu Dhabi Systems and Information Centre, established pursuant to Abu Dhabi Law No.18 of Information systems transition through a lifecycle of: i) Design ii) Development iii) Testing iv) Production and v) Retirement/Replacement. Information systems will have Production status when being used to access, modify, transmit or store the entity s business records. Controls The application of people, process and/or technology in support of transacting business and managing risk. Controls can be technical or managerial in nature. Control Standards, as defined within the Abu Dhabi Information Security Standards, provide definition of control categories and types expected to be implemented by Abu Dhabi Government Entities. Information Any communication or representation of knowledge such as facts, data or opinions in any medium or form; including textual, numerical, graphic, cartographic, narrative, audio or visual forms. 4 Information Security Policy

19 Definitions Authorising Official Information System Recovery Point Objective (RPO) Recovery Time Objective (RTO) Individual who has the ultimate responsibility to accredit all Government services. This individual accepts responsibility for the security of the service and accountability for any adverse impacts to the entity if a breach of security occurs. A discrete set of information resources organised for the collection, processing, maintenance, use, sharing, dissemination or disposal of information, including manual processes or automated processes. This includes information systems used by an entity either directly or used by another entity, or a contractor under a contract with the entity that: (i) requires the use of such information systems; or (ii) requires the use, to significant extent, of such information systems in the performance of a service or the furnishing of a product. Information systems may generate outputs that are electronic and/or paper-based. The maximum tolerable period in which data might be lost. The maximum tolerable outage that can be accepted on an information system. 5

20

21 CHAPTER 1 Introduction

22 Introduction 1.1 Purpose The Information Security Policy is considered the primary reference for Abu Dhabi Government Information Security. The purpose of this Information Security Policy is to confirm what must be done to secure the Government of Abu Dhabi s information assets. In this respect, the Policy is supported by the Abu Dhabi Information Security Standards. Secondly, the Information Security Policy assigns ownership and accountability for meeting these Information Security requirements by delineating specific organisations that have a key role to play in meeting the government s Information Security objectives. Fulfilling both of these objectives will enable Abu Dhabi to implement a robust Government-wide Information Security capability. This Information Security Policy is supported by a series of accompanying publications including the Abu Dhabi Information Security Standards, along with associated guides, templates and checklists. 1.2 Scope This Information Security Policy is informed by a holistic view of Information Security, not solely focusing Information Technology security. Therefore, the document addresses the security of information within Information Technology systems and also information that resides outside of Information Technology systems forming an overarching information system. To comprehensively address the various security risks, this policy defines requirements for ensuring that critical Government information is secure, regardless of the medium in which the information resides. These Information Security requirements are structured in twelve (12) control groupings, herein referred to as Information Security Domains. These are as shown below. Security Domain Name Information Security Governance Information Security Risk Management Human Resource Security 8 Information Security Policy

23 Introduction Third Party Supplier Security Information Security Training, Awareness and Communication Information Asset Management Physical and Environmental Security Information Systems Design, Development & Testing Identity & Access Management Information Systems Operations Management Information Security Incident Management Information Systems Continuity Management The success of the Information Security programme depends upon the collaboration between local government entities and concerned federal government entities. Abu Dhabi Systems & Information Centre (ADSIC) will coordinate the overarching framework, strategy, and standards-setting, and will support to execute the necessary government-wide controls needed to assist Entities in implementing their Information Security programmes. Ultimately, Entities are responsible for implementing the appropriate risk-based security controls to protect the information under their respective cognizance. Information Security Governance and Risk Management are the foundation of the Information Security Programme. These disciplines require that entities protect Government information assets in a manner commensurate with: 1. Compliance obligations 2. Specific risks that apply to the information assets 3. Business requirements for service or system The magnitude of harm that could result from the loss, misuse, unauthorised access to, or modification of such information should inform management decision making. All Government information requires some level of protection, however, certain information, because of its sensitivity, requires special management oversight. The determination of appropriate security controls and applicability of this special management oversight is determined through the classification of information and the three criteria types defined above. 9

24 1.3 Compliance and Enforcement Compliance with this Information Security Policy is mandatory. All Abu Dhabi Government Entities must comply with the roles, responsibilities, and security policies statements set forth in this document to ensure the confidentiality, integrity, and availability of Government information. Further, Abu Dhabi Government Entities must ensure that suppliers engaged by them adhere to the applicable obligations of this Policy and its supporting Information Security Standards. Abu Dhabi Government Information Systems that fail to comply with this policy may not be allowed to process Government information or connect to other Government systems. Enforcement and monitoring of this policy is the responsibility of each Entity s Information Security Governance Committee and Chief Information Security Officer. 1.4 Authorities This Information Security Policy defines mandatory requirements for protecting information. It is issued in accordance with: Article 24 of U.A.E Federal Law No. 1 of 2006 concerning Electronic Transactions & Commerce, which provides for Government to specify appropriate control processes and procedures to ensure the confidentiality, integrity, and availability of electronic records, payments and fees. Federal Law No. 5 of 2012 on combating cyber crimes, which establishes the definition of cyber crimes and associated penalties. Abu Dhabi Government Policy Agenda Information Security Policy

25 Introduction 11

26

27 CHAPTER 2 Information Security Domains

28 It is the intention of the Abu Dhabi Government to protect its information assets in a manner appropriate to the value of those information assets and the potential harm that could be caused as a consequence of loss, misuse, unauthorised access to, or unauthorised modification of, these assets. The Abu Dhabi Government has put in place this Information Security Policy as a mechanism to provide direction regarding the protection and stewardship of its information assets. Usage, storage, transmission and management of those information assets must be undertaken in a manner conformant with this Policy. To provide assurance that appropriate confidentiality, integrity, and availability provisions exist for government information assets and to ensure the effectiveness of information security programmes in the government entities, this Information Security Policy was organised into twelve Information Security domains as follows: 14 Information Security Policy

29 Information Security Domains 2.1 Information Security Governance Abu Dhabi Government Entities shall implement Information Security governance provisions to provide direction and oversight to their Information Security programmes. These programmes will be aligned to the requirements of this Policy and the Abu Dhabi Information Security Standards. These requirements include: 1. Entities shall set and review measurable objectives for their Information Security programmes and make sufficient budgetary provisions to achieve those objectives. Programme objectives should have a primary focus upon addressing areas of most significant risk, achieving compliance obligations and address business needs in a secure manner. 2. Entities shall ensure that suitable resourcing is provided for the organisation s Information Security programme to be transacted. Entities shall appoint a Chief Information Security Officer (CISO) to undertake day-to-day management of the Information Security programme, supported as necessary by additional security-related roles. 3. Entities shall constitute an Information Security Governance Committee (ISGC) to provide executive-level oversight for the Entity s Information Security Programme. 2.2 Information Security Risk Management Abu Dhabi Government Entities shall apply the Abu Dhabi Information Security Risk Management process in identifying, analysing, responding to and monitoring the most significant Information Security-related risks that the Entity faces. Entities shall be responsible for applying appropriate responses to the most significant risks having a bearing upon their Information Security posture. The responses should be aligned to the Control Standards found within the Abu Dhabi Information Security Standards. 15

30 2.3 Human Resources Security Abu Dhabi Government Entities shall implement work design and working practices that provide for personnel with secure access to government information assets. Entities shall make provision for an appropriate segregation of duties, as determined by risk assessment. Before access is granted to Abu Dhabi Government information assets, Entities shall ensure that personnel have been screened by appropriate authorities. Entities shall ensure that personnel have the required information, training, skills, awareness and competencies to process Government information in a manner appropriate to the information s classification. 2.4 Third Party Supplier Security Abu Dhabi Government Entities shall engage and manage third-party suppliers in a manner supportive of the goals and initiatives of the entity s Information Security programme. Third party suppliers with involvement in the creation, usage, storage, transmission or destruction of Abu Dhabi government data should ensure that they understand the Information Security obligations imposed upon them by the engaging Abu Dhabi Government Entity and by the Abu Dhabi Information Security Programme. 2.5 Information Security Training, Awareness and Communication Abu Dhabi Government Entities shall provide the users of their information assets with training and awareness appropriate to the roles undertaken by those users. Entities shall ensure that the benefits and obligations of their Information Security programmes are actively promoted, with the view to building awareness of, and engagement with, the entity s Information Security objectives. 16 Information Security Policy

31 Information Security Domains 2.6 Information Asset Management Abu Dhabi Government Entities shall identify and manage their information assets (including information systems). Records shall be kept regarding the purpose, location, ownership and usage of those information assets. Information assets shall be classified in accordance with the Abu Dhabi Information Classification framework. Information assets (both physical and logical) should have appropriate labelling applied to clearly communicate their information classification. 2.7 Physical and Environmental Security Abu Dhabi Government Entities shall provide protection to facilities used in the creation and management of information assets. The protections deployed shall: 1. Ensure critical or sensitive information processing facilities are physically protected from unauthorised access, damage, and interference; and 2. Equipment will be protected from physical and environmental threats. 2.8 Information Systems Design, Development and Testing Abu Dhabi Government Entities shall ensure that information systems and Information Security controls are designed, developed, implemented and tested in a manner aligned to achieving defined, specific Information Security requirements. The entity s employees, contractors and third party organisations with access to sensitive information or systems shall adhere to this process in order to ensure: 1. Business requirements of new systems or enhancements specify security control requirements; 2. Systems and associated controls are designed, developed, implemented and tested against those requirements. 17

32 2.9 Identity and Access Management Abu Dhabi Government Entities shall ensure that access to information systems and information assets in other forms is controlled. Users of information systems and information processing facilities shall be appropriately authenticated, with access and privileges granted on the basis of a verified business need. Entities shall be responsible for monitoring access for appropriate usage and revoking access when no longer required, or when deemed no longer appropriate. Users of information systems and information processing facilities shall be informed as to their obligations and responsibilities for Information Security Information Systems Operations Management Abu Dhabi Government Entities shall ensure that: 1. Processes, technologies and facilities are in place to support the management of information systems while in production. 2. Information systems shall be monitored, against an agreed Information Security baseline, for performance and compliance with the Entity s Information Security Policy. 3. Key information relating to information system activities shall be logged for future use. 4. Information systems shall be subject to regular data back-up and media shall be handled securely. 18 Information Security Policy

33 Information Security Domains 2.11 Information Security Incident Management Abu Dhabi Government Entities shall ensure Information Security-related incidents are identified, contained, managed and recovered from in a timely and effective manner. Entities shall ensure that potential incidents are anticipated and planning is undertaken to ensure an appropriate incident response can be mobilised when required. Significant incidents should be reported to ADSIC for appropriate support to be rendered to the Entity and to facilitate cross-governmental information sharing Information Systems Continuity Management Abu Dhabi Government Entities shall ensure that information systems and information processing facilities remain accessible for authorised use based on the business requirement. Entities shall develop resource and test an Information Systems Continuity Management Plan. For each information system a Recovery Point Objective (RPO) and Recovery Time Objective (RPO) shall be defined. Continuity planning shall seek to ensure that the agreed RPO and RTO targets can consistently be met, under a range of potential operational and exceptional circumstances. The Information System Continuity Management should be aligned with Business Continuity Management for the entity, where the latter exists. 19

34

35 CHAPTER 3 Roles & Responsibilities

36 This policy was developed in coordination with a number of Abu Dhabi Governments Entities and in coordination with strategic partners i.e. local and federal UAE Government entities, is required. To ensure the objectives of this policy is met and to achieve increased efficiency and effectiveness in implementation of Information Security, General Secretariat Executive Council (GSEC), Abu Dhabi Systems and Information Centre (ADSIC), Abu Dhabi Information Security Working Group (AD-ISWG) and all Abu Dhabi Government Entities (ADGE) will have defined roles and responsibilities to implement this policy. 22 Information Security Policy

37 Roles & Responsibilities 3.1 The General Secretariat of Abu Dhabi Executive Council The Executive Council shall provide strategic leadership and sponsorship for Information Security across the Government of Abu Dhabi. The Executive Council provides authority to the Abu Dhabi Systems and Information Centre (ADSIC) to manage the Government s Information Security framework. It requires all Government Entities to adhere to this Policy and the Abu Dhabi Information Security Standards. 3.2 Abu Dhabi Systems & Information Centre (ADSIC) The Abu Dhabi Systems and Information Centre (ADSIC) shall provide leadership and strategic direction for the Information Security Programme. It shall develop the necessary policy, standards, and guidance to ensure Information Security is effectively implemented and maintained across Abu Dhabi. ADSIC shall be responsible for leading the Government-wide Abu Dhabi Information Security Programme. These responsibilities shall include, but not be limited to: Development of a pan-governmental Information Security implementation strategy. Development, publication, maintenance and revision of: - Abu Dhabi Government Information Security Policy (this document) - Abu Dhabi Government Information Security Standards - Supporting implementation guides Strategic coordination of the Information Security programme will be undertaken by ADSIC. It will involve Abu Dhabi Government Entities, strategic partners and other stakeholders in order to achieve the programme s objectives. Facilitating the activities of the Information Security Working Group. Designing and delivering Information Security-related training and awareness to Abu Dhabi Government Entities. 23

38 Developing and submitting a regular report to the Executive Council General Secretariat regarding the progress and strategic direction of the Information Security Programme. Furthermore, aggregation, consolidation and review of Information Security status reports from Abu Dhabi Government Entities. Communicating and escalating, as necessary, serious Information Security issues and concerns to the relevant entities. Undertaking assessments of Abu Dhabi Government Entities Information Security Programmes and the associated managerial controls. Undertaking assessment of Abu Dhabi Government Entities technical and information system-specific controls. Establishing and managing a Security Operations Centre (SOC) to monitor government systems and respond to incidents and events with possible direct, indirect or consequential impact on Abu Dhabi information assets. 3.3 Abu Dhabi Information Security Working Group (AD-ISWG) An information sharing body led by the Abu Dhabi Systems and Information Centre and composed of Chief Information Security Officers of Abu Dhabi Government Entities. The Working Group members shall be responsible for: Providing real-world feedback on implementation challenges and opportunities arising within Entities Information Security programmes. Receiving programme status updates from ADSIC and cascading key points within their own organisations. 24 Information Security Policy

39 Roles & Responsibilities Reviewing draft Information Security documents, ahead of their publication. Sharing best practice concepts with peers in other government Entities. The AD-ISWG will be a consultative and information exchange body. It will not be a decision-making body. 3.4 Abu Dhabi Government Entities (ADGEs) All Abu Dhabi Government Entities shall have the primary responsibility for ensuring that an Information Security programme is implemented and effective within their own organisations. They have explicit responsibility to protect government information assets within their custody. Abu Dhabi Government Entities shall: Appoint a Chief Information Security Officer (CISO) and a supporting Information Security organisation (as necessary, based on the organisation s size, complexity, service portfolio and risk profile). Constitute a regularly meeting Information Security Governance Committee to provide executive-level oversight of the Entity s Information Security programme and the work of the CISO. Publish, and verify conformance with, an entity-level Information Security Policy. Undertake a categorisation of the entity s information assets (including information systems) based on criticality and importance of those assets to the entity and to the government at large. Develop and resource an Information Security Programme Plan, which shall be subsidiary to the entity s Strategic Plan. 25

40 Roles & Responsibilities Implement a set of common controls in support of the Information Security Programme Plan. Implement a set of tailored controls, as necessary, for individual information systems. Develop and maintain a register for tracking and managing the most significant Information Security risks. Train information users and information system administrators in their Information Security responsibilities. Communicate relevant information about threat, vulnerabilities and programme status to relevant stakeholders. Support ADSIC in the process of testing and evaluation of the entity information security programme status and provide ADSIC with the requested inputs to achieve the objective of testing and evaluation. Regularly report status to ADSIC, against the Information Security Programme Plan s milestones and other key metrics. Build the required capabilities to monitor the information systems and manage Information Security incidents in the entity. 26 Information Security Policy

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Public Law 113 283 113th Congress An Act

Public Law 113 283 113th Congress An Act PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Standards for Security Categorization of Federal Information and Information Systems

Standards for Security Categorization of Federal Information and Information Systems FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology

More information

TITLE III INFORMATION SECURITY

TITLE III INFORMATION SECURITY H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7

TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7 PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255

More information

BPA Policy 434-1 Cyber Security Program

BPA Policy 434-1 Cyber Security Program B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)

More information

How To Assess A Critical Service Provider

How To Assess A Critical Service Provider Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions Principles for financial market infrastructures: Assessment methodology for the oversight

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

INFORMATION SECURITY PROCEDURES

INFORMATION SECURITY PROCEDURES INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures

More information

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee

More information

Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions

Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions Committee on Payment and Settlement Systems Board of the International Organization of Securities Commissions Consultative report Principles for financial market infrastructures: Assessment methodology

More information

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive

More information

Minimum Security Requirements for Federal Information and Information Systems

Minimum Security Requirements for Federal Information and Information Systems FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory

More information

Network Security: Policies and Guidelines for Effective Network Management

Network Security: Policies and Guidelines for Effective Network Management Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. jgkolo@gmail.com, usdauda@gmail.com

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...

More information

Business Continuity Management Standard and Guide

Business Continuity Management Standard and Guide Business Continuity Management Standard and Guide AE/HSC/NCEMA 7000: 2012 Version 1 His Highness Sheikh Khalifa Bin Zayed Al Nahyan President of the United Arab Emirates Chairman of the Supreme Council

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES... Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection

Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection Crime Statistics Data Security Standards Office of the Commissioner for Privacy and Data Protection 2015 Document details Security Classification Dissemination Limiting Marker Dissemination Instructions

More information

Practical Overview on responsibilities of Data Protection Officers. Security measures

Practical Overview on responsibilities of Data Protection Officers. Security measures Practical Overview on responsibilities of Data Protection Officers Security measures Manuel Villaseca Spanish Data Protection Agency mvl@agpd.es Security measures Agenda: The rol of DPO on security measures

More information

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Solihull Clinical Commissioning Group

Solihull Clinical Commissioning Group Solihull Clinical Commissioning Group Business Continuity Policy Version v1 Ratified by SMT Date ratified 24 February 2014 Name of originator / author CSU Corporate Services Review date Annual Target audience

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...

More information

Lancashire County Council Information Governance Framework

Lancashire County Council Information Governance Framework Appendix 'A' Lancashire County Council Information Governance Framework Introduction Information Governance provides a framework for bringing together all of the requirements, standards and best practice

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing

More information

Council Policy. Records & Information Management

Council Policy. Records & Information Management Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Data Governance Policy. Version 2.0 19 October 2015

Data Governance Policy. Version 2.0 19 October 2015 Version 2.0 19 October 2015 Document Title: Summary: Date of Issue: Status: Contact Officer: Applies To: References: This policy provides the Cancer Institute NSW with an instrument to formally manage

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2

More information

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.

NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/. Department of Commerce $ National Oceanic & Atmospheric Administration $ National Weather Service NATIONAL WEATHER SERVICE POLICY DIRECTIVE 80-3 October 28, 2009 Science and Technology SYSTEMS ENGINEERING

More information

Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines

Industry. Cyber Security. Information Sharing at the Technical Level. Guidelines NATO Communications and Information Agency (NCI Agency) - Industry Cyber Security Information Sharing at the Technical Level Guidelines Effective date: 28 March 2014 Revision No: Rev 1 Change History Revision

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

TELEFÓNICA UK LTD. Introduction to Security Policy

TELEFÓNICA UK LTD. Introduction to Security Policy TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Information Security Policy

Information Security Policy Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

Polish Financial Supervision Authority. Guidelines

Polish Financial Supervision Authority. Guidelines Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES A CONSULTATION REPORT OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS STANDING COMMITTEE 3 ON MARKET INTERMEDIARIES

More information

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2. Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

Management Standards for Information Security Measures for the Central Government Computer Systems

Management Standards for Information Security Measures for the Central Government Computer Systems Management Standards for Information Security Measures for the Central Government Computer Systems April 26, 2012 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...

More information

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES

More information

Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5

Section 37.1 Purpose... 1. Section 37.2 Background... 3. Section 37.3 Scope and Applicability... 4. Section 37.4 Policy... 5 CIOP CHAPTER 37 Departmental Cybersecurity Policy TABLE OF CONTENTS Section 37.1 Purpose... 1 Section 37.2 Background... 3 Section 37.3 Scope and Applicability... 4 Section 37.4 Policy... 5 Section 37.5

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective

More information

5 FAM 630 DATA MANAGEMENT POLICY

5 FAM 630 DATA MANAGEMENT POLICY 5 FAM 630 DATA MANAGEMENT POLICY (Office of Origin: IRM/BMP/OCA/GPC) 5 FAM 631 GENERAL POLICIES a. Data management incorporates the full spectrum of activities involved in handling data, including its

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact

More information

IT Security Risk Management: A Lifecycle Approach

IT Security Risk Management: A Lifecycle Approach Information Technology Security Guidance IT Security Risk Management: A Lifecycle Approach ITSG-33 November 2012 Foreword The of is an unclassified publication issued under the authority of the Chief,

More information

GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987

GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987 GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987 CONTENTS Page 1. Introduction 3-4 2. The Commission s Policy 5 3. Outsourcing

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version

More information

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1 APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and

More information

1.0 Policy Statement / Intentions (FOIA - Open)

1.0 Policy Statement / Intentions (FOIA - Open) Force Policy & Procedure Reference Number Business Continuity Management D269 Policy Version Date 23 July 2015 Review Date 23 July 2016 Policy Ownership Portfolio Holder Links or overlaps with other policies

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public Defence Security Manual DSM Part 2:41 Security for Projects and Capability Planning Version 3 ation date July 2015 Amendment list 24 Optimised for Screen; Print; Screen Reader Releasable to Compliance

More information

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce

Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

INFORMATION SECURITY Humboldt State University

INFORMATION SECURITY Humboldt State University CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of

More information

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page

More information

INFORMATION SECURITY California Maritime Academy

INFORMATION SECURITY California Maritime Academy CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information

Data Protection Breach Reporting Procedure

Data Protection Breach Reporting Procedure Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

NSW Data & Information Custodianship Policy. June 2013 v1.0

NSW Data & Information Custodianship Policy. June 2013 v1.0 NSW Data & Information Custodianship Policy June 2013 v1.0 CONTENTS 1. PURPOSE... 4 2. INTRODUCTION... 4 2.1 Information Management Framework... 4 2.2 Data and information custodianship... 4 2.3 Terms...

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY Directorate of Performance Assurance INFORMATION GOVERNANCE POLICY Reference: DCP074 Version: 2.5 This version issued: 27/03/15 Result of last review: Minor changes Date approved by owner (if applicable):

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information