United Kingdom Nirex Limited CONTEXT NOTE. 4.5: Security. September 2005 Number:
|
|
- Cornelia Chapman
- 7 years ago
- Views:
Transcription
1 United Kingdom Nirex Limited CONTEXT NOTE 4.5: Security September 2005 Number:
2
3 CONTEXT NOTE 4.5: Security September 2005 Number:
4 Conditions of Publication This technical note is made available under Nirex s Transparency Policy. In line with this policy, Nirex is seeking to make information on its activities readily available, and to enable interested parties to have access to and influence on its future programmes. This document may be freely used for non-commercial purposes. However, all commercial uses, including copying and re-publication, require Nirex s permission. All copyright, database rights and other intellectual property rights reside with Nirex. Applications for permission to use this technical note commercially should be made to the Nirex Business Development Manager. Although great care has been taken to ensure the accuracy and completeness of the information contained in this publication, Nirex can not assume any responsibility for consequences that may arise from its use by other parties. United Kingdom Nirex Limited All rights reserved Bibliography If you would like to see other publications available from Nirex, a complete listing can be viewed at our website or please write to Corporate Communications at the address below, or info@nirex.co.uk. Feedback Readers are invited to provide feedback to Nirex on the contents, clarity and presentation of this report and on the means of improving the range of Nirex reports published. Feedback should be addressed to: Corporate Communications Administrator United Kingdom Nirex Limited Curie Avenue Harwell Didcot Oxfordshire OX11 0RH UK Or by to: info@nirex.co.uk
5 FOREWORD This Context Note is one in a series, prepared by United Kingdom Nirex Limited (Nirex), that summarises the issues, experience and status in each of 30 topic areas that are relevant to the phased development of a geological facility for the long-term management of intermediate-level and certain low-level radioactive waste in the UK the Nirex Phased Geological Repository Concept (PGRC). It is the view of Nirex that sufficient work has been done to demonstrate the viability of the generic Nirex Phased Geological Repository Concept: to support packaging advice; and to provide enough confidence to proceed with a site selection process in the UK. The aim of the Context Notes is to provide the documentation to support this view. The starting point for the notes has been an identification of issues based on extensive examination of reviews and published scrutiny of Nirex work and programmes over the past 20 years. This has been supplemented by more recent discussion meetings with knowledgeable and concerned organisations and discussion meetings within Nirex. The issues have been analysed according to their importance with respect to the future implementation of a geological repository in the UK, screened and sorted into topic areas. Then, for each topic, a Context Note has been prepared that presents the key issues, relevant experience, directions for further development and overall status in the topic area. The Context Notes are intended to provide a focus for discussion of issues and priorities of future work within Nirex, and as a means of communication to stakeholders. The Notes provide support to Nirex Report N/122, which presents an overview of the viability of the Nirex Phased Geological Repository Concept. 1
6 CONTENTS FOREWORD 1 1 INTRODUCTION 3 2 SECURITY TOPICS How is Security Regulated Nirex Generic PGRC Security Plan Why most security measures cannot be disclosed to the general public? How threats to security are identified and countered The current status of development of Security Plans Future Security 5 2
7 CONTEXT NOTE 4.5: SECURITY 1 INTRODUCTION The aim of this Context Note is to inform the reader that Nirex takes security very seriously and considers that integrated and well planned security measures are essential to counter a number of perceived threats which range from the malicious, through theft to irresponsible interference of radioactive waste at a planned radioactive waste repository. Security considerations are built into the design process and the operational planning, although specific details are not revealed since this would defeat their object. At each stage of security planning the Office for Civil Nuclear Security (OCNS) is consulted, for their approval and guidance, in their role as nuclear industry security regulator. The keys security issues and their evaluation are shown in Table 1. 2 SECURITY TOPICS 2.1 How is Security Regulated OCNS, which is part of the DTI, regulates the civil nuclear industry. On a day-to-day basis we are required to have a Company Security Policy, an IT Security Policy and Company Security Instructions in place as well as a Business Continuity Plan. These are routinely inspected by OCNS. Nirex is directed under Regulation 22(3)(b) and (c) of the Nuclear Industries Security Regulations 2003 SI 2003/403 by the Secretary of State for the Department of Trade & Industry (DTI) to: Adopt the security procedures and standards in force from time to time for the purpose of safeguarding sensitive nuclear information. This entails reference to the Classification Guide: The Physical Protection of Nuclear Materials (CWP/G8) issued by OCNS when originating protectively marked information. Also ensuring that all protectively marked information is safeguarded in accordance with the Manual of Protective Security issued by DCNSy (prior to becoming OCNS) in Apr 95. The Nuclear Industries Security Regulations 2003 were made under powers provided in the Anti-terrorism, Crime & Security Act 2001, an Act introduced as a direct result of the events in the USA on 11 Sep 01, as a result security requirements and standards were considerably tightened. This has had a corresponding impact on the release of and content of nuclear and security related information available to the general public. Nirex staff have all received briefings on the impact of the above legislation and its impact on our Transparency Policy. Nirex continues to publish as much information as possible and regularly challenges itself, its contractors and its shareholders on the need for a protective marking on information. The publication in June 2004 by OCNS of the document "Finding a Balance - Guidance on the Sensitivity of Nuclear and Related Information and its Disclosure" will go a long way to inform the general public and members of the industry of what can and cannot be released, more importantly the document gives reasons for non-disclosure. 3
8 2.2 Nirex Generic PGRC Security Plan The Company has a Security Plan for a Generic PGRC Design which has received interim approval by OCNS, it is being used now to ensure that: Basic security designs and measures are incorporated in the generic drawings and documents. Our generic document set remains within the law by not disclosing sensitive security information. Practical security measures required to counter known threats to a repository can be debated, researched and properly incorporated into the design. Markers are placed in the road map to prevent key security issues i.e. necessary security actions and appointments of security staff, from being overlooked. Security costings becoming more visible at an earlier stage. The different levels of physical security required for protecting Categories III, II and I waste are visible. Suitable assurance is given that security planning is advanced, designed in, stringently regulated and counters all perceived threats. 2.3 Why most security measures cannot be disclosed to the general public? In order to produce a Security Plan for a site holding a given type of radioactive waste, a threat assessment is carried out using information provided by OCNS (which is usually protectively marked SECRET). This information is obviously on limited dissemination. The specific security counter measures employed on a site attract a protective marking and would be rendered useless if disclosed to the general public. 2.4 How threats to security are identified and countered The potentially catastrophic consequences of malicious activity at civil nuclear facilities make it vitally important that security measures are both appropriate to the threat and fully effective. It is also important that resources are not wasted on ineffective or nugatory security measures. There is, therefore, a requirement for a definitive statement of the possible hostile activity and capability that could be faced by civil nuclear facilities. The Design Basis Threat (DBT), issued by the DTI s Office for Civil Nuclear Security (OCNS), meets this requirement for the United Kingdom. As the UK s independent regulator for civil nuclear security, the DTI s Director of Civil Nuclear Security (DCNS) has sole responsibility for establishing the DBT. However, if it is to be an effective guide to the operators, the DBT and the regulatory process that it supports must be reasonable and proportionate. The DBT should also, in so far as this is possible, reflect the concerns of all stakeholders. However, it is the responsibility of the DCNS to decide which hostile groups, types of activity and capabilities have to be countered by civil nuclear facilities subject to regulation. OCNS have a DBT as recommended in INFCIRC/225/Rev4. This document is a definitive compilation of physical protection measures for nuclear material drawn up by member States under the auspices of the International Atomic Energy Authority (IAEA). 4
9 The DBT: provides the basis for the design, implementation and management of security measures and systems by the regulated civil nuclear operators and site licensees; is used by OCNS to develop security standards and guidance, to evaluate the security plans of civil nuclear facilities, and to monitor compliance. The paper incorporates the comments on an earlier draft circulated widely within the industry and Government. The main body of the paper provides the rationale for the DBT. Its purpose is to set a framework, particularly of language, within which the DBT can be understood and accepted by all interested parties. The paper includes assessments of the threats produced by the Security Service, the police and other agencies, including information provided by foreign counterparts of OCNS. The paper considers: the consequences of malicious activity that are unacceptable to stakeholders; the threats that might create those unacceptable consequences; the risks to be managed. The DCNS, drawing on these assessments, decides which specific capabilities the operators and licensees must be able to counter. This is the Design Basis Threat proper. The DBT excludes hostile groups or capabilities that are judged by the DCNS not to be relevant to the civil nuclear industry in the UK, and takes account of the availability of countermeasures and other precautions provided by other, usually national, authorities (e.g. contingency arrangements to intercept hijacked aircraft) The current status of development of Security Plans Nirex has a Security Plan for a Generic PGRC which has received interim approval from OCNS. However, any change to the PGRC concept will result in the requirement to revise the existing Security Plan or, if necessary, the writing of a new one. Any such changes to the Security Plan will require approval from OCNS. The Security Plan follows a formula outlined at Annex A, Part One of the Nuclear Industries Security Regulations 2003, Guidance Document, issued by OCNS (which is protectively marked). Work is now underway to integrate the security measures in the approved Security Plan into the Generic PGRC layout drawings. 2.6 Future Security During the care and maintenance period, following emplacement and before closure, the waste may be easier to protect underground than in a surface store. This approach has several key advantages: An underground facility is more robust than a surface facility in respect of certain malicious threats, e.g. firing weapons at or attempting to steal waste or sabotage the facility. 1 Whole of Para 2.4 is the Management Summary of the OCNS, DTI paper on National Security & Civil Nuclear Facilities Developing the Design Basis Threat (protectively marked SECRET). 5
10 By placing the waste several hundred metres underground, the geological barrier created provides effective long term security resulting in a reduced need for an active security presence. If a future repository were to remain open this would detract from the security measures in place and considerably increase the running costs for the repository. In addition it would leave the repository vulnerable to human intrusion should there be a natural or man-made catastrophe or a breakdown in society. The level of cost of security (e.g. increased terrorism threat or issues of protest/reaction to decisions or activities) for all options would need to be continually assessed and revised as appropriate. Also security costs for all options need to be addressed in isolation of overall site security for active facilities as this will highlight the true cost of security when sites are being used purely for waste storage. 6
11 Table 1 Key Issues and Their Evaluation Issue Security is mandatory and therefore taken seriously Countering the threat of Terrorism/Theft/Sabotage Security of a deep repository versus surface storage Regulation of Security Evaluation The public need to be given assurances that the minimum security measures are planned into the Generic PGRC in order to secure the waste from misuse/theft/terrorism etc. Very real threats are countered by the Nirex Generic PGRC Security Plan. Detailed security measures are not published for obvious reasons. Access to radioactive waste stored underground is made very difficult due to the few number of controlled access points. Many more threats are viable to surface stores. Security of civil nuclear establishments is now governed by the NISR 2003 and regulated by OCNS Status The security measures required are in the NISR 2003 Technical Guidance Manual (Protectively marked RESTRICTED). Security measures factored into the Nirex Generic PGRC Security Plan are approved by OCNS. Reasoning is given in NISR 2003 and clarified to the public in the OCNS Finding A Balance guidance document on disclosure and non-disclosure of information. Another argument for accelerated implementation of deep geological repository projects has focused on national security, due to the reduced vulnerability of underground facilities to possible terrorist threats. Security measures are embedded in the generic design planning. 7
12
13 United Kingdom Nirex Limited Curie Avenue Harwell, Didcot Oxfordshire OX11 0RH t +44 (0) f +44 (0) e nirex.co.uk w
Office for Nuclear Regulation
Generic Design Assessment New Civil Reactor Build Step 4 Security Assessment of the Westinghouse AP1000 Reactor Assessment Report: ONR-GDA-AR-11-015 10 November 2011 PROTECTIVE MARKING IF APPLICABLE Crown
More informationWaste Transfer Pricing Methodology for the disposal of higher activity waste from new nuclear power stations
Waste Transfer Pricing Methodology for the disposal of higher activity waste from new nuclear power stations December 2011 Contents Contents... i Introduction... 1 Executive Summary... 1 Background...
More informationRegulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationSouth West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author
More informationBackgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a
More informationSecurity and Safeguards Considerations in Radioactive Waste Management. Canadian Nuclear Safety Commission
Security and Safeguards Considerations in Radioactive Waste Management Raoul Awad Director General, Directorate of Security and Safeguards Canadian Nuclear Safety Commission Radioactive Waste Management
More informationCorporate Communications Strategy
Corporate Communications Strategy 2014 Office for Nuclear Regulation page 1 of 6 Introduction Effective communications is an important part of ONR s success and supports our reputation as a trusted, independent
More informationHMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
More informationNational Occupational Standards. Compliance
National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them? National Occupational Standards (NOS) are statements
More informationInformation Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
More informationComparison of internet connection records in the Investigatory Powers Bill with Danish Internet Session Logging legislation
Comparison of internet connection records in the Investigatory Powers Bill with Danish Internet Session Logging legislation We consider that, on balance, there is a case for Internet Connection Records
More informationCommittees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
More informationDRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL
DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL INTRODUCTION EXPLANATORY NOTES 1. These explanatory notes relate to the Draft Data Retention and Investigatory Powers Bill. They have been prepared by
More informationBusiness Continuity Policy. Version 1.0
Business Continuity Policy Version.0 January 206 Contents Contents Version control Foreword Policy. Scope.2 Aim and objectives.3 Methods and standards.4 Responsibilities.5 Governance.6 Training and exercises
More informationJoint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security- Perspective for Management Information Security Management Program Concept
More informationINFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
More informationOPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE CREATE COMPETITIVE ADVANTAGE A PLATFORM FOR INNOVATION
National Standardization Strategic Framework OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE A PLATFORM FOR INNOVATION CREATE COMPETITIVE ADVANTAGE Foreword Standards influence everything we do.
More informationFinal Draft Guidance on Audit Committees
Guidance Corporate Governance April 2016 Final Draft Guidance on Audit Committees The FRC is responsible for promoting high quality corporate governance and reporting to foster investment. We set the UK
More informationNHS Hardwick Clinical Commissioning Group. Business Continuity Policy
NHS Hardwick Clinical Commissioning Group Business Continuity Policy Version Date: 26 January 2016 Version Number: 2.0 Status: Approved Next Revision Due: January 2017 Gordon Stevens MBCI Corporate Assurance
More informationInformation Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
More informationCyber security organisational standards: call for evidence
Cyber security organisational standards: call for evidence Department for Business Innovation and Skills This is an Engineering the Future response to the Business Innovation and Skills Cyber security
More informationSecurity Management Systems (SEMS) for Air Transport Operators. Executive Summary
Security Management Systems (SEMS) for Air Transport Operators Executive Summary March 2011 Security Management Systems (SeMS) for Air Transport Operators Introduction and Scope Executive Summary In early
More informationISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
More informationSeoul Communiqué 2012 Seoul Nuclear Security Summit
Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to
More informationGeneral Dental Council Website Review: Dental Professionals Survey Invitation to Tender
General Dental Council Website Review: Dental Professionals Survey Invitation to Tender Summary 1. The General Dental Council (GDC) invites tender proposals for a research project on the usability of the
More informationReporting Service Performance Information
AASB Exposure Draft ED 270 August 2015 Reporting Service Performance Information Comments to the AASB by 12 February 2016 PLEASE NOTE THIS DATE HAS BEEN EXTENDED TO 29 APRIL 2016 How to comment on this
More informationPolice use of Firearms
CODE OF PRACTICE ON Police use of Firearms and Less Lethal Weapons Contents 1. Introduction 1.1 Purpose of the code 1 1.2 Statutory basis of the code 1 1.3 Weapons covered by this code 2 1.4 Armed support
More informationUnited Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework.
United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework 28 September 2012 Chair s Summary The United Nations High-Level Meeting on Countering
More informationStrategic Alliance. Business Continuity Policy
Version 1.1 April 2016 Contents Contents Version control Foreword Policy Scope Aim and objectives Methods and standards Responsibilities Governance Training and exercises Page i ii 1 2 2 2 Version 1.1
More informationCorporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
More informationDHHIT Network Security Standards and Procedures
DHHIT Network Security Standards and Procedures Contents 1. Introduction 2 2. Scope 2 3. Definitions 2 4 Employment practices 2 5 Employee responsibility 3 6 Physical security 3 7 Network and Systems Security
More informationEXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of
More informationTemplate for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)
More informationScotland s National Action Plan to tackle Child Sexual Exploitation
Scotland s National Action Plan to tackle Child Sexual Exploitation Ministerial Foreword Aileen Campbell The safety and wellbeing of all children and young people is a key priority for the Scottish Government.
More informationValue and Challenges of Regularised Consultations and Information Sharing between Facility Security Managers 1
Page 1 of 8 Value and Challenges of Regularised Consultations and Information Sharing between Facility Security Managers 1 Dr Roger Howsley Executive Director, World Institute for Nuclear Security (WINS)
More informationInformation Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
More informationInsights of the Periodic Reviews Regarding the Physical Protection of Nuclear Power Plants Designed to Earlier Standards
Insights of the Periodic Reviews Regarding the Physical Protection of Nuclear Power Plants Designed to Earlier Standards A. Hagemann Systems Technology and Operating Experience Division Gesellschaft für
More informationExposure Draft: Improving the Structure of the Code of Ethics for Professional Accountants Phase 1
Ken Siong IESBA Technical Director IFAC 6 th Floor 529 Fifth Avenue New York 10017 USA 22 April 2016 Dear Mr Siong Exposure Draft: Improving the Structure of the Code of Ethics for Professional Accountants
More informationOffice for Nuclear Regulation
ONR GUIDE Function and Content of a Safety Management Prospectus Document Type: Nuclear Safety Technical Assessment Guide Unique Document ID and Revision No: NS-TAST-GD-072 Revision 2 Date Issued: April
More informationBusiness Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
More informationAppendix 15 CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT
Appendix 15 CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT The Code This Code sets out the principles of good corporate governance, and two levels of recommendations: code provisions; and recommended
More informationWhen being a good lawyer is not enough: Understanding how In-house lawyers really create value
When being a good lawyer is not enough: Understanding how In-house lawyers really create value Contents Foreword... 3 Do you really understand how In-house lawyers create value?... 4 Why creating value
More informationTHE DECOMMISSIONING OF THE UK NUCLEAR INDUSTRY S FACILITIES
THE DECOMMISSIONING OF THE UK NUCLEAR INDUSTRY S FACILITIES Introduction 1. This statement of the UK Government and devolved administrations policy on the decommissioning of nuclear facilities updates
More informationA GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
More informationLicensing a Repository at Yucca Mountain
2008 Licensing a Repository at Yucca Mountain DOE PROJECTED SCHEDULE FOR LICENSING A GEOLOGIC REPOSITORY Churchill County Nuclear Waste Oversight Program 85 North Taylor St., Fallon, NV 89406 Licensing
More informationBSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012
To: From: Subject: Status: Date of Meeting: BSO Board Director of Human Resources & Corporate Services Business Continuity Policy For Approval 28 February 2012 The Board is asked to agree the attached
More informationGuidance for audit committees. The internal audit function
Guidance for audit committees The internal audit function March 2004 The Combined Code on Corporate Governance July 2003 C.3 Audit Committee and Auditors Main Principle: The board should establish formal
More informationFUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS
IAEA NUCLEAR SECURITY SERIES NO. FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS Revision 17.04 Page 1 of 20 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME]
More informationSCHOOL ONLINE SAFETY SELF REVIEW TOOL
SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: esafety@swgfl.org.uk
More informationBusiness Continuity Policy
Business Continuity Policy Page 1 of 15 Business Continuity Policy First published: Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/14 Vicky Ryan Updated to include
More informationRisk management systems of responsible entities: Further proposals
CONSULTATION PAPER 263 Risk management systems of responsible entities: Further proposals July 2016 About this paper This paper sets out our proposals to provide guidance to responsible entities on our
More informationA specification for security-minded building information modelling, digital built environments and smart asset management
Introduction to PAS 1192-5:2015 A specification for security-minded building information modelling, digital built environments and smart asset management Introduction PAS 1192-5:2015 is a specification
More informationGuidelines on SPECIAL BRANCH WORK in the United Kingdom
Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence
More information7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers
Contents Page 1 Introduction 2 2 Objectives of the Strategy 2 3 Data Quality Standards 3 4 The National Indicator Set 3 5 Structure of this Strategy 3 5.1 Awareness 4 5.2 Definitions 4 5.3 Recording 4
More informationIMPACT OF CORPORATE GOVERNANCE ON PERFORMANCE OF COMPANIES IGOR TODOROVIĆ 1
MONTENEGRIN IMPACT OF JOURNAL CORPORATE OF ECONOMICS GOVERNANCE Vol. 9, ON No. PERFORMANCE 2 Special Issue OF COMPANIES (May, 2013), 47-53 47 IMPACT OF CORPORATE GOVERNANCE ON PERFORMANCE OF COMPANIES
More informationInformation Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
More informationProcess for advising on the feasibility of implementing a patient access scheme
Process for advising on the feasibility of implementing a patient access scheme INTERIM September 2009 Patient Access Schemes Liaison Unit at NICE P001_PASLU_Process_Guide_V1.3 Page 1 of 21 Contents (to
More informationPolicy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.
International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction
More informationNSS 2014 UK NATIONAL PROGRESS REPORT. March 2014
NSS 2014 UK NATIONAL PROGRESS REPORT March 2014 1. Support for the Convention on the Physical Protection of Nuclear Material and the International Convention for the Suppression of Acts of Nuclear Terrorism
More informationDORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy
Part Two Part One Not Protectively Marked DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy. The Dorset & Wiltshire Fire and Rescue Authority (DWFRA)
More informationINTERNATIONAL ATOMIC ENERGY AGENCY WAGRAMERSTRASSE 5, P.O. BOX 100, A-1400 VIENNA, AUSTRIA FACSIMILE: (+43 1) 26007, TELEPHONE: (+43 1) 2600
INTERNATIONAL ATOMIC ENERGY AGENCY WAGRAMERSTRASSE 5, P.O. BOX 100, A-1400 VIENNA, AUSTRIA FACSIMILE: (+43 1) 26007, TELEPHONE: (+43 1) 2600 - CRAFT - The International Project on COMPLIMENTARY SAFETY
More informationRC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay
RC-17 Radiation Protection in Waste Management and Disposal Implementing the Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management Alejandro V. Nader
More informationRisk Management & Business Continuity Manual 2011-2014
ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page
More informationDeveloping the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments
1 Developing the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments J. Herbach 1 1 Centre for Conflict and Security Law, University of Amsterdam E-mail contact
More informationCorporate Risk Management Policy
Corporate Risk Management Policy Managing the Risk and Realising the Opportunity www.reading.gov.uk Risk Management is Good Management Page 1 of 19 Contents 1. Our Risk Management Vision 3 2. Introduction
More informationPROCEDURES FOR ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING OF INVESTMENT PROJECTS
PROCEDURES FOR ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING OF INVESTMENT PROJECTS Approved 10 July 2015 CONTENTS 1. INTRODUCTION 1 2. OVERVIEW OF THE ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING
More informationTHE COMBINED CODE PRINCIPLES OF GOOD GOVERNANCE AND CODE OF BEST PRACTICE
THE COMBINED CODE PRINCIPLES OF GOOD GOVERNANCE AND CODE OF BEST PRACTICE Derived by the Committee on Corporate Governance from the Committee s Final Report and from the Cadbury and Greenbury Reports.
More informationISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
More informationNuclear Security Glossary
IAEA NUCLEAR SECURITY SERIES NO. Nuclear Security Glossary Revision 3E Draft 17 March 2010 Page 1 of 16 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME] Page 2 of 16 Introduction The Nuclear
More informationThe Long-Term Safety Strategy for the Geological Disposal of Radioactive Waste
Belgian agency for radioactive waste and enriched fissile materials Geological Disposal Programme The Long-Term Safety Strategy for the Geological Disposal of Radioactive Waste SFC1 level 4 report: second
More informationICSA Response. DCLG Codes of conduct for local authority members and employees A consultation
ICSA Response DCLG Codes of conduct for local authority members and employees A consultation Submission Number: 08.40.379 Date 24.12.2008 INSTITUTE OF CHARTERED SECRETARIES & ADMINISTRATORS Response to
More informationRating agency approval Guidelines Insurance Sector
Rating agency approval Guidelines Insurance Sector Insurance Policy Prudential Supervision Department December 2010 Purpose of this guideline 1 This document sets out the Reserve Bank of New Zealand s
More informationInformation security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
More informationFINANCIAL SERVICES FLASH REPORT
FINANCIAL SERVICES FLASH REPORT UK Outlines New Action Plan for Anti-Money Laundering and Counter-Terrorist Finance May In April, the United Kingdom s Home Office and Her Majesty s Treasury (HMT) issued
More informationWho Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
More informationInformation Governance Strategy
Information Governance Strategy THCCGCG9 Version: 01 The information governance strategy outlines the CCG governance aims and the key objectives of its governance policies. The Chief officer has the overarching
More informationDIRECTIVE 2014/32/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
29.3.2014 Official Journal of the European Union L 96/149 DIRECTIVE 2014/32/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 February 2014 on the harmonisation of the laws of the Member States relating
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationLondon 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments
London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012
More informationManagement of Radioactive Waste & Materials Inventory Data
Management of Radioactive Waste & Materials Inventory Data Critical Enabler Contents Executive Summary... 3 1. Introduction... 4 2. Inventory Data Users... 5 3. Current Situation... 7 3.1 Management of
More informationThe Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS
PRIORITY RECOMMENDATIONS R1 BIS to elevate the profile of information risk in support of KIM strategy aims for the protection, management and exploitation of information. This would be supported by: Establishing
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationNHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY
NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY AUTHOR/ APPROVAL DETAILS Document Author Written By: Human Resources Authorised Signature Authorised By: Helen Shields Date: 20
More informationIntroduction. Clarification of terminology
Initiating a dialogue about the security of digital built assets: a guide for managers (with regard to PAS 1192-5, A Specification for security-minded building information modelling, digital built environments
More informationRoyal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information
Royal Borough of Kensington and Chelsea Data Quality Framework ACE: A Framework for better quality data and performance information March 2010 CONTENTS FOREWORD 2 A CORPORATE FRAMEWORK FOR DATA QUALITY
More informationCorporate Governance in New Zealand Principles and Guidelines
CONSULATION DRAFT: November 2014 CONSULTATION DRAFT November 2014 Corporate Governance in New Zealand Principles and Guidelines A handbook for directors, executives and advisers Auckland Office Level 5,
More informationGuidelines on Appointments to State Boards Department of Public Expenditure and Reform, November 2014
Guidelines on Appointments to State Boards Department of Public Expenditure and Reform, November 2014 Introduction and Context 1. Background 1.1 In 2011 the Government introduced new arrangements for appointments
More informationPractice Note. 10 (Revised) October 2010 AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM
October 2010 Practice Note 10 (Revised) AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM The Auditing Practices Board (APB) is one of the operating bodies of the Financial Reporting
More informationGuidance for ISO liaison organizations Engaging stakeholders and building consensus
Guidance for ISO liaison organizations Engaging stakeholders and building consensus ISO in brief ISO is the International Organization for Standardization. ISO has a membership of 163* national standards
More informationBusiness Continuity Management
Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective
More informationCompliance. Compliance Toolkit. Protecting Charities from Harm. Chapter 2 Due Diligence, Monitoring and Verification of End Use of Charitable Funds
Compliance Compliance Toolkit Protecting Charities from Harm Chapter 2 Due Diligence, Monitoring and Verification of End Use of Charitable Funds The Charity Commission The Charity Commission is the independent
More informationBUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility
More informationHow To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
More informationAUDIT COMMITTEE TERMS OF REFERENCE
AUDIT COMMITTEE TERMS OF REFERENCE 1. Purpose The Audit Committee will assist the Board of Directors (the "Board") in fulfilling its oversight responsibilities. The Audit Committee will review the financial
More informationMENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY. Ensuring Information is Accurate and Fit for Purpose
MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY Index: Introduction Information is a Corporate Resource Personal Responsibility Information Accessibility Keeping Records of what we do Ensuring
More information