IT Asset Management Procedure (QM)DT/001. Support Procedure. Written by. Martin Crane. Version /08/2012

Size: px
Start display at page:

Download "IT Asset Management Procedure (QM)DT/001. Support Procedure. Written by. Martin Crane. Version /08/2012"

Transcription

1 IT Asset Management Procedure (QM)DT/001 Support Procedure Written by Martin Crane Version /08/2012 Revision Version Summary of Changes Contributor date 22/08/ Initial Draft Martin Crane 22/07/ Added printer disposal requirements to section 5 and appendix D referencing CfH disposal guidelines 13/09/ Appendix B: Updated asset marking screenshots and descriptions for monitors and new model base units 11/08/ Updated job titles on disposal responsibility and disposal log sheet template link for updated assurance around hard disk disposal within equipment. Addition of appendix E example of waste transfer certificate Martin Crane Martin Crane Martin Crane Change Approval This document forms part of the IT Support and Helpdesk Quality System. The IT Quality Manager should be notified of any changes to this document - 1 -

2 Table of Contents Purpose of this Document... 3 Overview Receipting of Hardware Unpacking hardware Storing hardware for extended periods Managing deployed assets Decommissioning and disposal of hardware Pre-disposal whilst assets are being decommissioned and stored Organising a disposal... 5 Appendix A -IT Purchasing and installation information slip:... 6 Appendix B Marking process... 8 Process... 8 Printer Asset Positions... 9 Monitor Asset Positions... 9 Base Unit Asset Positions... 9 Mini Tower Cases and Dell Desktop form factor... 9 Ultra Small Form Factor... 9 Laptop Positions Appendix C Supportworks inventory data fields Asset Tab Owner Tab Procurement Tab Appendix D CfH Printer Disposal Guidelines Appendix E IT Equipment Transfer Certificate IT Equipment Transfer Certificate

3 Purpose of this Document To comply with audit and quality standards it is essential to have a robust process for receipting, handling and storing valuable goods. All members of IT that are involved in this process should be conversant with this procedure but namely: 2 nd line support Desktop installations IT Procurement Where the nominated groups or staff members listed above are regularly required to perform this function it is also expected that anyone providing cover for their role will also adhere to this procedure. Overview The IT Support Coordinator is responsible for overseeing that this process is carried out and that records kept are accurate and able to be used for any means as required, for example financial forecasting, data on assets per cost centre and IT rollout planning. The records may also be called up for regular audit of stock and in the event of any theft. This document will cover: Receipting of hardware and attaching a paper form to the packaging by IT Procurement Unpacking, recording inventory data within 1 day of receipt. Storing for extended periods e.g. projects or for ad-hoc installs. Updating inventory records for equipment within the Trust. Decommissioning and disposal of hardware. 1. Receipting of Hardware IT Procurement is responsible for the following tasks: 1.1. Hardware items will be dropped by courier. The packaging should be inspected for damage and noted with courier on their paperwork. It is usual for a courier to request signature for proof of delivery IT Procurement will produce a Purchasing and installation slip and attach to the packaging. This provides information which will later be used to enter the item onto the IT Inventory within the Supportworks Helpdesk product. See: \\charlie\itdepartment\itordering and Installs\IT Procurement Officer\PURCHASING AND INSTALLATION INFORMATION.doc copy in Appendix A 1.3. For ad-hoc hardware installs a call should be logged on the Supportworks helpdesk system and allocated to the Desktop Installations support group. See: \\charlie\shared\itdepartment\ittech\documents\procedures\helpdesk\call Handling Process Using Supportworks.doc 1.4. Equipment should be moved still within packaging to the workshop area for preparation

4 2. Unpacking hardware Desktop Installations or 2 nd line support are responsible for the following tasks: 2.1 Unpack hardware items in a secure environment retaining the Purchasing and Installation slip (1.2). 2.2 Dispose of packing in green bins immediately to ensure work areas remain safe. Cardboard should be disposed of in designated cages (on trial by Portering as of Nov 08). Paying particular note to the fire escape route through the IT Workshop. 2.3 Apply Selectamark template to device in the established location see Appendix B. 2.4 Update the Supportworks inventory with the information detailed in the Purchasing and Installation slip (1.2) Log into Supportworks Click File Manage Assets Add New Complete the Asset details on tabs Asset, Owner, Procurement and click Add Record. For detailed information see Appendix C. 2.5 Items should be stored on the For Installation rack pending preparation. The Purchasing and Installation slip should remain attached. 3. Storing hardware for extended periods Where project or revenue funds are required to be spent (e.g. financial year end) there is sometimes a requirement to store hardware for extended periods. Particular consideration needs to be made to ensure the items are secure, tracked and reserved. The above processes should be undertaken and in addition: A designated area should be reserved to keep all items in one place. The IT Support Coordinator will give guidance where required. The shelf or racking should have an itemised list attached referencing the project name. This visually highlights what should be contained in the allocated space. Also acts as a quick check sheet and a visible deterrent from other team members moving items or using elsewhere e.g. spares. As items are deployed in the course of the project in addition to the Supportworks data being updated as per section 2. The item should also be crossed out on the paper list. 4. Managing deployed assets The IT Department is responsible for managing IT assets deployed within the Trust. The Supportworks inventory continues to be used for this function after deployment and data from this system may be presented in report form to IT management, Finance, Information Governance, a contractor, the Police in the event of theft and used for identifying items for replacement. It is therefore necessary to ensure any relocated equipment has details modified in the system Whilst carrying out a move as logged via the IT Helpdesk, obtain the destination room number and the department name if this changes

5 4.2 If this is a PC it s network name should be changed where a department change takes place. Other management systems reliant on the PC name should be updated to reflect this. Please see PC Deployment Procedure. 4.3 As part of the call complete the Supportworks inventory fields to reflect these changes: Department ; Room No and last moved date. 4.4 If by arrangement users are permitted to move their own equipment this information should still be gathered and updated. 5. Decommissioning and disposal of hardware The decommissioning of hardware should be carried out carefully to ensure accurate record keeping and patient confidentiality. Both Trust and legislative waste management policies should be adhered to ensure correct disposal including the WEEE directive; NHS IG protocols as well as guidance issued by the Information Commissioners Office. Read this procedure in conjunction with the PC Decommissioning Procedure which provides breakdown of the technical steps required. 5.1 Pre-disposal whilst assets are being decommissioned and stored Add assets to the current disposal list attached to the outer door of the IT workshop to include asset number; serial number; appliance number; hardware type; make/model; data asset serial number (e.g. hard disk within unit) Remove any patient demographic labels which are often found attached to monitors and dispose of in blue paper shredding bins For PCs/laptops ensure removable media is removed from floppy/cd-rom drives and that the media is returned to the user or disposed of securely Ensure that paper is removed from printers remember official headed paper could be used by another party to commit fraud against the Hospital. Printers which include job storage features (e.g. hard disks) must be flagged to receive confidential media treatment onsite as per PCs/laptops Hardware assets for disposal should be stored in IT Store 2 Room B on the left hand side. 5.2 Organising a disposal When an appropriate level of hardware items are collected the IT helpdesk Coordinator or IT Service & Quality Manager will make arrangements for a hardware disposal using an approved waste management company specialising in IT recycling and destruction of sensitive data, who will undertake CESG approved degaussing, wiping or shredding of data assets (any company used will have signed up to Trust developed contractual conditions and completed a 3 rd party confidentially agreement which will be held by the IG Manager. The contractor will also be Environment Agency registered to handle electronic waste) The IT Helpdesk Coordinator or IT Service & Quality Manger will work with a Helpdesk & Desktop support team member to prepare disposal: The paper list described in section will be checked against the store room contents and typed - 5 -

6 up and saved in the same location as the template with the filename in the format disposalcompanyname_currentdate.doc from the template - \\charlie\itdepartment\itordering and Installs\Hardware Sale and Disposal\blank list.doc (example given in Appendix E) Either the IT Helpdesk Coordinator or a nominated member of staff familiar with these procedures will assist the waste carrier on the day of collection to ensure removal of items, paperwork signed and protect items of value stored in the same area. Any cause for concern should be raised in the first instance with the IT Service & Quality Manager or the IG Manager Items disposed of should have asset records updated in Supportworks to show the department field as ** DISPOSED **, notes box to read Disposed of to xxxx where xxx is the waste carrier and the last moved date changed to the disposal date Management systems including IP address lists; Antivirus console; Active Directory and SMS should be updated to reflect disposal and ensure correct software licensing The IT Service & Quality Manager will a copy of the signed disposed listed items and the Waste Transfer Note provided by the Waste Carrier to the Operational Estates & Environment Manager a copy of the listed items to the Works Superintendent where the disposed items have an Appliance Number as these need to be flagged on the Estates PAT testing register Signed copies of the log paperwork should be filed in the Sale/Disposal of Obsolete IT Equipment folder held by the IT Service & Quality Manager. He will sample items on the list to verify they have been removed/updated on management systems. He will also retain waste transfer notes and supplier produced logs in the same file Quarterly waste summary information will provided by the IT Service & Quality Manager to the Operational Estates & Environment Manager for their ERIC returns. Appendix A -IT Purchasing and installation information slip: PURCHASING AND INSTALLATION INFORMATION Order Number: WSH 1 Supplier: 2 Warranty Start Date: 3 Warranty Period: 4 Purchase Price: 5 1 Order number is supplied from the Powergate IT Procurement System 2 As purchased 3 Date of delivery 4 As guaranteed by the supplier or manufacturer which ever is longer 5 The price per unit - 6 -

7 Funding Source: 6 Requires PA Testing: YES NO 7 Installation Details: 8 6 Central IT Budget; Capital Project; Trust Funds; PCT; Friends of the Hospital Fund; 3 rd Party Recharge 7 Any item that has a power plug and can be moved e.g. PC, printer is classed as portable and therefore should be marked for PAT testing. 8 Additional supporting comments to help Installations team e.g. user contact, known room no

8 Appendix B Marking process Below describes the standard positioning of asset marking on equipment. It is important to maintain the positions as users are used to these when calling the Helpdesk to report IT incidents. Where equipment is made of dark coloured plastic e.g. black Dell computer cases use white compound. Where the equipment is light coloured (silver; white; beige) use blue compound. Process 1. Tear off template backing. 2. Apply the label to the appropriate position on the new equipment. 3. Apply blue or white compound as suited to the colour of the equipment casing. 4. Carefully peel off the template 5. Allow to dry. If the equipment is to be moved be aware of the marking

9 Printer Asset Positions Right hand side of printer Monitor Asset Positions Top edge of monitor centred. Base Unit Asset Positions Mini Tower Cases and Dell Desktop form factor Top edge of base unit so it is visible standing under a desk. Ultra Small Form Factor Front panel beneath CD drive

10 Laptop Positions Area beneath keyboard to the right of the mouse control. Appendix C Supportworks inventory data fields Inventory records to complete within the Supportworks helpdesk system: Asset Tab

11 Owner Tab Procurement Tab

12 Appendix D CfH Printer Disposal Guidelines 20-%20Digital%20Printers%20Copiers%20and%20Multi%20Function%20Devices.pdf

13 Appendix E IT Equipment Transfer Certificate IT Equipment Transfer Certificate This certificate has been issued to the following person upon transfer of ownership of redundant IT equipment from the Trust. Issued to :.. Date : Line No. Asset No. Serial No. Appliance No. Hardware Type. Specification/Make/Mod el Data Asset S/N (Hard disk) Please keep this certificate for proof of transfer. The following items of IT Equipment have been sold or donated to you as redundant/scrap hardware. They are supplied as seen, with no guarantee on their reliability. The West Suffolk NHS Foundation Trust accepts no responsibility for use of these items outside the Trust after you have signed this document in agreement and taken the equipment away. N.B. These items are sold without Windows. The PC s do not have a modem or Internet connection. The IT Department regret that we are unable to provide any support or advice. The hardware is sold As seen Authorised by:. Position: Signed:.Date: / /. Accepted by:. Signed:.Date: / /

Appendices Device Destruction/ Disposal process 7

Appendices Device Destruction/ Disposal process 7 IM&T Electronic Information Security Policy Classification: Policy Lead Author: Jym Bates, Head of Information Assurance Additional author(s): N/A Authors Division: Corporate (IM&T) Unique ID: TI4(09)

More information

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1. Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage

More information

Grasmere Primary School Asset Management Policy

Grasmere Primary School Asset Management Policy Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the

More information

Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media

Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media The University has legal obligations to ensure that all computers, IT equipment, and data storage media (e.g.

More information

How To Manage A University Computer System

How To Manage A University Computer System PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

Management of Assets Policy

Management of Assets Policy CREST Management of Assets Policy Version No: Reason for Update Date of Update Updated By 1 Policy introduced April 2012 Finance Office 2 Review incorporates IT Security Internal Audit review February

More information

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the

More information

Management of Assets Procedure

Management of Assets Procedure Management of Assets Procedure Contents 1 Introduction... 3 2 Fixed Assets Register... 3 3 Inventory Registers... 3 4 Capital Asset Purchase... 7 5 Asset Physical Verification... 7 6 Asset Disposal...

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

Mobile Device Policy

Mobile Device Policy Mobile Device Policy Purpose of this Document This document describes the policy for the management of mobile devices. This document will be reviewed every 12 months Author: Matt Mason Version: 1.1 Date:

More information

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6

More information

Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion

Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion Essex Fire Authority Fleet Management Internal Audit Report (4.12/13) 28 February 2013 FINAL Overall Opinion Essex Fire Authority Fleet Management 4.12/13 CONTENTS Section Page Executive Summary 1 Action

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Service Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information)

Service Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information) APPENDIX E Service Instruction 0759 Destruction of Information Assets (Including Protectively Marked Information) Document Control Description and Purpose This instruction is intended to provide guidance

More information

ManageEngine Desktop Central Training

ManageEngine Desktop Central Training ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

Remote Access and Home Working Policy London Borough of Barnet

Remote Access and Home Working Policy London Borough of Barnet Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Fujitsu Asset Lifecycle Management Services

Fujitsu Asset Lifecycle Management Services Fujitsu Asset Lifecycle Management Services Reshaping ICT, Reshaping Business Contents 1.1 Introduction 3 1.2 Our approach 4 1.2.1 Fujitsu differentiators 5 1.3 Capability 6 1.3.1 Compliance 6 1.3.2 Tools

More information

University of South Wales Software Policies

University of South Wales Software Policies University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

Local Enhanced Service Specification for the Supply of Pharmaceutical Services to Care Homes through Community Pharmacy

Local Enhanced Service Specification for the Supply of Pharmaceutical Services to Care Homes through Community Pharmacy Local Enhanced Service Specification for the Supply of Pharmaceutical Services to Care Homes through Community Pharmacy Contents: 1. Introduction and purpose 2. Period of Service 3. Aim of the Service

More information

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 20/04/2016 HSCIC Audit of Data Sharing

More information

Asset Management Policy

Asset Management Policy Asset Management Policy Issue Date: August 2011 Author: Head of Finance Approval Body: Senior Leadership Team CONTENTS Page 1. Policy Statement 3 2. Scope 3 3. Definitions 3 4. Accountabilities and Responsibilities

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing

More information

ULSTER COUNTY COMPTROLLER S OFFICE Elliott Auerbach, Comptroller

ULSTER COUNTY COMPTROLLER S OFFICE Elliott Auerbach, Comptroller ULSTER COUNTY COMPTROLLER S OFFICE Elliott Auerbach, Comptroller July 28, 2015 Review of Internal Controls over IT Equipment The mission of the Ulster County Comptroller s Office is to serve as an independent

More information

AMS Asset Management Redkite Asset Management System When only the best will do.

AMS Asset Management Redkite Asset Management System When only the best will do. Defects AMS Asset Management Redkite Asset Management System When only the best will do. Redkite Systems Ltd 2014 AMS Overview You ll wonder how you managed without it! What can I record on Redkite AMS?

More information

IT06 - Information Technology (IT) Hardware and Software Policy

IT06 - Information Technology (IT) Hardware and Software Policy IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

www.neelb.org.uk Web Site Download Carol Johnston

www.neelb.org.uk Web Site Download Carol Johnston What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate

More information

Business Continuity Policy and Business Continuity Management System

Business Continuity Policy and Business Continuity Management System Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain

More information

Dell Service Description

Dell Service Description Dell Service Description IT Asset Donation - EMEA Introduction Dell is pleased to provide Asset Resale and Recycling Services (the Service(s) ) in accordance with this service description (the Service

More information

PORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT. Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL

PORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT. Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL Page 1 of 1 PORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL This revision supersedes all previous revisions.

More information

NHS Business Services Authority Records Management Audit Framework

NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Corporate Secretariat NHSBSARM019 Issue Sheet Document Reference Document Location Title Author Issued

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

How To Inspect A Blood Bank

How To Inspect A Blood Bank Site visit inspection report on compliance with HTA minimum standards Belfast Cord Blood Bank HTA licensing number 11077 Licensed for the procurement, processing, testing, storage, distribution and import/export

More information

Standard Operating Procedure for Archiving Essential Documentation relating to Clinical Trials of Investigational Medicinal Products (CTIMPs)

Standard Operating Procedure for Archiving Essential Documentation relating to Clinical Trials of Investigational Medicinal Products (CTIMPs) archiving\spon_s21_sop_for_archiving V02.doc Page 1 of 13 Standard Operating Procedure for Archiving Essential Documentation relating to Clinical Trials of Investigational Medicinal Products (CTIMPs) SOP

More information

University of St Andrews. Unit Income and Cash Handling Policy

University of St Andrews. Unit Income and Cash Handling Policy University of St Andrews Unit Income and Cash Handling Policy Last reviewed 17 September 2014 CONTENTS page 1 Introduction and Policy Statement 3 2 Cash Free Units 3 3 Securing Cash 3 4 Receipting Cash

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

Determine dates with you telecom suppliers so that the new office is online before your move for both Phones and Data connections.

Determine dates with you telecom suppliers so that the new office is online before your move for both Phones and Data connections. IT Office Move - Tips and Check List: Office IT Move Plan Introduction: If you are moving to a New Office and/or Data Center (Cloud), or if this is also a Colocation exercise please note this is a basic

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

DERBYSHIRE COUNTY COUNCIL. Cabinet. 28th November 2006. Report of the Deputy Chief Executive and Strategic Director Corporate Resources

DERBYSHIRE COUNTY COUNCIL. Cabinet. 28th November 2006. Report of the Deputy Chief Executive and Strategic Director Corporate Resources DERBYSHIRE COUNTY COUNCIL Cabinet 28th November 2006 Report of the Deputy Chief Executive and Strategic Director Corporate Resources County-wide PC Commissioning Unit (Strategic Policy and Budget) 1. PURPOSE

More information

CCG: IG06: Records Management Policy and Strategy

CCG: IG06: Records Management Policy and Strategy Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of

More information

Overview. Responsibility

Overview. Responsibility Overview Property management is an important function at the University. Prudent inventory practices help protect the University s multi-million dollar investment in equipment, provide documentation needed

More information

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your

More information

Associated Files: Managing resources. Expected Duration: 2 hours

Associated Files: Managing resources. Expected Duration: 2 hours Unit 2 Business Managing Instructions and answers for Teachers These instructions should accompany the OCR resource Managing, which supports the OCR Level 3 Cambridge Technical Certificate in Business

More information

Home Working Policy Version Date Status Comments

Home Working Policy Version Date Status Comments Home Working Policy Version Date Status Comments 1.0 June 2010 Draft 1.0 August 2010 Draft Policy sent out for consultation via JCC and Corporate Bulletin Board. 1.0 November 2010 Final Resources Portfolio

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version 1.1 Responsible Person Information Governance Manager Lead Director Head of Corporate Services Consultation Route Information Governance Steering Group Approval Route

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

Tenant Managed Services- Basic. Rancho Cordova Data Center. Tenant Guide 2014-08

Tenant Managed Services- Basic. Rancho Cordova Data Center. Tenant Guide 2014-08 - Basic Rancho Cordova Data Center Tenant Guide 2014-08 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 PURPOSE... 3 2 COMPUTER ROOM GUIDELINES... 4 2.1 GENERAL SITE GUIDELINES... 4 2.2 CABINET GUIDELINES...

More information

Ardington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving.

Ardington Archives. Components of the process. Audit of needs. Cataloguing. Retrieval. Collection and deposit. Destruction. The archiving. Ardington Archives Components of the process Audit of needs Cataloguing Retrieval Collection and deposit Destruction The archiving process 3 Section Contents ARCHIVING PROCESS The archiving process Reference

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

Asset Register. 1.2 Definitions

Asset Register. 1.2 Definitions Asset Register 1.2 Definitions Asset is something that is owned by the business that can be converted to cash. Asset management is the system that monitors and maintains the assets of the business. 1 A4

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

MFX RELOCATIONS. Data Centre & Computer Room Relocations

MFX RELOCATIONS. Data Centre & Computer Room Relocations MFX RELOCATIONS MFX Relocations is our specialist relocation division and can undertake any type of commercial move but also undertakes specialist moves which includes:- Specialist IT relocations (Data

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

Waste Management Policy

Waste Management Policy HEALTH AND SAFETY ISSUES Waste Management Policy Policy No: 39 Date of issue: October 1998 Review Dates: August 2001, December 2003, July 2008 Date to be Reviewed: July 2010 Page 1 of 13 Date of Issue:

More information

Aberdeen City Council IT Asset Management

Aberdeen City Council IT Asset Management Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates

More information

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS) Procedure Credit Card Handling and Security for Departments/Divisions and Elected/Appointed Offices Last Update: January 19, 2016 References: Credit Card Payments Policy Purpose: To comply with the Payment

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

Information Security Policy

Information Security Policy Information Security Policy Version August 23, 2010 1 of 8 Table of Contents Introduction Ethics and Acceptable Use Policies Usage Policy Disciplinary Action Protect Stored Data Restrict Access to Data

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants

Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants 2014 Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants This document provides general advice and guidance on security

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Breckland Council. Printing Strategy

Breckland Council. Printing Strategy Breckland Council Printing Strategy Version: 0.1 November 2009 Document control Version history Version Date Comments 1(Draft)_0.1 1 December 2009 First Draft Publishers Reference: Author Kevin Taylor

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

3. Specification. Tender No. 1716 Tender Name: Panel for External Printing Services 49

3. Specification. Tender No. 1716 Tender Name: Panel for External Printing Services 49 3. Specification Tender Name: Panel for External Printing Services 49 Specification 1. Introduction The Port Phillip City Council ( the Council ) invites tenders from suitably experienced organisation(s)

More information

Ixion Group Policy & Procedure. Remote Working

Ixion Group Policy & Procedure. Remote Working Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises

More information

RECORDS MANAGEMENT FRAMEWORK

RECORDS MANAGEMENT FRAMEWORK RECORDS MANAGEMENT FRAMEWORK Policy Number: 253 Supersedes: Standards For Healthcare Services No/s 1, 19, 20 Version No: Date Of Review: Reviewer Name: 1.1 Nov 2011 Alison Gittins 1.2 Mar 2015 Alison Gittins

More information

DATA SECURITY POLICY. Data Security Policy

DATA SECURITY POLICY. Data Security Policy Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.

More information

TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales

TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Dacorum Borough Council Final Internal Audit Report

Dacorum Borough Council Final Internal Audit Report Dacorum Borough Council Final Internal Audit Report ICT Change Management Distribution list: Chris Gordon Group Manager Neil Telkman - Information, Security and Standards Officer Gary Osler ICT Service

More information

St Hugh s School. Remote Access Policy

St Hugh s School. Remote Access Policy St Hugh s School Remote Access Policy Remote Access Policy v1.0 17/11/15 Item Title Page number 1.0 Introduction 2 1.6 Definitions 2 2.0 Scope and limitations 3 3.0 Available remote services 3-4 4.0 Method

More information

Introduction to the NHS Information Governance Requirements

Introduction to the NHS Information Governance Requirements Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely

More information

Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy

Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Access: If you have been granted a Frey Access Card with currently approved access to

More information

Remote Access Policy

Remote Access Policy BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

2.0 RECOMMENDATIONS Members of the Committee are asked to note the information contained within this report.

2.0 RECOMMENDATIONS Members of the Committee are asked to note the information contained within this report. REPORT TO: SCRUTINY COMMITTEE 25 JUNE 2013 REPORT ON: REPORT BY: INTERNAL AUDIT REPORTS CHIEF INTERNAL AUDITOR REPORT NO: 280-2013 1.0 PURPOSE OF REPORT To submit to Members of the Scrutiny Committee a

More information

Shredding. Security. Recycling

Shredding. Security. Recycling Shredding Security Recycling WHO WE ARE PHS Datashred has the knowledge, capability and experience to ensure the safe and secure disposal of your confidential material. Trusted by over a third of FTSE

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Medical Devices Management Policy Version: 10 Reference Number: CO16 Supersedes Supersedes: Version 9 Description of Amendment(s): Originator Addition of 4.8 Sharps

More information

New Jersey City University Information Technology Equipment Policies & Procedures Page 1 of 5

New Jersey City University Information Technology Equipment Policies & Procedures Page 1 of 5 Page 1 of 5 TABLE OF CONTENTS Page No. INTRODUCTION... 3 PURPOSE... 3 SCOPE... 3 POLICY... 3 INFORMATION TECHNOLOGY EQUIPMENT... 3 INVENTORY... 4 EQUIPMENT RECEIVED BY ITS DEPARTMENT... 4 EQUIPMENT RECEIVED

More information

Business Continuity Management For Small to Medium-Sized Businesses

Business Continuity Management For Small to Medium-Sized Businesses Business Continuity Management For Small to Medium-Sized Businesses Produced by NORMIT and Norfolk County Council Resilience Team For an electronic copy of this document visit www.normit.org Telephone

More information

TEWKESBURY BOROUGH COUNCIL

TEWKESBURY BOROUGH COUNCIL TEWKESBURY BOROUGH COUNCIL Report to: Executive Committee Date of Meeting: 4 July 2012 Subject: Report of: Director: Lead Member: Number of Appendices: Replacement of the Council s Telephone System Tina

More information

FIXED ASSET AND INVENTORY TRACKING

FIXED ASSET AND INVENTORY TRACKING Rev. April, 2013 FIXED ASSET AND INVENTORY TRACKING I. INTRODUCTION Asset inventory and tracking systems are an essential part of maintaining control of an organization=s assets. It documents ownership

More information

Records Management Policy

Records Management Policy Records Management Policy Document information Document type: Operational Policy Document title: Records Management Policy Document date: November 2014 Author: NHS South Commissioning Support Unit, Information

More information

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent

More information

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files. Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely

More information

Site visit inspection report on compliance with HTA minimum standards. London School of Hygiene & Tropical Medicine. HTA licensing number 12066

Site visit inspection report on compliance with HTA minimum standards. London School of Hygiene & Tropical Medicine. HTA licensing number 12066 Site visit inspection report on compliance with HTA minimum standards London School of Hygiene & Tropical Medicine HTA licensing number 12066 Licensed under the Human Tissue Act 2004 for the storage of

More information

INFORMATION SECURITY INCIDENT REPORTING POLICY

INFORMATION SECURITY INCIDENT REPORTING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information