RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL INFORMATION SECURITY POLICY Version 2.0.1

Size: px
Start display at page:

Download "RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL INFORMATION SECURITY POLICY Version 2.0.1"

Transcription

1 RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL INFORMATION Version Revised and effective from 1st April 2012 Document Control Document Control Organisation Title Author Filename ICT Services Information Security Policy Tim Jones \\adrctcictnas2\gcsx\gcsx-project\policies and Procedures\Information Security Policy

2 Owner Author Subject Protective Marking Review date Head of ICT Steve Carter Information Security Unclassified The Information Management & Security Forum will formally review the Information Security Policy annually Revision History Revision Revisor Previous Description of Revision Date Version 20/02/09 ICT SMT 1.0. Final Document 11/09/09 ICT SMT 1.1 Amendments to reflect GCSX Use 22/11/11 Steve Carter 1.1 Updates 01/03/2012 Steve Carter 2.0 Additional paper based security Updates on Social Media, PCi and device control 01/04/2012 Steve Carter Review - Minor changes Document Approvals This document requires the following approvals: Sponsor Approval Name Date Information Management & 01/03/2012 Security Forum Andrew Hopkins (Internal Audit) Rhianydd Davies (HR) Phil Derham (Corp) Jeanette Howells (ESG) Josie Rhisart (Education) Sally Churchill (CCS) Andy Wilkins (Legal) Louise Evans 01/03/ /03/ /03/ /03/ /03/ /03/ /03/2012 ICT SMT Elaine Pritchard 19/03/2012 Tim Jones 19/03/2012 SIRO Leigh Gripton 21/03/2012 Document Distribution This document will be distributed to: Name Job Title Address All employees, members, contractors & third party suppliers Page 2 of 16

3 RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL INFORMATION SUMMARY OF POLICY INTENTIONS The purpose of this Information Security Policy is to create a framework to protect the Council s Information Assets, whether electronic or paper based from all threats, including internal or external, deliberate or accidental (the Policy). It is the purpose of this Policy to ensure that: Information will be protected against unauthorised access. Confidentiality of information will be assured. Integrity of information will be maintained. Regulatory and legislative requirements will be met. Business Continuity plans will be produced, tested and regularly reviewed. All breaches of information security, actual or suspected, will initially be reported to the ICT Service Desk and where they will be appropriately investigated. Operating policies and procedures will be produced to support this Policy (see section 5 for more details) Business requirements for the availability of information and information systems will be met. The Head of ICT, in consultation with the Director (Customer Care & ICT), has direct responsibility for developing, promoting and raising awareness of this Policy and in providing advice and guidance on its implementation. Responsibility for Data Protection, within the context of the Data Protection Act 1998, is delegated to the Data Protection Officer. All breaches of information security, actual or suspected, electronic or paper based, must be reported to the ICT Service Desk for further investigation. All Group Directors, Directors, Service Directors and Heads of Service are directly responsible for implementing and managing this Policy within their Service areas. Page 3 of 16

4 It is the responsibility of each employee to familiarise themselves with this Policy and fully adhere to its requirements. Priorities One of the ICT Services top priorities is to improve its security controls in line with best practice (namely International Standards Organisation (ISO 27001)) This Policy has been produced to help promote best practice and will act as a catalyst for further policies and procedures to improve security controls for information within the Council. As new policies emerge and existing ones are amended, staff and other users will be updated on the most recent policies appropriately. Policy Revision The Information Management Group will periodically review and re-issue this Policy where appropriate drawing attention to any changes that may have been made. Page 4 of 16

5 INFORMATION CONTENTS Page 1. Definition of Information Security 6 2. Scope of Policy 7 Statement of Management Intent 7 Links to ICT Services Objectives 7 Responsibility for Information Security 8 3. Control Framework 8 Information Asset Control - General Responsibilities 8 Authorisation for use of ICT computer equipment 8 Computer Systems 9 Computer Data 9 Creation of Databases (Sub-systems) 10 Storage Users responsibilities 11 General Protocol for Use of ICT 11 Users Responsibilities Reference to Other Policies Structure of Risk Management Education, Training & Awareness of Information Security Business Continuity & ICT Disaster Recovery Reporting Security Events (Breach of Controls) Consequences of Breach to Policy 15 Exemptions from this Policy Compliance with Legislation Reminder of General Responsibilities 16 Page 5 of 16

6 1. Definition of Information Security INFORMATION 1.1 Information is an asset that, like other important business assets, is essential to an organisation s business and consequently needs to be suitably protected. This is especially important in the increasingly interconnected business environment. As a result of this increasing interconnectivity, information is now exposed to a growing and wider variety of threats and vulnerabilities. 1.2 Information Security is the protection of information from a wide range of threats in order to ensure business continuity, minimise business risk and maximise business opportunities. 1.3 Information Security is achieved by implementing a suitable set of controls, including policies, processes and procedures, organisational structures and software and hardware functions. 1.4 These controls need to be established, implemented, monitored, reviewed and improved where necessary, to ensure that specific security and business objectives of the Council are met. 1.5 This Policy will support ICT Services in its operation of Information Security whose aim is to maintain: Confidentiality of information Integrity of information Availability of information protecting access to it; preventing alteration of information; and ensuring information and services are available to authorised persons when required. 1.6 This Policy intends to help minimise the risks, from whatever source, to the security of Information and intends introducing appropriate levels of controls to offer adequate protection without unnecessary expense or intrusion. 1.7 The Council recognises Information Security as an enabler to service delivery and sharing of information with the Council s partners. The Council s aim is to implement effective, efficient and appropriate security controls to match requirements of both good practice and those of its partners and demonstrate to the citizens that information held about them, and information they may require, is held and delivered in a secure manner. Page 6 of 16

7 2. Scope of Policy 2.1 This Policy applies to the use of any Information facilities including hardware, software, buildings and networks provided by the Council and is applicable to all members of the Council including elected members, staff, contractors, consultants, visitors, authorised third party users and any other authorised users who access the Council Information Systems. 2.2 All Information Assets are corporate assets. This Policy covers all Information Assets, wherever they exist, which are either the Council s property or can reasonably be held to be the property of the Council. 2.3 This Policy also covers data held for the purpose of the councils business on all media inclusive of paper documents and electronic files. Statement of Management Intent: 2.4 ICT Services has a positive commitment set out in its ICT Plan and Information Management Plan to maintain communications with both Service Groups and key suppliers to help support and implement the goals and objectives of this Policy. Links to ICT Services Objectives: 2.5 As part of its objectives, ICT Services has identified the following two objectives that correlate to this Policy. It intends to: Delivering a flexible, available and secure infrastructure, ensuring continuous and equitable access to ICT Ensure the most effective use of information governance and integration to provide a platform for more secure efficient data sharing. 2.6 Fundamental to the success in meeting these objectives will be the adherence to Information policies and procedures, this Policy being the one that underpins the impetus to succeed in this endeavour. Responsibility for Information Security: 2.7 The Director for Customer Care & ICT has overall accountability, under the Council s Scheme of Delegation, for the security of Information facilities and the post also fulfils the function of Senior Information Risk Officer (SIRO) for the Council. In addition to this and the above Management s commitment, ICT Services will engage with the Information Management Group as an appropriate forum that will monitor progress towards the implementation of controls as set out by ISO and the ICT Strategic Steering Group will act as a decision point at key stages in the process. The Director of Customer Care & ICT will chair this forum. Page 7 of 16

8 3. Control Framework Information Asset Control - General Responsibilities: 3.1 Every piece of information and the physical media upon which it is stored and the physical or wireless media through which it is transmitted, is classified as an Information Asset. This information is collected, classified, organised and stored in various forms: Applications Databases Data Files Operational and Support Procedures Archived Information Continuity Plans Computer Equipment Communications Equipment Telephony Devices Storage Media Specific Technical Equipment Paper Based Documentation and Files 3.2 These information assets are owned by the Council and will be maintained on a Corporate Information Asset Register. Data held on paper and other physical storage devices are also classified as Information Assets. Authorisation for Use of ICT Computer Equipment: The Directors and Heads of Service are responsible for computer equipment under their control to ensure its proper use. Only persons authorised by the Directors of the Council, Heads of Service or delegated Managers may operate computer equipment. All acquisitions of computer equipment must conform to Contract Procedure Rules and Financial Procedure Rules (current edition) and must be appropriately procured via published ICT Services procedures. (Available at respectively.) Only authorised ICT staff may connect or disconnect Council computer equipment from designated connection points. (With the exception of Mobile Computer users). In certain circumstances, ICT Services may delegate this responsibility for specific staff relocation purposes. Only software authorised by Group / Service Directors or Heads of Service, may be installed and accessed on any Council Computer System post consultation with ICT. Details of which should be shared with ICT Services to ensure security measures are followed appropriately and that Page 8 of 16

9 ongoing software support can be arranged. Only authorised ICT staff may install or uninstall hardware, applications software, firmware, device drivers or applications programming interfaces to computer systems. In certain circumstances, ICT Services may delegate this responsibility for specific staff relocation purposes. Computer Systems: Council Computer Systems and associated Council business software applications must be used primarily for the purpose of Council business unless authorised by the individual user s manager for limited personal use outside of working hours. No personal computer, personal media device or network system is to be connected to the Council s computer systems without authorisation and the consent of the Head of ICT, or staff with appropriate delegated authority. All laptops must be encrypted with the Council s encryption system. The only exception being where agreement is reached with the Information Management Officer to utilise an alternative method of ensuring the security of any data held on the device. All removable media such as USB storage devices must be encrypted to a minimum of 128 bit encryption. All mobile phones, smart phones, tablets or PDAs must be protected with a strong password and should any device be used to store personal or sensitive information it must be encrypted. All areas where ICT Servers or Communications equipment is sited should be secure with access restricted only to ICT staff or staff who have been given appropriate permission from a Head of Service. No telecommunication channel to remote systems is to be established from any Council computer equipment without authorisation and the consent of the Head of ICT, or staff with appropriate delegated authority. Data: Directors and Heads of Service are responsible for information under their control and to ensure its proper use. Copyright of all Council data is vested in the Council. No intellectual property rights may be claimed by any authorised user over data and information produced by Council owned systems. Any record of personal information recorded on any data file within the Council s paper based systems is the responsibility of the employee to ensure compliance with the Data Protection Act Users that require access to PROTECT or RESTRICTED information and are required to use the Government Secure Extranet (GCSx) facilities or PCi must be cleared to Baseline Personnel Security Standard. Page 9 of 16

10 Deliberate attempts to gain unauthorised access to copy, destruct, destroy, alter, interfere or generally subvert any Council Computer System, Information Asset or Communications System is forbidden. Unauthorised disclosure of information is forbidden. All data accessed, stored, received and transmitted by an authorised user is the responsibility of that user whilst their userid is valid within Council owned computer systems. Upon termination of access and/or termination of contractual employment of that user, the data currently and previously accessed, stored, received and transmitted on or by Council owned Computer Systems by virtue of the userid properties becomes the sole property of the Council, and its access, control, archive, dissemination and deletion immediately inherited by the Local Head of Service or Head of ICT as appropriate. The security of all paper based data accessed, stored or transported is the responsibility of the data owner. Paper records and files containing personal or sensitive data should be handled in such a way as to restrict access only to those persons with authorisation and business reasons to access them. Personal and sensitive information held on paper or any other media must be protected from visitors or unauthorised staff to offices. Before any personal data is transported the consent of the Data Owner must be obtained and the identity and authorisation of the recipient must be formally confirmed and documented. Facsimile technology (fax machines) should not be used for transmitting documents containing personal data where avoidable. If faxing is the only available option of transmitting documents containing personal data a procedure should be followed whereby the recipient is informed, prior to faxing, of the imminent arrival of documents containing personal data by way of fax. All projects relating to the way information is handled, or involving new information must be reviewed at the outset of the project to ascertain if a Privacy Impact Assessment should be included as part of the project. All data sharing with parties outside the Council must be documented and agreed using the appropriate forms and details must be passed to the Data Protection Officer. The creation and subsequent use of personal databases containing Council data is forbidden unless authorised by ICT Services. (See section 3.3.) Creation of databases (sub-systems): 3.3 The creation of a database (via applications such as Microsoft Excel or Microsoft Access) by using or duplicating Council data from approved systems to assist you in your day to day duties is not permitted, unless appropriately authorised and it includes the following principles: Page 10 of 16

11 It is appropriately registered with ICT Services to allow recognition and ongoing ICT support; It is legally licensed; It is held securely and is subject to appropriate back up controls; and It doesn t compromise the integrity of an existing authorised system or process or undermine Management s objectives for the use of that data. Must be deleted when no longer required Note - spreadsheets are databases. If in doubt, contact the ICT Service Desk for further advice. Storage: Computer input and output whether printed or electronically stored (CD/DVD type), must be stored securely in accordance with the sensitivity of the information printed or stored. Waste computer output whether printed or electronically stored (CD/DVD type), must be disposed of with due regard to its sensitivity. All confidential printed output must be shredded or appropriately disposed of as confidential waste. Paper documents must be stored securely in accordance with the sensitivity of the information. 4. Users Responsibilities General Protocol for Use of ICT 4.1 General use of ICT must be controlled by policy to enable the efficient business use of computer facilities within the Council. Users Responsibilities: All authorised users of the Council are expected to use computing and telephone facilities within their environment in a responsible manner to the benefit of the Council without offence to other users, the public and any third party with whom they are communicating. Authorised ICT staff will set up users with a systems profile, which allows access levels to Council systems, Information, applications and computer devices as determined by the user s Manager. All users are issued with a permanent logon userid and initial personal password. The combination of userid and password enables logon and sign-on to the Councils networked computer systems. Users are compelled to change their password at least every 60 days. Certain applications require additional userid s and passwords, which will be issued by the relevant application owner or ICT Services, according to ownership, access rights and distribution. Page 11 of 16

12 In all cases, the personal password(s) issued will be known only to the authorised user and must not be written down or physically or electronically stored by the user. The disclosure of passwords, directly or indirectly is forbidden with the notable exception being where it is essential to disclose it to a member of ICT Services to facilitate maintenance or resolve user password problems, in these circumstances, once maintenance is complete or problems have been resolved, users should change the password to retain privacy. Where authorised group access applies, the disclosure of passwords to anyone outside of the authorised group is forbidden. The use of any userid and/or password other than your own or, where applicable, that of the authorised group is forbidden. Users must utilise lock computer (by holding down the Ctrl, Alt and Del buttons simultaneously then clicking on the lock computer tab) and use password enabled screen savers at all times when leaving their workstation unattended. Computer systems screensavers and background images must be one of the default range provided by the computer. Creation, modification or manufacture of an image that portrays a pornographic, sexual, violent, capable of inciting violence, terrorist or rebellious, or offensive image or text is forbidden. Any illegal or unlicensed use of software is forbidden. All Council owned Computer Systems are enabled with ICT installed antivirus software. Attempted removal, modification or subversion of this software is forbidden. Staff who access sensitive or confidential information must be aware of their responsibilities under the Data Protection Act and actively seek training where necessary. Staff required to access facilities on the GCSx network or information derived from that source must read and understand the GCSx Acceptable Usage Policy and accept the conditions set out in the Personal Commitment Statement Staff required to use systems under PCi governance must read and accept the PCi and Income Management Policies. 4.2 If you are in doubt as to any of the above issues, you should contact the ICT Service Desk for assistance. (ICT Service Desk ) or via at ictservicedesk@rhondda-cynon-taff.gov.uk Page 12 of 16

13 5. Reference to Other Policies 5.1 The following documents will be added to as further Information policies are developed as part of the on-going improvement process for Information Security. The following policies will together constitute a framework of policy and guidance that governs the operation of Information Security within the Council: This Information Security Policy Internet and Acceptable Use Policy Password Management & Personal Firewall Policies Malware & Patch Management Policies Portable & Remote Computing Policy Information Security Incident Management Policy GCSX Information AUP & Personal Commitment Statement Protective Monitoring Policy Network Time & Physical Security Policies Third Party Connection Agreements ICT Disaster Recovery Plan & Business Continuity Planning Risk Management/Business Impact Analysis Approach PCI and Income Management Policies Records Management and Retention Policy Freedom of Information & Data Protection Policies Subject Access Request Policy Regulation of Investigatory Powers Policy Environmental Information Regulation Policy Social Media Policy This document, and subsequent new and supporting guides and procedures, are available at the above intranet link or on request via the ICT Service Desk. 6. Structure of Risk Management 6.1 The Council shall protect its information assets commensurate with their value and importance to the Council. Risks will be determined and assessed and appropriate control measures put in place to minimise such risks. The Council s Risk Management Group is responsible for developing and monitoring such risks although Information Security is an operational service risk which is managed by ICT. 7. Education, Training & Awareness of Information Security 7.1 All employees will be asked to read, familiarise and ensure they have understood this Policy and their role and responsibilities in complying with it. Page 13 of 16

14 7.2 ICT Services will actively promote this Policy and other related policies, both internally and externally, and will make staff aware of any changes or new policies as and when they occur. 7.3 All users must be made aware and have access to appropriate Information Security guidance and where users are to work with information of a personal or sensitive nature they must receive appropriate information security awareness training. 8. Business Continuity & ICT Disaster Recovery 8.1 The Council will aim to provide business continuity for its critical information systems in the event of systems failure The purpose of a Business Continuity Plan is to reduce, to an acceptable level, the actual or potential disruption caused by disasters and/or failures of security. The role of the plan is to provide documented pre-agreed decisions and procedures for responding to incidents in order to continue business operations in relation to people, premises, ICT, information, supplies and stakeholders. The Business Continuity Plan coordinates several areas of response and is owned by the Group Director for Environmental Services The purpose of an ICT Disaster Recovery Plan is to reduce, to an acceptable level, the actual or potential disruption caused by disasters and/or failures of security. The role of the plan is to provide documented pre-agreed decisions and procedures for responding to incidents in order to continue business operations specifically in relation to ICT services. This approved plan forms part of the wider Business Continuity Plan and is owned by ICT. 8.3 The risk management process will provide a means of considering the risks to each information asset and the controls needed to reduce the risk of failure. A combination of preventative and recovery controls will be used. 9. Reporting Security Events (Breach of Controls) 9.1 Any employee or information user of the Council who considers that this policy has not been or is not being followed by any user in respect of computer, , paper documents or internet usage, the results of which could be damaging to other staff, service users, or the Council, or illegal in any way, must raise the matter with their line manager, or if not appropriate, the ICT Service Desk. All security events must be reported to the ICT Service Desk ( ictservicedesk@rhondda-cynon-taf.gov.uk) as defined in the Information Security Incident Management Policy as soon as they become apparent. Security events can be any instance of security breach, threat, weakness or malfunction, which may impact on the security of the Council s Information Assets. Page 14 of 16

15 9.2 All staff or agents of the Council will be encouraged to report any security event, actual or potential, without fear of recrimination. Every effort will be made to learn lessons from security events in order that preventative controls may be put in place for the future. 9.3 Where an employee or computer or information user of the Council inadvertently makes a genuine mistake or the unexpected occurs it should be reported to their line manager or the ICT Service Desk without delay. 10. Consequences of Breach to Policy 10.1 Any breach of this and related policies may warrant further investigation that may lead to an investigation by Internal Audit, the Council s disciplinary procedures being invoked and in certain circumstances, may necessitate the involvement of the Information Commissioner s Office and/or the Police To help facilitate any such investigation, the Information Commissioners Office and/or the Council reserves the right to monitor, access and review any individuals use of Council Computer equipment, information systems and facilities covered by this policy without the additional consent being required from any employee. ICT Services monitoring tools for example are capable of detailing an individual user s activity during the day such as files accessed, created and deleted, access to the internet, websites visited, the times visited and the number of s sent / received on any given day. Using this information, monitoring and surveillance may be undertaken for the purpose of business operations, audit and security or where there is reason to believe that a breach of security or a breach of policy has occurred. In some circumstances equipment including personal storage media may be seized by ICT Services for forensic analysis. Exemptions from this policy: Authorised ICT System Administrators are exempt from this policy as their associated userids enable those authorised to offer the ability to provide proactive maintenance of Council owned computer systems and protection of Information Assets. At all other times ICT officers must adhere to this Policy. 11. Compliance with Legislation 11.1 The Council, its employees and agents must comply with all UK and European legislation that is pertinent to the security of its ICT facilities. This legislation includes the following and any statutory modifications or amendments: The Civil Contingencies Act (2004) Freedom of Information Act (2000) The Regulation of Investigatory Powers Act (2000) Page 15 of 16

16 STATEMENT DATE: 01/04/2012 Electronic Communications Act (2000) The Data Protection Act (1998) The Computer Misuse Act (1990) The Malicious Communications Act (1988) The Copyright, Designs and Patents Act (1988) The Telecommunications Act (1984) The Theft Act (1968) The Obscene Publications Act (1964) The Criminal Justice Act (1987, 1991 and 2003) The Race Relations Act (1965) Contract Law (a range of UK and EU legislation) UK and EU Human Rights Legislation 12. Reminder of General Responsibilities All Group Directors, Directors, Service Directors and Heads of Service are directly responsible for implementing this Policy within their Service areas, and for adherence by their staff. It is the responsibility of each employee to familiarise themselves with this Policy and fully adhere to its requirements. Any breaches of this and related policies may warrant further investigation that may lead to the Council s disciplinary procedures being invoked, an investigation by Internal Audit and, in certain circumstances, may necessitate the involvement of the Police End of policy document Page 16 of 16

RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL INFORMATION SECURITY INCIDENT MANAGEMENT POLICY Version 2.0.1

RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL INFORMATION SECURITY INCIDENT MANAGEMENT POLICY Version 2.0.1 RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL INFORMATION SECURITY INCIDENT MANAGEMENT POLICY Version 2.0.1 Revised and effective from 1st April 2012 Document Control Organisation Title Author Filename Owner

More information

Merthyr Tydfil County Borough Council. Information Security Policy

Merthyr Tydfil County Borough Council. Information Security Policy Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Corporate Information Security Management Policy

Corporate Information Security Management Policy Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification

More information

Mike Casey Director of IT

Mike Casey Director of IT Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

Data Protection Policy

Data Protection Policy Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and

More information

Information Security Incident Management Policy and Procedure

Information Security Incident Management Policy and Procedure Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2

Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2 Information security and paper-based data storage and disposal NOT PROTECTIVELY MARKED INFORMATION SECURITY POLICY Version 2.2 Title Subject Version Date Author Protective Marking Classification INFORMATION

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

Information Services. Protecting information. It s everyone s responsibility

Information Services. Protecting information. It s everyone s responsibility Information Services Protecting information It s everyone s responsibility Protecting information >> Contents >> Contents Introduction - we are all responsible for protecting information 03 The golden

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

06100 POLICY SECURITY AND INFORMATION ASSURANCE

06100 POLICY SECURITY AND INFORMATION ASSURANCE Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Network Security Policy

Network Security Policy Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

Corporate ICT & Data Management. Data Protection Policy

Corporate ICT & Data Management. Data Protection Policy 90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

INFORMATION SECURITY MANAGEMENT POLICY

INFORMATION SECURITY MANAGEMENT POLICY INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Security Incident Management Policy

Security Incident Management Policy Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015

More information

Security Incident Policy

Security Incident Policy Organisation Title Author Owner Protective Marking Somerset County Council Security Incident Policy Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council will

More information

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards EMMANUEL CE VA MIDDLE SCHOOL IT Security Standards 1. Policy Statement The work of Schools and the County Council is increasingly reliant upon Information & Communication Technology (ICT) and the data

More information

Remote Access and Home Working Policy London Borough of Barnet

Remote Access and Home Working Policy London Borough of Barnet Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and

More information

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Incident Response Policy Reference Number Title CSD-012 Information Security Incident Response Policy Version Number 1.2 Document Status Document Classification

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information

More information

Acceptable Use Guidelines

Acceptable Use Guidelines Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency

More information

Central Bedfordshire Council. IT Acceptable Use Policy. Version 1.7 January 2016 Not Protected. Not Protected Page 1 of 11

Central Bedfordshire Council. IT Acceptable Use Policy. Version 1.7 January 2016 Not Protected. Not Protected Page 1 of 11 Central Bedfordshire Council IT Acceptable Use Policy Version 1.7 January 2016 Not Protected Not Protected Page 1 of 11 Policy Approval Central Bedfordshire Council acknowledges that information is a valuable

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Harper Adams University College. Information Security Policy

Harper Adams University College. Information Security Policy Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

Corporate Affairs Overview and Scrutiny Committee

Corporate Affairs Overview and Scrutiny Committee Agenda item: 4 Committee: Corporate Affairs Overview and Scrutiny Committee Date of meeting: 29 January 2009 Subject: Lead Officer: Portfolio Holder: Link to Council Priorities: Exempt information: Delegated

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;

PRIVACY POLICY. comply with the Australian Privacy Principles (APPs); ensure that we manage your personal information openly and transparently; PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal

More information