Compliance Action Planning for BS 7958 CCTV Management and Operation Code of Practice
|
|
- Jocelin Stevenson
- 7 years ago
- Views:
Transcription
1 Compliance Action Planning for BS 7958 CCTV Management and Operation Code of Practice Quality Management Project No: Document Date 8 th July 2014 Document Title Compliance Action Planning for BS 7958 CCTV Management and Operation Code of Practice Prepared by Neil Brailsford Signature Checked by David Ventham Signature Approved by Nick Hewitson Signature Revision History Revision # Details Prepared By Checked Date of Issue By 1.1 Internal Draft NB DV 8 July 2014 A1 Issued to Client NB DV 8 July 2014 Page 1 of 5
2 1.0 Background Traditionally in the UK, CCTV operations have been managed by common sense and use of the organisation s normal working practices, which may or may not have been adapted to suit. However, in 1999/2005 and then revised in 2009 the British Standards Institute issued BS 7958 Closed Circuit Television (CCTV) Management and Operation Code of Practice. CCTV Control Rooms that directly or inadvertently monitor public spaces should be managed and operated in accordance with BS This British Standard states the requirements for a management system and covers everything from the physical layout of the control room, control room operation, personnel training and HR matters, evidence gathering, data protection, information security and business continuity. Examples of public spaces are: Town centres; Shopping malls; Public buildings (such as museums, sports centres and civic centres); Airports; Train stations; Bus stations; o Onboard vehicle; Traffic management systems; Car parks. These systems must be managed and operated correctly, failure to comply with BS 7958 can expose the organisation to risk of litigation, vote of no confidence and adverse publicity at the least. At worst, it might lose or accidentally make public vital information. Figure1: Typical CCTV Control Room Page 2 of 5
3 2.0 What The BS 7958 Standard Requires Of You The Code of Practice issued by the British Standards Institute as BS 7958 'CCTV - Management and Operation' incorporates the applicable legislation from the Data Protection Act 1998 and the Human Rights Act The Data Protection Act 1998 requires that all 'Data Controllers', or designated managers as appointed by the CCTV system owners, keep secure the details (images) relating to individuals. The management system in BS 7958 'CCTV - Management and Operation' (Section 4.6.4) calls for 'audit trails of systems used for - the media register - the operators log - the incident log - witness statements - faults and maintenance records - the security of data - authorised visitors.' It also calls for effective 'Warning and Information Signs' compliant with the Data Protection Act Other codes and standards which are imbedded within BS 7958 are: Information Commissioners Office (ICO) CCTV Code of Practice 2008; Association of Chief Police Officers (ACPO) and UK Home Office National CCTV Strategy 2007; BS Code of Practice for digital CCTV recording systems for the purpose of image export to be used as evidence; Code of Practice for the Identification of Persons; Regulation of Investigatory Powers Act 2000 (RIPA); and SIA (accredited level 2 award) CCTV licence. Staff screening processes along with staff training and records are an important part of BS Irrespective of the ownership, this code covers CCTV schemes used in areas where the public would have a right to visit. These areas include, but are not limited to: A place that is privately owned, but where the public perceive no boundary; A place where a public service is offered; Public footpaths, roads, bridle-ways, etc; Educational establishments and hospitals; Sports grounds, supermarkets and housing areas. 3.0 How We Can Help You To Achieve Compliance Organisations wishing to reduce risk exposure and at least use best practices should have an independent compliance audit of their system and operational procedures, with remedial plans for any non compliance. This reduces the risk and exposure to your organisation, increases efficiencies and provides a better service. Page 3 of 5
4 Smart Consultation Limited offer Compliance Action Planning (CAP). We can take care of the complete development and operation service of a management system based on BS 7958:2005/2009 to give you confidence in meeting full compliance with all applicable regulations and anticipation of, and preparation for, all foreseeable eventualities. CCTV is our core skill and we are experienced at assessing the BS 7958 compliance of control rooms and understanding where non compliances exist and developing remedial action plans to meet the standard. We develop a management system to meet your needs so that compliance is locked into your normal operational activity. We use a safe hands approach to help you maintain compliance in the future, with continuous improvement to help changes brought about by changing regulations and legal requirements. We are not a UKAS approved certification body and cannot issue an audited compliance certificate but what we can do is help you plan the path to compliance and, with our guidance, get you from where you are on that journey to compliance. We work with you to audit your system and understand your current status, defining where you have compliance or the understanding of any non compliance and what you need to do to reach compliance. We use an in-depth check list for each relevant part of the standard to inspect your system. We are here to HELP YOU and we never forget that your system, your staff and your worries are special and we tailor our help and our plans to meet YOUR NEEDS. 4.0 Current BS7958 review BS7958 is currently in review with a plan for an updated version of the standard to be released in early It is being revised in line with the Home Office Surveillance Camera Code of Practice which was released in June This code sets out 12 guiding principles which should apply to all public space surveillance camera systems. This code has been developed to address concerns over the potential for abuse or misuse of surveillance in public places. The Surveillance Camera Commission (a statutory appointment made by the Home Secretary under the Protection of Freedoms Act 2012) has a number of statutory functions, these include: Encouraging compliance with this code of practice; Reviewing the operation of this code; Providing advice about this code (including breaches of it). Page 4 of 5
5 The Home Office Surveillance Camera Code of Practice defines best practice in the operation and management of CCTV systems. The new revision of BS7958 will provide a path to meet best practice and to be independently audited. While the Code of Practice and BS7958 isn t a legal requirement for the vast majority of CCTV camera system operators (there are some relevant authorities who are defined by section 33 of the Protection of Freedoms Act 2012 who must have regard to the code); it is seen as a significant step in delivering the government s commitment to the further regulation of CCTV. Other bodies may be considered for inclusion as relevant authorities who will have to have regard to the code in the future. The achievement of BS7958 certification will therefore provide an operational benchmark and a robust defence in the event of any legal challenge to the existence or use of a CCTV system. Our staff are involved in the review of BS7958 and we are therefore well placed to help you meet not only the current version of the standard but also to be ready with appropriate policies and procedures in place to meet the next revision of the standard. 5.0 Contact Us For additional information please contact us at: Smart CCTV Limited 8 Dragoon House Hussar Court Westside View Waterlooville Hampshire PO7 7SF Telephone Number: +44 (0) Nick.hewitson@smartcctvltd.com Neil.brailsford@smartcctvltd.com w ww.smartcctvltd.com Page 5 of 5
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
More informationPolicy for Management of CCTV on Waste Operation Vehicles
Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for
More informationUlster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title IT Monitoring Policy 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information Services
More informationClosed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
More informationMinding Your Business BUSINESS WATCH
Minding Your Business BUSINESS WATCH Introduction BUSINESS WATCH At Business Watch we understand that the security of your property and business is important, but it may not be cost effective to install
More informationBuckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
More informationWhite Paper. Portsmouth Bluetooth and Wi-Fi journey time and congestion monitoring system
Portsmouth Bluetooth and Wi-Fi journey time and congestion monitoring system Quality Management Project No: N/A Document Date 29 Mar 2014 Portsmouth Bluetooth and Wi-Fi journey time and congestion monitoring
More informationCorporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
More informationPS 172 Protective Monitoring Policy
PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;
More informationInformation governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
More informationPolicy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
More informationHighland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
More informationSelf assessment tool. Using this tool
Self assessment tool How well does your organisation comply with the 12 guiding principles of the surveillance camera code of practice? Complete this easy to use self assessment tool to find out if you
More informationWhite Paper. Sensor Technologies for the Protection of remote assets
White Paper Sensor Technologies for the Protection of remote assets In today s complex geopolitical environment, Government Agencies and Public Bodies have a responsibility to provide protection and resilience
More informationWILTSHIRE POLICE FORCE POLICY
Template v4 WILTSHIRE POLICE FORCE POLICY BUSINESS CONTINUITY MANAGEMENT SYSTEMS (BCMS) Effective from: July 2013 Version: 2.0 Next Review Date: July 2015 POLICY STATEMENT Wiltshire Police has a statutory
More informationInformation Governance Strategy
Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version
More informationCODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION
CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION Made by the Secretary of State for the Home Department under sections 39 and 39A of the Police Act 1996 and sections 28, 28A, 73 and 73A of the
More informationINFORMATION SECURITY: UNDERSTANDING BS 7799. BS 7799 is the most influential, globally recognised standard for information security management.
FACTSHEET The essence of BS 7799 is that a sound Information Security Management System (ISMS) should be established within organisations. The purpose of this is to ensure that an organisation s information
More informationFleet Compliance. Presented by: Richard Evans
Presented by: Richard Evans Turn data into meaningful management information with smart data capture & processing Do you act on your findings with full stakeholder support? Reporting and tackling non conformance
More informationRecords Retention and Disposal Schedule. Information Management
Records Retention and Disposal Schedule Information Management Version control Version Author Policy Approved By Approval Date Publication Date Review Due V 1.0 Information Governance Unit Philip Jones,
More informationInformation Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy
Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that
More informationInformation Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
More informationUniversity of Liverpool
University of Liverpool IT Procurement & Third Party Security Policy (Procurement of IT Assets, Services and Release of University Owned Data) Reference Number Title CSD-017 IT Procurement & Third Party
More informationSecurity. Deployment Protocol for BWC s (Appendix H)
(Appendix H) Ref: 1012 Rev: Author: Approver: Date: 24/08/12 Introduction North East Lincolnshire Partnership Car Parks Department owns 18 Body Worn cameras, hereinafter referred to as BWCs. This document
More informationUNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
More informationINFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
More informationEmployee Surveillance and the Law
One day conference Employee Surveillance and the Law Understanding the challenges posed by surveillance and monitoring in the workplace Supported by 4 November 2015 Central London Book online at www.regonline.com/employeesurveillance
More informationSECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
More informationRegulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
More informationSUBJECT ACCESS REQUEST PROCEDURE
SUBJECT ACCESS REQUEST PROCEDURE Document History Document Reference: Document Purpose: IG31 This procedure sets out the responsibility for staff when receiving requests for information provided under
More informationSmart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)
Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature
More informationRemote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
More informationGLASGOW SCHOOL OF ART OCCUPATIONAL HEALTH AND SAFETY POLICY. 1. Occupational Health and Safety Policy Statement 1
GLASGOW SCHOOL OF ART OCCUPATIONAL HEALTH AND SAFETY POLICY CONTENTS PAGE 1. Occupational Health and Safety Policy Statement 1 2. Occupational Health and Safety Management System 2 3. Organisational Management
More informationInformation Governance Framework
Information Governance Framework March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aim 2 3 Purpose, Values and Principles 2 4 Scope 3 5 Roles and Responsibilities 3 6 Review 5 Appendix 1 - Information
More informationInformation Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.
Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments
More informationData Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
More informationSecuring safe, clean drinking water for all
Securing safe, clean drinking water for all Enforcement policy Introduction The Drinking Water Inspectorate (DWI) is the independent regulator of drinking water in England and Wales set up in 1990 by Parliament
More informationCCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
More informationPolice National Computer (PNC) Page 1 of 20 Guidance Police National Computer (PNC) version 5.0 Valid from 23 January 2014
Police (PNC) Page 1 of 20 Guidance Police (PNC) version 5.0 Valid from 23 January 2014 Police (PNC) What is the Police and Legislation and Home Office access to Police Requesting Police checks Updating
More informationFLEET ROAD RISK POLICY
FLEET ROAD RISK POLICY SGPilliner U:\PolicieandProcedures\FleetRoadRiskPolicy\FleetRoadRiskPolicy040903 1 Fleet Road Risk Policy. 1.0 Introduction. Carmarthenshire County Council is committed to manage
More informationCorporate Records Management Policy
Corporate Records Management Policy Introduction Part 1 Records Management Policy Statement. February 2011 Part 2 Records Management Strategy. February 2011 Norfolk County Council Information Management
More informationPolice Service of Scotland Security Systems Policy
Police Service of Scotland Security Systems Policy Version 0.12 Jan 2012 Contents Document Information...4 Version Control...5 Version Distribution...8 DEFINITIONS 9 1. INTRODUCTION...12 1.1 Scope of Policy...12
More informationInformation Governance Policy
Information Governance Policy Version: Revised: Consultation: Ratified by: 1.0 Information Governance Committee Governance Committee Date ratified: 19 March 2008 Name of originator/author: David McGrath
More informationA customer s guide to BS 8418 detector-activated remotely monitored CCTV systems
A customer s guide to BS 8418 detector-activated remotely monitored CCTV systems May 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk
More information06100 POLICY SECURITY AND INFORMATION ASSURANCE
Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information
More informationAutomatic Number Plate Recognition (ANPR) Systems
Automatic Number Plate Recognition (ANPR) Systems Code of Practice Date: August 2014 Economy, Enterprise and Environment Directorate Document History Date Author Change 07/01/2014 Business & Enterprise
More informationmaintenance of CCTV surveillance systems code of practice
maintenance of CCTV surveillance systems code of practice Issue 3 January 2015 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk
More informationTRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales
TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street
More informationData Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
More informationLONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
More informationOnline Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
More informationLIFT MANAGEMENT. Version 01 / November 2015 Page 1 of 9 Approved by Health & Safety Committee
LIFT MANAGEMENT Version 01 / November 2015 Page 1 of 9 Approved by Health & Safety Committee This is a controlled document. It should not be altered in any way without the express permission of the author
More informationWEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
More informationTRANSPORT FOR LONDON (TfL) LOW EMISSIONS CERTIFICATE (LEC) GUIDANCE NOTES FOR THE COMPANY AUDIT PROCESS. LEC (Company Audit) Guidance Notes
TRANSPORT FOR LONDON (TfL) LOW EMISSIONS CERTIFICATE (LEC) GUIDANCE NOTES FOR THE COMPANY AUDIT PROCESS LEC (Company Audit) Guidance Notes Glossary of Terms Transport for London (TfL) London Low Emission
More informationDATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
More informationTRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason
TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Reference Number HR 2012 046 Version: 1 Status: Final Author: Jane Thomas Job Title HR Manager Amendment
More informationSurveillance Camera Code of Practice. June 2013
Surveillance Camera Code of Practice June 2013 Surveillance Camera Code of Practice Presented to Parliament Pursuant to Section 30 (1) (a) of the Protection of Freedoms Act 2012 June 2013 London: The Stationery
More informationThe effects of CCTV on Crime What Works Briefing
The effects of CCTV on Crime What Works Briefing Overview: The review finds that use of Close Circuit Television (CCTV) can lead to a small reduction in crime. CCTV is more effective when directed against
More informationA guide to access control for manufacturing sites
A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round
More informationInformation Governance Strategy Includes Information risk & incident management methodology
Version 2.0 LOGOLOGO Information Governance Strategy Includes Information risk & incident management methodology Approved by: Quality & Governance Committee Ratification date: May 2014 Review date: May
More informationCorporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
More informationCode of Corporate Governance
www.surreycc.gov.uk Making Surrey a better place Code of Corporate Governance October 2013 1 This page is intentionally blank 2 CONTENTS PAGE Commitment to good governance 4 Good governance principles
More informationLEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
More informationAPPENDIX U NOT PROTECTIVELY MARKED Page 1 of 6
APPENDIX U Page 1 of 6 REQUIREMENTS FOR COMPANIES INSTALLING AND MONITORING AFTER-THEFT SYSTEMS WITH VEHICLE IMMOBILISATION FOR VEHICLE RECOVERY 1. INTRODUCTION 1.1 This appendix sets out the police requirements
More informationParliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
More informationASBESTOS MANAGEMENT PLAN. Borough of Poole Transportation Services, Property Management, Civic Centre, Poole, Dorset BH15 2RU
ASBESTOS MANAGEMENT PLAN Borough of Poole Transportation Services, Property Management, Civic Centre, Poole, Dorset BH15 2RU CONTENTS 1. INTRODUCTION 2. HOW DOES THE BOROUGH OF POOLE MANAGE ITS ASBESTOS
More informationSteps to take after a fall in a public place
Steps to take after a fall in a public place Henry Carus + Associates 1 Contents 4 Common situations 8 What to do right away 10 Dealing with those responsible 11 Dealing with the responsible company s
More informationMANAGEMENT SYSTEM CERTIFICATION CONDITIONS & USE OF THE CERTIFICATION MARK
MANAGEMENT SYSTEM CERTIFICATION CONDITIONS & USE OF THE CERTIFICATION MARK Vehicle Certification Agency 1, The Eastgate Centre Eastgate Road Bristol BS5 6XX Telephone: 0300 330 5797 e-mail: enquiries@vca.gov.uk
More informationInformation Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
More informationEssex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion
Essex Fire Authority Fleet Management Internal Audit Report (4.12/13) 28 February 2013 FINAL Overall Opinion Essex Fire Authority Fleet Management 4.12/13 CONTENTS Section Page Executive Summary 1 Action
More informationCode of Practice on the Identity Card Number and other Personal Identifiers Compliance Guide for Data Users
Code of Practice on the Identity Card Number and other Personal Identifiers Compliance Guide for Data Users INTRODUCTION What does the code of practice cover? The code of practice gives practical guidance
More informationIf you require any further information, or have any queries, please contact the Quality Improvement and Change Management Unit on 9222 2197.
Clinical Review and Audit Committee Annual Report to the Public for 2015 On Quality Improvement Activities Undertaken or Overseen By Clinical Review and Audit Committee Department of Corrective Services
More informationPOLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
More informationAssets & Street Services. Business Plan 2014/15
Assets & Street Services Business Plan /15 Business Plan -15 Directorate: - Assets and Street Services Table 1: Service Activities from Corporate Plan Delivery Plan CPDP 1. Aim 2 Priority 12 By March We
More informationREPORT 4 FOR DECISION. This report will be considered in public
REPORT 4 Subject: Safety Readiness for the Summer 2013 Events Programme Agenda item: Public Item 7 Report No: 4 Meeting date: 28 May 2013 Report to: Board Report of: Mark Camley, Interim Executive Director
More informationInformation Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
More informationLord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000
Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under
More informationCCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
More informationPROCEDURE Transaction Monitoring and Audit. Number: G 0811 Date Published: 6 June 2013
1.0 Summary of Changes This procedure has been amended to include the Police National Database (PND). 2.0 About this Procedure The Chief Constable will assume the responsibilities of the data controller
More informationReport to Trust Board
Report to Trust Board Date of Board Meeting: 25 th November 2009 Subject: Trust Board Lead: NHS Litigation Authority (NHSLA) Assessment Preparation Rosie Musson Head of and Partnerships Presented by: Rosie
More informationInformation Governance Strategy Includes Information risk & incident management methodology
Version 3.0 LOGOLOGO Information Governance Strategy Includes Information risk & incident management methodology Approved by: Quality Assurance Group Ratification date: March 2015 Review date: March 2016
More informationInformation Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
More informationDefinition document for colleges of further education
Freedom of Information Act Definition document for colleges of further education For the avoidance of doubt, this document covers further education colleges in England, Wales and Northern Ireland that
More information1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.
Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review
More informationHow To Protect Your Privacy In The Workplace
Review of the Workplace Surveillance Act 2005 (NSW) Submission to the NSW Attorney- General s Department January 2011 e m a i l: m a i l @ p r i v a c y. o r g. a u w e bsite : w w w. p r i v a c y. o
More informationSURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
More informationWe then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective.
Good Practice Audit outcomes analysis Police Forces April 2013 to April 2014 This report is based on the final audit reports the ICO completed in the Criminal Justice sector, specifically of Police forces,
More informationTraffic Management Plan - Depot Procedure
Traffic Management Plan - Depot Procedure Date: 1/8/13 Version: TMPDPGWT001 Status: Approved 1. Purpose This procedure outlines the traffic management plan which must be followed for the Depots. 2. Scope
More informationINFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
More informationDrinking Water Quality Management Plan Review and Audit Guideline
Drinking Water Quality Management Plan Review and Audit Guideline This publication has been compiled by Queensland Water Supply Regulator, Department of Energy and Water Supply. State of Queensland, 2013.
More informationMerton Parking Service CCTV Enforcement Manual
Merton Parking Service CCTV Enforcement Manual Version 1.3 April 2013 Introduction Legislation Data protection Health & Safety CCCTV camera equipment Mobile CCTV vehicles CCTV control room CCTV evidence
More informationCOMPLIANCE FRAMEWORK AND REPORTING GUIDELINES
COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES DRAFT FOR CONSULTATION June 2015 38 Cavenagh Street DARWIN NT 0800 Postal Address GPO Box 915 DARWIN NT 0801 Email: utilities.commission@nt.gov.au Website:
More informationDASDRIVE ULTIMATE LEGAL PROTECTION KEY FACTS BROCHURE. Act quickly after an accident and call us now on
DASDRIVE ULTIMATE LEGAL PROTECTION KEY FACTS BROCHURE Act quickly after an accident and call us now on 0800 783 6066 2 DASDRIVE ULTIMATE If you ve been unfortunate enough to have been involved in a motor
More informationExecutive Summary. The Review Group Approach to the Review
Executive Summary The Taxi Regulation Review was a wide ranging review carried out in line with a Government decision of June 2011. The review was chaired by Mr. Alan Kelly TD, Minister of State for Public
More informationManaging Asbestos Policy
Managing Asbestos Policy Liverpool Mutual Homes Page 1 of 16 Table of Contents 1. MANAGEMENT INFORMATION 2. POLICY STATEMENT 3. POLICY AIMS AND KEY OBJECTIVES 4. INTRODUCTION 5. DETAIL 6. LINKS TO LMH
More informationRIPA (Regulations and Investigatory Powers Act)
Dartmoor National Park Authority INTERNET MONITORING POLICY & INVESTIGATION PROTOCOL Approved: February 2010 Review Date: September 2010 1. Introduction Private use of the computer facilities is covered
More informationUniversity of Liverpool
University of Liverpool Information Security Incident Response Policy Reference Number Title CSD-012 Information Security Incident Response Policy Version Number 1.2 Document Status Document Classification
More informationData Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
More informationSo the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
More informationHuman Resources Policy No. HR46
Human Resources Policy No. HR46 Maintaining Personal Files and ESR Records Additionally refer to HR04 Verification of Professional Registration HR33 Recruitment and Selection HR34 Policy for Carrying Out
More information