Clinical Quality and Safety Committee. 3 Years or dependent on change in legislation

Size: px
Start display at page:

Download "Clinical Quality and Safety Committee. 3 Years or dependent on change in legislation"

Transcription

1 Title: Procedural Document Type: Reference: CQC Outcome: Policy & Procedure Policy & Procedure IT-P20 Version: V 1.1 Approved by: Ratified by: Outcome 6E Professional Practice Forum Date ratified: 22 January 2015 Freedom of Information: Name of originator/author: Name of responsible team: Review Frequency: Clinical Quality and Safety Committee This document can be released IT Security/IG Manager Information Governance Review date: 22 nd January 2018 Target audience: 3 Years or dependent on change in legislation All staff, volunteers and contactors working on behalf of PCH 1. Summary The purpose of this policy & procedure is to aid the effective and appropriate use of to reduce the risk of adverse events by: Setting out the rules governing the sending, receiving, and storing of , including patient identifiable and commercially sensitive data. Establishing PCH and user rights and responsibilities for the use of the system. Promoting awareness of and adherence to current legal requirements and NHS information governance standards. Defining actions to be taken in the event of an incident. 2. Related Organisation Policies Records Management Policy & Procedure Incident Management Policy Acceptable Use Policy Disciplinary Policy IT Security Policy Mobile IT Security Policy Policy Page 1 of 26

2 Confidentiality Code of Conduct for Employees Anti Fraud and Bribery Policy Whistleblowing Policy 3. Related legislation and national guidance The Data Protection Act 1998 The Human Rights Act 1998 Common law duty of confidentiality The Computer Misuse Act 1990 Caldicott Principles NHS Care Record Guarantee Telecommunications (Lawful Business Practice)(Interception of Communications) Regulations 2000 ( Lawful Business Regulations ) Bribery Act Training Requirements It is not anticipated that training will be required, however practical support and assistance can be obtained through Cornwall IT Services (CITS) service on Tel: Equality Impact Assessment The organisation aims to design and implement services, policies and measures that meet the diverse needs of our service, population and workforce, ensuring that none are placed at a disadvantage over others. The Equality Impact Assessment Tool is designed to help you consider the needs and assess the impact of your policy. 6. This document replaces: Version 1 7. Process for monitoring compliance and effectiveness This will be done by ensuring that the system and its contents are appropriate as described in this policy. Any information held or passing through the system is the property of the Organisation. All used on local NHS systems is monitored for viruses. content is automatically scanned for potentially offensive content and will be blocked if it has been identified as containing restricted words. Policy Page 2 of 26

3 Inbound s are automatically scanned and blocked/quarantined if they are considered to be potentially unsolicited s (i.e. SPAM). All (incoming and outgoing) on local NHS systems is logged automatically. Monitoring logs are audited periodically. The use of is not private. The content of is not routinely monitored, but the Organisation reserves the right to access, read, print, or delete s at any time. Accounts may be accessed as part of a formal investigation of a suspected breach of Organisation policies or in the prevention and detection of crime. Any monitoring or interception of communications will be carried out in accordance with legislation such as the Regulation of Investigatory Powers Act 2000, the Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000, the Data Protection Act 1998, the Human Rights Act Element to be monitored Lead Tool Frequency Reporting arrangements Acting on recommendations and Lead(s) Change in practice and lessons to be shared Outgoing s are recorded automatically to logs recording who sent the , to whom, Subject title and attachment information. IT Security Team (CITS shared service) Detailed information on the content can be retrieved from Groupwise or backup tape if necessary. Logs are created atomically when s are sent and received. Detailed information on the content of s are only accessed as part of an authorised investigation (IG Lead) or to resolve maintenance issues with the permission of the user. Breaches of this policy will be reported to the IG Lead and may be passed to the appropriate line manager, Personnel Dept. or Counter Fraud Specialist as appropriate. IT Security Team Required changes to practice will be identified following changes in legislation, Department of Health IG Toolkit requirements and as a result in any investigations. Changes will be recommended to the Information Governance Sub Committee for adoption and this will be disseminated to staff via the Document Library and staff bulletin as appropriate. Policy Page 3 of 26

4 Version Control Table Version Changes Made by Date Summary of Changes No (Name and Job Title) June Adopted policy Alan Gerrish June Updated in accordance with Countywide policy and to include actions to be taken in the event of a breach of confidentiality Gina Matthews, IG Manager (Interim) This document is to be retained for 10 years from the date of expiry. Policy Page 4 of 26

5 Table of Contents Version Control Table Introduction Scope Definitions/Glossary Ownership, responsibilities and rights Duties Roles of the Manager: Roles of the Individual User: Role of Cornwall IT Service Standards of Practice Managing s Use of s Legal requirements Security Personal use Forwarding Misuse of the system Sending attachments Sending confidential information by Patient level, sensitive or confidential information NHS Mail Assistance Retention and Destruction Breaches of this Policy Liability Appendix 1: Encryption Decision Tree Appendix 2: Sending & Receiving Encrypted s Procedure Policy Page 5 of 26

6 1. Introduction is an established method for day to day internal and external communication by NHS organisations. It can be of great benefit to the NHS when used appropriately. Its use, however, also exposes the Organisation and individual users to risks. This includes the risk of legal action due to breaches of, for example, data protection, and confidentiality requirements, threats to IT and information security, and ineffective communication. If these risks materialise either the Organisation or the individual employee are at risk of prosecution, can have a negative impact on the reputation of the Organisation and can lead to financial penalty following legal action. Care must therefore always be given to ensure that the is to the intended recipient and that the content is appropriate to be sent as an . is not always the best way to communicate information as messages can often be misunderstood. The pure volume of messages can also be prohibitive to effective communication as a result of overload. s should be treated with the same level of attention that is given to drafting and managing formal letters and memos. As well as taking care over how messages are written, s should be managed appropriately after they have been sent or received. This policy clearly sets the Organisation s expectations of staff, managers and the CITS organisation in the use and management of the system, including accessing non-work accounts on Organisation systems. Staff should ensure that they are familiar with the content of this policy and use it as a point of reference when dealing with messages. 2. Scope This policy applies to all users and their use of: NHS accounts (*.nhs.uk and *.nhs.net) for business and personal use on Organisation and non-organisation premises including from home, internet cafes and via portable media. Personal accounts (webmail) accessed from Organisation equipment. 3. Definitions/Glossary Cornwall NHS managed network the N3 and local networks and IT systems connecting the Organisations and partner organisations in Cornwall for the delivery of NHS services managed by CITS. Partner organisations Royal Cornwall Hospitals Trust, Cornwall Partnership Foundation Trust and Kernow Clinical Commissioning Group. Policy Page 6 of 26

7 User Any person who uses the Cornwall NHS managed network (including, but not limited to, all staff, non-executive directors, trainees, GP s, contractors, temporary staff, students, researchers, trainers and consultants) CITS Service Desk The IT helpdesk which provides IT support and administration functions as well as a central point to report IT related incidents. The service desk can be contacted by calling ext (if dialling from an internal phone, otherwise call ), CITS.Servicedesk@cornwall.nhs.uk of fax Ownership, responsibilities and rights The Organisation provides access to systems to employees and authorised non-organisation employees only for use in their: Work duties Work related educational purposes Work related research purposes The Organisation allows communications of a personal nature but this should be restricted to break times and not conducted during your contracted hours. Personal use does not include writing to statutory bodies or other formal establishments, as this could indicate that the views and opinions are that of the Organisation and not of the individual. This does not restrict the communication to utilities etc. No one has a right of access to an account. The inappropriate use or abuse of may result in access being withdrawn or amended. The Organisation reserves the right to remove or amend access to the system at any time in order to protect and preserve the integrity and confidentiality of the system. 5. Duties 5.1 Roles of the Manager: All managers are responsible for ensuring that the staff they manage have read and understood their responsibilities as described in both the Policy and Procedure and the Code of Connection, which encompasses confidentiality and security. They should ensure that their staff are equipped to fulfil those responsibilities; this will include covering it at their local induction and by identifying and meeting specific and generic training needs through personal development plans. Managers have specific responsibilities at each stage of a staff members employment: Policy Page 7 of 26

8 Starters Managers should ensure ALL new staff have reviewed and understood the Code of Conduct for Employees in Respect of Confidentiality. This must be completed prior to giving an employee access to the network or Organisation information systems. This is essential as failure to comply by an employee may lead to disciplinary action (the requirement to sign the manager s checklist declaration applies to ALL staff who work in the Organisation and not only those with network access). Managers are required to countersign this declaration to indicate that they have checked that the member of staff has read the relevant information governance policies and has had an opportunity to ask questions about anything they do not understand. Movers/Leavers Managers should ensure that when staff leave, or change role, that information stored within their accounts (including the s, contacts and documents) is moved to either an appropriate person or shared work area, for purposes of business continuity. It is also important that all patient and organisationally sensitive information is deleted from the account (unauthorised access to confidential information is a breach of the Data Protection Act and could lead to a fine of up to 500,000). If a staff member moves from one organisation to another within Cornwall Healthcare Community, it will be standard practice that the account moves with them from old to new organisation, in line with the principles of the NHS mail system but with the following safeguards in place: If a user account is of corporate significance, a process will be followed to remove all but personal s and contact details from the account prior to the person leaving. One option for this is to create a role based account e.g. Information Governance Lead that the leaving post holder moves/copies all non personal to the role based account. An alternative option is to rename the current account to the role based name, set up a new user account and to copy all personal from the role based account to the new individual account The CITS IT Security team should be contacted to agree a handling strategy in such situations. In the event of an exceptional circumstance or request by the current organisation, the account will not move to the new organisation. In this case the existing account will be renamed to an agreed account name, and a new account set up for the user should they ever be employed by another Cornwall Healthcare organisation. The organisation that the employee is leaving from will have ultimate control and decision making on what happens to an employee s account when moving from one Cornwall community organisation to another. Policy Page 8 of 26

9 Senior managers should ensure that managers within their Service are aware of their responsibilities in relation to informing staff about acceptable standards of information governance. 5.2 Roles of the Individual User: All employees with access to are responsible for: Complying with this policy and ensuring that they are aware of the requirements and standards of behaviour as described in section 6. Standards of Practice. Failure to do so could result in the removal of access and/or disciplinary action. Reporting information incidents and near misses, including breaches of this policy, in line with the Procedure for Reporting IM&T Security Incidents. See section 8 for what to do in the event of a breach of confidentiality. Ensuring that during periods of planned absence, they have made arrangements for third party access to their account by a relevant individual to ensure business continuity. If the absence is due to unforeseen events (such as illness), it may be necessary for an employee s line manager to request access to an employee s account (and documents) for the purposes of business continuity. Ensuring that any personal s (and documents) are saved in a separate folder to clearly distinguish them from work based information (e.g. labelled as Private, Confidential or Personal ), so that in the event that third party access is granted to the account, this information should not be accessed. In the event that third party access has been granted as a result of a period of absence or for the purposes normal collaborative working, only work based information should be accessed based on a specific need basis. Information clearly marked as private must not be accessed. If personal/private information is unintentionally accessed it must not be further disclosed. 5.3 Role of Cornwall IT Service To provide an system capable of compliance with the Department of Health IG Toolkit standards. While it is recognised that compliance can only be achieved at an individual s level, the core application must have the functionality for a person to be able to comply with NHS, local and national standards (e.g. securing information in transit). To administer the system (i.e. create and suspend accounts) in accordance with local procedures and to provide support in the use of the system. To provide guidance on use to ensure compliance with NHS Standards, Organisation Policies and UK Law. Policy Page 9 of 26

10 To ensure that there are monitoring facilities in place to ensure compliance with the Organisation s policies and UK Law. To provide information from an individual s account when requested to support a disciplinary investigation. 6. Standards of Practice This policy & procedure is based on current law, NHS Information Governance standards, and accepted standards of good practice; your duty to handle Organisation and person identifiable information appropriately arises out of common law, legal obligations, staff employment contracts, and professional obligations. Any breaches of this policy & procedure may result in your employment or your association with the Organisation being terminated. It may also bring into question your professional registration and may result in disciplinary, civil, or criminal proceedings. If there is anything that isn t clear or which you do not understand in this policy & procedure you must contact your line manager, in the first instance, or the Information Governance Manager for further information. 6.1 Managing s is a communication tool and not a records management system. Where the content of an may be needed in the future it is the responsibility of the user to ensure it is stored appropriately (archived) within the corporate records system. Where the content of an or attachments forms part of a record e.g. the patient record, it is the responsibility of the user to ensure it is added to, and becomes part of, that record whether held in hard copy or electronic format. Attachments can be saved to folders and where the content of an needs to be saved (i.e. evidence of comments from various sources forming a conclusion or action), it can be printed either to hard copy or electronically (PDF). s and attachments that do not relate to work activities or do not need to be kept as part of a record must be deleted as soon as possible after receipt. Storage space for s is limited to a maximum allocation, determined on available storage, backup facilities and maximum file sizes determined by the application. Exceeding the allocated space could result in the corruption and loss of your s and/or attachments. 6.2 Use of s Users should use only when it is appropriate to do so and not as a substitute for verbal communication. Policy Page 10 of 26

11 s should be worded with care because voice inflections cannot be picked up and it can be difficult to interpret the tone of a message. is a formal method of communication and should be treated the same as if writing a letter. messages must not include anything that would offend or embarrass any reader or would embarrass the Organisation if it found its way into the public domain. Write ALL s on the assumption that they may be read by others, particularly people who do not normally work for the Organisation such as temporary staff. is easily forwarded on and may be read by unintended recipients. is disclosable under the Data Protection Act, if relevant to the request for personal information. Limit the number of recipients the is sent too only as many recipients as is absolutely necessary. All users have a responsibility to not overload other staff with irrelevant s and not to put pressure on recipients by copying in people with authority unnecessarily. A concise and meaningful title must be put in the subject heading of every to indicate its content. This will assist the recipient in prioritising the opening of and aids the retrieval of opened messages. Users should not use as the only method of communication if an urgent response is required. Users must access regularly and respond to messages in a timely manner. Users should indicate when they are not able to read their (for example, when on annual leave) by using the tools within the system (such as an out of office notification). Inappropriate use may result in poor communication, impede the function of the Organisation s network system, impede the effective functioning of , or compromise the security of the system. Users must only use a disclaimer that has been authorised. Users must only use a signature in the correct format; surname forename job title Policy Page 11 of 26

12 organisation name in full user base address base telephone number work mobile telephone number fax number Peninsula Community Health is a not-for-profit Community Interest Company delivering NHS adult community health services in Cornwall and the Isles of Scilly 6.3 Legal requirements The use of must comply with the law such as the Data Protection Act 1998 and adhere to Organisation rules, codes of conduct, policies and procedures e.g. Acceptable Use Policy Users must comply with any licence conditions and copyright for any software they have access to. Users must not use for any purpose that conflicts with their contract of employment. messages have the same legal status as other written documents and must be disclosed in legal proceedings if relevant to the issues. The content of any s may be disclosable under the Data Protection Act Therefore, the author must ensure the content, style and language used is appropriate, as any data subjects mentioned may legally request access to the s under the Data Protection Act Improper statements may result in the Organisation and/or user being liable under law. 6.4 Security Passwords: All passwords and log in details for systems must be kept confidential (no member of staff should ever ask you to divulge your password). Sharing passwords or log in details will be considered misconduct. Where necessary, users can give proxy access to their account. This should normally be read access but may allow full access depending on the relationship. There is no right for a manager to demand access to a member of staff s account unless there is a legitimate business continuity, disciplinary reason, disciplinary investigation or request under the Data Protection Act that requires such access. In all cases this needs to be agreed by the Information Governance Lead. Policy Page 12 of 26

13 passwords should be changed regularly (at least every 3 months) and should be complex in nature, e.g.: Minimum length of 8 characters containing numeric and/or special characters Must not be easy to guess never use family members or pets names, telephone numbers, car registration number/make or model, etc. Must not be a recognisable word (these are vulnerable to automated dictionary hacks). If a tablet or smartphone has been set up to access work s, you must either password protect the device (preferable) or change the settings on the application to force the password to be entered each time s are accessed (i.e. turn off remember my password feature). Password protecting a device usually has the added advantage of encrypting the device. Organisation password security is particularly important as s are accessible via the internet using Webmail and therefore username and password are the only security safeguarding the information stored within a user s system. Users must lock their terminal when not at their computer, for example, to make a cup of tea, to attend a meeting or to go for lunch. Portable devices, including mobile and smart phones, used to store s must be encrypted. When accessing via a portable device or via webmail, it is the users responsibility to ensure that the is not viewable by any other person. Similar care should be taken to any printed s with confidential information. Printed s containing confidential information must be stored and disposed of securely. Business related s received into the Organisation system must not be forwarded onto personal accounts, non-nhs accounts or personal portable devices. 6.5 Personal use The personal use of the system is not discouraged providing that personal use is brief, is not used to store attachments, is carried out in the user s own time, does not detract from the user s work duties and does not disrupt the work of others. Personal s should be stored in a folder marked personal. Policy Page 13 of 26

14 Special care should be taken when using the Organisation s system to send personal s as these s will inherently carry the Organisation s signature and therefore may be, incorrectly, assumed to be sent on behalf of the Organisation rather than of a non-work and personal nature. This is of particular importance when sending s to statutory bodies or formal establishments where it would be easy to misinterpret the as a formal communication from one organisation to another. Only use your Organisation address to register with authorised social media sites when you have been approved to be acting on behalf of the Organisation. Entering into a Forum or a Blog and making informal suggestions or giving advice using the Organisations address could be perceived as formal NHS advice from the Organisation. In general, when registering for social media sites (Facebook, twitter, etc.) use a personal address, these can easily be created by signing up to Hotmail, Yahoo mail etc. When using personal webmail (Hotmail, Yahoo, etc.) you must never attach or send any Organisation or patient information. To do so would be a breach of NHS standards and the Data Protection Act and this will lead to disciplinary action. If you know that another user is sending information using this type of system, it should be reported immediately to the CITS Service Desk (ext. 1717) or direct to your IG Lead. 6.6 Forwarding Users must not automatically forward from their Organisation account or send confidential or sensitive Organisation information to non-nhs accounts. Examples of non-nhs accounts include Hotmail, Yahoo, AOL, and services provided by internet service providers. 6.7 Misuse of the system Users must not: Use the Organisation s to conduct private or freelance work for the purpose of commercial gain. Create, hold, send or forward s that have obscene, pornographic, sexually or racially offensive, defamatory, harassing or otherwise illegal content. (If you receive such a message you should report it to the CITS Service Desk immediately.) Create, hold, send or forward s that contain statements that are untrue, inaccurate, misleading or offensive about any person or organisation. Access and use another user s account without permission. If it is necessary to access another user s account then contact the CITS Service Desk for details of the necessary procedure. (Users should be Policy Page 14 of 26

15 aware that access to their account by authorised individuals may be necessary in periods of absence for business continuity reasons.) Send messages from another member of staff s account or under a name other than your own, unless for example Personal Assistants and other nominated staff are delegated access by their manager. In this instance the signature must clearly indicate that the message is being sent on the managers behalf. Send global s to ALL staff. There are processes that must be followed for such communications. Contact the Communications department who will ensure it is sent via approved routes (e.g. Bulletin). Send unsolicited s (spam) to large numbers of users unless it is directly relevant to the recipient s work. Send or forward chain letters or other similar non-work related correspondence. Use for political lobbying. Knowingly introduce to the system, or send an or attachment, containing malicious software, for example, viruses. Forge or attempt to forge messages, for example, spoofing. 6.8 Sending attachments Consider alternative ways of making large work documents available to colleagues such as placing documents on the intranet or server and ing a link. Alternatively, use file compression, for example, zip files, or other methods of file transfer, for example, FTP or FTPS. (Ask the Cornwall IT Service Desk for advice). 6.9 Sending confidential information by Confidential or sensitive information, including information about patients/service users and staff, must not be sent by , even if it is encrypted, unless it is part of an approved workflow process authorised by a senior manager and with the associated risk assessment signed off by the Information Asset Owner. Safe haven procedures must be used when routinely sending confidential or sensitive information by to external organisations. Confidential or sensitive Organisation information when accessed from non-nhs equipment must be done so in a secure manner. You should not download sensitive information to a non-organisation device. (Arrangements for working outside of this policy require prior approval from the manager who should seek advice from the Information Governance Lead). Policy Page 15 of 26

16 Users must not set up their Organisation account to automatically forward s to non-nhs accounts. Examples of non-nhs accounts include Hotmail, Yahoo, AOL, and services provided by internet service providers. Users must not forward any from their Organisation account that could be considered spam, contains offensive material or is a chain letter sent on by others. Using an NHS address gives the receiver the impression that the content of the is endorsed by the NHS Patient level, sensitive or confidential information The most common cause of unauthorised disclosure of confidential information within the NHS is s sent to the wrong recipient. It is essential, when sending s with patient identifiable information, that you ensure that the address is correct. If you are not 100% certain that you know the correct address you must use the GroupWise Address Book and select the person/destination address. If the intended recipient is not in the address book, you must find another way to confirm the address. To ensure that the Organisations address book is searched first for contacts please ensure that is selected as the highest priority in settings. You can do this by: Opening GroupWise Clicking on Address Book In the Address Book window, select File and then Name Completion Search Order Ensure that under the pane entitled Selected books: that Novell GroupWise Address Book is first in the list. This can be achieved by selecting this entry and clicking the Up button. The only other Address book that should be contained within the list is Frequent Contacts and, if used, should always be below Novell GroupWise Address Book. You must include the phrase Patient Information in the Subject Field; this ensures that the message is clearly identifiable to the authorised addressee. If sending containing sensitive information outside of the Organisation you must first establish if it is legal to do so. Sharing information without Policy Page 16 of 26

17 consent could be a breach of the Data Protection Act 1998(if in doubt, please contact the Information Governance Department for advice). You should type [Encrypt] in the subject header, this will ensure appropriate security measures are applied before it leaves the Organisations server but only using GroupWise. Further advice on when to encrypt s can be found in Appendix 3. If the is being sent to another NHS (or Government) organisation, establish the details of their NHS.net (or gsi.gov.uk) account and use your own NHS.net account to send as this is the NHS preferred method of ing patient and confidential information. There may be occasions when you are sending particularly sensitive information and do not wish to use information that will identify the individual within the body of the text. In these cases we recommend that you speak to the person you are going to be sending the information to and agree a secret password/pseudonym that will identify the person between you. Type in the information you wish to into the body of the message or send it in an attached document. To ensure that your attachment can only be read by the intended recipient you may wish to consider password protecting the document and, additionally, informing them of the password verbally. You must not save this information, or your GroupWise Archive, to a local drive (c:, d:, etc) on your computer. You must save this information to a network drive on a server (h:, s:, etc) NHS Mail NHS Mail account holders details can be obtained by looking on the search facility, link: Many organisations have now migrated to NHS Mail. If you need to send and receive confidential data from these organisation contact CITS to set up an NHS Mail account Assistance If you need any assistance in using please contact the CITS Support Service Centre on Tel: If you have any queries about the confidentiality aspects with the information you are sending you should contact your Caldicott Guardian or Information Governance Manager. Policy Page 17 of 26

18 7. Retention and Destruction The Organisation reserves the right to retain as required to meet its legal obligations. s do not form part of the corporate record and s that are required as part of the corporate record system should be saved in line with the corporate records policy (i.e. to a network drive). accounts will be retained for a period of 6 months following a user leaving a post. 8. Breaches of this Policy In the event of a breach of confidential information i.e. where an is sent to the wrong recipient, staff are required to take the following actions:- If sent to a groupwise address; If the has not been opened delete from the recipients mailbox and report as a near miss. If the has been opened it can only be deleted by either the recipient or Cornwall IT Services and report as a breach of confidentiality. Outside of Groupwise report as a breach of confidentiality and contact the recipient to obtain assurance that the has been destroyed and that the has not been forward, shared or backed up. The Organisation will: Investigate breaches of this policy, actual or suspected, in accordance with Organisation procedures. Where there is a breach of confidentiality the line manager will be required to send an apology letter explaining how the incident took place, what data was breached, to whom and what actions have been taken to ensure that this does not happen again Where appropriate, invoke the Organisation s disciplinary procedure for breaches of this policy. Where appropriate, make a complaint to an individual s employing organisation and co-operate fully into any investigation of that complaint where breaches of this policy are committed by users who are not employees of the Organisation (such as staff on secondment to the Organisation, Honorary Contract holders and users given access to systems). Where appropriate take legal action (that is, criminal or civil proceedings) in respect of this policy. Policy Page 18 of 26

19 9. Liability The Organisation will not be liable for any financial or material loss to an individual when using for personal use or when using personal equipment to access work . Policy Page 19 of 26

20 Appendix 1: Encryption Decision Tree Sending information via is a very efficient way of providing information. However, due to the ease and speed of creating and sending s, it is important that you do not forget that s are a very poor substitute for a conversation. If something needs to be discussed or explained it would be far better to pick up the phone or talk face to face. Does the contain any personally identifiable data or organisationally sensitive information? No does not need to be encrypted. Yes Can all personal information be anonymised before ing? i.e. removing names and identifiers Yes does not need to be encrypted. No Is the being sent within the Cornwall NHS Community? No Yes does not need to be encrypted. s that stay within GroupWise (Cornwall.nhs.uk) are secure. s to Cornwall Council or any other external body are not secure, including nhs.net. Be sure to check the address as there are several staff members with the same, or very similar, names. ALWAYS CHECK THE ADDRESS MUST be ENCRYPTED. Enter [Encrypt] in the Subject line. As a failsafe, the Cornwall NHS Community has an electronic encryption system that scans s for: NHS Number (including the spaces) i.e. xxx xxx xxxx Payroll Number NI Number Patient Information in the subject line. It is best practice to manually encrypt s rather than rely on an electronic system. Policy Page 20 of 26

21 Appendix 2: Sending & Receiving Encrypted s Procedure 1. Any containing personal or sensitive information that is being sent to a non NHS address must be encrypted. This is to comply with the initial directive in 2008 by David Nicholson, NHS Chief Executive, and is a subsequent requirement for all public sector organisations set by the Cabinet Office. 2. Before any encrypted s can be read, the recipient must complete a registration process to set up an account which is used to be able to log in to view the encrypted information. The registration process only has to be completed once, and when the account has been created the recipient will only need to provide a password to view the . Therefore, it is important in the first instance, that you notify the intended recipient that you are about to send personal/sensitive information that will be encrypted and that to view the information they will need to complete a registration process you may wish to send them the attached instructions Encryption using Secur to aid them through the process. 3. To encrypt an enter [Encrypt] in the s subject line. Don t forget to include the square brackets, usually found to the right of the letter P on the keyboard. You must include some text in the body of the message but it is recommended that no person identifiable data is included at this stage. You may like to ask the recipient to confirm when they have completed the registration successfully. You do not need to register unless the recipient replies to an encrypted message. 4. If the recipient is unable to register for encrypted s (organisation policy, technical policy limitations) you will be unable to send person identifiable to them via . Consider anonymising any information before sending, the use of a Safe Haven fax, registering for an NHS.net address or recorded/registered post. 5. If the recipient replies to an encrypted message from within WatchGuard (the Secur encryption service) you will receive a notification in your GroupWise Mailbox informing you that you have received a secure message. Simply follow the procedure for registration process outlined in Encryption using Secur section Policy Page 21 of 26

22 Encryption Using Secur 1. Sending an encrypted 1.1 Launch GroupWise and create and address a new message 1.2 In the subject include the phrase [Encrypt] 1.3 Type the message as usual and include any attachments before sending it in the normal way 2. Receiving an encrypted 2.1 The recipient will receive a message from you with the following content and should follow the instructions to view this secure message Policy Page 22 of 26

23 2.2 They will be presented with the following message and should click Read Message: Policy Page 23 of 26

24 2.3 A one time registration will be required per address receiving an encrypted When presented with the following screen, they should enter their full name and choose and retype a suitable password before clicking Continue Policy Page 24 of 26

25 2.3.2 The following screen will now be displayed The recipient should open the Identity Verification message when it arrives and click on the link provided Your message will now be displayed Policy Page 25 of 26

26 2.4 Further s can be accessed by entering their password after Read Message is selected from paragraph Policy Page 26 of 26

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3

LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3 LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

E-Mail and Internet Policy

E-Mail and Internet Policy E-Mail and Internet Policy Document reference Title: E-Mail and Internet Policy Product ID: Version Number: 8.0 Status: Live Distribution / Issue date: 12 November 2014 Author: K. Fairbrother Review Period:

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

INFORMATION RISK MANAGEMENT POLICY

INFORMATION RISK MANAGEMENT POLICY INFORMATION RISK MANAGEMENT POLICY DOCUMENT CONTROL: Version: 1 Ratified by: Steering Group / Risk Management Sub Group Date ratified: 21 November 2012 Name of originator/author: Manager Name of responsible

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

Information Governance Performance Manager. Important Note: The Intranet version of this document is the only version that is maintained.

Information Governance Performance Manager. Important Note: The Intranet version of this document is the only version that is maintained. Document Summary DOCUMENT NUMBER DATE RATIFIED POL/002/004 14 October DATE IMPLEMENTED October 2013 NEXT REVIEW DATE October 2015 ACCOUNTABLE DIRECTOR POLICY AUTHOR Director of Business Development Information

More information

INTERNET, EMAIL AND COMPUTER USE POLICY.

INTERNET, EMAIL AND COMPUTER USE POLICY. INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

Guidelines on developing a policy for managing email

Guidelines on developing a policy for managing email Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

Trust Advantages and Disadvantages of Using Intranet

Trust Advantages and Disadvantages of Using Intranet Policy No: OP17 Version: 6.0 Name of Policy: Internet, Intranet and Email Acceptable Use Policy Effective From: 04/08/2015 Date Ratified 04/03/2015 Ratified Health Informatics Assurance Committee Review

More information

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013 Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014

Islington ICT Email Policy A council-wide information technology policy. Version 0.9 June 2014 A council-wide information technology policy Version 0.9 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low

Policy. Social Media Acceptable Use Policy. Executive Lead. Review Date. Low Policy Social Media Acceptable Use Policy Date approved by - ISG Version Issue Date Review Date Executive Lead 11/6/2013 1.0 11/6/2013 11/6/2015 Mike Robson Executive Director Finance Procedure/Policy

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No SOCIAL MEDIA POLICY Ratified Governance & Risk Committee 08/2015 Status Final Issued August 2015 Approved By Governance and Risk Committee Consultation Governance and Risk Committee Equality Impact Assessment

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014

Email, Internet & Social Networking Policy Version 3.0. 5 th December 2014 Email, Internet & Social Networking Policy Lead executive Name / title of author: Chief Nurse Colin Owen, Information Governance and Data Security Lead Date reviewed: October 2014 Date ratified: 5 th December

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

UTC Cambridge ICT Policy

UTC Cambridge ICT Policy UTC Cambridge ICT Policy Lead member of SLT: Designated Governor: Staff Member: Principal TBC Lead IT & Telecommunication Technician Contents Introduction Scope Purpose Monitoring of college systems Prohibitions

More information

Information Governance Policy

Information Governance Policy Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Informatics Policy. Information Governance. Email and Internet Use and Monitoring Policy

Informatics Policy. Information Governance. Email and Internet Use and Monitoring Policy Informatics Policy Information Governance Document Control Document Title Author/Contact Document Reference 3539 Version 6 Pauline Nordoff-Tate, Information Assurance Manager Status Approved Publication

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

The Bishop s Stortford High School Internet Use and Data Security Policy

The Bishop s Stortford High School Internet Use and Data Security Policy Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

COLLEGE POLICY MANUAL

COLLEGE POLICY MANUAL Policy No. & Title: C202: ACCEPTABLE USE OF COLLEGE TECHNOLOGY Effective: 2015-07-14 Next Review: 2020-07-14 Policy Sponsor: Chief Information Officer Ref Cttee: Senior Leadership Council Approvals: 2000-05-03/SA-99-09;

More information

Internet and Social Media Policy

Internet and Social Media Policy Internet and Social Media Policy Page 1 of 19 Review and Amendment Log / Control Sheet Responsible Officer: Chief Officer Clinical Lead: Author: Date Approved: Committee: Version: Review Date: Medical

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

Information Sharing Policy

Information Sharing Policy Information Sharing Policy REFERENCE NUMBER IG 010 / 0v3 February 2013 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee 5.2.13 REVIEW DUE DATE February 2016 West Lancashire CCG is committed

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

CCG Social Media Policy

CCG Social Media Policy Corporate CCG Social Media Policy Version Number Date Issued Review Date 2 25/03/2015 25/03/2017 Prepared By: Consultation Process: Formally Approved: Governance Manager, North of England Commissioning

More information

ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference

ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference ELECTRONIC COMMUNICATIONS & INTERNET ACCEPTABLE USE POLICY Document Reference Electronic Communications and Internet Acceptable Use Policy P010 Version Number V4.13 Author/Lead Job Title Director s Name

More information

Peninsula Community Health. Server Back Up Procedures

Peninsula Community Health. Server Back Up Procedures Peninsula Community Health Server Back Up Procedures Title: Local Server Back Up Procedures Procedural Document Type: Procedure Reference: ITP12 CQC Outcome: Outcome 21 Version: 1.0 Approved by: Information

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - EMAIL POLICY Executive Director (AK) [J50] AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1

More information

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08

Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 Hull Teaching Primary Care Trust INTERNET USE POLICY 06.02.08 C ONTENTS Introduction 3 1. Objectives 3 1.1 Ensure Availability 3 1.2 Preserve Integrity 3 1.3 Preserve Confidentiality 3 1.4 Policy applicable

More information

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

INFORMATION GOVERNANCE POLICY & FRAMEWORK

INFORMATION GOVERNANCE POLICY & FRAMEWORK INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger

More information

Information Security and Governance Policy

Information Security and Governance Policy Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Information Governance Strategy. Version No 2.0

Information Governance Strategy. Version No 2.0 Plymouth Community Healthcare CIC Information Governance Strategy Version No 2.0 Notice to staff using a paper copy of this guidance. The policies and procedures page of PCH Intranet holds the most recent

More information

SAS TRUSTEE CORPORATION ( STC )

SAS TRUSTEE CORPORATION ( STC ) SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Version: V1 Ratified by: Operational Management Executive Committee Date ratified: 26 September 2013 Name and Title of originator/author(s): Chris Brady, FOI, Data Protection and

More information

Policy Document Control Page. Updated to include new NHS mail encryption feature

Policy Document Control Page. Updated to include new NHS mail encryption feature Policy Document Control Page Title Title: Electronic Mail Policy Version: 6 Reference Number: CO6 Keywords: (please enter tags/words that are associated to this policy) Email Supersedes Supersedes: Version

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

E-Gap Terms and Conditions of Use

E-Gap Terms and Conditions of Use E-Gap Terms and Conditions of Use User Terms and Conditions The following paragraphs specify the basis on which you may use the e-gap System and provides information on how we will handle your data. This

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES)

POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) Policy Document POLICY ON THE USE OF UNIVERSITY INFORMATION AND COMMUNICATION TECHNOLOGY RESOURCES (ICT RESOURCES) For the definitions of terms used in this policy document refer to the Delegations of

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Information Governance

Information Governance Information Governance Information for Patients Information Governance (IG) Contents: Identifying the IG Lead for the Practice. This identifies the main people responsible for Information Governance Policy.

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information