Corporate ICT Asset Management

Size: px
Start display at page:

Download "Corporate ICT Asset Management"

Transcription

1 Policy Corporate ICT Asset Management Please note this policy is mandatory and staff are required to adhere to the content Summary A comprehensive program to monitor the location, use and value of all Information and Communications Technology (ICT) equipment and facilities must be established and maintained. Table 1 - Document details Publication date April 2009 Review date January 2014 Related legislation/applicable section of legislation Related policies, procedures, guidelines, standards, frameworks Replaces ICT Security Policy April 2009 Policy officer (position) Manager, ICT Infrastructure & Asset Management Policy officer (phone) Policy sponsor (position) Executive director responsible (position and office) Applies to Key words Status Approved by Assistant Director, ICT Technical Services Executive Director, Infrastructure All DECD Employees ICT, asset management Approved Executive Director, Infrastructure Approval date April 2009 Version Corporate ICT Asset Management April 2009

2 Table 2 - Revision record Date Version Revision description 2 Corporate ICT Asset Management April 2009

3 Table of Contents Policy... 1 Corporate ICT Asset Management... Error! Bookmark not defined. 1. Title Purpose Scope Policy detail Roles and responsibilities Monitoring, evaluation and review Definitions and abbreviations Supporting documents References...6 Appendix Corporate ICT Asset Management April 2009

4 1. Title Corporate ICT Asset Management 2. Purpose A comprehensive program to monitor the location, use and value of all Information and Communications Technology (ICT) equipment and facilities must be established and maintained. 3. Scope All DECD employees 4. Policy detail Assets Register Physical Assets Each physical asset above a defined value must be identified and recorded in an Asset Register which is maintained and reconciled by ICT Services. Asset Register Logical Assets All logical Assets comprising packaged software and developed application systems must be identified and recorded in an Asset Register which is maintained and reconciled by ICT Services. Asset Ownership and Protection of Intellectual Property Rights The ownership of, and responsibility for, all ICT equipment and information systems software is vested in ICT Services. This responsibility includes the protection of the Department for Education and Child Development (DECD) Intellectual Property rights over the software. Inventory Review Physical Assets A stock-take of all DECD ICT physical assets must be completed by ICT Services at least annually, and all discrepancies reconciled. Budgets All budgets relating to maintenance, operation and replacement of ICT assets are the responsibility of ICT Services. Asset Replacement A program for regular review and replacement of physical ICT assets must be established to ensure a flexible, effective and cost efficient ICT infrastructure is in place. Appropriate Use 4 Corporate ICT Asset Management April 2009

5 Staff must be conscientious in the business use of DECD information systems and facilities. All use must comply with policies relating to the internet, and acceptable use. Personal Use DECD staff are permitted reasonable personal use of DECD supplied ICT facilities and software as long as that use does not compromise or impact the security of those facilities, DECD information systems and DECD information and does not conflict with the Commissioner for Public Employment s Code of Ethics and DECD policies and standards. Unauthorised Equipment or Software Unauthorised equipment and unauthorised or unlicensed software must not be installed on, attached to or operated on any DECD ICT facilities. Any equipment or software identified as unapproved and/or unlicensed must be removed immediately. Software Inventory Control The purchase, installation, registration, upgrade, disposal and loan of software must be properly coordinated and controlled. Regular reviews must be conducted (via monthly monitoring reports) by the ICT Assets Coordinator Software. Illegal Software Use The number of user licences for approved software must not be exceeded by illegal copying or other means. The requirements of the Copyright Act 1986, as amended, applicable patent law and conditions of use restrictions must be strictly adhered to. 5. Roles and responsibilities Table 2 - Roles and responsibilities Role Authority/responsibility for 6. Monitoring, evaluation and review 5 Corporate ICT Asset Management April 2009

6 7. Definitions and abbreviations Table 3 - Definitions and abbreviations Term Meaning 8. Supporting documents The following whole-of-government policies and DECD policies are relevant and must be read in conjunction with this policy. DECD Policy ICT Security DECD Policy Internet Access and Use DECD Policy Access and Use DECD Standard - Corporate Managed Desktop Environment Information Technology Infrastructure Services Policy Telecommunications Services Policy Personal Computers Policy Microsoft Software MS Select Program Policy ICT Infrastructure Standards Policy 9. References N/A Appendix N/A 6 Corporate ICT Asset Management April 2009

Corporate ICT Change Management

Corporate ICT Change Management Policy Corporate ICT Change Management Please note this policy is mandatory and staff are required to adhere to the content Summary A formal change management system must be approved, implemented and enforced

More information

Mobile Communication Device

Mobile Communication Device Policy Mobile Communication Device Please note this policy is mandatory and staff are required to adhere to the content Summary Access to mobile communication devices must be properly administered and

More information

Internet Access and Use

Internet Access and Use Policy Internet Access and Use Please note this policy is mandatory and staff are required to adhere to the content Summary DECD staff must use the Internet in an appropriate and professional manner, and

More information

Corporate ICT Availability

Corporate ICT Availability Policy Corporate ICT Availability Please note this policy is mandatory and staff are required to adhere to the content Summary DECD ICT facilities and information must be available during agreed operational

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

JOB DESCRIPTION BUSINESS DEVELOPMENT & PROJECT MANAGER

JOB DESCRIPTION BUSINESS DEVELOPMENT & PROJECT MANAGER JOB DESCRIPTION POST TITLE: POST NUMBER: WEB DEVELOPER IT14 GRADE: 9 RESPONSIBLE TO: RESPONSIBLE FOR: LIAISON WITH: BUSINESS DEVELOPMENT & PROJECT MANAGER N/A ICT Team, all users (customers) of MDDC ICT

More information

Draft Internal Audit Report Software Licensing Audit. December 2009

Draft Internal Audit Report Software Licensing Audit. December 2009 Draft Internal Audit Report Software Licensing Audit December 2009 Contents Page Executive Summary 3 Observations and Recommendations 6 Appendix 1 Audit Framework 9 Appendix 2 - Staff Interviewed 10 Statement

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

University of South Wales Software Policies

University of South Wales Software Policies University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets

More information

Please note this procedure is mandatory and staff are required to adhere to the content

Please note this procedure is mandatory and staff are required to adhere to the content Procedure Glass Replacement Please note this procedure is mandatory and staff are required to adhere to the content This document is currently under review. Please direct any questions regarding this document

More information

Associated Files: Managing resources. Expected Duration: 2 hours

Associated Files: Managing resources. Expected Duration: 2 hours Unit 2 Business Managing Instructions and answers for Teachers These instructions should accompany the OCR resource Managing, which supports the OCR Level 3 Cambridge Technical Certificate in Business

More information

Licence Agreement. Document filename. HSCIC Licence Agreement. Directorate / Programme. Solution, Design, Assurance and Standards. Status.

Licence Agreement. Document filename. HSCIC Licence Agreement. Directorate / Programme. Solution, Design, Assurance and Standards. Status. Document filename HSCIC Licence Agreement Directorate / Programme Solution, Design, Assurance and Standards Status Approved Version 1.0 Version issue date 01/04/2013 Licence Agreement INTRODUCTION This

More information

IMPLEMENTATION DETAILS

IMPLEMENTATION DETAILS Policy: Title: Status: 1. Introduction ISP-I11 Software License Regulations Approved Information Security Policy Documentation IMPLEMENTATION DETAILS 1.1. The Software Management Policy (ISP-S13) makes

More information

University of Liverpool

University of Liverpool University of Liverpool Card Payment Policy Reference Number Title Version Number 1.0 Document Status Document Classification FIN-001 Card Payment Policy Active Public Effective Date 03 June 2014 Review

More information

SOFTWARE ASSET MANAGEMENT POLICY

SOFTWARE ASSET MANAGEMENT POLICY SOFTWARE ASSET MANAGEMENT POLICY Metadata Author.Contributor Derrick Bates Coverage.spatial UK, Cumbria Creator ICT Client Team Organisational Development Date.issued 1 st May 2008 Description The document

More information

University of Ulster Standard Cover Sheet

University of Ulster Standard Cover Sheet University of Ulster Standard Cover Sheet Document Title REMOTE ACCESS STANDARD 2.4 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services Directorate)

More information

Corporate Information Security Management Policy

Corporate Information Security Management Policy Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification

More information

Harper Adams University College. Information Security Policy

Harper Adams University College. Information Security Policy Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

Temporary Records Procedure

Temporary Records Procedure Procedure Temporary Records Procedure Please note this procedure is mandatory and staff are required to adhere to the content DECD 07/6197 Summary That DECD Central Office, Regional Offices and sites will

More information

ICANWK616A Manage security, privacy and compliance of cloud service deployment

ICANWK616A Manage security, privacy and compliance of cloud service deployment ICANWK616A Manage security, privacy and compliance of cloud service deployment Release 1 ICANWK616A Manage security, privacy and compliance of cloud service deployment Modification History Release Release

More information

Research Data Management Policy

Research Data Management Policy Research Data Management Policy Version Number: 1.0 Effective from 06 January 2016 Author: Research Data Manager The Library Document Control Information Status and reason for development New as no previous

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information

Information Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy

Information Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that

More information

This Policy was approved by 2014.

This Policy was approved by 2014. WEB PUBLISHING POLICY This Policy was approved by Senate onn 4 June 2014 and came into force on 1 July 2014. 1 Introduction Overview This Policy applies to all websites published under the aston.ac.uk

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Open Data Strategy 2013-2017. Department of Tourism, Major Events, Small Business and the Commonwealth Games. Page 1 of 14

Open Data Strategy 2013-2017. Department of Tourism, Major Events, Small Business and the Commonwealth Games. Page 1 of 14 Open Data Strategy 2013-2017 Department of Tourism, Major Events, Small Business and the Commonwealth Games Page 1 of 14 This publication has been compiled by Andrew Dungan, Small Business Division,, Department

More information

Asset management policy

Asset management policy Asset management policy POL-C-002 Version 3.1 26 February 2007 Contents 1. Title... 3 2. Introduction... 3 3. Scope... 3 4. Principles and guidelines... 3 5. Definition of responsibilities... 10 6. References...

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

(For official use only) 12/12/20/ DEAT/EIA/

(For official use only) 12/12/20/ DEAT/EIA/ DETAILS OF EAP AND DECLARATION OF INTEREST File Reference Number: NEAS Reference Number: Date Received: (For official use only) 12/12/20/ DEAT/EIA/ Application for authorisation in terms of the National

More information

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy

More information

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2. Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments

More information

Audit of IT Asset Management Report

Audit of IT Asset Management Report Audit of IT Asset Management Report Recommended by the Departmental Audit Committee for approval by the President on Approved by the President on September 4, 2012 e-doc : 3854899 1 Table of Contents EXECUTIVE

More information

EULA - Page 2 of 5 any service, account, computer systems or networks associated with the Internet-based services provided by ESI-TECNALIA.

EULA - Page 2 of 5 any service, account, computer systems or networks associated with the Internet-based services provided by ESI-TECNALIA. EULA - Page 1 of 5 END-USER LICENSE AGREEMENT FOR ESI-TECNALIA SOFTWARE IMPORTANT READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

Project Plan (Statement of Work) Data Management Framework PJSM1009

Project Plan (Statement of Work) Data Management Framework PJSM1009 Project Plan (Statement of Work) Data Management Framework PJSM1009 1. DOCUMENT INFORMATION, CONTENT & PURPOSE 1.1 Document Purpose This Statement of Work (SoW) describes the approach to and the management

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

FELLOWSHIP AND TRAINING GRANTS. Terms and Conditions of Award

FELLOWSHIP AND TRAINING GRANTS. Terms and Conditions of Award FELLOWSHIP AND TRAINING GRANTS Terms and Conditions of Award These terms and conditions relate to fellowships and training grants awarded by the June Hancock Mesothelioma Research Fund (JHMRF). Acceptance

More information

COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1

COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 1. INTRODUCTION The purpose of this policy is to: I. Regulate access to Manukau Institute of Technology ( MIT ) Computer Systems ensuring they

More information

Information Technology and Communications Policy

Information Technology and Communications Policy Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies

More information

Grasmere Primary School Asset Management Policy

Grasmere Primary School Asset Management Policy Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the

More information

Software compliance policy

Software compliance policy Software compliance policy Name of policy, procedure or regulation Software compliance policy Purpose of policy, procedure or regulation To provide a coordinated approach to software asset management Who

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

Information Security Policy

Information Security Policy Information policies and standards Department of Transport and Main Roads Prepared by Enterprise Security Unit Version no. v3.0 Status Final QGCIO ref. QGEA Information Standard, Information Security (IS18)

More information

BAND: 5. 37½ hours per week 1. JOB SUMMARY

BAND: 5. 37½ hours per week 1. JOB SUMMARY POST TITLE: Software Developer BAND: 5 HOURS: ACCOUNTABLE TO: LOCATION: 37½ hours per week Head of Informatics Programme Mamhilad 1. JOB SUMMARY Reporting to Software Development Manager, the post holder

More information

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet

St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources

More information

Fiskars Code of Conduct

Fiskars Code of Conduct GROUP POLICY Fiskars Code of Conduct Version history: Person responsible Päivi Timonen, General Counsel Owner Fiskars Ethics Advisory Group Framework 1.A Group Next Revision Date Code Policies Version

More information

IT SECURITY POLICY (ISMS 01)

IT SECURITY POLICY (ISMS 01) IT SECURITY POLICY (ISMS 01) NWAS IM&T Security Policy Page: Page 1 of 14 Date of Approval: 12.01.2015 Status: Final Date of Review Recommended by Approved by Information Governance Management Group Trust

More information

Anchor Bay Schools Software Policy

Anchor Bay Schools Software Policy Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual

More information

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF

ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF ACCEPTABLE IT AND COMPUTER USE POLICY GUIDE FOR STAFF The African Academy of Sciences (AAS) Postal Address: P.O. Box 24916 00502, Nairobi, KENYA Physical Address: 8 Miotoni Lane, Karen, Nairobi Tel: +

More information

SOFTWARE LICENSING POLICY

SOFTWARE LICENSING POLICY SOFTWARE LICENSING POLICY Version 12/12/2012 University of Birmingham 2012 David Deighton, IT Services CONTENTS 1. Policy on Software Licensing... 3 1.1 Software Licensing Compliance... 3 1.2 Software

More information

Date 23 November 2010. Version 02.02. Information Security & Strategy Group. Authorising Body. Chris Drake Julia Harris. Contact

Date 23 November 2010. Version 02.02. Information Security & Strategy Group. Authorising Body. Chris Drake Julia Harris. Contact Software Licensing Policies DQ Status Approved Policy DQ Content Authority Supplier Authoriser Contact(s) for Help Description Head of Information security, Julia Harris N/A Software Compliance Manager,

More information

1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner

1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner Policy Details 1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner 4. Date created February 2015 5. Date of

More information

REAL ESTATE INSTITUTE OF NEW SOUTH WALES CODE OF PRACTICE

REAL ESTATE INSTITUTE OF NEW SOUTH WALES CODE OF PRACTICE REAL ESTATE INSTITUTE OF NEW SOUTH WALES CODE OF PRACTICE 01. Foreword The Real Estate Institute of Australia encourages the highest standards in real estate practice. Its unceasing aim is that the practice

More information

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014 Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date

More information

Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs

Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs NOTE: This is a CONTROLLED Document. Any documents appearing in paper

More information

Remote Access Policy

Remote Access Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction

THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction THE UNIVERSITY OF THE WEST INDIES Electronic Mail & Messaging Services Policy 1. Introduction In accordance with its broader strategic objectives, The University of the West Indies (the UWI) promotes the

More information

Joint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009

Joint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009 Joint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009 The innovative pharmaceutical industry 2 is committed to the transparency

More information

IN THE SPECIAL INCOME TAX COURT - PRETORIA

IN THE SPECIAL INCOME TAX COURT - PRETORIA IN THE SPECIAL INCOME TAX COURT - PRETORIA /jv CASE NO: 10699 DATE: 19/3/2003 In the income tax appeal of: APPELLANT Appellant and THE COMMISSIONER FOR THE SOUTH AFRICAN REVENUE SERVICES Respondent JUDGMENT

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

New Zealand Institute of Chartered Accountants

New Zealand Institute of Chartered Accountants New Zealand Institute of Chartered Accountants PS-2 Issued 06/03 Revised 05/08 Amended 07/13 PROFESSIONAL STANDARD NO. 2, 2008 CLIENT MONIES Issued by the Council of the New Zealand Institute of Chartered

More information

Professional Engineers Acting As Independent Contractors. Prepared by: B. DiStefano P.Eng. / R. Hicks, P.Eng. / L. Mitelman, P.

Professional Engineers Acting As Independent Contractors. Prepared by: B. DiStefano P.Eng. / R. Hicks, P.Eng. / L. Mitelman, P. Professional Engineers Ontario GuidEline Professional Engineers Acting As Independent Contractors Prepared by: B. DiStefano P.Eng. / R. Hicks, P.Eng. / L. Mitelman, P.Eng/ Notice: The Professional Standards

More information

Virginia Primary School Learning Together, Learning for our Future

Virginia Primary School Learning Together, Learning for our Future Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of

More information

Appendix 4C. Quarterly report for entities admitted on the basis of commitments BIOTRON LIMITED. Quarter ended ( current quarter )

Appendix 4C. Quarterly report for entities admitted on the basis of commitments BIOTRON LIMITED. Quarter ended ( current quarter ) Appendix 4C Rule 4.7B Introduced 31/03/00 Amended 30/09/01, 24/10/05, 17/12/10 Quarterly report for entities admitted on the basis of commitments Name of entity BIOTRON LIMITED ABN Quarter ended ( current

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Internal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC

Internal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC Internal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC Internal control consists of: Entity level controls these controls relate to the overall control environment and can potentially

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Policies Concerning the use of Computers

Policies Concerning the use of Computers Policies Concerning the use of Computers Shrewsbury School s Policies Concerning the use of Computers The Director of IT is responsible for the formulation and review of policies affecting the use of computers

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

IT Security Management

IT Security Management The Auditor-General Audit Report No.23 2005 06 Protective Security Audit Australian National Audit Office Commonwealth of Australia 2005 ISSN 1036 7632 ISBN 0 642 80882 1 COPYRIGHT INFORMATION This work

More information

APES 310 Dealing with Client Monies

APES 310 Dealing with Client Monies EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies ISSUED: December 2010 Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) Prepared and issued by Accounting

More information

www.neelb.org.uk Web Site Download Carol Johnston

www.neelb.org.uk Web Site Download Carol Johnston What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate

More information

Ingle Farm East Primary School

Ingle Farm East Primary School Ingle Farm East Primary School Cyber-Safety Policy Endorsed by Governing Council on AUGUST, 2015 Review date AUGUST, 2018 Overview Measures to ensure the cyber-safety of Ingle Farm East Primary School

More information

Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0

Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0 Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations

More information

Staff Member Signature Date Direct Supervisor Related Mater Health Services Position Description attached. Theme Leader Signature Date.

Staff Member Signature Date Direct Supervisor Related Mater Health Services Position Description attached. Theme Leader Signature Date. POSITION DESCRIPTION Mothers and Babies Theme Position Title Division Position Purpose Position Scope Occupational Category and Level Reporting Relationship Review Date Next Review Due, Mothers and Babies

More information

Definitions used in these Grant Conditions can be found at paragraph 13.

Definitions used in these Grant Conditions can be found at paragraph 13. GRANT CONDITIONS These Grant Conditions, together with the Award Letter and the Policies and Positions Statements, set out the terms and conditions on which the Grant is made by the Funders to the Host

More information

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and

More information

6 INFORMATION AND TECHNOLOGY RESOURCES

6 INFORMATION AND TECHNOLOGY RESOURCES 6 INFORMATION AND TECHNOLOGY RESOURCES The City's computer network is available seven days a week, 24 hours a day. The City Clerk s Office, Council and Support Services, provides Members of Council with

More information

CRM in a Day Support Services Agreement

CRM in a Day Support Services Agreement CRM in a Day Support Services Agreement Agreement Number: Start Date: Renewal Date: Minimum Term: This Agreement sets forth the terms and conditions under with CRM in a Day shall support the Microsoft

More information

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) (NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Policy and Procedures on Financial Conflict of Interest For Sponsored Programs

Policy and Procedures on Financial Conflict of Interest For Sponsored Programs PM 2015-02 President Willie Hagan Supersedes PM 01-09 Policy and Procedures on Financial Conflict of Interest For Sponsored Programs 1.0 REFERENCES a) CSUDH PM 01-09 b) California The Political Reform

More information

NOT PROTECTIVELY MARKED. Suffolk County Council DATA QUALITY POLICY

NOT PROTECTIVELY MARKED. Suffolk County Council DATA QUALITY POLICY Suffolk County Council DATA QUALITY POLICY This policy is sponsored by the Director of Resource Management on behalf of the Chief Executive of Suffolk County Council. Responsibility for maintaining, reviewing

More information

1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.

1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy. Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

APES 310 Dealing with Client Monies

APES 310 Dealing with Client Monies M EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) [Supersedes APES 310 Dealing with Client Monies issued

More information