CCTV Cameras Policy. Policy Guidelines
|
|
|
- Justina Sanders
- 10 years ago
- Views:
Transcription
1 CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes the reception desk, waiting area, interview and conference rooms. A separate policy and procedures has been developed to govern the use of CCTV cameras, which has the primary purpose of providing an additional risk management tool to the others included in the Client Service Strategy. The Client Service Strategy is available on the Intranet under Ops Support Client Services. The CCTV Policy and Procedures is also available under Ops Support Client Services CCTV Cameras. Purpose The purpose of this policy is to govern the use of a CCTV system on Legal Aid NSW premises as an incident risk management tool under the requirements of the OH&S Act 2000 and the Regulations 2001 as well as the Workplace Surveillance Act. Scope These guidelines focus only on the use of CCTV cameras at Sydney Central client service area on the ground floor. In implementing the policy the requirements of the Workplace Surveillance Act and Regulations 2005 as well as the OH&S Act 2000 and regulations were considered. The OH&S Committee is considered to be the representative body under the team of the Workplace Surveillance Act and Regulations. The operation of CCTV is strongly governed by Sections 11, 14 and 16 of the Workplace Surveillance Act and the following requirements: CCTV cameras will be clearly visible. Signs will be at each entrance to notify people that they may be under surveillance. Legal Aid NSW will not use CCTV to conduct surveillance of employees who are not at work. An employee will be considered to be at work when they are at the workplace of the employee or they are anywhere else whilst performing work for the employer. Legislative Framework: Workplace Surveillance Act 2005 The Workplace Surveillance Act 2005 replaces the Workplace Video Surveillance Act 1998, and commenced on 7 October The 2005 Act has much broader coverage, in that it applies to camera surveillance, computer surveillance and CCTV Camera Policy Jan 2009 Page 1 of 5
2 tracking surveillance of staff. The Act regulates the use of both overt and covert surveillance and the use and disclosure of the records obtained from surveillance. Listening Devices Act 1984 When conducting workplace camera surveillance, if the camera is used to record private conversations, the camera surveillance will also be regulated by the Listening Devices Act Privacy legislation Personal information collected by surveillance will be protected by the Privacy and Personal Information Protection Act Guidelines LANSW will operate only overt camera surveillance to observe personal or property security and unlawful activity Overt camera surveillance: Risk Assessment: LANSW has incorporated recommendations from two independent risk assessments to identify security risks, and determine and implement appropriate controls to eliminate or minimise the risks. As camera surveillance is considered to be a risk control strategy that is toward the lower end of the hierarchy of risk controls eg an administrative control, LANSW must ensure that, as far as practicable, all other appropriate risk control strategies higher up the hierarchy are put in place to control security risks. The existing Client Service Strategy and Head Office Duress Procedures provide these strategies. Employee Notification: Section 10 of the Workplace Surveillance Act 2005 provides clear direction on the requirements for notifying employees where an employer wishes to undertake overt workplace camera surveillance. The use of cameras to undertake workplace surveillance will be lawful under the Workplace Surveillance Act 2005 only if all of the following conditions are met: Employees have been notified, in writing, at least 14 days before the cameras are used. New starters must be advised prior to commencing work (Section 10) The cameras are clearly visible to people in the area that is under surveillance (Section 11) Signs notifying people that they may be under camera surveillance are clearly visible at each entrance to the area under surveillance (Section 11). Notification Exemption Clause: CCTV Camera Policy Jan 2009 Page 2 of 5
3 Section 14 of the Workplace Surveillance Act 2005 allows for an exemption from the employee notification requirements where the surveillance: Is conducted with the agreement of the employee or a body representing a substantial number of employees at the particular workplace e.g. a union or representative body, for a purpose other than surveillance of staff (e.g. security purposes) and Is carried out in accordance with that agreement. Failure to meet all the requirements for overt surveillance will constitute covert surveillance, which is in breach of the Act in the absence of a covert surveillance authority. General Issues for Overt Camera Surveillance: Security related workplace camera surveillance Objectives of camera surveillance In the security context, camera surveillance is generally used to achieve the following objectives: To deter security incidents e.g. theft, vandalism, violence etc. To gather information that may be used in evidence if a crime is committed within view of the camera (assuming the camera is recording) To allow a security incident to be viewed as it is occurring and an appropriate response to be raised. Monitoring of camera surveillance Continuous Monitoring: In the situations listed above, the camera will only achieve its objectives if it is being continuously monitored or being managed in a way that ensures an appropriate response is activated in the event of a violent incident. LANSW has adopted a strategy of continuous monitoring via a control panel and will ensure that employees involved in these surveillance activities are appropriately licensed and trained, as required by security industry legislation. Non Continuous Monitoring: Where continuous monitoring of CCTV in higher risk areas is not feasible the following strategies, as a minimum, are to be implemented: The CCTV is continuously recorded with archived images stored for up to 7 days. A fixed duress alarm is installed within the vicinity of the CCTV. CCTV Camera Policy Jan 2009 Page 3 of 5
4 A physical security response is mobilised where the fixed duress alarm is activated. Protocols advising staff and others of the need to activate the fixed duress alarm in the event of an incident are provided within the Head Office Duress Procedures. Regular review of the effectiveness of the above strategies is undertaken to ensure risk and liability are being appropriate managed in a way that maintains the security of staff and others. Placement of cameras Where a security risk assessment results in the decision to use overt camera surveillance in a particular location, effective placement of the camera within this location is critical to the success of a surveillance strategy aimed at controlling security risks. Lighting levels, including shadowing, minimum lux levels, type and height including varying lighting levels in open areas as opposed to under awnings etc and obstructions to fields of view. Pedestrian thoroughfares, including analysis of the amount of pedestrian access throughout each day. The recommended height of equipment above ground to deter potential vandalism (while noting that position height of cameras needs to allow adequate identification of persons. The view from the recommended camera height, taking into account building structures and awnings. Direction of the sun, including sunrise and sunset blooming and the possible effect on the cameras. Whether private premises would come within the view of the cameras. The accessibility of equipment for maintenance purposes including any safety issues for staff undertaking the maintenance. Possibility of accompanying lighting intruding upon the surrounding area. Access to power supply Cabling routes and distances Availability of existing cables and conduits Related procedures LANSW should also develop effective procedures for: Ensuring camera surveillance equipment remains appropriately placed, and continues to be pointed in the necessary direction. Maintenance and testing of the equipment - a maintenance log is recommended. Currently procedures ensure duress alarms are tested daily; it will be a requirement that the CCTV system is also tested daily. CCTV Camera Policy Jan 2009 Page 4 of 5
5 Undertaking regular risk assessments to ensure that the introduction of camera surveillance has not created new or different security risks e.g. moved potential illegal activity from the area now under surveillance to other surrounding areas, or created expectations in relation to a duress response that may be unrealistic or unable to be met. Use and disclosure of surveillance records The Workplace Surveillance Act 2005 (Section 18) requires that any record made as a result of surveillance not be used or disclosed unless the disclosure is: For a legitimate purpose related to the employment of staff or the legitimate business activities of LANSW. To a member or officer of a law enforcement agency (eg Police) for use in connection with the detection, investigation or prosecution of an offence. For a purpose that is directly or indirectly related to the taking of civil or criminal proceedings. Reasonably believed to be necessary to avert an imminent threat of serious violence or of substantial damage to property. As it is in the public interest to assist law enforcement agencies to pursue their law enforcement and public protection activities, LANSW will assess requests for surveillance records in the absence of a warrant on a case by case basis. In deciding whether to provide surveillance records LANSW will balance this need with its own obligations of confidentiality to its clients and the sensitive nature of legal information. Factors that should be considered prior to disclosing surveillance records without a warrant include: The seriousness of the alleged offence. The degree of evidence available that suggests the surveillance record contains information that will assist with law enforcement. Whether significant personal information relating to third parties will be disclosed. How well sign posted the camera surveillance is i.e. will staff and visitors to the area have a reasonable expectation that they will be captured in surveillance records. Any industrial arrangements as the surveillance records may also include footage of staff. LANSW has developed protocols for determining whether such records should be provided to other parties, and identify who within LANSW has the authority to approve the release of those records. CCTV Camera Policy Jan 2009 Page 5 of 5
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
COBAR SHIRE COUNCIL FILE:P5-90
COBAR SHIRE COUNCIL WORKPLACE SURVEILLANCE POLICY FILE:P5-90 Table of Contents POLICY STATEMENT... 3 INTRODUCTION 3 POLICY RESPONSIBILITIES 4 DEFINITIONS.. 5 REASONS AND REQUIREMENTS FOR SURVEILLANCE...
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
CCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
How To Protect Your Privacy In The Workplace
Review of the Workplace Surveillance Act 2005 (NSW) Submission to the NSW Attorney- General s Department January 2011 e m a i l: m a i l @ p r i v a c y. o r g. a u w e bsite : w w w. p r i v a c y. o
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY. WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA OVERVIEW The objects of this Bill are to ensure that employers
Lawlink NSW: Guide to the Workplace Video Surveillance Act
Guide to the Workplace Video Surveillance Act A Guide to the Workplace Video Surveillance Act 1998 (NSW) Privacy NSW February 2002 CONTENTS The Workplace Video Surveillance Act 1998 Coverage of the Act
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Surveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
Physical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
European Investment Bank Group. Video-surveillance policy
Group TABLE OF CONTENTS 1. Purpose and scope of the video-surveillance policy... 2 2. Respect for privacy, data protection and compliance with the relevant rules... 2 2.1. Compliance status... 2 2.2.
Camera Use. Policy Statement and Purpose. Table of Contents
Camera Use Policy Type: Administrative Responsible Office: VCU Police Department Initial Policy Approved: 12/04/2015 Current Revision Approved: New Policy Statement and Purpose VCU is committed to enhancing
Reporting of Suspected or Actual Child Abuse and Neglect
Reporting of Suspected or Actual Child Abuse and Neglect Protocol between the Ministry of Education, the New Zealand School Trustees Association and Child, Youth and Family 2009 Introduction The Ministry
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10
UNIVERSITY OF LONDON CCTV POLICY Academic Buildings, Libraries and Residences Page 1 of 10 Contents The CCTV system... 3 Responsible officers... 3 Data Protection Act 1998... 3 The system... 3 Purpose
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
MODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
Physical Security Policy Template
Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your
Video surveillance at EFSA Implementing rules and technical specifications
Video surveillance at EFSA Implementing rules and technical specifications PUBLIC version 1 Introduction EFSA operates a video surveillance system (hereafter VSS) for the safety and security of its buildings,
UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy
UNIVERSITY OF MANITOBA POLICY Policy: Effective Date: October 1, 2012 Revised Date: November 20, 2012 Review Date: October 1, 2022 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
DISCIPLINARY POLICY. 1. Introduction. 2. Structured support. 3. Formal action process 3.1. Investigations. 4. Notes of the Hearing and Investigation
HUMAN RESOURCES DISCIPLINARY POLICY 1. Introduction 2. Structured support 3. Formal action process 3.1. Investigations 4. Notes of the Hearing and Investigation 5. Suspension 6. Grievance 7. Convening
(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX ("Police Force"),
DATE OF INFORMATION SHARING AGREEMENT JULY 2015 PARTIES (1) LIVE NATION (MUSIC) UK LIMITED (Company Number 02409911) whose registered office is at 2 nd Floor, Regent Arcade House, 19-25 Argyll Street,
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets
Guidelinesfor. Releasing Patient Information to Law Enforcement
for Releasing Patient Information to Law Enforcement WHO IS A LAW ENFORCEMENT OFFICIAL? INTRODUCTION Hospitals and health systems are responsible for protecting the privacy and confidentiality of their
Disciplinary and Dismissals Policy
Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary
Parliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
Western Australia Legislation for Video Surveillance Devices
Western Australia Legislation for Video Surveillance Devices This document is an analysis of the Western Australia Surveillance Devices Act 1998; its purpose is to highlight some widely held misconceptions
UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
VIDEO SURVEILLANCE GUIDELINES
VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology
University of Essex Automatic Number Plate Recognition (ANPR) Policy
& Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies
Method Statement Reception Services
CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 19 th March 2007 Project Co Final Version Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
Other Review Dates: 15 July 2010, 20 October 2011
POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October
Community Lifestyle Support Inc.
HUMAN SERVICES QUALITY FRAMEWORK STANDARDS DOCUMENT REFERENCE: Q:/6 WORKPLACE SURVEILLANCE POLICY DATE REVIEWED: August 2014 NEXT REVIEW DATE: August 2015 AUTHORISATION: Management Committee STANDARD REFERENCE:
Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013
Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is
Mohammad Djafari Pediatric. 15-17 Kennedy Parkway. Cortland, New York 13045. Notice of Privacy Practices
Mohammad Djafari Pediatric 15-17 Kennedy Parkway Cortland, New York 13045 Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOUR CHILD/CHILDREN MAY BE USED AND DISCLOSED AND
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
Glasgow Kelvin College. Disciplinary Policy and Procedure
Appendix 1 Glasgow Kelvin College Disciplinary Policy and Procedure Document Control Information Status: Responsibility for Document and its implementation Responsibility for document review: Current version
Federico Beauty Institute. Campus Safety and Security Handbook
Federico Beauty Institute Campus Safety and Security Handbook I. Campus Geography Federico Beauty Institute is located & controls 1515 Sports Drive, Sacramento, CA 95834. This is The School s only location.
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice
Buckinghamshire County Council Transport for Buckinghamshire ANPR Code of Practice 1 Introduction 1.1 Buckinghamshire County Council (BCC) Transportation Service has Automatic Number Plate Recognition
A customer s guide to BS 8418 detector-activated remotely monitored CCTV systems
A customer s guide to BS 8418 detector-activated remotely monitored CCTV systems May 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: [email protected]
TRANSPORT NSW. Guidelines for the Use of Taxi Security Cameras in New South Wales
TRANSPORT NSW Guidelines for the Use of Taxi Security Cameras in New South Wales (Pursuant to Schedule 1, Passenger Transport Regulation 2007) July, 2010 Transport Services Division 16-18 Wentworth Street
This procedure applies where formal disciplinary action is commenced on or after 11 December 2013
Appendix X Disciplinary Procedure This procedure applies where formal disciplinary action is commenced on or after 11 December 2013 1 Purpose 1.1 This procedure is designed to help and encourage all employees
Security Services Policy and Procedures
and Procedures January 2011 Contents Heading Page Policy Policy Statement: 3 Procedures Aims and objectives: 3 Responsibilities: 4 Introduction: 6 Security Service management remit: 6 Overall aims of the
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY. Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1
SWIMMING AUSTRALIA LIMITED GAMBLING, BETTING AND MATCH FIXING POLICY Swimming Australia Limited - Gambling, Betting and Match Fixing Policy Page 1 CONTENTS PAGE BACKGROUND 3 REVIEW HISTORY 4 GAMBLING,
Wyoming School Boards Association Insurance Trust ( The Plan ) HEALTH CARE PLAN PRIVACY NOTICE
Wyoming School Boards Association Insurance Trust ( The Plan ) HEALTH CARE PLAN PRIVACY NOTICE THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Privacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
CCTV Surveillance: Business Security & Video Best Practices
CCTV Surveillance: Business Security & Video Best Practices T A B L E O F C O N T E N T S Introduction P A G E 3 Why CCTV? P A G E 4 Is CCTV Right for You? P A G E 7 Video Security Best Practices? P A
Disciplinary Policy and Procedure
Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them
River Valley Therapy & Sports Medicine, Inc. Notice of Privacy Practices
River Valley Therapy & Sports Medicine, Inc. Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed and how you can get access to this information.
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
NOT PROTECTIVELY MARKED
PEOPLE AND ORGANISATIONAL DEVELOPMENT HUMAN RESOURCES DISCIPLINARY POLICY AND PROCEDURE Author/Role Fiona Munro, Human Resources Date of Risk Assessment (if applicable) N/A Date of Equality Impact Assessment
NOTICE OF PRIVACY PRACTICES
NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. IF YOU HAVE ANY
GUIDELINES ISSUED UNDER PART 5A OF THE EDUCATION ACT 1990 FOR THE MANAGEMENT OF HEALTH AND SAFETY RISKS POSED TO SCHOOLS BY A STUDENT S VIOLENT
GUIDELINES ISSUED UNDER PART 5A OF THE EDUCATION ACT 1990 FOR THE MANAGEMENT OF HEALTH AND SAFETY RISKS POSED TO SCHOOLS BY A STUDENT S VIOLENT BEHAVIOUR CONTENTS PAGE PART A INTRODUCTION AND STATEMENT
Guidelines on the Use of Armed Security Services from Private Security Companies
UNITED NATIONS SECURITY MANAGEMENT SYSTEM Security Management Operations Manual Guidelines on the Use of Armed Security Services from Private Security Companies These guidelines should be read in conjunction
Data protection policy
Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data
Online Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
Protection of the Environment Operations Act 1997
New South Wales Protection of the Environment Operations (General) Amendment (Pollution Incident Response Management Plans) Regulation 2012 under the Protection of the Environment Operations Act 1997 Her
Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
BRANCH SECURITY REVIEW CHECKLIST
BRANCH: Date: Section 1 Physical Vulnerability 1. Do all office windows permit an unobstructed view of the bank s interior? 2. Are all exterior doors and windows equipped with tamper-resistant locks? 3.
ACE Insurance Limited ELITE II PROFESSIONAL INDEMNITY INSURANCE POLICY
ELITE II PROFESSIONAL INDEMNITY INSURANCE POLICY Renewal Proposal Form - Miscellaneous ABN 23 001 642 020 AFSL 239687 Page 1 of 8 ACE ELITE II PROFESSIONAL INDEMNITY INSURANCE RENEWAL PROPOSAL FORM Miscellaneous
INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK
INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK Registered Company Name Company Trading Name Address Email Address Contact number We have enclosed a standard employee handbook. You should read through the details
COUNCIL OF EUROPE COMMITTEE OF MINISTERS
COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at
WORKPLACE VIOLENCE POLICY
WORKPLACE VIOLENCE POLICY SUNY Canton is committed to providing a safe work environment for all employees that is free from intimidation, threats, and violent acts. The college will respond promptly to
Reparation Protocol i
Reparation Protocol i ii Contents: Aims and Objectives of Reparation 5 1 Health and Safety 6 2 Risk Management 6 3 Safeguarding 6 4 Code of Conduct 7 5 Information Sharing 8 6 Reparation Process 8 7 Expectation
The Reject Shop Limited Trading Policy
23 December 2010 Australian Securities Exchange Limited Manager, Company Announcements Level 4, 20 Bridge Street SYDNEY, NSW 2000 Dear Sir, The Reject Shop Limited Trading Policy Please find attached a
OHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY
CAMPUS SAFETY POLICIES OHIO TECHNICAL CENTER AT VANTAGE CAMPUS SAFETY AND SECURITY Campus policies regarding the reporting of criminal actions and emergencies: Vantage students and employees will report
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Health and safety guidance for research undertaken in the community
Health and safety guidance for research undertaken in the community Document control information Published document name: research-comm-gn.pdf Date issued: September 2012 Version: 3.0 Previous review dates:
Privacy is the ability of an individual or group to keep their lives and
Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees.
Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930
Security Classification: NOT PROTECTIVELY MARKED Disclosable under FOIA 2000: Yes Author: T/CI Nick Barker Force / Organisation: BTP Date Created: May 2009 Telephone: 0207 830 8930 Association of Chief
SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement 1. Context The University security service provides night and weekend cover throughout the
DRAFT CITY/COUNTY OF, TENNESSEE POLICE ALARM ORDINANCE
DRAFT CITY/COUNTY OF, TENNESSEE POLICE ALARM ORDINANCE WHEREAS, the purpose of this ordinance, finds that excessive false alarms unduly burden the Police Department s limited law enforcement resources.
Terms of Business for Registered Support Providers
Terms of Business for Registered Support Providers The National Disability Insurance Scheme Act 2013 provides for the making of Rules and requirements for registered providers of support. The Rule National
Privacy and CCTV. A guide to the Privacy Act for businesses, agencies and organisations
Privacy and CCTV A guide to the Privacy Act for businesses, agencies and organisations Privacy and CCTV A guide to the Privacy Act for businesses, agencies and organisations Published by the Office of
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
