Freedom of Information & Records Management Group Standards for Creation and Storage of Physical & Electronic Files

Size: px
Start display at page:

Download "Freedom of Information & Records Management Group Standards for Creation and Storage of Physical & Electronic Files"

Transcription

1 Freedom of Information & Records Management Group Standards for Creation and Storage of Physical & Electronic Files 1

2 Document Control: Issued By: Freedom of Information and Records Management Group (FIRM) Version Reason for Change Author Date 1.0 Initial Issue B Dale 06/08/ Amendments from S Kerridge B Dale 01/10/ Amendments from FIRM Group meeting B Dale 30/11/ Amendments from C Gales C Gales 13/01/ Amendments from FIRM Group (13/1/11) and C Gales (8/2/11) FIRM and C Gales 8/2/ Final check B Dale 10/3/11 Version control of a document is vital for good records management and consistency across the whole organisation. The latest version of this document will be made available on the University website, please ensure that you use the most up-to- version. 2

3 8. Standards for Creation and Storage of Physical & Electronic Files 1. Introduction The University s Freedom of Information and Records Management Group (FIRM) was set up to develop University Policy and Procedures in relation to Records Management, and to oversee the implementation of recommendations made by Internal Audit, and approved by the University s Audit Committee. This document now forms part of the University s Records Management Policy and relates to University Standards for the Creation Storage and Archival of Physical and Electronic Files. 2. Purpose of document To communicate to University staff the University s Standards for the Creation Storage and Archival of Physical and Electronic files. These standards will come into force following Executive approval. Physical and electronic files already in existence will be exempt from the Creation and Storage of Physical & Electronic Files standards. Please note that all physical and electronic files in existence now and in the future must adhere to the University s Retention, Archiving and Disposal Policy. 3. File Structures Whatever type of information you are dealing with, the aim of storing that information either electronically or physically is to enable quick retrieval with the minimum of effort. It is important to remember that you are storing University information in order to retrieve it and by consistent file creation and file management you will assist the University in achieving: Compliance with the statutory 20 days retrieval of information under the Freedom of Information Act, and 40 days under the Data Protection Act. Control of records within offices across the University and quick access to information. 3

4 Lifecycle of a record Create Archive Store Retrieve 4. Creation - Physical and Electronic Files The following recommended standards should be adopted by staff to aid retrieval of both physical and electronic files. There is no need to change existing file names however; these standards should be adhered to for new physical and electronic files. File Names - should be short and clear, as clarity and usability permits, and should not contain non-standard abbreviations or terms other staff may not understand. Repetition and redundancy Avoid repetition and redundancy in file names: e.g. a record s name should not contain information that is already present in the folder in which it is filed. Capital letters Use capital letters to start each word; never use spaces or underscores e.g. FinAccounts2009.doc. Some software packages have difficulty recognising files names with spaces and this can be a particular problem when publishing files to external web sites. Therefore the avoidance of spaces and underscores in naming files is very important. Two-digit numbers A minimum of two-digit numbers is required. It is important to include the zero for numbers 0-9 in file names to maintain the numeric order is cases where file names include numbers. An advantage of this is that it assists in easier retrieval of the most recent record number. Date Format If using a in a file name this should state the in a back to front format, and always use four digit years, two digit months and two digit days, e.g. YYYYMMDD or YYYYMM or YYYY. The back to front format means the chronological order of the records is maintained in the file directory, and this assists when trying to retrieve the latest d record. Personal Names When a record is a piece of correspondence it may be appropriate to include within the file name the name of the individual. When it is appropriate to include a personal name it should be given as - the Surname first followed by the Forename. Generic Terms Avoid using words like draft, letter or memo at the start of file names. Using descriptive generic terms at the start of file names, 4

5 means that all such records will appear together in the file directory. This will make it much more difficult to retrieve records. e.g. DraftFinancial2010.doc FinalFinancial2010.doc Would make it difficult to find the financial documents, whereas: FinancialDraft2010V01.doc FinancialDraft2010V02.doc FinancialFinal2010.doc Would follow each other if the files were sorted alphabetically. Order the Elements - The elements to be included in a file name should be ordered according to the way in which the record will be retrieved during the course of day to day business, e.g. Retrieved by Date the element should appear first. Retrieved by Description then the description should be listed first. Recurring events should include the and description of the event, unless these elements already exist in the file name, e.g. minutes of meetings, regular reports, event management and budget planning documents need to include the and the event name/description in order for the record to be identified and retrieved. The file names of correspondence need to include the name of the correspondent, an indication of the subject, the of the correspondence and whether it is incoming or outgoing correspondence. Hence the file names of correspondence should include the following elements: 1. Name of correspondent. (This is either the name of the person who sent you the correspondence or the name of the person to whom you sent the correspondence) 2. A description of the subject, provided it is not already stated in the folder title; 3. The of the correspondence; 4. If it is received correspondence, then include the standard abbreviation Rcvd. The version number of a record should be indicated in its file name by the inclusion of the letter V followed by the version number and, if applicable, Draft or Final. e.g. FinancialFinal2010V01 It is always important to differentiate between various drafts of a document by giving each draft its own number. If a version number is applicable, it should always appear in the file name of the record so that the most recent version can be readily identified 5

6 Summary - Ensure each file has the following: A unique title so that it can be easily identified. Always make sure that the file title refers to the records contained within it. Metadata displayed on the front cover. See appendix 2 for the metadata template which must be completed and attached to new physical files. An index of directories holding electronic files must be created (See Appendix 4) and held in a location which is regularly backed up (e.g. your Faculty or Service shared S: drive) to ensure the index is not lost. Ensure all staff that may need to access the information are trained in the retrieval process. Print a copy of the index on a regular basis. The frequency will depend on how often you create new files but you must print a copy at least once per month. This is your contingency in the event you need to retrieve a file and the computer systems are not available for you to access the index. 5. Physical Files How to File and Store Physical files should use a filing system to facilitate the storage and efficient retrieval of records. Every new physical file must be recorded and maintained in an ordered and consistent manner. The following standards must be followed:- The filing system must:- Enable you to find the information as quickly as possible and with the minimum of effort. Everyone who uses the filing system must know how it works It must be simple to use Files must be:- Kept up to Stored away from threat of fire/water/malicious attack/unauthorised access Accessible within the statutory 20-day response deadline to any requests for information made under the Freedom of Information Act Retained in line with the University s Data Retention, Archiving and Disposal Policies. 6

7 Removal of Files If a physical file is removed from its usual location you must up who has taken it, when it was taken and when it was returned. This will help locate missing files. This information must be completed on the template attached to the front cover of the physical file and also in the electronic index. See Appendix 2 & 3 Before the file is removed:- 1. Locate the physical file. You may need to refer to the electronic index to find the physical file location 2. Up the template on the front cover with the name of the person and the the file is removed (Date loaned & to whom) 3. Open the electronic index and locate the row relating to this particular file 4. Remove any entry in the last loaned to, last loaned and the last returned this will refer to the last time the file was loaned 5. Up the electronic index columns last loaned to and last loaned with the name of the person removing the file and the it was removed 6. Save the upd electronic index When the file is returned:- 1. Up the template on the front cover with the the file was returned ( Date returned & by whom) 2. Open the electronic index and locate the row relating to this particular file 3. Up the electronic index with the last returned 4. Save the electronic index 5. Replace the physical file in its designated location - If an contains important information that needs action, or to which you will need to refer later, you must save it in the relevant hard copy file. Security - All files must be held in appropriate accommodation. Confidential files and personal data must be located in maintained lockable filing cabinets. All files must be locked away or otherwise made secure every night. 7

8 Never allow physical files to get so large that they become unwieldy. Once a file is full, create a continuation file and number the files accordingly (e.g. File title - File 01 - range, File title - File 02 - range etc). Name the files to make it clear the order they were created and how many there are e.g. SmithJohn of2. Should file 3 be created for this student then you will need to up the reference on files 1 and 2 to become 01of 03 and 02 of 03. You will also need to up your electronic index. When a physical file is closed, ensure that all documents that need to be kept are in fact in the file i.e. remember to print to paper any relevant electronic documents or transactions and file them to ensure that the physical file is complete and that all relevant information is in one place. 6. Electronic Files How to File and Store Location of electronic files must be carefully considered by the Faculty/Service to ensure ease of retrieval. Remember everyone who needs to have access must know where the file is located and its name. It is sometimes worth having a mirror image of your Physical and Electronic File Names for ease of reference and retrieval. However as with physical storage it is important to follow the same principle of standards therefore: All electronic files must contain metadata. See Appendix 1 for the metadata template which must be the first page of electronic documents Files must be stored within the Document Management System if the file is made available under the University s Publication Scheme. Non Publication Scheme documents (including draft documents to be made available via the University s Publication Scheme) must be stored on the University s filestore. Faculties and Services may decide their own directory structures and directory naming conventions Documents must contain the full path name and file name in the footer of the documents to aid identification and location Files must be archived, retained and disposed of in line with the University s Data Retention, Archiving and Disposal Policies. 7. Guidance on Preparing Records for Onsite Storage There may be some records which you need occasional rather than regular access to and the pressure for office accommodation on-campus means that you may wish to consider moving some of your records to another on-campus location which might be cheaper and safer to use. This guidance provides some simple ideas on what to take into account when making such decisions. Records should be secured, cabinets, filing cabinets, storage rooms/cupboards should be lockable 8

9 Ensure you keep a list of where records are stored Ensure storage areas are kept tidy and clean Consult HR to ensure that health and safety requirements are met in your storage area Ensure that records used most frequently are the most easily accessible Records should not be stored in a place where they are going to cause an obstruction Don t store records near water Ensure your records are free from interference by animal pests Use proper storage boxes Label your boxes, contents list may be kept elsewhere if this is necessary for security purposes Don t stack boxes any more than 3 high on a shelf Don t overfill storage boxes Use proper storage furniture and don t stack anything directly on the ground 8. Recommendations for Desktop Computer Users Network Drives C: Drive Computer s Hard Drive This is your computer s hard-drive and is commonly known as your C:Drive or Local Drive. Only temporary files should be stored on the local C:Drive. The reasons for this are: If your computer develops a fault with its hard-drive the files stored may become corrupt or may not even be recoverable and could be lost permanently. Therefore the recommendation to take regular back-ups is important to remember. Do not use your local C: Drive to store permanent files as they are not backed up on the University s network and could be lost if your PC crashes. Files stored on your local C:Drive are only accessible by you and this could cause problems for your colleagues if they need to access information during your absence. Personal - Central Storage This is a storage space on the central network which is only accessible by you, much like the C:Drive. However, the difference is using this part of the network ensures that your data is backed up centrally, and means data lost due to accidental deletions or amendments can be recovered. The network drive is usually known as H however, depending on how your computer has been set up and configured may be known by another letter name, for example Z. Whatever letter is used, your own user ID will appear in the network address denoting that it is your personal drive. 9

10 Shared Access Central Storage The University s Central Filestore is accessible both on and off Campus. Access on-site: Usually this is set up on your PC as the S:Drive, again depending on how your computer has been set up and configured you may use a different letter name. The S:Drive gives you the flexibility of being able to share documents with your colleagues and have the added benefit of knowing that files are centrally stored therefore backed up regularly. In fact backed-up files are stored in the snapshot folder on your S.Drive which enables you to recover deleted files yourself without the need for IT intervention. Access off-campus: is via: Click on the Filestore Icon and log in with your staff User ID and Password. If you have never used the Central Filestore before you may need to activate it. You can do this by changing your University Password in Selfcare. The Selfcare icon is also at Retention and Review Files created or upd should be reviewed every 6 months. In most cases information saved to your H: Drive (see information above) may well be obsolete and should be deleted. Subject Access Requests may require you to provide any information you hold in your personal directories i.e. C: or H: Drives, also within your . Therefore it is good practice to regularly review and delete old files including . Portable Data Devices The use of portable data storage e.g. data pens should be kept to a minimum and Filestore as mentioned previously is available off-campus and is a more secure means of storing and accessing data. The use of Filestore is the preferred University method of secure storage. Data of a personal and sensitive nature should only be copied to a portable data device in exceptional circumstances and with the permission of your line manager.(refer to guidance on data security) Where it is necessary to copy personal or sensitive data to a portable data device an iron key should be used. Iron keys look like a pen drive but they allow you to protect the data through identity management (i.e. a login and password are required); also the data itself should be encrypted on the iron key. The purchase of Iron Keys is available via ITS Service Desk - helpdesk@sunderland.ac.uk. Iron keys can typically cost anything between The Information Commissioner s Office has now begun to issue significant fines in cases of serious personal data loss. The University will 10

11 also take disciplinary action against a member of staff deemed to have ignored this guidance). Loss of personal data via unprotected portable devices is a serious breach of Data Protection and a disciplinary offence. Portable data devices (e.g. pens / sticks) are for temporary storage only. Do not rely on a data pen as your only copy of the file. The master version of a document must be stored on filestore, or the Document Management System, according to your local Faculty/Service arrangements. Document Management System The Freedom of Information Act grants access rights to recorded information held by a wide range of public bodies (which includes Universities) and, in line with the Information Commissioners much more demanding expectations of public bodies, a new Publication Scheme was introduced and became operation on 1 st January The Publication Scheme is available via The Publication Scheme falls into 7 main categories: Who we are and What we do What we Spend and How we spend it What our Priorities are and How we are doing How we make Decisions Policies and Procedures List and Registers Services We Offer As an example, we are expected to make publicly available documents which display our performance in a range of areas; including external reviews and audit reports. The Scheme also required that the documents available must be the most recent including Minutes from Boards and Committees, recent consultative documents etc. Therefore all corporate files to be retained in line with the University s Records Management Policy should be held within Document Management System and those that do not fall under the scheme but need to be accessible to other colleagues should be held on the S:Drive. All files held within Document Management System must contain a review and expiry on the initial upload. These s should again conform to the University s Retention Policy All Information Champions have responsibility for the review archiving and destruction of these files. Facilities also use the Document Management System for storage of key master documents. 11

12 Recommended Templates Appendix 1 Electronic File Header Information (Metadata) Title Description Revision History Version Date Author&Department Changes Archive and Disposal Review Date Date to be archived Date to be deleted Deleted by 12

13 Appendix 2 - Physical File Cover Sheet File Title ( name) e.g. SmithJohn Description Physical records relating to student John Smith reg. no File sequence 1 of 2 Names of related files e.g. 2 of 2 Review Date 10 th July 2010 Date File Created 10 th July 2009 Created by ( person) Physical location of file Store cupboard room 23 Hutton Building Location of related files e.g. where is 2 of 2 Date added to electronic index Location of electronic index e.g. \\uos-staff.sunderland.ac.uk\academicrvs Date Loaned & to whom Date Returned & by whom Date file closed Date Archived Date Destroyed Archive Location Destroyed by whom 13

14 Appendix 3 - Physical File Index File Index Title Descri ption creation created by sequence physical location relate d files location of related files review added to this index location of electronic copy last loaned to Last loaned last returned closed archived archived location & ref destroye d dest roye d by who m for Creation and Storage of Physical & Electronic Files.docx 14

15 Appendix 4 Electronic Directory Index Directory Directory location Navigation path Description Date directory (and subdirectories) contents reviewed and upd/deleted Next review Docushare Collection-641 Financial regulations etc P&F shared directory \\uosstaff\planningfinance\ Project documentation, minutes of meetings 15

Naming Conventions For Electronic Files and Folders

Naming Conventions For Electronic Files and Folders Draft Guidance for College Staff Relating to Electronic Records, File/Document Management Contents Draft Guidance for College Staff Relating to Electronic Records, File/Document Management... 1 1. Introduction...

More information

CORPORATE RECORDS MANAGEMENT STANDARDS - STANDARD NAMING CONVENTIONS FOR ELECTRONIC FILES, FOLDERS AND RECORDS 1

CORPORATE RECORDS MANAGEMENT STANDARDS - STANDARD NAMING CONVENTIONS FOR ELECTRONIC FILES, FOLDERS AND RECORDS 1 CORPORATE RECORDS MANAGEMENT STANDARDS - STANDARD NAMING CONVENTIONS FOR ELECTRONIC FILES, FOLDERS AND RECORDS 1 SUMMARY OF PRINCIPAL CHANGES General changes This document has been revised to reflect the

More information

Business Improvements

Business Improvements Business Improvements RECORDS MANAGEMENT GUIDANCE Naming conventions for electronic documents What are naming conventions? Naming conventions help you to create understandable, consistent and predictable

More information

Where to Store and how to Share Electronic Documents. Guidance for staff

Where to Store and how to Share Electronic Documents. Guidance for staff Where to Store and how to Share Electronic Documents Guidance for staff 1 Executive Summary Aimed at Purpose Benefits for Staff Necessary skills Related Policy Related Guidance All trust staff who create

More information

Data Security Policy

Data Security Policy Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:

More information

RECORDS MANAGEMENT Managing Electronic Records in Shared Network Drives Good Practice Guidance

RECORDS MANAGEMENT Managing Electronic Records in Shared Network Drives Good Practice Guidance RECORDS MANAGEMENT Managing Electronic Records in Shared Network Drives Good Practice Guidance Version: 1 Status: Final Last Saved: 24 April 2007 Author: David Cloy CONTENTS 1. Introduction 2. Glossary

More information

NAMING FOLDERS AND FILES

NAMING FOLDERS AND FILES NAMING FOLDERS AND FILES It is important to have an agreed approach to naming Folders and Files which everyone who uses the shared folder understands. The agreed system should above all be: Simple and

More information

FILING AND STORING RECORDS

FILING AND STORING RECORDS FILING AND STORING RECORDS CONTENTS 1. FILING AND STORING ACTIVE RECORDS 1 1.1 Organizing Filing Locations 1 1.2 Labels for Hardcopy Files 3 2. STORING INACTIVE HARDCOPY RECORDS IN YOUR AGENCY 3 2.1 Labels

More information

Life Cycle of Records

Life Cycle of Records Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible

More information

Date of review: Information Governance Group January 2016. Policy Category: CONTENT SECTION DESCRIPTION PAGE

Date of review: Information Governance Group January 2016. Policy Category: CONTENT SECTION DESCRIPTION PAGE Title: Date Approved: January 2015 Division/Department: Corporate Services Corporate Records Policy Approved by: Date of review: Information Governance Group January 2016 Author (post-holder): Interim

More information

DOCUMENT AND RECORDS CONTROL PROCEDURE

DOCUMENT AND RECORDS CONTROL PROCEDURE DOCUMENT AND RECORDS CONTROL PROCEDURE PROCEDURE OBJECTIVES To ensure that documents are approved for adequacy prior to use. To ensure the adequacy and appropriateness of documents are reviewed on a regularly

More information

Document Management Plan Preparation Guidelines

Document Management Plan Preparation Guidelines Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Evidence additional element appendix 47. Records Management Guidance for the management of emails

Evidence additional element appendix 47. Records Management Guidance for the management of emails Records Management Guidance for the management of emails 2010 1 Document Control Sheet Name of Document: Guidelines for the Management of Emails as Records 2010 Author: Consultees Description of Content:

More information

Records Management - Managing Electronic Records File Naming Conventions. As each item is added to the folder should saved using a logical filename.

Records Management - Managing Electronic Records File Naming Conventions. As each item is added to the folder should saved using a logical filename. Opening Electronic Records Electronic records should be created as soon as the first document relevant to the record is received or created so as to ensure that all relating documents can be stored together

More information

LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER

LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER SECTION 46 OF THE FREEDOM OF INFORMATION ACT 2000 NOVEMBER 2002 Presented to Parliament by the Lord Chancellor Pursuant to section

More information

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy Computer Security Policy Contents 1 Scope... 3 2 Governance... 3 3 Physical Security... 3 3.1 Servers... 3 3.2

More information

UNIVERSITY OF LONDON RECORDS MANAGEMENT MANUAL: BEST PRACTICE PROCEDURE No. 4 ELECTRONIC RECORDS MANAGEMENT

UNIVERSITY OF LONDON RECORDS MANAGEMENT MANUAL: BEST PRACTICE PROCEDURE No. 4 ELECTRONIC RECORDS MANAGEMENT 1. Introduction UNIVERSITY OF LONDON RECORDS MANAGEMENT MANUAL: BEST PRACTICE PROCEDURE No. 4 ELECTRONIC RECORDS MANAGEMENT 1.1 The principles governing the closure and subsequent retention of electronic

More information

Good Practice in Records Management and Information Security

Good Practice in Records Management and Information Security Good Practice in Records Management and Information Security BELB LJ Schools 2013 How Valuable are Records & Documents? Valuable only because of the information they contain. Usable if they can be accessed

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

Best Practices for Document Naming Conventions

Best Practices for Document Naming Conventions An Applied Knowledge Group, Inc. Whitepaper 2100 Reston Parkway Suite 400 Reston, Virginia 20191 703.860.1145 www.akgroup.com Best Practices for Document Naming Conventions Best Practices and Strategy

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Records Management Policy & Guidance

Records Management Policy & Guidance Records Management Policy & Guidance COMMERCIALISM Document Control Document Details Author Nigel Spencer Company Name The Crown Estate Department Name Information Services Document Name Records Management

More information

NOT PROTECTIVELY MARKED FORCE PROCEDURES. Email Retention, Archiving and Destruction Procedure v1.2. Records Manager

NOT PROTECTIVELY MARKED FORCE PROCEDURES. Email Retention, Archiving and Destruction Procedure v1.2. Records Manager FORCE PROCEDURES Email Retention, Archiving and Destruction Procedure v1.2 Procedure Reference Number: 2010.08 Procedure Author: Samantha Hampson, Records Manager Procedure Review Date: 1 st April 2011

More information

Information Services. Protecting information. It s everyone s responsibility

Information Services. Protecting information. It s everyone s responsibility Information Services Protecting information It s everyone s responsibility Protecting information >> Contents >> Contents Introduction - we are all responsible for protecting information 03 The golden

More information

Information Management Policy

Information Management Policy Title Information Management Policy Document ID Director Mark Reynolds Status FINAL Owner Neil McCrirrick Version 1.0 Author Deborah Raven Version Date 26 January 2011 Information Management Policy Crown

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Naming Conventions for Digital Documents

Naming Conventions for Digital Documents Department of Education & Early Development DIVISION OF LIBRARIES, ARCHIVES & MUSEUMS Alaska State Archives Records & Information Management Service (RIMS) 141 Willoughby Avenue P.O. Box 110571 Juneau,

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY [Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body

More information

OFFICIAL. NCC Records Management and Disposal Policy

OFFICIAL. NCC Records Management and Disposal Policy NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy

More information

Agency Manager Professional Software Manual

Agency Manager Professional Software Manual Agency Manager Professional Software Manual Table Of Contents Navigation Pane... 4 Management Console... 5 Company Details... 5 Company Bank Details... 6 VAT Rate... 6 Currency Setting... 7 Database Users...

More information

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session Everyone in the workplace has a legal duty to protect the privacy of information about individuals AEP/BELB/LJ/2010 Awareness Session During 2007 alone, 36,989,300 people in the UK have had their private

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

This policy is not designed to use systems backup for the following purposes:

This policy is not designed to use systems backup for the following purposes: Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa

More information

DURHAM COUNTY COUNCIL CORPORATE RECORDS MANAGEMENT POLICY

DURHAM COUNTY COUNCIL CORPORATE RECORDS MANAGEMENT POLICY DURHAM COUNTY COUNCIL CORPORATE RECORDS MANAGEMENT POLICY Version 3.0 February 2015 Table of Contents 1. Purpose...3 2. Background... 4 3. Legislative Arena... 4 4. Scope...5 5. Aim and Objectives... 6

More information

Dale E. Applegate. dapplegate@marlandale.com. dale@consultd.com

Dale E. Applegate. dapplegate@marlandale.com. dale@consultd.com Small Business Document Management Dale E. Applegate dapplegate@marlandale.com dale@consultd.com Where are you Today? With your Document Management Assess Your Current Document Management Low Tech- Paper

More information

ANU Electronic Records Management System (ERMS) Manual

ANU Electronic Records Management System (ERMS) Manual ANU Electronic Records Management System (ERMS) Manual May 2015 ERMS Manual May 2015 1 Contents The ERMS Manual 1. Introduction... 3 2. Policy Principles... 3 3. The Electronic Records Management System...

More information

Temporary Records Procedure

Temporary Records Procedure Procedure Temporary Records Procedure Please note this procedure is mandatory and staff are required to adhere to the content DECD 07/6197 Summary That DECD Central Office, Regional Offices and sites will

More information

MANAGING SHARED AREAS: FILE STRUCTURES

MANAGING SHARED AREAS: FILE STRUCTURES MANAGING SHARED AREAS: FILE STRUCTURES Benefits of a Good File Structure A well organised structure for shared folders should mean that there is a consistent and agreed approach to the way information

More information

Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000

Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6

More information

Best Practice Guidance on Information and Records Management

Best Practice Guidance on Information and Records Management Best Practice Guidance on Information and Records Management v1.0 April 2012 Elaine Forbes- Information Governance Manager Contents Introduction... 2 Why do we have to manage information and records?...

More information

Non-Profit Records Management Tool Kit

Non-Profit Records Management Tool Kit Non-Profit Records Management Tool Kit January 2013 Contents Introduction.... 3 Generally Accepted Record Keeping Principles.... 4 What is a Record?.... 5 File Maintenance.... 6 Classifying a Record.....8

More information

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines (This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November

More information

A records survey is a systematic exercise to locate and identify all the records held by a particular business area.

A records survey is a systematic exercise to locate and identify all the records held by a particular business area. Conducting a records survey For whom is this guidance intended? This guidance is intended for University staff responsible for setting up records management systems in their part of the University. It

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

IT ACCESS CONTROL POLICY

IT ACCESS CONTROL POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Naming Conventions for Electronic Documents

Naming Conventions for Electronic Documents i Information Management Naming Conventions for Electronic Documents August 2005 Produced by Information Management, Branch Government and Program Support Services Alberta Government Services 3 rd Floor,

More information

ICT Data Backup and Recovery Policy

ICT Data Backup and Recovery Policy ICT Data Backup and Recovery Policy TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Records Management Policy

Records Management Policy Records Management Policy Document information Document type: Operational Policy Document title: Records Management Policy Document date: November 2014 Author: NHS South Commissioning Support Unit, Information

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Embedding Digital Continuity in Information Management

Embedding Digital Continuity in Information Management Embedding Digital Continuity in Information Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information

University of Limerick Data Protection Compliance Regulations June 2015

University of Limerick Data Protection Compliance Regulations June 2015 University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick

More information

Scope and Explanation

Scope and Explanation The Moray Council Retention & Disposal Schedule for documents and records [paper and electronic] Scope and Explanation 1 Document Control Sheet Name of Document: The Moray Council Records Retention Schedule

More information

Information and Compliance Management Information Management Policy

Information and Compliance Management Information Management Policy Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and

More information

Summary Electronic Information Security Policy

Summary Electronic Information Security Policy University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

1. The records have been created, sent or received in connection with the compilation.

1. The records have been created, sent or received in connection with the compilation. Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy

More information

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers: ITEM NO: 4 Report To: AUDIT PANEL Date: 23 March 2010 Reporting Officers: Subject: Report Summary: Recommendations: Links to Community Strategy: Policy Implications: Financial Implications: (Authorised

More information

Information Security Policy

Information Security Policy Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED

More information

MTRS 2.0 Transaction Reporting Gateway Guide

MTRS 2.0 Transaction Reporting Gateway Guide MTRS 2.0 Transaction Reporting Gateway Guide Version 1.1 October 19, 2015 Document History Version Description of Change Date V1.0 Initial version Sept 23, 2014 V1.1 Added Certification and Enrollment

More information

NextStep FAST Information Coordinators Manual

NextStep FAST Information Coordinators Manual NextStep FAST Information Coordinators Manual Disclosure Form: http://its.syr.edu/is/empack-form.cfm ENTSEC@syr.edu - Information Systems security team listserv Table of Contents Overview... 3 Signing

More information

E-mail Management: A Guide For Harvard Administrators

E-mail Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Records & Information Management Policy

Records & Information Management Policy The Moray Council Records & Information Management Policy 2013 1 Name of Record Author Description of Content Status Approved by Records & Information Management Policy Eleanor Rowe, Records Manager Strategic

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Implementing an Electronic Document and Records Management System. Key Considerations

Implementing an Electronic Document and Records Management System. Key Considerations Implementing an Electronic Document and Records Management System Key Considerations Commonwealth of Australia 2011 This work is copyright. Apart from any use as permitted under the Copyright Act 1968,

More information

Information Management Policy

Information Management Policy Information Management Policy Document Control Title Organisation Description Author(s) Information Management Policy London Legacy Development Corporation The Information Management Policy describes how

More information

Union County. Electronic Records and Document Imaging Policy

Union County. Electronic Records and Document Imaging Policy Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability

More information

MANAGEMENT OF MEETING PAPERS AND MINUTES

MANAGEMENT OF MEETING PAPERS AND MINUTES MANAGEMENT OF MEETING PAPERS AND MINUTES 1. INTRODUCTION 1.1 This guidance is for everyone responsible for recording and managing meetings, including Chairs and Secretaries. 1.2 This guidance will benefit

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

How to Manage Email. Guidance for staff

How to Manage Email. Guidance for staff How to Manage Email Guidance for staff 1 Executive Summary Aimed at Note Purpose Benefits staff Necessary skills to All staff who use email This guidance does NOT cover basic IT literacy skills. Staff

More information

Student Records Management Review Issued by Caroline Dominey, Records Manager August 2012

Student Records Management Review Issued by Caroline Dominey, Records Manager August 2012 Student Records Management Review Issued by Caroline Dominey, Records Manager August 2012 1. Introduction/background to Review During an internal Audit of Quality Standards and Academic Validation of Taught

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

SharePoint Document and Data Control

SharePoint Document and Data Control SharePoint Document and Data Control This article is concerned with how the management of documents and data in a site related to the delivery of SharePoint, thus allowing the control, storage and management

More information

Staff information. Email management policy

Staff information. Email management policy Staff information Email management policy 1. Scope This policy applies ICO-wide to all email users; including contractors and secondees where they have access to ICO email systems. 2. Purpose 2.1 To ensure

More information

Local Government Cyber Security:

Local Government Cyber Security: Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

RECORDS AND INFORMATION MANAGEMENT AND RETENTION

RECORDS AND INFORMATION MANAGEMENT AND RETENTION RECORDS AND INFORMATION MANAGEMENT AND RETENTION Policy The Health Science Center recognizes the need for orderly management and retrieval of all official records and a documented records retention and

More information

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.

Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files. Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely

More information

Extension Course -9006 Notes, Attachments, and Document Management Version 9.0

Extension Course -9006 Notes, Attachments, and Document Management Version 9.0 Extension Course -9006 Notes, Attachments, and Document Management Version 9.0 Information in this document is subject to change without notice and does not represent a commitment on the part of Technical

More information

New ehealth Computer Account User Information. July 2014

New ehealth Computer Account User Information. July 2014 New ehealth Computer Account User Information July 2014 Security and Identification Manitoba ehealth takes very seriously the need to protect your computer account along with the confidential data and

More information

QUICK START GUIDE RESOURCE MANAGERS. Last Updated: 04/27/2012

QUICK START GUIDE RESOURCE MANAGERS. Last Updated: 04/27/2012 QUICK START GUIDE RESOURCE MANAGERS Last Updated: 04/27/2012 Table of Contents Introduction... 3 Getting started... 4 Logging into Eclipse... 4 Setting your user preferences... 5 Online help and the Eclipse

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

NHS Fife. Your Business @ Risk - Information Governance and Security Survey

NHS Fife. Your Business @ Risk - Information Governance and Security Survey NHS Fife Your Business @ Risk - Information Governance and Security Survey Prepared for NHS Fife September 2014 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability

More information

How To Use Research Support (Rms)

How To Use Research Support (Rms) Edith Cowan University Research Management System Viewing and Recording Data A guide for Research Support Edith Cowan University June 2015 V3 Contents Introduction... 3 RMS grants administration summary...

More information

FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT

FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT November 2003 Laid before the Scottish Parliament on 10th November 2003 pursuant to section 61(6) of the Freedom of Information

More information

University of Sunderland Business Assurance Over-arching Information Governance Policy

University of Sunderland Business Assurance Over-arching Information Governance Policy University of Sunderland Business Assurance Over-arching Information Governance Policy Document Classification: Public Policy Reference Central Register IG001 Policy Reference Faculty / Service IG 001

More information

DATA AND PAYMENT SECURITY PART 1

DATA AND PAYMENT SECURITY PART 1 STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Remote Access Policy

Remote Access Policy BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is

More information