Freedom of Information & Records Management Group Standards for Creation and Storage of Physical & Electronic Files
|
|
- Agatha Hall
- 8 years ago
- Views:
Transcription
1 Freedom of Information & Records Management Group Standards for Creation and Storage of Physical & Electronic Files 1
2 Document Control: Issued By: Freedom of Information and Records Management Group (FIRM) Version Reason for Change Author Date 1.0 Initial Issue B Dale 06/08/ Amendments from S Kerridge B Dale 01/10/ Amendments from FIRM Group meeting B Dale 30/11/ Amendments from C Gales C Gales 13/01/ Amendments from FIRM Group (13/1/11) and C Gales (8/2/11) FIRM and C Gales 8/2/ Final check B Dale 10/3/11 Version control of a document is vital for good records management and consistency across the whole organisation. The latest version of this document will be made available on the University website, please ensure that you use the most up-to- version. 2
3 8. Standards for Creation and Storage of Physical & Electronic Files 1. Introduction The University s Freedom of Information and Records Management Group (FIRM) was set up to develop University Policy and Procedures in relation to Records Management, and to oversee the implementation of recommendations made by Internal Audit, and approved by the University s Audit Committee. This document now forms part of the University s Records Management Policy and relates to University Standards for the Creation Storage and Archival of Physical and Electronic Files. 2. Purpose of document To communicate to University staff the University s Standards for the Creation Storage and Archival of Physical and Electronic files. These standards will come into force following Executive approval. Physical and electronic files already in existence will be exempt from the Creation and Storage of Physical & Electronic Files standards. Please note that all physical and electronic files in existence now and in the future must adhere to the University s Retention, Archiving and Disposal Policy. 3. File Structures Whatever type of information you are dealing with, the aim of storing that information either electronically or physically is to enable quick retrieval with the minimum of effort. It is important to remember that you are storing University information in order to retrieve it and by consistent file creation and file management you will assist the University in achieving: Compliance with the statutory 20 days retrieval of information under the Freedom of Information Act, and 40 days under the Data Protection Act. Control of records within offices across the University and quick access to information. 3
4 Lifecycle of a record Create Archive Store Retrieve 4. Creation - Physical and Electronic Files The following recommended standards should be adopted by staff to aid retrieval of both physical and electronic files. There is no need to change existing file names however; these standards should be adhered to for new physical and electronic files. File Names - should be short and clear, as clarity and usability permits, and should not contain non-standard abbreviations or terms other staff may not understand. Repetition and redundancy Avoid repetition and redundancy in file names: e.g. a record s name should not contain information that is already present in the folder in which it is filed. Capital letters Use capital letters to start each word; never use spaces or underscores e.g. FinAccounts2009.doc. Some software packages have difficulty recognising files names with spaces and this can be a particular problem when publishing files to external web sites. Therefore the avoidance of spaces and underscores in naming files is very important. Two-digit numbers A minimum of two-digit numbers is required. It is important to include the zero for numbers 0-9 in file names to maintain the numeric order is cases where file names include numbers. An advantage of this is that it assists in easier retrieval of the most recent record number. Date Format If using a in a file name this should state the in a back to front format, and always use four digit years, two digit months and two digit days, e.g. YYYYMMDD or YYYYMM or YYYY. The back to front format means the chronological order of the records is maintained in the file directory, and this assists when trying to retrieve the latest d record. Personal Names When a record is a piece of correspondence it may be appropriate to include within the file name the name of the individual. When it is appropriate to include a personal name it should be given as - the Surname first followed by the Forename. Generic Terms Avoid using words like draft, letter or memo at the start of file names. Using descriptive generic terms at the start of file names, 4
5 means that all such records will appear together in the file directory. This will make it much more difficult to retrieve records. e.g. DraftFinancial2010.doc FinalFinancial2010.doc Would make it difficult to find the financial documents, whereas: FinancialDraft2010V01.doc FinancialDraft2010V02.doc FinancialFinal2010.doc Would follow each other if the files were sorted alphabetically. Order the Elements - The elements to be included in a file name should be ordered according to the way in which the record will be retrieved during the course of day to day business, e.g. Retrieved by Date the element should appear first. Retrieved by Description then the description should be listed first. Recurring events should include the and description of the event, unless these elements already exist in the file name, e.g. minutes of meetings, regular reports, event management and budget planning documents need to include the and the event name/description in order for the record to be identified and retrieved. The file names of correspondence need to include the name of the correspondent, an indication of the subject, the of the correspondence and whether it is incoming or outgoing correspondence. Hence the file names of correspondence should include the following elements: 1. Name of correspondent. (This is either the name of the person who sent you the correspondence or the name of the person to whom you sent the correspondence) 2. A description of the subject, provided it is not already stated in the folder title; 3. The of the correspondence; 4. If it is received correspondence, then include the standard abbreviation Rcvd. The version number of a record should be indicated in its file name by the inclusion of the letter V followed by the version number and, if applicable, Draft or Final. e.g. FinancialFinal2010V01 It is always important to differentiate between various drafts of a document by giving each draft its own number. If a version number is applicable, it should always appear in the file name of the record so that the most recent version can be readily identified 5
6 Summary - Ensure each file has the following: A unique title so that it can be easily identified. Always make sure that the file title refers to the records contained within it. Metadata displayed on the front cover. See appendix 2 for the metadata template which must be completed and attached to new physical files. An index of directories holding electronic files must be created (See Appendix 4) and held in a location which is regularly backed up (e.g. your Faculty or Service shared S: drive) to ensure the index is not lost. Ensure all staff that may need to access the information are trained in the retrieval process. Print a copy of the index on a regular basis. The frequency will depend on how often you create new files but you must print a copy at least once per month. This is your contingency in the event you need to retrieve a file and the computer systems are not available for you to access the index. 5. Physical Files How to File and Store Physical files should use a filing system to facilitate the storage and efficient retrieval of records. Every new physical file must be recorded and maintained in an ordered and consistent manner. The following standards must be followed:- The filing system must:- Enable you to find the information as quickly as possible and with the minimum of effort. Everyone who uses the filing system must know how it works It must be simple to use Files must be:- Kept up to Stored away from threat of fire/water/malicious attack/unauthorised access Accessible within the statutory 20-day response deadline to any requests for information made under the Freedom of Information Act Retained in line with the University s Data Retention, Archiving and Disposal Policies. 6
7 Removal of Files If a physical file is removed from its usual location you must up who has taken it, when it was taken and when it was returned. This will help locate missing files. This information must be completed on the template attached to the front cover of the physical file and also in the electronic index. See Appendix 2 & 3 Before the file is removed:- 1. Locate the physical file. You may need to refer to the electronic index to find the physical file location 2. Up the template on the front cover with the name of the person and the the file is removed (Date loaned & to whom) 3. Open the electronic index and locate the row relating to this particular file 4. Remove any entry in the last loaned to, last loaned and the last returned this will refer to the last time the file was loaned 5. Up the electronic index columns last loaned to and last loaned with the name of the person removing the file and the it was removed 6. Save the upd electronic index When the file is returned:- 1. Up the template on the front cover with the the file was returned ( Date returned & by whom) 2. Open the electronic index and locate the row relating to this particular file 3. Up the electronic index with the last returned 4. Save the electronic index 5. Replace the physical file in its designated location - If an contains important information that needs action, or to which you will need to refer later, you must save it in the relevant hard copy file. Security - All files must be held in appropriate accommodation. Confidential files and personal data must be located in maintained lockable filing cabinets. All files must be locked away or otherwise made secure every night. 7
8 Never allow physical files to get so large that they become unwieldy. Once a file is full, create a continuation file and number the files accordingly (e.g. File title - File 01 - range, File title - File 02 - range etc). Name the files to make it clear the order they were created and how many there are e.g. SmithJohn of2. Should file 3 be created for this student then you will need to up the reference on files 1 and 2 to become 01of 03 and 02 of 03. You will also need to up your electronic index. When a physical file is closed, ensure that all documents that need to be kept are in fact in the file i.e. remember to print to paper any relevant electronic documents or transactions and file them to ensure that the physical file is complete and that all relevant information is in one place. 6. Electronic Files How to File and Store Location of electronic files must be carefully considered by the Faculty/Service to ensure ease of retrieval. Remember everyone who needs to have access must know where the file is located and its name. It is sometimes worth having a mirror image of your Physical and Electronic File Names for ease of reference and retrieval. However as with physical storage it is important to follow the same principle of standards therefore: All electronic files must contain metadata. See Appendix 1 for the metadata template which must be the first page of electronic documents Files must be stored within the Document Management System if the file is made available under the University s Publication Scheme. Non Publication Scheme documents (including draft documents to be made available via the University s Publication Scheme) must be stored on the University s filestore. Faculties and Services may decide their own directory structures and directory naming conventions Documents must contain the full path name and file name in the footer of the documents to aid identification and location Files must be archived, retained and disposed of in line with the University s Data Retention, Archiving and Disposal Policies. 7. Guidance on Preparing Records for Onsite Storage There may be some records which you need occasional rather than regular access to and the pressure for office accommodation on-campus means that you may wish to consider moving some of your records to another on-campus location which might be cheaper and safer to use. This guidance provides some simple ideas on what to take into account when making such decisions. Records should be secured, cabinets, filing cabinets, storage rooms/cupboards should be lockable 8
9 Ensure you keep a list of where records are stored Ensure storage areas are kept tidy and clean Consult HR to ensure that health and safety requirements are met in your storage area Ensure that records used most frequently are the most easily accessible Records should not be stored in a place where they are going to cause an obstruction Don t store records near water Ensure your records are free from interference by animal pests Use proper storage boxes Label your boxes, contents list may be kept elsewhere if this is necessary for security purposes Don t stack boxes any more than 3 high on a shelf Don t overfill storage boxes Use proper storage furniture and don t stack anything directly on the ground 8. Recommendations for Desktop Computer Users Network Drives C: Drive Computer s Hard Drive This is your computer s hard-drive and is commonly known as your C:Drive or Local Drive. Only temporary files should be stored on the local C:Drive. The reasons for this are: If your computer develops a fault with its hard-drive the files stored may become corrupt or may not even be recoverable and could be lost permanently. Therefore the recommendation to take regular back-ups is important to remember. Do not use your local C: Drive to store permanent files as they are not backed up on the University s network and could be lost if your PC crashes. Files stored on your local C:Drive are only accessible by you and this could cause problems for your colleagues if they need to access information during your absence. Personal - Central Storage This is a storage space on the central network which is only accessible by you, much like the C:Drive. However, the difference is using this part of the network ensures that your data is backed up centrally, and means data lost due to accidental deletions or amendments can be recovered. The network drive is usually known as H however, depending on how your computer has been set up and configured may be known by another letter name, for example Z. Whatever letter is used, your own user ID will appear in the network address denoting that it is your personal drive. 9
10 Shared Access Central Storage The University s Central Filestore is accessible both on and off Campus. Access on-site: Usually this is set up on your PC as the S:Drive, again depending on how your computer has been set up and configured you may use a different letter name. The S:Drive gives you the flexibility of being able to share documents with your colleagues and have the added benefit of knowing that files are centrally stored therefore backed up regularly. In fact backed-up files are stored in the snapshot folder on your S.Drive which enables you to recover deleted files yourself without the need for IT intervention. Access off-campus: is via: Click on the Filestore Icon and log in with your staff User ID and Password. If you have never used the Central Filestore before you may need to activate it. You can do this by changing your University Password in Selfcare. The Selfcare icon is also at Retention and Review Files created or upd should be reviewed every 6 months. In most cases information saved to your H: Drive (see information above) may well be obsolete and should be deleted. Subject Access Requests may require you to provide any information you hold in your personal directories i.e. C: or H: Drives, also within your . Therefore it is good practice to regularly review and delete old files including . Portable Data Devices The use of portable data storage e.g. data pens should be kept to a minimum and Filestore as mentioned previously is available off-campus and is a more secure means of storing and accessing data. The use of Filestore is the preferred University method of secure storage. Data of a personal and sensitive nature should only be copied to a portable data device in exceptional circumstances and with the permission of your line manager.(refer to guidance on data security) Where it is necessary to copy personal or sensitive data to a portable data device an iron key should be used. Iron keys look like a pen drive but they allow you to protect the data through identity management (i.e. a login and password are required); also the data itself should be encrypted on the iron key. The purchase of Iron Keys is available via ITS Service Desk - helpdesk@sunderland.ac.uk. Iron keys can typically cost anything between The Information Commissioner s Office has now begun to issue significant fines in cases of serious personal data loss. The University will 10
11 also take disciplinary action against a member of staff deemed to have ignored this guidance). Loss of personal data via unprotected portable devices is a serious breach of Data Protection and a disciplinary offence. Portable data devices (e.g. pens / sticks) are for temporary storage only. Do not rely on a data pen as your only copy of the file. The master version of a document must be stored on filestore, or the Document Management System, according to your local Faculty/Service arrangements. Document Management System The Freedom of Information Act grants access rights to recorded information held by a wide range of public bodies (which includes Universities) and, in line with the Information Commissioners much more demanding expectations of public bodies, a new Publication Scheme was introduced and became operation on 1 st January The Publication Scheme is available via The Publication Scheme falls into 7 main categories: Who we are and What we do What we Spend and How we spend it What our Priorities are and How we are doing How we make Decisions Policies and Procedures List and Registers Services We Offer As an example, we are expected to make publicly available documents which display our performance in a range of areas; including external reviews and audit reports. The Scheme also required that the documents available must be the most recent including Minutes from Boards and Committees, recent consultative documents etc. Therefore all corporate files to be retained in line with the University s Records Management Policy should be held within Document Management System and those that do not fall under the scheme but need to be accessible to other colleagues should be held on the S:Drive. All files held within Document Management System must contain a review and expiry on the initial upload. These s should again conform to the University s Retention Policy All Information Champions have responsibility for the review archiving and destruction of these files. Facilities also use the Document Management System for storage of key master documents. 11
12 Recommended Templates Appendix 1 Electronic File Header Information (Metadata) Title Description Revision History Version Date Author&Department Changes Archive and Disposal Review Date Date to be archived Date to be deleted Deleted by 12
13 Appendix 2 - Physical File Cover Sheet File Title ( name) e.g. SmithJohn Description Physical records relating to student John Smith reg. no File sequence 1 of 2 Names of related files e.g. 2 of 2 Review Date 10 th July 2010 Date File Created 10 th July 2009 Created by ( person) Physical location of file Store cupboard room 23 Hutton Building Location of related files e.g. where is 2 of 2 Date added to electronic index Location of electronic index e.g. \\uos-staff.sunderland.ac.uk\academicrvs Date Loaned & to whom Date Returned & by whom Date file closed Date Archived Date Destroyed Archive Location Destroyed by whom 13
14 Appendix 3 - Physical File Index File Index Title Descri ption creation created by sequence physical location relate d files location of related files review added to this index location of electronic copy last loaned to Last loaned last returned closed archived archived location & ref destroye d dest roye d by who m for Creation and Storage of Physical & Electronic Files.docx 14
15 Appendix 4 Electronic Directory Index Directory Directory location Navigation path Description Date directory (and subdirectories) contents reviewed and upd/deleted Next review Docushare Collection-641 Financial regulations etc P&F shared directory \\uosstaff\planningfinance\ Project documentation, minutes of meetings 15
Naming Conventions For Electronic Files and Folders
Draft Guidance for College Staff Relating to Electronic Records, File/Document Management Contents Draft Guidance for College Staff Relating to Electronic Records, File/Document Management... 1 1. Introduction...
More informationCORPORATE RECORDS MANAGEMENT STANDARDS - STANDARD NAMING CONVENTIONS FOR ELECTRONIC FILES, FOLDERS AND RECORDS 1
CORPORATE RECORDS MANAGEMENT STANDARDS - STANDARD NAMING CONVENTIONS FOR ELECTRONIC FILES, FOLDERS AND RECORDS 1 SUMMARY OF PRINCIPAL CHANGES General changes This document has been revised to reflect the
More informationBusiness Improvements
Business Improvements RECORDS MANAGEMENT GUIDANCE Naming conventions for electronic documents What are naming conventions? Naming conventions help you to create understandable, consistent and predictable
More informationWhere to Store and how to Share Electronic Documents. Guidance for staff
Where to Store and how to Share Electronic Documents Guidance for staff 1 Executive Summary Aimed at Purpose Benefits for Staff Necessary skills Related Policy Related Guidance All trust staff who create
More informationData Security Policy
Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:
More informationRECORDS MANAGEMENT Managing Electronic Records in Shared Network Drives Good Practice Guidance
RECORDS MANAGEMENT Managing Electronic Records in Shared Network Drives Good Practice Guidance Version: 1 Status: Final Last Saved: 24 April 2007 Author: David Cloy CONTENTS 1. Introduction 2. Glossary
More informationNAMING FOLDERS AND FILES
NAMING FOLDERS AND FILES It is important to have an agreed approach to naming Folders and Files which everyone who uses the shared folder understands. The agreed system should above all be: Simple and
More informationFILING AND STORING RECORDS
FILING AND STORING RECORDS CONTENTS 1. FILING AND STORING ACTIVE RECORDS 1 1.1 Organizing Filing Locations 1 1.2 Labels for Hardcopy Files 3 2. STORING INACTIVE HARDCOPY RECORDS IN YOUR AGENCY 3 2.1 Labels
More informationLife Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
More informationDate of review: Information Governance Group January 2016. Policy Category: CONTENT SECTION DESCRIPTION PAGE
Title: Date Approved: January 2015 Division/Department: Corporate Services Corporate Records Policy Approved by: Date of review: Information Governance Group January 2016 Author (post-holder): Interim
More informationDOCUMENT AND RECORDS CONTROL PROCEDURE
DOCUMENT AND RECORDS CONTROL PROCEDURE PROCEDURE OBJECTIVES To ensure that documents are approved for adequacy prior to use. To ensure the adequacy and appropriateness of documents are reviewed on a regularly
More informationDocument Management Plan Preparation Guidelines
Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations
More informationHuman Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationEvidence additional element appendix 47. Records Management Guidance for the management of emails
Records Management Guidance for the management of emails 2010 1 Document Control Sheet Name of Document: Guidelines for the Management of Emails as Records 2010 Author: Consultees Description of Content:
More informationRecords Management - Managing Electronic Records File Naming Conventions. As each item is added to the folder should saved using a logical filename.
Opening Electronic Records Electronic records should be created as soon as the first document relevant to the record is received or created so as to ensure that all relating documents can be stored together
More informationLORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER
LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER SECTION 46 OF THE FREEDOM OF INFORMATION ACT 2000 NOVEMBER 2002 Presented to Parliament by the Lord Chancellor Pursuant to section
More informationOriginator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy
Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy Computer Security Policy Contents 1 Scope... 3 2 Governance... 3 3 Physical Security... 3 3.1 Servers... 3 3.2
More informationUNIVERSITY OF LONDON RECORDS MANAGEMENT MANUAL: BEST PRACTICE PROCEDURE No. 4 ELECTRONIC RECORDS MANAGEMENT
1. Introduction UNIVERSITY OF LONDON RECORDS MANAGEMENT MANUAL: BEST PRACTICE PROCEDURE No. 4 ELECTRONIC RECORDS MANAGEMENT 1.1 The principles governing the closure and subsequent retention of electronic
More informationGood Practice in Records Management and Information Security
Good Practice in Records Management and Information Security BELB LJ Schools 2013 How Valuable are Records & Documents? Valuable only because of the information they contain. Usable if they can be accessed
More informationDATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
More informationBest Practices for Document Naming Conventions
An Applied Knowledge Group, Inc. Whitepaper 2100 Reston Parkway Suite 400 Reston, Virginia 20191 703.860.1145 www.akgroup.com Best Practices for Document Naming Conventions Best Practices and Strategy
More informationVersion: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
More informationRecords Management Policy & Guidance
Records Management Policy & Guidance COMMERCIALISM Document Control Document Details Author Nigel Spencer Company Name The Crown Estate Department Name Information Services Document Name Records Management
More informationNOT PROTECTIVELY MARKED FORCE PROCEDURES. Email Retention, Archiving and Destruction Procedure v1.2. Records Manager
FORCE PROCEDURES Email Retention, Archiving and Destruction Procedure v1.2 Procedure Reference Number: 2010.08 Procedure Author: Samantha Hampson, Records Manager Procedure Review Date: 1 st April 2011
More informationInformation Services. Protecting information. It s everyone s responsibility
Information Services Protecting information It s everyone s responsibility Protecting information >> Contents >> Contents Introduction - we are all responsible for protecting information 03 The golden
More informationInformation Management Policy
Title Information Management Policy Document ID Director Mark Reynolds Status FINAL Owner Neil McCrirrick Version 1.0 Author Deborah Raven Version Date 26 January 2011 Information Management Policy Crown
More informationSo the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
More informationNaming Conventions for Digital Documents
Department of Education & Early Development DIVISION OF LIBRARIES, ARCHIVES & MUSEUMS Alaska State Archives Records & Information Management Service (RIMS) 141 Willoughby Avenue P.O. Box 110571 Juneau,
More informationRECORDS MANAGEMENT POLICY
[Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body
More informationOFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
More informationAgency Manager Professional Software Manual
Agency Manager Professional Software Manual Table Of Contents Navigation Pane... 4 Management Console... 5 Company Details... 5 Company Bank Details... 6 VAT Rate... 6 Currency Setting... 7 Database Users...
More informationEveryone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session
Everyone in the workplace has a legal duty to protect the privacy of information about individuals AEP/BELB/LJ/2010 Awareness Session During 2007 alone, 36,989,300 people in the UK have had their private
More informationScotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
More informationThis policy is not designed to use systems backup for the following purposes:
Number: AC IT POL 003 Subject: Backup and Restore Policy 1. PURPOSE The backup and restore policy establishes the need and rules for performing periodic system backup to permit timely restoration of Africa
More informationDURHAM COUNTY COUNCIL CORPORATE RECORDS MANAGEMENT POLICY
DURHAM COUNTY COUNCIL CORPORATE RECORDS MANAGEMENT POLICY Version 3.0 February 2015 Table of Contents 1. Purpose...3 2. Background... 4 3. Legislative Arena... 4 4. Scope...5 5. Aim and Objectives... 6
More informationDale E. Applegate. dapplegate@marlandale.com. dale@consultd.com
Small Business Document Management Dale E. Applegate dapplegate@marlandale.com dale@consultd.com Where are you Today? With your Document Management Assess Your Current Document Management Low Tech- Paper
More informationANU Electronic Records Management System (ERMS) Manual
ANU Electronic Records Management System (ERMS) Manual May 2015 ERMS Manual May 2015 1 Contents The ERMS Manual 1. Introduction... 3 2. Policy Principles... 3 3. The Electronic Records Management System...
More informationTemporary Records Procedure
Procedure Temporary Records Procedure Please note this procedure is mandatory and staff are required to adhere to the content DECD 07/6197 Summary That DECD Central Office, Regional Offices and sites will
More informationMANAGING SHARED AREAS: FILE STRUCTURES
MANAGING SHARED AREAS: FILE STRUCTURES Benefits of a Good File Structure A well organised structure for shared folders should mean that there is a consistent and agreed approach to the way information
More informationLord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000
Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under
More informationAGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader
AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION
More informationUSERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM
USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6
More informationBest Practice Guidance on Information and Records Management
Best Practice Guidance on Information and Records Management v1.0 April 2012 Elaine Forbes- Information Governance Manager Contents Introduction... 2 Why do we have to manage information and records?...
More informationNon-Profit Records Management Tool Kit
Non-Profit Records Management Tool Kit January 2013 Contents Introduction.... 3 Generally Accepted Record Keeping Principles.... 4 What is a Record?.... 5 File Maintenance.... 6 Classifying a Record.....8
More informationMinistry of Children and Family Development (MCFD) Contractor s Information Management Guidelines
(This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November
More informationA records survey is a systematic exercise to locate and identify all the records held by a particular business area.
Conducting a records survey For whom is this guidance intended? This guidance is intended for University staff responsible for setting up records management systems in their part of the University. It
More informationData Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
More informationIT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
More informationNaming Conventions for Electronic Documents
i Information Management Naming Conventions for Electronic Documents August 2005 Produced by Information Management, Branch Government and Program Support Services Alberta Government Services 3 rd Floor,
More informationICT Data Backup and Recovery Policy
ICT Data Backup and Recovery Policy TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
More informationDATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationRecords Management Policy
Records Management Policy Document information Document type: Operational Policy Document title: Records Management Policy Document date: November 2014 Author: NHS South Commissioning Support Unit, Information
More informationInformation Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
More informationEmbedding Digital Continuity in Information Management
Embedding Digital Continuity in Information Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
More informationUniversity of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
More informationScope and Explanation
The Moray Council Retention & Disposal Schedule for documents and records [paper and electronic] Scope and Explanation 1 Document Control Sheet Name of Document: The Moray Council Records Retention Schedule
More informationInformation and Compliance Management Information Management Policy
Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and
More informationSummary Electronic Information Security Policy
University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More information1. The records have been created, sent or received in connection with the compilation.
Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy
More informationITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:
ITEM NO: 4 Report To: AUDIT PANEL Date: 23 March 2010 Reporting Officers: Subject: Report Summary: Recommendations: Links to Community Strategy: Policy Implications: Financial Implications: (Authorised
More informationInformation Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
More informationMTRS 2.0 Transaction Reporting Gateway Guide
MTRS 2.0 Transaction Reporting Gateway Guide Version 1.1 October 19, 2015 Document History Version Description of Change Date V1.0 Initial version Sept 23, 2014 V1.1 Added Certification and Enrollment
More informationNextStep FAST Information Coordinators Manual
NextStep FAST Information Coordinators Manual Disclosure Form: http://its.syr.edu/is/empack-form.cfm ENTSEC@syr.edu - Information Systems security team listserv Table of Contents Overview... 3 Signing
More informationE-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationRecords & Information Management Policy
The Moray Council Records & Information Management Policy 2013 1 Name of Record Author Description of Content Status Approved by Records & Information Management Policy Eleanor Rowe, Records Manager Strategic
More informationData and Information Security Policy
St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration
More informationImplementing an Electronic Document and Records Management System. Key Considerations
Implementing an Electronic Document and Records Management System Key Considerations Commonwealth of Australia 2011 This work is copyright. Apart from any use as permitted under the Copyright Act 1968,
More informationInformation Management Policy
Information Management Policy Document Control Title Organisation Description Author(s) Information Management Policy London Legacy Development Corporation The Information Management Policy describes how
More informationUnion County. Electronic Records and Document Imaging Policy
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
More informationMANAGEMENT OF MEETING PAPERS AND MINUTES
MANAGEMENT OF MEETING PAPERS AND MINUTES 1. INTRODUCTION 1.1 This guidance is for everyone responsible for recording and managing meetings, including Chairs and Secretaries. 1.2 This guidance will benefit
More informationUniversity of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
More informationHow to Manage Email. Guidance for staff
How to Manage Email Guidance for staff 1 Executive Summary Aimed at Note Purpose Benefits staff Necessary skills to All staff who use email This guidance does NOT cover basic IT literacy skills. Staff
More informationStudent Records Management Review Issued by Caroline Dominey, Records Manager August 2012
Student Records Management Review Issued by Caroline Dominey, Records Manager August 2012 1. Introduction/background to Review During an internal Audit of Quality Standards and Academic Validation of Taught
More informationE-SAFETY POLICY 2014/15 Including:
E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable
More informationHow To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
More informationSharePoint Document and Data Control
SharePoint Document and Data Control This article is concerned with how the management of documents and data in a site related to the delivery of SharePoint, thus allowing the control, storage and management
More informationStaff information. Email management policy
Staff information Email management policy 1. Scope This policy applies ICO-wide to all email users; including contractors and secondees where they have access to ICO email systems. 2. Purpose 2.1 To ensure
More informationLocal Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
More informationINFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third
More informationDATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
More informationScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
More informationRECORDS AND INFORMATION MANAGEMENT AND RETENTION
RECORDS AND INFORMATION MANAGEMENT AND RETENTION Policy The Health Science Center recognizes the need for orderly management and retrieval of all official records and a documented records retention and
More informationCatalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
More informationData Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationThe guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.
Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely
More informationExtension Course -9006 Notes, Attachments, and Document Management Version 9.0
Extension Course -9006 Notes, Attachments, and Document Management Version 9.0 Information in this document is subject to change without notice and does not represent a commitment on the part of Technical
More informationNew ehealth Computer Account User Information. July 2014
New ehealth Computer Account User Information July 2014 Security and Identification Manitoba ehealth takes very seriously the need to protect your computer account along with the confidential data and
More informationQUICK START GUIDE RESOURCE MANAGERS. Last Updated: 04/27/2012
QUICK START GUIDE RESOURCE MANAGERS Last Updated: 04/27/2012 Table of Contents Introduction... 3 Getting started... 4 Logging into Eclipse... 4 Setting your user preferences... 5 Online help and the Eclipse
More informationPolicy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
More informationNHS Fife. Your Business @ Risk - Information Governance and Security Survey
NHS Fife Your Business @ Risk - Information Governance and Security Survey Prepared for NHS Fife September 2014 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability
More informationHow To Use Research Support (Rms)
Edith Cowan University Research Management System Viewing and Recording Data A guide for Research Support Edith Cowan University June 2015 V3 Contents Introduction... 3 RMS grants administration summary...
More informationFREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT
FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT November 2003 Laid before the Scottish Parliament on 10th November 2003 pursuant to section 61(6) of the Freedom of Information
More informationUniversity of Sunderland Business Assurance Over-arching Information Governance Policy
University of Sunderland Business Assurance Over-arching Information Governance Policy Document Classification: Public Policy Reference Central Register IG001 Policy Reference Faculty / Service IG 001
More informationDATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
More informationRemote Access Policy
BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is
More information