Video surveillance at EFSA Implementing rules and technical specifications
|
|
|
- Molly Aileen Barton
- 10 years ago
- Views:
Transcription
1 Video surveillance at EFSA Implementing rules and technical specifications PUBLIC version 1 Introduction EFSA operates a video surveillance system (hereafter VSS) for the safety and security of its buildings, assets, staff and visitors. The present document and its attachments describe the EFSA's VSS and the precautions that EFSA takes to protect the personal data, privacy and other fundamental rights and legitimate interests of people filmed by the cameras. Due to the sensitivity of the issue, the approval of the Executive Director is deemed necessary. 2 Scope This document concerns the video surveillance system installed in the EFSA premises, Via Carlo Magno 1a, Parma as well as surveillance in representation rooms of EFSA located at Palazzo Ducale, Parma. 3 Purpose 3.1. Purpose of the video surveillance at EFSA. EFSA uses its VSS for the sole purpose of physical security and access control. The video-surveillance system helps to control the access to EFSA premises, ensuring the security and safety of premises, individuals and goods (e.g. documents, assets). It complements other physical security systems such as the access control system by means of access badges and physical intrusion control systems. It helps to prevent, deter, and if necessary, investigate unauthorised physical access and security incidents in areas under surveillance. In addition, video-surveillance helps to prevent, detect and investigate theft of equipment or assets owned by EFSA, visitors or staff and threats to the safety of visitors or staff. This policy forms part of the broader Security Policy of EFSA, available on the Intranet Portal Purpose limitation. The system is not used for any other purposes than described under the previous point. Therefore, it is not used to monitor the work of individuals or their attendance or as an investigative tool (other than investigating physical security incidents such as thefts or unauthorised access). Only in exceptional circumstances the images may be transferred to investigatory bodies in the framework of a formal administrative inquiry, disciplinary proceeding or criminal investigation as described in point 7.5 below (see Sections 5.7, 5.8 and 10.3 of the EDPS Guidelines). 2
2 4 Ensuring efficient targeted video surveillance 4.1. Document objectives. EFSA processes the images in accordance with both the Video Surveillance Guidelines issued by the European Data Protection Supervisor (EDPS) (hereafter referred to as EDPS Guidelines ) and Regulation (EC) No 45/2001 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies (hereafter referred to as the Data Protection Regulation ). For the points listed below, the practise of EFSA derogates from the recommendations in the EDPS Guidelines. A justification is provided in the points referred to: Infra-red illumination point 6.1 Retention period of images from cameras covering limited areas outside the EFSA building perimeter point Data protection compliance The present Policy takes account of the following: A data protection Audit and privacy impact analysis of the EFSA video-surveillance system was carried out in The resulting findings and recommendations have been addressed in the present Policy (see Annex 1); The EDPS Opinion following the notification for prior checking by the DPO, submitted to the EDPS in accordance with Article 27 of the Data Protection Regulation (Annex 8); Information to the Italian National Data Protection Authority Revision of the existing system In order to ensure that the VSS of EFSA is compliant with the EDPS Guidelines, the system is subject to a self-audit, or anytime when substantive infrastructural changes are implemented and/or new technologies are adopted. In this case, CORSER Unit must inform the DPO and anticipate the periodical self-audit. In view of the fact that the present Policy addresses the findings and recommendations of the initial data protection audit referred to in above point 4.2, the first self-audit shall be carried out within two years after entering in force of the measures described in this document Decision of the Executive Director and consultation The decision to use a video surveillance system and to adopt the safeguards described or referred to in this document was made by the Executive Director. The DPO (Data Protection Officer) and the SO (Security Officer) of EFSA have been consulted before the adoption of this document Transparency. There are two versions of this document: the present confidential version for restricted use and a public version available and posted on the EFSA Intranet Portal and on the EFSA official website. The public version contains summary information with respect to particular topics. Information is only omitted from the public version insofar as the preservation of confidentiality is absolutely necessary for compelling reasons in accordance with the 3
3 Regulation on public access to documents 1 (e.g. for security reasons, to preserve the confidentiality of business sensitive information, or to protect the privacy of individuals). 5 Areas under surveillance within the EFSA perimeter (Confidential [...] information) 6 Collection of video images (Confidential information) [...] 7 Data access and disclosure 7.1. In-house security staff and guards. Live and recorded CCTV footage is accessible to security guards on duty (contract outsourcing see below 7.5) and EFSA staff of CORSER Unit, i.e. the head of unit and CORSER staff in charge, firstly the EFSA Security Officer and other CORSER staff in charge of office security. All persons with access to the VSS have signed a Declaration on Confidentiality (see Annex 3) Access rights. Access credentials to the VSS are set as follows (see Annex 2 for details): A personalised administrator account for the EFSA Security Officer (+ backup), allowing granting access rights, the creation of new accounts and exporting images from the VSS; A personalised super-user account for the Security Guards Team Leader (+ backup); Generic user account for security guards and two staff members of CORSER Site Management Team, allowing the live viewing and viewing of recorded images; Generic maintenance account for technicians in charge of system maintenance (outsourced service) 7.3. Data protection training. The DPO organizes periodical refreshment training on data protection issues related to the VSS for all persons with access rights to the system. This data protection training is organised on a two-yearly basis. (see Section 8.2 of the EDPS Guidelines) Confidentiality Declarations. Each individual with access to the VSS must sign the Declaration of Confidentiality (see Annex 3 and Section 8.3 of the EDPS Guidelines). The originals of declarations are kept by the CORSER Unit in charge of the system Transfers and disclosures. All transfers and disclosures of CCTV footage must be formally requested in writing and documented and are subject to a rigorous assessment of the necessity for such transfer and the compatibility of the transfer with the declared security and access 1 Regulation (EC) N 1049/2001 of 30 May 2001 regarding public access to European Parliament, Council and Commission documents, OJ , L145/43, article 4 4
4 control purpose (see Section 10 of the EDPS Guidelines). Transfers to local law enforcement authorities (e.g. Polizia, Carabinieri) when needed, to investigate or prosecute criminal offences Such transfers can only be authorized following a formal written request to EFSA, signed by a sufficiently highly ranked police officer or a court order, or a similar formal request, specifying the reason why the VSS images are needed as well as the location, date and time of the requested images. Each request for disclosure to local authorities is assessed by the EFSA Security Officer (SO) and the CORSER Site Management Team and also the Data Protection Officer (DPO) may be consulted. Transfers to investigatory bodies of the EU and of EFSA Transfers can be made to the European Anti-fraud Office (OLAF) in the framework of an investigation carried out by OLAF itself, by the Investigation Panel or the Disciplinary Board in the framework of an administrative inquiry or disciplinary proceeding, under the rules set forth in Annex IX of the Staff Regulations and in the EFSA Implementing Rules on Administrative Inquiries and Disciplinary Proceedings, provided that it can be reasonably expected that the transfers may help the investigation or prosecution of a sufficiently serious disciplinary or criminal offence. Image exportation and Register of transfers Transfers happen by exporting images from the system upon the permission of the EFSA Security Officer or on behalf of the Executive Director. Only the Security Officer, CORSER Site Management Team staff in charge and the coordinator of security guards are able to export images from the system. All transfers are registered in the Register of retention and transfers provided in Annex 5 (see Sections 7.2 and 10.5 of the EDPS Guidelines). Outsourced service Security surveillance with security guards is an outsourced service at EFSA. The contract between EFSA and the provider regulating this service is available as Annex 4. 8 Information security and data protection safeguards A number of technical and organisational measures have been put in place in order to protect the security of the system, including personal data. A secure data center protected by electronic and physical access control, where the dedicated servers for storing the recorded images are hosted. EFSA s IT network infrastructure is protected against intrusion by means of firewalls ; Before authorised access to the system is granted, individuals concerned have been security-cleared and have signed a Declaration on Confidentiality (see Annex 3); Access rights to the system are assigned strictly on a need-to-know basis to persons having access control and EFSA building security as part of their work responsibilities, i.e. the EFSA Security Officer, CORSER Site Management Team, security guards and 5
5 persons in charge of the VSS maintenance. The list of individuals having access to the system, detailing their rights, is at all times kept up-to-date. 9 Retention period of images The images are kept for maximum 7 calendar days. For images from cameras covering limited areas outside the EFSA building perimeter as documented in Annex 2, the retention period is reduced to 2 working days, considered as the minimum time required for operational follow-up to security issues occurring during weekends or public holidays. After this time period, the images are automatically overwritten on the VSS servers on a first-in, first-out basis. For images needed for further investigation purposes or to evidence a security incident, the retention period may be prolonged as long as the images are needed for this purpose. In any case, extended retention periods and transfers of VSS images are rigorously documented in the register of retention and transfers (see Annex 5) (see Section 7 of the EDPS Guidelines.). The way transfers of VSS images and related requests are handled is described in the VSS technical description (Annex 2). Once the VSS servers or other media are not longer useable, they will be safely disposed of in such a manner that the remaining data on it are permanently and irreversibly deleted. 10 Information to the public Multi-layer approach. Information to the public about the video-surveillance is provided in an effective and comprehensive manner. To this end, a multi-layer approach is followed with a combination of the following information methods: On-the-spot notices to alert data subjects and the public and containing essential information about the processing in English and Italian language are placed adjacent to the areas monitored. For the limited areas outside the EFSA building perimeter captured by cameras equipped with the infra-red feature, a more extensive on-the-spot notice in Italian language is placed according to the content in Annex 6; The public version of the present Document is posted on the EFSA Intranet Portal and EFSA official website and is available within CORSER Unit upon request; A specific privacy statement for data subjects in the sense of Article 12 of Regulation (EC) No 45/2001 is available at the EFSA reception and with CORSER Unit see Annex Specific individual notice. In addition, individuals must also be given individual notice in case they have been identified on camera provided that one or more of the following conditions apply: Their identity is noted in any images or recording; The images or recording are used against an individual; The images or recording are kept beyond the retention period in above point 9 and/or they are transferred in the sense of point 7.5; The identity of the individual is disclosed to anyone outside CORSER Unit The provision of a notice may sometimes be delayed temporarily, for example if this is 6
6 necessary for the prevention, investigation, detection and prosecution of criminal offences 2. The DPO is consulted in all such cases to ensure that the individual s rights are respected. 11 Data access, verification, correction and erasure All the data subjects, including the EFSA staff and visitors and members of the public as far as captured on the VSS of EFSA, have the right to access the personal data that EFSA holds on them and correct or supplement the data. Any access request by the data subject or related requests on their personal data shall be directed to the Security Officer ( [email protected]). The Data Protection Officer ([email protected]) may also be contacted in the event of any questions relating to the processing of personal data. Whenever possible, the Security Officer responds to an enquiry as soon as possible and ultimately within 15 calendar days. If that is not possible, the data subject is informed on the next steps. Where specifically requested, a viewing of the images may be arranged or the data subject may obtain a copy of the recorded images on DVD or another medium. In the event of such a request, the data subject may be asked to prove his/her identity beyond doubt (e.g. he could be asked to show the identity card when attending the viewing) and, whenever possible, also specify the date, time, location and circumstances when he/she was caught on the cameras. A typical example of an access request by the data subject, is providing an excerpt of the CCTV footage to the bicycle owner capturing the moment of theft from the bicycle racks located in the external area of the EFSA building perimeter. It should be added that an access request may be refused when an exemption under Article 20(1) of Regulation 45/2001 applies in a specific case. For example, following a case-by-case evaluation, EFSA may have to conclude that restricting access may be necessary to safeguard the investigation of a criminal offence. A restriction may also be necessary to protect the rights and freedoms of others, for example, when other people are also present in the images, and it is not possible to acquire their consent for the disclosure of their personal data or use image editing to remedy the lack of consent. Finally to add that in case the exercise of the data subject s rights results in the disclosure of VSS images in the way described in this section, this is documented in the register of retention and transfers. 12 Right of recourse 2 Other exceptions under Article 20 of the Data Protection Regulation may also apply in exceptional circumstances. 7
7 All persons have the right of recourse to the European Data Protection Supervisor if they consider that their rights under Regulation 45/2001 have been infringed as the result of the processing of their personal data by EFSA. Before doing so, EFSA recommends that they first contact: the Security Officer and/or the Data Protection Officer EFSA staff members may also request a review by the appointing authority under Article 90 of the Staff Regulations. 13 Entry into force The implementing rules described in the present document shall enter into force on the day following the date of its adoption. It repeals the previous Video surveillance policy in force since The Executive Director may review this document whenever deemed necessary. Done at Parma 13/11/2014 Annexes: Bernhard Url Executive Director [signed] (N.B. considered confidential except for Annexes 6-7) Annex 1: Data Protection Audit and Privacy Impact Assessment (2012); Annex 2: Video Surveillance System technical description; Annex 3: Model for the Confidentiality Declarations (Section 8.3 of the EDPS Guidelines); Annex 4: Contract with the outsourced security company I.V.R.I.; Annex 5: Register of retention and transfers (point 10.5 and 7.2 of the EDPS Guidelines); Annex 6: On-the-spot CCTV data protection notices of EFSA; Annex 7: Specific Privacy Statement for data subjects; Annex 8 EDPS opinion on EFSA VSS-16 July 2013 Annex 9 Extract from EFSA Security Assessment EU - JRC_28/03/
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
European Investment Bank Group. Video-surveillance policy
Group TABLE OF CONTENTS 1. Purpose and scope of the video-surveillance policy... 2 2. Respect for privacy, data protection and compliance with the relevant rules... 2 2.1. Compliance status... 2 2.2.
SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001 IN RELATION TO THE DATA PROTECTION OFFICER
SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001 IN RELATION TO THE DATA PROTECTION OFFICER 10 September 2009 page 1 / 8 SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001
Do you have a private life at your workplace?
Do you have a private life at your workplace? Privacy in the workplace in EC institutions and bodies Giovanni Buttarelli In the course of his supervisory activities, the EDPS has published positions on
PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10
UNIVERSITY OF LONDON CCTV POLICY Academic Buildings, Libraries and Residences Page 1 of 10 Contents The CCTV system... 3 Responsible officers... 3 Data Protection Act 1998... 3 The system... 3 Purpose
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
Parliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
DG RTD COMMON AUDIT SERVICE SPECIFIC PRIVACY STATEMENT EXTERNAL AUDIT AND CONTROL
DG RTD COMMON AUDIT SERVICE SPECIFIC PRIVACY STATEMENT EXTERNAL AUDIT AND CONTROL Version Date Description of changes Page 1.1 21 August 2014 New online location in the Participant Portal (as the file
CCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
EUROPEAN COMMISSION SERVICE SPECIFIC PRIVACY STATEMENT (SSPS) 1. Online services on the Participant Portal
EUROPEAN COMMISSION SERVICE SPECIFIC PRIVACY STATEMENT (SSPS) PROCESSING OPERATIONS OF APPLICANTS DATA 1. Online services on the Participant Portal The Participant Portal offers online electronic services
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
Self assessment tool. Using this tool
Self assessment tool How well does your organisation comply with the 12 guiding principles of the surveillance camera code of practice? Complete this easy to use self assessment tool to find out if you
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
DATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
CCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
University of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
The Anti-Corruption Compliance Platform
The Anti-Corruption Compliance Platform DATA COLLECTION RISK IDENTIFICATION SCREENING INTEGRITY DUE DILIGENCE CERTIFICATIONS GIFTS, TRAVEL AND ENTERTAINMENT TRACKING SECURITY AND DATA PROTECTION The ComplianceDesktop
SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
Corporate Policy. Data Protection for Data of Customers & Partners.
Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble Ladies and gentlemen, Dear employees, The electronic processing of virtually all sales procedures, globalization and growing
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
The primary responsibility for the data processing lies within the Administration Department, which the FINCOP Unit is part of.
Opinion on a Notification for Prior Checking received from the Data Protection Officer of the European Training Foundation Regarding the Processing Operations to Manage Calls for Tenders Brussels, 22 April
How To Write A Report On A Recipe Card
Opinion on a notification for Prior Checking received from the Data Protection Officer of the European Investment Bank (EIB) concerning procedures related to "360 Leadership feedback report" Brussels,
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
ATMD Bird & Bird. Singapore Personal Data Protection Policy
ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
Data Protection. Policy and Application July 2009
Data Protection Policy and Application July 2009 Produced for staff of the House of Commons Service by the Department of Resources Information Rights and Information Security (IRIS) Service Data Policy:
Appendix 11 - Swiss Data Protection Act
GLEIF- LOU Restricted Appendix 11 - Swiss Data Protection Act GLEIF Revision Version: 1.0 2015-09-23 Master Copy page 2 of 11 Applicable Provisions of the Swiss Data Protection Act (DPA) including the
MODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
CORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
Surveillance Camera Code of Practice. June 2013
Surveillance Camera Code of Practice June 2013 Surveillance Camera Code of Practice Presented to Parliament Pursuant to Section 30 (1) (a) of the Protection of Freedoms Act 2012 June 2013 London: The Stationery
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
COMMISSION REGULATION (EU) No /.. of XXX
EUROPEAN COMMISSION Brussels, XXX [ ](2013) XXX draft COMMISSION REGULATION (EU) No /.. of XXX on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC on privacy
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy
Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection
Data Protection Policy
Data Protection Policy Version: V1 Ratified by: Operational Management Executive Committee Date ratified: 26 September 2013 Name and Title of originator/author(s): Chris Brady, FOI, Data Protection and
Data Protection Policy.
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
University of Essex Automatic Number Plate Recognition (ANPR) Policy
& Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies
Surveillance Equipment
University of North Dakota Loss Control Committee Standard Practice 240 Surveillance Equipment Effective 12/2005 Revised 10/07 I. Purpose The purpose of this standard practice is to regulate the use of
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY
UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY 1. Purpose 1.1 The Data Protection Act 1998 ( the Act ) has two principal purposes: i) to regulate the use by those (known as data controllers) who obtain,
EURODAC Central Unit. Inspection Report
EURODAC Central Unit Inspection Report June 2012 Case file: 2011-1103 INDEX 1. INTRODUCTION... 3 1.1 The EURODAC system... 3 1.2 EDPS supervision of the EURODAC Central Unit... 3 1.3 Scope of the inspection...
Guidelines on data protection in EU financial services regulation
Guidelines on data protection in EU financial services regulation 1 Contents Table of Contents 10-point checklist for analysing data protection and privacy...4 1. Data protection and financial services
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE
Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION
AIRBUS GROUP BINDING CORPORATE RULES
1 AIRBUS GROUP BINDING CORPORATE RULES 2 Introduction The Binding Corporate Rules (hereinafter BCRs ) of the Airbus Group finalize the Airbus Group s provisions on the protection of Personal Data. These
TABLE OF CONTENTS. Maintaining the Quality and Integrity of Information. Notification of an Information Security Incident
AGREEMENT BETWEEN THE UNITED STATES OF AMERICA AND THE EUROPEAN UNION ON THE PROTECTION OF PERSONAL INFORMATION RELATING TO THE PREVENTION, INVESTIGATION, DETECTION, AND PROSECUTION OF CRIMINAL OFFENSES
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
Data Protection Policy
Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third
Personal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person.
PART I: INTRODUCTION AND BACKGROUND Purpose This Data Protection Binding Corporate Rules Policy ( Policy ) establishes the approach of Fluor to compliance with European data protection law and specifically
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
COMMISSION DECISION of 16 August 2006 C( 2006 ) 3602. concerning the security of information systems used by the European Commission
COMMISSION DECISION of 16 August 2006 C( 2006 ) 3602 concerning the security of information systems used by the European Commission THE COMMISSION OF THE EUROPEAN COMMUNITIES, Having regard to the Treaty
Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document
Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Data Protection in Ireland
Data Protection in Ireland 0 Contents Data Protection in Ireland Introduction Page 2 Appointment of a Data Processor Page 2 Security Measures (onus on a data controller) Page 3 8 Principles Page 3 Fair
Act on Background Checks
NB: Unofficial translation Ministry of Justice, Finland Act on Background Checks (177/2002) Chapter 1 General provisions Section 1 Scope of application (1) This Act applies to background checks, which
EUROPEAN DATA PROTECTION SUPERVISOR
20.6.2012 Official Journal of the European Union C 177/1 I (Resolutions, recommendations and opinions) OPINIONS EUROPEAN DATA PROTECTION SUPERVISOR Opinion of the European Data Protection Supervisor on
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
