IT SECURITY POLICY (ISMS 01)

Size: px
Start display at page:

Download "IT SECURITY POLICY (ISMS 01)"

Transcription

1 IT SECURITY POLICY (ISMS 01) NWAS IM&T Security Policy Page: Page 1 of 14 Date of Approval: Status: Final Date of Review

2 Recommended by Approved by Information Governance Management Group Trust Board Approval date Version number 1.7 Review date January 2017 Responsible Director Responsible Manager For use by Director of Finance Head of Informatics All Trust employees NWAS IT Security Policy Page: Page 2 of 14

3 Change record form Version Date of change Date of release Changed by Reason for change Kate Cushion Document Creation To be reviewed March Maria Kane Kate Cushion Template change due to reconfiguration from Mersey Regional Ambulance to North West Ambulance service Authorised by on front cover sheet included Chief Executive and Director of IM&T and signed off at board meeting (Removed authorisation of front cover sheet as chief executive does not want his signature as a standard format on policies however board minutes for approval are available.) Maria Kane 3.1 And 4.1 Information Security Officer removed and replaced with IT Security Manager Kate Cushion Trust Board Approval Maria Kane Joanne Moran Annual Review of Policy, updated changes, Trust Board Approval. Annual Review of Policy updated 3.1 has been amended to include IG Training has been included in the Mandatory work programme. 5.2 Standards and Guideline link has been updated pg. 13 has been updated with the links to the IT policies on the Trust Intranet. NWAS IT Security Policy Page: Page 3 of 14

4 1.7 Nov Joanne Moran Updated to replace Director of IM&T with Director of Finance. Also, replaced Assistant Director of Health Informatics with Head of Informatics. IT Directorate has been changed to Quality Directorate. IMT has been replaced with ICT Table of Contents NWAS IT Security Policy Page: Page 4 of 14

5 Section Contents 1 Introduction 2 Scope of IT Security 3 Security Management 4 Roles & Responsibilities 5 Policy Documentation 6 Outline of Standards & Guidelines by Category 1.0 Introduction NWAS IT Security Policy Page: Page 5 of 14

6 Information represents an increasingly valuable asset to the organisation as systems proliferate and increased reliance is placed on the access and use of information. North West Ambulance Service NHS Trust, known throughout this document as NWAS, seeks to protect its information storage on both computer systems and paper based systems from misuse and to minimise the impact of service breaks by developing an IT Security Policy and procedures to manage and enforce it known as its Information Security Management System (ISMS). Key issues addressed by the IT Security Policy are: Confidentiality - data access is confined to those with specified authority to view the information Integrity - all system assets are operating correctly according to specification. Availability - information is delivered to the right person when it is needed The organisation also has legal obligations to maintain security and confidentially notably under the Data Protection Act (1998), Copyright Patents and Designs Act (1988), and Computer Misuse Act (1990), Records Management Code of Practice, as well as the NHS Information Governance Agenda. NWAS acknowledges that it has an obligation to ensure appropriate security for all Information Technology data, equipment and processes in its domain of ownership and control. Every member of NWAS shares this obligation to varying degrees, when processing personal and sensitive data. Personal data means data which relates to a living individual who can be identified: (a) From those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual. (Data Protection Act, section 1) This document will: Enumerate the elements that constitute IT security. Explain the need for IT security and identify major threats to NWAS. Specify the various categories of IT data, equipment and processes subject to this policy. Indicate appropriate levels of security through standards and guidelines. The impact on individuals privacy before developing new IT systems or when changing the way in which personal data is handled is considered by performing a Privacy Impact Assessment (PIA). This is a process which enables the Trust to anticipate and address the NWAS IT Security Policy Page: Page 6 of 14

7 likely privacy impacts of new initiatives, foresee problems and negotiate solutions to ensure data protection compliance. These Privacy Impact Assessments will be subject to internal audits. 2.0 Scope of IT Security 2.1 Definition of Security Security can be defined as "the state of being free from unacceptable risk". The risk concerns the following categories of losses: Confidentiality of Information. Integrity of data. Assets. Efficient and Appropriate Use. System Availability. Fraudulent activities. Confidentiality refers to the privacy of personal or corporate information. It also includes issues of copyright and other intellectual property rights. Integrity refers to the accuracy of data. Loss of data integrity may be gross and evident, as when a computer disc fails, or subtle, as when a character in a file is altered. The assets that must be protected include: Computer and Peripheral Equipment. Telecommunications Equipment. Computing and Communications Premises. Power, Water, Environmental Control and Communications Utilities. Supplies and Data Storage Media. System Computer Programs and Documentation. Application Computer Programs and Documentation. Data & Information. NWAS IT Security Policy Page: Page 7 of 14

8 Mobile equipment Efficient and Appropriate Use ensures that NWAS IT resources are used for the purposes for which they were intended and in a manner that does not interfere with the rights of others. Availability is concerned with the full functionality of a system (e.g. Emergency Control Centre or Patient Transport Service) and its components. The potential causes of these losses are termed "threats". These threats may be human or non-human, natural, accidental or deliberate. 2.2 Major Threats to NWAS In general terms most companies who lose vital information or information systems for a relatively short period of time will, sooner or later, cease to trade. Although this situation is not possible within the NHS the loss of credibility within the wider health economy as a creditable service provider and with the public would be just as damaging. Information and information systems are an extremely valuable asset of the business and as such we are required to identify major areas of risk or threat. The major threats this policy has been written to cover are: a) Theft or destruction of: Physical equipment Essential operating data Confidential or sensitive information b) Interruption to the operating environment: Loss Emergency Computer aided dispatch systems Loss Non-emergency Patient Transport Service systems Loss of the Telecommunications systems Loss of essential Business systems and data. Loss of Rostering Systems Loss of Networking Environment c) Breaking the law. Examples of the legislation relevant in this area are: Data Protection Act (1998) Copyright, Design and Patents Act (1988) Computer Misuse Act (1990) Records Management Code of Practice Any or all of the above can lead to criminal prosecution, a loss of confidence and credibility and ultimately legal proceedings for damages etc. The standards and guidelines described in this policy have been developed to avoid such situations arising. NWAS IT Security Policy Page: Page 8 of 14

9 2.3 Domains of Security This policy will deal with the following domains of security: Computer system security: CPU, Peripherals, Operating Systems. This includes data security. Physical security: The premises occupied by all personnel and equipment. Operational security: Environmental controls, power equipment and operational activities. Procedural security by ICT, vendor, management personnel, as well as ordinary users. 2.4 Reasons for IT Security Confidentiality of certain information is mandated by common law, legislation, explicit agreement or convention. Different classes of information require different degrees of confidentiality. The hardware and software components that constitute NWAS ICT assets represent a sizeable monetary investment that must be protected. The same is true for the information stored in its IT systems, some of which have taken huge resources to generate and some of which can never be reproduced. The Quality Directorate is responsible for ensuring the integrity and availability of all Trust data. There are controls in place to protect data in the event of a hardware failure, accidental deletion, unauthorised change or loss of estate. All Information electronic or paper will follow NHS Guidelines for the minimum retention period for each record type. The Records Management and Life Cycle policy has been implemented providing a process by which the Trust manages all the aspects of records. This includes internally or externally generated records and in any format or media type, from their creation, all the way through their lifecycle to their eventual disposal. The use of NWAS ICT assets other than in a manner and for the purpose for which they were intended represents a misallocation of valuable NWAS resources and possibly a danger to its reputation or a breach of the law. NWAS computer equipment must never be used for private business or commercial purposes. Finally, proper functionality of IT systems is required for the efficient operation of NWAS. Some systems, such as the Emergency Computer aided dispatch, Non-emergency Patient Transport Service, Risk Management, Rostering and Business Intelligence systems are of paramount importance to the success of NWAS. NWAS IT Security Policy Page: Page 9 of 14

10 3.0 Security Management 3.1 IT Security Structure/Organisation Management The Head of Informatics supported by the Information Governance Manager, who is responsible for ensuring a framework, is in place, to enforce organisational security management through Information Governance Training and the implementation of Standards and Guidelines. This framework includes: Monitoring and reporting on the state of information security within the organisation Ensuring that the Information Security Policy is implemented throughout the organisation Developing and enforcing detailed procedures to maintain security All the organisation s personnel are aware of their responsibilities and are accountable for information security and compliance with relevant legislation. Monitoring for actual or potential IT security breaches Information Governance Training is delivered on the Mandatory Training Programme 3.2 All staff have a responsibility for security, should report and ensure all security incidents are documented. They are responsible for their own property whether personal or provided by the Trust and are advised to follow Trust Standards and Guidelines. 3.3 National Management The NHS Information Governance Agenda has been established to provide a framework to assist organisations assessing information management risks. 3.4 Auditors The implementation of this policy on systems will be subject to periodic review by both internal and external auditors, the recommendations from which will normally be implemented subject to meeting the wider organisational management requirements. Any major security incident is liable to be referred to the auditors for investigation. 4.0 Roles & Responsibilities 4.1 Policy Management NWAS IT Security Policy Page: Page 10 of 14

11 Approval of the IT Security Policy is vetted with the Executive Management Team of NWAS. Advice and opinions on the Policy will be sought from: Information Governance Management Group ICT Security Forum ICT Department Senior Managers from within NWAS Formulation of the policy is the responsibility of the Head of Informatics. Maintenance of the policy is the responsibility of the Information Governance Manager. 4.2 Policy Implementation Each member of NWAS will be responsible for reading all published IT standards and guidelines of behaviour. IT security of each system and its data will be the responsibility of the Senior Information Risk Officer (SIRO) and the Information Asset Owners. Managers are responsible for implementing the IM&T Security Policy and associated Standards within their Directorate and to take preventative action where necessary. 4.3 Information Asset Owners Head of Service for Emergency control centres will be the Information Asset Owner of the Emergency Command and Control Centre system. Head of Service for Patient Transport Service Control Room will be the Information Asset Owner of Non-emergency Command &Control system. Data Centre Managers will be the Information Asset Owners of all strategic system platforms. Individual departments will be Information Asset Owners of strategic applications under their managerial control (e.g. Finance for North East Patches). Departmental managers will be Information Asset Owners of all non-strategic systems under their control. Individuals will be Information Asset Owners of desktop systems and laptop computers under their control. 4.4 NWAS Services It is recognised that various sections of NWAS provide services that relate to IT security, both directly and indirectly. It is expected that there will be collaboration between these sections NWAS IT Security Policy Page: Page 11 of 14

12 and the ICT department in the generation of standards, guidelines and implementation of this policy. Some of these sections and their services are: Human Resources: Personnel selection, induction, exit processing, policies concerning confidentiality, privacy, and the use of NWAS computer equipment and telecommunications systems. Estates: Physical building security. Risk and Safety: - CCTV Emergency Preparedness: Terrorism 5.0 Policy Documentation 5.1 Standards and Guidelines Standards (mandatory) and guidelines (best practice) will be published separately from this policy to assist ordinary users and system Information asset Owners to meet their IT security responsibilities. These standards and guidelines are an integral part of NWAS IT Security Policy and therefore define it in detail. Various links to the Standards and Guidelines are presented in Section 6 of this document. Although guidelines are given as suggestions they do form best working practice. Likewise, standards are given to ensure best working practice is employed and ensure as far as possible that all risks to NWAS have been minimised. It should also be noted that where standards have been applied, failure to follow the standards could render an employee liable to NWAS disciplinary procedure which could result in disciplinary action from NWAS and may, in circumstances where the action or conduct is illegal or unlawful, render the employee personally liable and or subject of criminal proceedings. Please refer to Principle standards 12a Incident Reporting Standard, 12b - Incident Response (Legal Forensics) and 12c Incident Response (Operational). Although not part of IT Security, the ICT department will also publish guidance given as IT Advice covering topics such as Health and Safety. 5.2 Documents The detail of the policy is laid out in the standards and guidelines which are published separately on the intranet Subsequent standards and guidelines and changes thereto will be made available to all employees via the Intranet and Trust Bulletins. NWAS IT Security Policy Page: Page 12 of 14

13 5.3 Availability It is intended that this IT Security Policy be publicly accessible in its entirety via NWAS World Wide Web Home Page, the internal Intranet Home Page and in printed format within both the ICT and Human Resources Departments. All users of NWAS ICT resources must be made fully aware of this policy, standards and guidelines. 5.4 Changes The IT Security Policy is a "living" document that will be amended as required to deal with changes in technology, applications, procedures, legal and social imperatives, perceived dangers, etc. Major changes will be made in consultation with the groups mentioned in Section 4.1, and with the approval of the Executive Management Team. The Head of Informatics will be responsible for and approve minor changes. 6.0 Standards and Guidelines Standards and Guidelines Principle Standards Procedures Legal Requirements Data Protection Act (1998) This standard is intended to make users aware of the implications of the Data Protection Act (1998). NWAS IT Security Policy Page: Page 13 of 14

14 The Computer Misuse Act (1990) This standard is intended to make users aware of the implications of The Computer Misuse Act (1990). Sensitive Information This standard is intended to raise the level of awareness within the user population with regards to the use of commercially sensitive information, its disclosure and the security measures that need to be taken. NHS Information Governance Agenda As a key part of the Information Governance agenda, the Department of Health and NHS Connecting for Health jointly produced an Information Governance Toolkit. The Toolkit also contains specific organisational views. It is the tool by which organisations can assess their compliance with current legislation, standards and national guidance. NWAS IT Security Policy Page: Page 14 of 14

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact

More information

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2. Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Corporate Information Security Management Policy

Corporate Information Security Management Policy Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

PS 172 Protective Monitoring Policy

PS 172 Protective Monitoring Policy PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;

More information

NHS Business Services Authority Information Security Policy

NHS Business Services Authority Information Security Policy NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA

More information

INFORMATION GOVERNANCE POLICY & FRAMEWORK

INFORMATION GOVERNANCE POLICY & FRAMEWORK INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Information Governance Policy

Information Governance Policy Policy Policy Number / Version: v2.0 Ratified by: Audit Committee Date ratified: 25 th February 2015 Review date: 24 th February 2016 Name of originator/author: Name of responsible committee/individual:

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version

More information

DATA PROTECTION AND DATA STORAGE POLICY

DATA PROTECTION AND DATA STORAGE POLICY DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

An Approach to Records Management Audit

An Approach to Records Management Audit An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Information Security Management System Policy

Information Security Management System Policy Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version 1.1 Responsible Person Information Governance Manager Lead Director Head of Corporate Services Consultation Route Information Governance Steering Group Approval Route

More information

Information security policy

Information security policy Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current

More information

Information Governance Strategy :

Information Governance Strategy : Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update

More information

1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.

1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy. Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review

More information

Information Governance Strategy. Version No 2.0

Information Governance Strategy. Version No 2.0 Plymouth Community Healthcare CIC Information Governance Strategy Version No 2.0 Notice to staff using a paper copy of this guidance. The policies and procedures page of PCH Intranet holds the most recent

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies

More information

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval

More information

BEFORE USING THIS GUIDANCE, MAKE SURE YOU HAVE THE MOST UP TO DATE VERSION GUIDANCE 2 POLICY AREA: INFORMATION GOVERNANCE

BEFORE USING THIS GUIDANCE, MAKE SURE YOU HAVE THE MOST UP TO DATE VERSION GUIDANCE 2 POLICY AREA: INFORMATION GOVERNANCE GUIDANCE 1 TITLE: INFORMATION GOVERNANCE FRAMEWORK 2 POLICY AREA: INFORMATION GOVERNANCE 3 ACCOUNTABLE DIRECTOR FOR POLICY AREA: DIRECTOR OF QUALITY AND GOVERNANCE 4 GUIDANCE DRAFTED BY: INTEGRATED GOVERNANCE

More information

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework Putting Barnsley People First Barnsley Clinical Commissioning Group Information Governance Policy and Management Framework Version: 1.1 Approved By: Governing Body Date Approved: 16 January 2014 Name of

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy To whom this document applies: All Trust staff, including agency and contractors Procedural Documents Approval Committee Issue Date: January 2010 Version 1 Document reference:

More information

Network Security Policy

Network Security Policy Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Version: 3.2 Authorisation Committee: Date of Authorisation: May 2014 Ratification Committee Level 1 documents): Date of Ratification Level 1 documents): Signature of ratifying

More information

INFORMATION GOVERNANCE STRATEGY

INFORMATION GOVERNANCE STRATEGY INFORMATION GOVERNANCE STRATEGY Page 1 of 10 Strategy Owner Valerie Penn, Head of Governance Strategy Author Caroline Law, Information Governance Project Manager Directorate Corporate Governance Ratifying

More information

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid. Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September 2015. Information Governance Manager

SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September 2015. Information Governance Manager SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY Report to the Trust Board 22 September 2015 Sponsoring Director: Author: Purpose of the report: Key Issues and Recommendations: Director

More information

How To Ensure Information Security In Nhs.Org.Uk

How To Ensure Information Security In Nhs.Org.Uk Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Merthyr Tydfil County Borough Council. Information Security Policy

Merthyr Tydfil County Borough Council. Information Security Policy Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of

More information

University of Brighton School and Departmental Information Security Policy

University of Brighton School and Departmental Information Security Policy University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives

More information

Incident reporting procedure

Incident reporting procedure Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance

More information

Stellenbosch University. Information Security Regulations

Stellenbosch University. Information Security Regulations Stellenbosch University Information Security Regulations 1. Preamble 1.1. Information Security is a component of the Risk structure and procedures of the University. 1.2. Stellenbosch University has an

More information

Information Governance Management Framework

Information Governance Management Framework Information Governance Management Framework Document Status: Approved Version: v 1.3 DOCUMENT CHANGE HISTORY Version Date Comments (i.e. viewed, or reviewed, amended, approved by person or committee v1.0

More information

JOB DESCRIPTION. Information Governance Manager

JOB DESCRIPTION. Information Governance Manager JOB DESCRIPTION POST TITLE: Information Governance Manager DIRECTORATE: ACCOUNTABLE TO: BAND: LOCATION: CSS Head of Information Governance 8a CSS Job Purpose The Information Governance Manager will ensure

More information

Information Security Management System Information Security Policy

Information Security Management System Information Security Policy Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

The CPS incorporates RCPO. CPS Data Protection Policy

The CPS incorporates RCPO. CPS Data Protection Policy The CPS incorporates RCPO CPS Data Protection Policy Contents Introduction 3 Scope 4 Roles and Responsibilities 4 Processing Criminal Cases 4 Information Asset Owners 5 Information Asset Register 5 Information

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Version Version 1 Ratified By Date Ratified PROPOSED FOR APPROVAL 15/11/12 Author(s) Responsible Committee / Officers Date Issue November 2012 Review Date November 2013 Intended

More information

Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation

Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation Northumberland, Newcastle North and East, Newcastle West, Gateshead, South Tyneside, Sunderland, North Durham, Durham Dales, Easington and Sedgefield, Darlington, Hartlepool and Stockton on Tees and South

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

Information Governance Policy

Information Governance Policy BEXLEY CARE TRUST MANAGEMENT MANUAL Title: INFORMATION GOVERNANCE POLICY Originating Department: IT DEPARTMENT Authorised by: Risk Management Committee June 2008 Reference no: CA12 Date of Issue: JANUARY

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013 Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: Revised: Consultation: Ratified by: 1.0 Information Governance Committee Governance Committee Date ratified: 19 March 2008 Name of originator/author: David McGrath

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Information Security Policy

Information Security Policy Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall

More information

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information