IT SECURITY POLICY (ISMS 01)
|
|
|
- Amberlynn Powell
- 10 years ago
- Views:
Transcription
1 IT SECURITY POLICY (ISMS 01) NWAS IM&T Security Policy Page: Page 1 of 14 Date of Approval: Status: Final Date of Review
2 Recommended by Approved by Information Governance Management Group Trust Board Approval date Version number 1.7 Review date January 2017 Responsible Director Responsible Manager For use by Director of Finance Head of Informatics All Trust employees NWAS IT Security Policy Page: Page 2 of 14
3 Change record form Version Date of change Date of release Changed by Reason for change Kate Cushion Document Creation To be reviewed March Maria Kane Kate Cushion Template change due to reconfiguration from Mersey Regional Ambulance to North West Ambulance service Authorised by on front cover sheet included Chief Executive and Director of IM&T and signed off at board meeting (Removed authorisation of front cover sheet as chief executive does not want his signature as a standard format on policies however board minutes for approval are available.) Maria Kane 3.1 And 4.1 Information Security Officer removed and replaced with IT Security Manager Kate Cushion Trust Board Approval Maria Kane Joanne Moran Annual Review of Policy, updated changes, Trust Board Approval. Annual Review of Policy updated 3.1 has been amended to include IG Training has been included in the Mandatory work programme. 5.2 Standards and Guideline link has been updated pg. 13 has been updated with the links to the IT policies on the Trust Intranet. NWAS IT Security Policy Page: Page 3 of 14
4 1.7 Nov Joanne Moran Updated to replace Director of IM&T with Director of Finance. Also, replaced Assistant Director of Health Informatics with Head of Informatics. IT Directorate has been changed to Quality Directorate. IMT has been replaced with ICT Table of Contents NWAS IT Security Policy Page: Page 4 of 14
5 Section Contents 1 Introduction 2 Scope of IT Security 3 Security Management 4 Roles & Responsibilities 5 Policy Documentation 6 Outline of Standards & Guidelines by Category 1.0 Introduction NWAS IT Security Policy Page: Page 5 of 14
6 Information represents an increasingly valuable asset to the organisation as systems proliferate and increased reliance is placed on the access and use of information. North West Ambulance Service NHS Trust, known throughout this document as NWAS, seeks to protect its information storage on both computer systems and paper based systems from misuse and to minimise the impact of service breaks by developing an IT Security Policy and procedures to manage and enforce it known as its Information Security Management System (ISMS). Key issues addressed by the IT Security Policy are: Confidentiality - data access is confined to those with specified authority to view the information Integrity - all system assets are operating correctly according to specification. Availability - information is delivered to the right person when it is needed The organisation also has legal obligations to maintain security and confidentially notably under the Data Protection Act (1998), Copyright Patents and Designs Act (1988), and Computer Misuse Act (1990), Records Management Code of Practice, as well as the NHS Information Governance Agenda. NWAS acknowledges that it has an obligation to ensure appropriate security for all Information Technology data, equipment and processes in its domain of ownership and control. Every member of NWAS shares this obligation to varying degrees, when processing personal and sensitive data. Personal data means data which relates to a living individual who can be identified: (a) From those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual. (Data Protection Act, section 1) This document will: Enumerate the elements that constitute IT security. Explain the need for IT security and identify major threats to NWAS. Specify the various categories of IT data, equipment and processes subject to this policy. Indicate appropriate levels of security through standards and guidelines. The impact on individuals privacy before developing new IT systems or when changing the way in which personal data is handled is considered by performing a Privacy Impact Assessment (PIA). This is a process which enables the Trust to anticipate and address the NWAS IT Security Policy Page: Page 6 of 14
7 likely privacy impacts of new initiatives, foresee problems and negotiate solutions to ensure data protection compliance. These Privacy Impact Assessments will be subject to internal audits. 2.0 Scope of IT Security 2.1 Definition of Security Security can be defined as "the state of being free from unacceptable risk". The risk concerns the following categories of losses: Confidentiality of Information. Integrity of data. Assets. Efficient and Appropriate Use. System Availability. Fraudulent activities. Confidentiality refers to the privacy of personal or corporate information. It also includes issues of copyright and other intellectual property rights. Integrity refers to the accuracy of data. Loss of data integrity may be gross and evident, as when a computer disc fails, or subtle, as when a character in a file is altered. The assets that must be protected include: Computer and Peripheral Equipment. Telecommunications Equipment. Computing and Communications Premises. Power, Water, Environmental Control and Communications Utilities. Supplies and Data Storage Media. System Computer Programs and Documentation. Application Computer Programs and Documentation. Data & Information. NWAS IT Security Policy Page: Page 7 of 14
8 Mobile equipment Efficient and Appropriate Use ensures that NWAS IT resources are used for the purposes for which they were intended and in a manner that does not interfere with the rights of others. Availability is concerned with the full functionality of a system (e.g. Emergency Control Centre or Patient Transport Service) and its components. The potential causes of these losses are termed "threats". These threats may be human or non-human, natural, accidental or deliberate. 2.2 Major Threats to NWAS In general terms most companies who lose vital information or information systems for a relatively short period of time will, sooner or later, cease to trade. Although this situation is not possible within the NHS the loss of credibility within the wider health economy as a creditable service provider and with the public would be just as damaging. Information and information systems are an extremely valuable asset of the business and as such we are required to identify major areas of risk or threat. The major threats this policy has been written to cover are: a) Theft or destruction of: Physical equipment Essential operating data Confidential or sensitive information b) Interruption to the operating environment: Loss Emergency Computer aided dispatch systems Loss Non-emergency Patient Transport Service systems Loss of the Telecommunications systems Loss of essential Business systems and data. Loss of Rostering Systems Loss of Networking Environment c) Breaking the law. Examples of the legislation relevant in this area are: Data Protection Act (1998) Copyright, Design and Patents Act (1988) Computer Misuse Act (1990) Records Management Code of Practice Any or all of the above can lead to criminal prosecution, a loss of confidence and credibility and ultimately legal proceedings for damages etc. The standards and guidelines described in this policy have been developed to avoid such situations arising. NWAS IT Security Policy Page: Page 8 of 14
9 2.3 Domains of Security This policy will deal with the following domains of security: Computer system security: CPU, Peripherals, Operating Systems. This includes data security. Physical security: The premises occupied by all personnel and equipment. Operational security: Environmental controls, power equipment and operational activities. Procedural security by ICT, vendor, management personnel, as well as ordinary users. 2.4 Reasons for IT Security Confidentiality of certain information is mandated by common law, legislation, explicit agreement or convention. Different classes of information require different degrees of confidentiality. The hardware and software components that constitute NWAS ICT assets represent a sizeable monetary investment that must be protected. The same is true for the information stored in its IT systems, some of which have taken huge resources to generate and some of which can never be reproduced. The Quality Directorate is responsible for ensuring the integrity and availability of all Trust data. There are controls in place to protect data in the event of a hardware failure, accidental deletion, unauthorised change or loss of estate. All Information electronic or paper will follow NHS Guidelines for the minimum retention period for each record type. The Records Management and Life Cycle policy has been implemented providing a process by which the Trust manages all the aspects of records. This includes internally or externally generated records and in any format or media type, from their creation, all the way through their lifecycle to their eventual disposal. The use of NWAS ICT assets other than in a manner and for the purpose for which they were intended represents a misallocation of valuable NWAS resources and possibly a danger to its reputation or a breach of the law. NWAS computer equipment must never be used for private business or commercial purposes. Finally, proper functionality of IT systems is required for the efficient operation of NWAS. Some systems, such as the Emergency Computer aided dispatch, Non-emergency Patient Transport Service, Risk Management, Rostering and Business Intelligence systems are of paramount importance to the success of NWAS. NWAS IT Security Policy Page: Page 9 of 14
10 3.0 Security Management 3.1 IT Security Structure/Organisation Management The Head of Informatics supported by the Information Governance Manager, who is responsible for ensuring a framework, is in place, to enforce organisational security management through Information Governance Training and the implementation of Standards and Guidelines. This framework includes: Monitoring and reporting on the state of information security within the organisation Ensuring that the Information Security Policy is implemented throughout the organisation Developing and enforcing detailed procedures to maintain security All the organisation s personnel are aware of their responsibilities and are accountable for information security and compliance with relevant legislation. Monitoring for actual or potential IT security breaches Information Governance Training is delivered on the Mandatory Training Programme 3.2 All staff have a responsibility for security, should report and ensure all security incidents are documented. They are responsible for their own property whether personal or provided by the Trust and are advised to follow Trust Standards and Guidelines. 3.3 National Management The NHS Information Governance Agenda has been established to provide a framework to assist organisations assessing information management risks. 3.4 Auditors The implementation of this policy on systems will be subject to periodic review by both internal and external auditors, the recommendations from which will normally be implemented subject to meeting the wider organisational management requirements. Any major security incident is liable to be referred to the auditors for investigation. 4.0 Roles & Responsibilities 4.1 Policy Management NWAS IT Security Policy Page: Page 10 of 14
11 Approval of the IT Security Policy is vetted with the Executive Management Team of NWAS. Advice and opinions on the Policy will be sought from: Information Governance Management Group ICT Security Forum ICT Department Senior Managers from within NWAS Formulation of the policy is the responsibility of the Head of Informatics. Maintenance of the policy is the responsibility of the Information Governance Manager. 4.2 Policy Implementation Each member of NWAS will be responsible for reading all published IT standards and guidelines of behaviour. IT security of each system and its data will be the responsibility of the Senior Information Risk Officer (SIRO) and the Information Asset Owners. Managers are responsible for implementing the IM&T Security Policy and associated Standards within their Directorate and to take preventative action where necessary. 4.3 Information Asset Owners Head of Service for Emergency control centres will be the Information Asset Owner of the Emergency Command and Control Centre system. Head of Service for Patient Transport Service Control Room will be the Information Asset Owner of Non-emergency Command &Control system. Data Centre Managers will be the Information Asset Owners of all strategic system platforms. Individual departments will be Information Asset Owners of strategic applications under their managerial control (e.g. Finance for North East Patches). Departmental managers will be Information Asset Owners of all non-strategic systems under their control. Individuals will be Information Asset Owners of desktop systems and laptop computers under their control. 4.4 NWAS Services It is recognised that various sections of NWAS provide services that relate to IT security, both directly and indirectly. It is expected that there will be collaboration between these sections NWAS IT Security Policy Page: Page 11 of 14
12 and the ICT department in the generation of standards, guidelines and implementation of this policy. Some of these sections and their services are: Human Resources: Personnel selection, induction, exit processing, policies concerning confidentiality, privacy, and the use of NWAS computer equipment and telecommunications systems. Estates: Physical building security. Risk and Safety: - CCTV Emergency Preparedness: Terrorism 5.0 Policy Documentation 5.1 Standards and Guidelines Standards (mandatory) and guidelines (best practice) will be published separately from this policy to assist ordinary users and system Information asset Owners to meet their IT security responsibilities. These standards and guidelines are an integral part of NWAS IT Security Policy and therefore define it in detail. Various links to the Standards and Guidelines are presented in Section 6 of this document. Although guidelines are given as suggestions they do form best working practice. Likewise, standards are given to ensure best working practice is employed and ensure as far as possible that all risks to NWAS have been minimised. It should also be noted that where standards have been applied, failure to follow the standards could render an employee liable to NWAS disciplinary procedure which could result in disciplinary action from NWAS and may, in circumstances where the action or conduct is illegal or unlawful, render the employee personally liable and or subject of criminal proceedings. Please refer to Principle standards 12a Incident Reporting Standard, 12b - Incident Response (Legal Forensics) and 12c Incident Response (Operational). Although not part of IT Security, the ICT department will also publish guidance given as IT Advice covering topics such as Health and Safety. 5.2 Documents The detail of the policy is laid out in the standards and guidelines which are published separately on the intranet Subsequent standards and guidelines and changes thereto will be made available to all employees via the Intranet and Trust Bulletins. NWAS IT Security Policy Page: Page 12 of 14
13 5.3 Availability It is intended that this IT Security Policy be publicly accessible in its entirety via NWAS World Wide Web Home Page, the internal Intranet Home Page and in printed format within both the ICT and Human Resources Departments. All users of NWAS ICT resources must be made fully aware of this policy, standards and guidelines. 5.4 Changes The IT Security Policy is a "living" document that will be amended as required to deal with changes in technology, applications, procedures, legal and social imperatives, perceived dangers, etc. Major changes will be made in consultation with the groups mentioned in Section 4.1, and with the approval of the Executive Management Team. The Head of Informatics will be responsible for and approve minor changes. 6.0 Standards and Guidelines Standards and Guidelines Principle Standards Procedures Legal Requirements Data Protection Act (1998) This standard is intended to make users aware of the implications of the Data Protection Act (1998). NWAS IT Security Policy Page: Page 13 of 14
14 The Computer Misuse Act (1990) This standard is intended to make users aware of the implications of The Computer Misuse Act (1990). Sensitive Information This standard is intended to raise the level of awareness within the user population with regards to the use of commercially sensitive information, its disclosure and the security measures that need to be taken. NHS Information Governance Agenda As a key part of the Information Governance agenda, the Department of Health and NHS Connecting for Health jointly produced an Information Governance Toolkit. The Toolkit also contains specific organisational views. It is the tool by which organisations can assess their compliance with current legislation, standards and national guidance. NWAS IT Security Policy Page: Page 14 of 14
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.
Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
PS 172 Protective Monitoring Policy
PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
INFORMATION GOVERNANCE POLICY & FRAMEWORK
INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Information Governance Policy
Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Information Governance Policy
Policy Policy Number / Version: v2.0 Ratified by: Audit Committee Date ratified: 25 th February 2015 Review date: 24 th February 2016 Name of originator/author: Name of responsible committee/individual:
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Information Governance Policy
Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date
Information Governance Strategy
Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire
NHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
An Approach to Records Management Audit
An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
Information Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
USE OF PERSONAL MOBILE DEVICES POLICY
Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014
Information Governance Policy
Information Governance Policy Version 1.1 Responsible Person Information Governance Manager Lead Director Head of Corporate Services Consultation Route Information Governance Steering Group Approval Route
Information security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
Information Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.
Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review
Information Governance Strategy. Version No 2.0
Plymouth Community Healthcare CIC Information Governance Strategy Version No 2.0 Notice to staff using a paper copy of this guidance. The policies and procedures page of PCH Intranet holds the most recent
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
BEFORE USING THIS GUIDANCE, MAKE SURE YOU HAVE THE MOST UP TO DATE VERSION GUIDANCE 2 POLICY AREA: INFORMATION GOVERNANCE
GUIDANCE 1 TITLE: INFORMATION GOVERNANCE FRAMEWORK 2 POLICY AREA: INFORMATION GOVERNANCE 3 ACCOUNTABLE DIRECTOR FOR POLICY AREA: DIRECTOR OF QUALITY AND GOVERNANCE 4 GUIDANCE DRAFTED BY: INTEGRATED GOVERNANCE
Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework
Putting Barnsley People First Barnsley Clinical Commissioning Group Information Governance Policy and Management Framework Version: 1.1 Approved By: Governing Body Date Approved: 16 January 2014 Name of
Information Governance Strategy
Information Governance Strategy To whom this document applies: All Trust staff, including agency and contractors Procedural Documents Approval Committee Issue Date: January 2010 Version 1 Document reference:
Network Security Policy
Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Version: 3.2 Authorisation Committee: Date of Authorisation: May 2014 Ratification Committee Level 1 documents): Date of Ratification Level 1 documents): Signature of ratifying
INFORMATION GOVERNANCE STRATEGY
INFORMATION GOVERNANCE STRATEGY Page 1 of 10 Strategy Owner Valerie Penn, Head of Governance Strategy Author Caroline Law, Information Governance Project Manager Directorate Corporate Governance Ratifying
All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.
Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September 2015. Information Governance Manager
SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY Report to the Trust Board 22 September 2015 Sponsoring Director: Author: Purpose of the report: Key Issues and Recommendations: Director
How To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Information & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Merthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
University of Brighton School and Departmental Information Security Policy
University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives
Incident reporting procedure
Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance
Stellenbosch University. Information Security Regulations
Stellenbosch University Information Security Regulations 1. Preamble 1.1. Information Security is a component of the Risk structure and procedures of the University. 1.2. Stellenbosch University has an
Information Governance Management Framework
Information Governance Management Framework Document Status: Approved Version: v 1.3 DOCUMENT CHANGE HISTORY Version Date Comments (i.e. viewed, or reviewed, amended, approved by person or committee v1.0
JOB DESCRIPTION. Information Governance Manager
JOB DESCRIPTION POST TITLE: Information Governance Manager DIRECTORATE: ACCOUNTABLE TO: BAND: LOCATION: CSS Head of Information Governance 8a CSS Job Purpose The Information Governance Manager will ensure
Information Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
The CPS incorporates RCPO. CPS Data Protection Policy
The CPS incorporates RCPO CPS Data Protection Policy Contents Introduction 3 Scope 4 Roles and Responsibilities 4 Processing Criminal Cases 4 Information Asset Owners 5 Information Asset Register 5 Information
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Version Version 1 Ratified By Date Ratified PROPOSED FOR APPROVAL 15/11/12 Author(s) Responsible Committee / Officers Date Issue November 2012 Review Date November 2013 Intended
Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation
Northumberland, Newcastle North and East, Newcastle West, Gateshead, South Tyneside, Sunderland, North Durham, Durham Dales, Easington and Sedgefield, Darlington, Hartlepool and Stockton on Tees and South
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
Information Governance Policy
BEXLEY CARE TRUST MANAGEMENT MANUAL Title: INFORMATION GOVERNANCE POLICY Originating Department: IT DEPARTMENT Authorised by: Risk Management Committee June 2008 Reference no: CA12 Date of Issue: JANUARY
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013
Use of Social Networking Websites Policy START DATE: March, 2013 NEXT REVIEW: March 2015 COMMITTEE APPROVAL: Joint Management Trade Union Committee CHAIR S SIGNATURE: STAFF SIDE CHAIR S SIGNATURE: DATE:
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
Information Governance Policy
Information Governance Policy Version: Revised: Consultation: Ratified by: 1.0 Information Governance Committee Governance Committee Date ratified: 19 March 2008 Name of originator/author: David McGrath
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
