BRIEFING PAPER UNIVERSITY GREY USER IDENTITY MANAGEMENT
|
|
|
- Tamsin Hancock
- 10 years ago
- Views:
Transcription
1 BRIEFING PAPER UNIVERSITY GREY USER IDENTITY MANAGEMENT
2 UNIVERSITY GREY USER IDENTITY MANAGEMENT TABLE OF CONTENTS 1. INTRODUCTION COMMON IDENTITY MANAGEMENT ISSUES THE ROLE OF IT DEPARTMENTS IN IDENTITY MANAGEMENT EXAMPLES OF GOOD PRACTICE... 4 POLICY:... 4 PROCESS:... 4 PEOPLE:... 4 SYSTEMS: KEY PRINCIPLES FOR DEVELOPING IDENTITY MANAGEMENT... 5 APPENDIX A GREY USER CATEGORIES AND ELIGIBILITY... 6 SUMS Consulting Management Consultants Suzie Moon May 2014
3 1. Introduction One of the main challenges currently facing university information management is to ensure that all the information held about an individual user is joined up across their different systems and that accurate digital identifiers are allocated to each of the individual university IT and library resource users. The requirements of electronic resource licence providers present further challenges as universities have to ensure that only the users permitted under the terms of their licence agreements are given access to the agreed, paid for, resources. The resources and identifiers allocated to university staff and current students have been established by reference to university regulations, policies and practice. However, there remains a large number of users who are neither staff nor current students but who currently make a significant contribution to university life, teaching and research capability and who have a requirement to access ICT and library resources to a lesser or greater extent. These can include, for example, honorary staff, temporary staff, alumni, contractors, staff of university/business partnerships, and visitors they are often referred to as grey users. Lack of clarity around grey users can make it difficult for genuine contributors to access the required resources or easy for users with dubious authority to gain unauthorised access. The following pages explore: Common Identity Management Issues The Role of IT departments in Identity Management Examples of Good Practice Key Principles for Developing Identity Management If you have any questions about Identity Management please contact Suzie Moon or Bob Walder at SUMS Consulting: [email protected] or [email protected] SUMS 2014 Version: Final Page 1
4 2. Common Identity Management Issues SUMS research has identified the following identify management issues: Ownership: there needs to be clarity about where responsibility for grey user Identity Management lies within the university, particularly with regard to taking responsibility for an individual and the resources that the university provides for them is it the IT or HR department, the library, the department or school or a combination of all or some of them? Compliance: universities have to comply with current licensing, audit and data protection requirements. The increasing use of electronic resources, the majority of which are provided under strict licence terms, requires universities to demonstrate to the resource providers that users meet the stated criteria. Resource providers may withdraw access to resources for an institution if they find that licence terms have been breached and universities could also be open to potentially expensive legal action. Circumventing the system: sometimes an individual who has not received the access to ICT and/or library resources that they had requested or expected will try to circumvent the system by, for example, using someone else s university account information. Unclear university policies, processes and systems for Identity Management applicable to all users: universities generally have developed clear policies and the processes and systems to successfully implement them with regard to their students and staff. However, this does not always extend to the grey users who now form a large part of a university community, especially with the growing trend for partner institutions within the UK and for building new campuses in other countries, particularly in the Far East. Sponsors do not follow current university policy: sometimes the university sponsor for an individual seeking access to resources requests resource access which is not permitted under current university policy and this can cause friction and difficulty for the staff member who has to refuse or amend the request. Time consuming: depending on the process being followed, particularly if it is paper based or partpaper based, requiring signatures from sponsors, it can take several days, even weeks for account access to be implemented which often leads to frustration and lack of productivity and does not present a picture of an efficient organisation to the end user who, in this digital age, expects to have their access needs arranged before they arrive at the university. Risk of paper based systems: paper forms can and have been mislaid or delayed and sometimes, especially when granting a large number of permissions to a group perhaps at a training course or conference, they can be incorrectly completed which can lead to time-consuming chasing up or referring back to the originator. New funding arrangements: Since September 2012 universities have been funded by new arrangements which have seen a reduction in central grants and an increase in tuition fees, as well as new JISC banding categories which determine how much is paid for electronic resource licences and access. All sources of university income are now taken into account when determining bands and this includes funding from partners and overseas institutions. This may lead to increased expectations about access to university provided resources. Changes instituted by the resource providers: Academic publishers and resource providers have introduced electronic systems which look at an individual s defined values as set by the institution in order to check that they match the criteria for the particular resource before access is provided, otherwise it will be denied. Universities need to ensure that individual user profiles are linked to the correct values which accord with current university policy and licence agreements or else provide facilities such as walk-in access to electronic resources which meet the licence provider s terms and conditions. SUMS 2014 Version: Final Page 2
5 3. The Role of IT departments in Identity Management University IT departments are responsible for setting up, maintaining and removing IT accounts, whether for students, staff or grey users. The policies and systems for provisioning student and staff accounts should be clearly set out in order to ensure the smooth functioning of registering students for the new academic year and the induction of a new member of university staff. This is not always the case however when university IT departments are asked to supply a grey user with an IT account and access to required resources. The IT department will need to create or be provided with the following information before it is able to set up a new user account: A digital identity: unique to the individual user together with a unique user name and password A role: what does the individual do in the university e.g student, financial officer, IT Service Desk manager, etc. Entitlement(s): what university IT and academic resources the individual is able to access Authentication: demonstration that the individual requesting an identity and access to resources is who they say they are. Often however a lack of clarity in these areas either causes delay or pushes access decisions onto staff who are not suitably qualified. SUMS 2014 Version: Final Page 3
6 4. Examples of Good Practice SUMS has recently conducted a number of comparator studies in order to determine good practice with regard to Identity Management, in universities, particularly with regard to grey users. Policy: It is important that a clear policy is agreed and recognised regarding grey users and that their access permissions to resources and privileges is agreed and made explicit. This needs to be publicised to all staff members of the university. Honorary status is time limited Access to resources is based on the minimum needed to perform a role within the university. Process: It is important to consider the requirements of any new Identity Management system including establishing the policies and processes before implementing new technology. This can be achieved by the creation of a special university group of stakeholders whose remit is to define user categories and consider entitlements and privileges as well as establishing a clear process to promote these as well as sanctions if they are not followed. Associate is the most common group name for grey users at a university Casual visitors details are currently not kept by university IT systems. Casual visitors have been given access to some universities public unsecure Wi-Fi systems which they can access by using their own address. The library system can be used to check that a grey user has been given the correct authorisations that are permitted by the licence terms and can be used to give these authorisations direct to the grey user Departments become source owners and sponsor the grey user, and have to make the business case which justifies their use of university resources and systems and also take responsibility for their use of these resources An online Identity Management system can deal with an Associate request in a short time period (quickest could be a few minutes) if the required details and forms are completed promptly. People: A series of university wide newsletters and workshops can been used to promote a new Identity Management system to relevant staff members and support its successful introduction. Staff who are involved are invited to give their feedback throughout the process. Creating a specific Identity Manager post can help in the management and creation of accounts and permissions. Systems: A dedicated web site is essential to promote the Identity Management policies and procedures as well as giving guidance on Associate categories and resource and access rights An on-line based system that gives ownership to the sponsoring school or department can result in a much reduced time for creating an Associate account and allotting resources. It can also have other advantages as it means that information is held about the Associate which helps with other areas of university administration such as the giving out of parking permits. This may be useful when considering moves to a cloud based resource system with costs being able to be allocated back to the relevant sponsoring department. The new system of electronic resource providers relying on defined values means that some on-line resources are no longer available to some grey users. One solution is to provide one or more dedicated walk-in user P.C.s in the university library. SUMS 2014 Version: Final Page 4
7 5. Key Principles for Developing Identity Management A number of key principles derived from good practice have been developed with regard to grey user Identity Management. These principles can be used as a basis to help inform the creation of a university grey user policy which should cover entitlements and groupings as well as the process for the creation and maintenance of grey user accounts: The allocation of resources and privileges to grey users at the university should be formally agreed as university policy A policy should contain a list of principles, a set of clearly defined categories and for each category a list of eligibilities. This could be extended to include all staff and students, both current and past, to create a university-wide Identity Management policy. The policy should contain a list of clearly defined roles, and for each role a single category into which it falls The policy should include how to deal with new grey user roles The policy needs to be well publicised to all university members and users as well as to future grey users and be publicly available on the university website All grey users, including honorary positions, should be time limited and resource and account privileges should be based on the individual s role in the university The policy will need to be supported by clarifying processes and responsibilities Ownership of a grey user should be clearly established as part of university policy Provisions should be made to review, update and enforce the policy and institute disciplinary sanctions as required. Completing a table based on the headings and exemplars suggested in Appendix A can form a useful resource to help clarify and develop grey user categories and eligibilities as well as indicating whether an individual is a member of the university as defined by its Charter. SUMS 2014 Version: Final Page 5
8 Appendix A Grey user categories and eligibility Grey user categories and eligibility Example Grey User Alumni Auditors Casual Staff Contractors Emeritus Appointments (Professors/Readers) Office e.g. External Examiners Needs access to which resources as a minimum Alumni web pages. Internet when on University campus Internet; relevant systems access Internet, then depends on role requirements Internet as minimum. May need access to , software, data storage, relevant systems and library services Internet, , software and data storage, VLE and library services Internet. Access to examination papers and databases Able to access licensed /walk-in resources University Sponsor Review Period University Member Y/N Walk-in Alumni Services N/A Y Walk-in Relevant Department 3 months N Walk-in HR/Facilities Annually N Licensed resources, only if their work requires access, otherwise walk-in Licensed resources Relevant Department 3 months N Relevant Department/Vice Chancellor s Annually? Walk-in Registry 3 Months N
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
Bring Your Own Device Policy
Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Information Privacy Policy
Information Privacy Policy pol-032 Version: 2.01 Last amendment: Oct 2014 Next Review: Aug 2017 Approved By: Council Date: 04 May 2005 Contact Officer: Director, Strategic Services and Governance INTRODUCTION
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Data Protection Policy
1. Introduction 1.1 The College needs to keep certain information about its employees, students and other stakeholders, for example to allow it to monitor performance, achievements and health and safety.
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Human Resources Policy No. HR46
Human Resources Policy No. HR46 Maintaining Personal Files and ESR Records Additionally refer to HR04 Verification of Professional Registration HR33 Recruitment and Selection HR34 Policy for Carrying Out
Privacy Policy. 30 January 2015
Privacy Policy 30 January 2015 Table of Contents 1 Overview 3 Purpose 3 Scope 3 2 Collection 3 What information do we collect? 3 What if you do not give us the information we request? 4 3 Use of information
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
This Policy was approved by 2014.
WEB PUBLISHING POLICY This Policy was approved by Senate onn 4 June 2014 and came into force on 1 July 2014. 1 Introduction Overview This Policy applies to all websites published under the aston.ac.uk
Informatics Policy. Information Governance. Network Account and Password Management Policy
Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
Health and Safety Policy and Procedures
Health and Safety Policy and Procedures Health & Safety Policy & Procedures Contents s REVISION AND AMENDMENT RECORD : Summary of Change Whole Policy 4.0 05 Nov 08 Complete re-issue Whole Policy 4.1 10
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Version: 1.0 Last Amendment: N/A Approved by: Executive Committee Policy owner/sponsor: Director, Digital Library Services and CIO Policy Contact Officer: Manager, ICT
Introduction to the NHS Information Governance Requirements
Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Credit Control and Debt Management Policy
Credit Control and Debt Management Policy Issue Date: August 2011 Author: Head of Finance Approval Body: Senior Leadership Team CONTENTS Page(s) 1. Policy Statement 3 2. Background 3 4 3. Debt Management
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
Guide 2 Organisational
Guide 2 Organisational arrangements to support records management This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by
BBC. Anti-Bribery Policy. June 2011
BBC Anti-Bribery Policy June 2011 CONTENTS CLAUSE 1. Anti-Bribery Policy statement... 1 2. Who is covered by the policy?... 2 3. What is bribery?... 2 4. Gifts and hospitality... 3 5. Gifts and hospitality
Policy on the Provision of Mobile Phones
Provision of Mobile Phones Policy on the Provision of Mobile Phones Originator name: Section / Dept: Implementation date: Date of next review: Related policies: Policy history: Roger Stickland Approval
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
APES 320 Quality Control for Firms
APES 320 Quality Control for Firms APES 320 Quality Control for Firms is based on International Standard on Quality Control (ISQC 1) (as published in the Handbook of International Auditing, Assurance,
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
GymSports NZ Incorporated. Membership Data Regulation. Commencement Date 23 January 2009. Issued 23 January 2009
GymSports NZ Incorporated Membership Data Regulation Commencement Date 23 January 2009 Issued 23 January 2009 GymSports NZ, 2008 GymSports New Zealand Incorporated Membership Data Regulation 1. Purpose
Data Protection Policy
Internal Ref: NELC 16.60 Review date December 2016 Version No. V04 Data Protection Policy 1 Data Protection Statement Data Protection Policy 1.1 North East Lincolnshire Council recognises that in order
USE OF BUSINESS CREDIT CARDS FOR PURCHASING
POLICY STATEMENT USE OF BUSINESS CREDIT CARDS FOR PURCHASING POLICY ADOPTED: 15 July 2014 Policy Objective: The objectives of the Use of Business Cards for Purchasing Policy is to; Achieve significant
Private Patient Policy. Documentation Control
Documentation Control Reference Date approved Approving Body Trust Board Implementation Date July 2009 NUH Private Patient and Supersedes Overseas Visitor Policy Private Patient Advisory Group, Consultation
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Network Security & Connection Policy
Network Security & Connection Policy Effective from 17 February 2015 Version Number: 2.0 Author: Network Manager, IT Services Document Control Information Status and reason for development Revised to reflect
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Administrator Position Description. About the Drug Foundation
Administrator Position Description Approved by Executive Director, April 2013 Next review at annual staff appraisal About the Drug Foundation New Zealanders use drugs. That use can cause harms and add
Aberdeen City Council IT Asset Management
Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates
first direct credit card terms
first direct credit card terms 1 Definitions These are the definitions used in this Agreement: : a transfer to the Account of an amount you owe to another lender (who is not a member of the HSBC Group)
Research Governance Standard Operating Procedure
Research Governance Standard Operating Procedure The Management and Use of Research Participant Data for Secondary Research Purposes SOP Reference: Version Number: 01 Date: 28/02/2014 Effective Date: Review
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Research in the NHS HR Good Practice Resource Pack
Research in the NHS HR Good Practice Resource Pack Acknowledgements The Research Passport system was first developed in Greater Manchester by a partnership of NHS organisations and the University of Manchester.
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Information security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
IT ACCESS CONTROL AND USER ACCESS MANAGEMENT POLICY
IT ACCESS CONTROL AND USER Effective Date May 20, 2016 Cross-Reference 1. Contract Management Policy Responsibility Director, Information 2. IT Password Policy Technology 3. Record Classification and Handling
Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy
Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
and Conditions Business Telephone Banking
Terms and Conditions Business Telephone Banking Effective as at 18 April 2015 Contents Introduction 3 Your Bank 3 Our obligation to you 3 Features 4 Description 4 Bank Undertaking Security Deposit Accounts
INDEPENDENT TUTORIAL COLLEGE
INDEPENDENT TUTORIAL COLLEGE SCHEME DOCUMENT BRITISH ACCREDITATION COUNCIL FOR INDEPENDENT FURTHER AND HIGHER EDUCATION COLLEGE ACCREDITATION SCHEME CONTENTS 1. INTRODUCTION...1 2. ELIGIBILITY FOR ACCREDITATION...2
Pearson Vocational Centre Detail Change Request Form (United Kingdom and the Republic of Ireland)
Pearson Vocational Centre Detail Change Request Form (United Kingdom and the Republic of Ireland) This form should only be completed electronically. This form is only to be used by centres that are currently
Business Internet Banking Application Form
Business Internet Banking Application Form Free online banking for your business Welcome to Business Internet Banking. Please read the guidance notes before you complete each section. To use the service
Senate. SEN15-P17 11 March 2015. Paper Title: Enhancing Information Governance at Loughborough University
SEN15-P17 11 March 2015 Senate Paper Title: Enhancing Information Governance at Loughborough University Author: Information Technology & Governance Committee 1. Specific Decision Required by Committee
Sickness absence policy
Sickness absence policy This policy forms part of your contract of employment. The councils are entitled to introduce minor and non-fundamental changes to this policy by notifying you of these changes
Client complaint management policy
Client complaint management policy 1. Policy purpose This policy implements section 219A of the Public Service Act 2008 in the Department of Justice and Attorney-General (DJAG). Under this section, Queensland
Policies, Procedures & Guidelines
Policies, Procedures & Guidelines Management Guidance On the Storage and Disposal of Employee Personnel Files Issue Number: 1 Originated by: Human Resource Department Ratified by: SMT & JSPC Agreed by:
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Document History Document Reference: Document Purpose: Date Approved: Approving Committee: To set out the technical capabilities of the chosen security solution Airwatch
Information Technology Services
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
Mount Gibson Iron Limited Corporate Governance Policies and Practices Manual Shareholder Communication Policy
1 Introduction 1.1 Mount Gibson Iron Limited (the Company) is committed to the following objectives: (d) (e) Ensuring that shareholders and the market are provided with full and timely information about
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
Credit Card Contract
Credit Card Contract Credit Card Booklet Cardholder enquiries & Lost and stolen cards Telephone : (679) 321 4300 Facsimile : (679) 330 3738 BSP/SecDocTemp006 Page 1 of 21 Template Issue No.3 reviewed 19032012
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review
NHS WALES. Local Health Boards DISCIPLINARY PROCEDURE AND RULES
NHS WALES Local Health Boards DISCIPLINARY PROCEDURE AND RULES 1. POLICY STATEMENT 1.1 It is the policy of Local Health Boards to promote good employment relations between them and their staff. Consequently
Use of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY
COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY December 2014 1 Contents Section Page Council Tax Reduction, Discount & Exemption Anti-Fraud Policy 1 Introduction 3 2 Definition of Council
University of Brighton School and Departmental Information Security Policy
University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Mobile Devices Security Policy
Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU
Information Technology Policy and Procedures
Information Technology Policy and Procedures Responsible Officer Author Ben Bennett, Business Planning & Resources Director Policy Development Group Date effective from April 2005 Date last amended February
Student Attendance Policy
Student Attendance Policy Introduction Providing a student experience of the highest possible quality is a priority for Queen Margaret University. Promoting and encouraging student engagement with all
Text and Email Messaging Safeguarding Guidelines
Text and Email Messaging Safeguarding Guidelines Text messaging: benefits and risks Many NGBs, CSPs and other sports organisations are keen to utilise text messaging systems to help to improve the success
BURSARY FUND/ DISCRETIONARY LEARNER SUPPORT FUND POLICY & PROCEDURES 2014/2015
BURSARY FUND/ DISCRETIONARY LEARNER SUPPORT FUND POLICY & PROCEDURES 2014/2015 16-18 Bursary Fund 19+ Bursary Fund 24+ Adult Learning Loan Bursary Fund Contents Introduction 3 Policy Aims 3 Criteria and
TECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
Disciplinary Procedure
Disciplinary Procedure Human Resources 1 Introduction The University is committed to supporting its staff in carrying out their responsibilities within an environment which encourages productive, safe
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Remote Access Policy
BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is
GUIDANCE NOTE DECISION-MAKING PROCESS
GUIDANCE NOTE DECISION-MAKING PROCESS This document is intended as a general guide to the way in which the Jersey Financial Services Commission (the Commission ), normally approaches the exercise of its
DATA PROTECTION ACT 1998 COUNCIL POLICY
DATA PROTECTION ACT 1998 COUNCIL POLICY Page 1 of 5 POLICY STATEMENT Blackpool Council recognises the need to fully comply with the requirements of the Data Protection Act 1998 (DPA) and the obligations
