PROCEDURE Transaction Monitoring and Audit. Number: G 0811 Date Published: 6 June 2013

Size: px
Start display at page:

Download "PROCEDURE Transaction Monitoring and Audit. Number: G 0811 Date Published: 6 June 2013"

Transcription

1 1.0 Summary of Changes This procedure has been amended to include the Police National Database (PND). 2.0 About this Procedure The Chief Constable will assume the responsibilities of the data controller under the Data Protection Act 1998 on behalf of Essex Police. Part of those responsibilities will be to ensure that the principles of the Act are adhered too and that users of all Essex Police systems processing personal data do so only for a valid policing purpose. An expansion of this validation programme to other information systems may take place subject to the agreement of the Head of SCMD. 3.0 Risk Assessments/Health and Safety Considerations Risks associated with this procedure relate to the damage caused to the reputation of the organisation by failing to take adequate measures to ensure full compliance with the provisions of the Data Protection Act Transaction Monitoring and audit performs three important functions: To deter and detect unauthorised access to systems; To raise staff awareness of data protection issues and maintain public confidence; To ensure all relevant transaction fields are completed to provide an adequate audit trail for retrospective investigations into transactions that have been carried out. The monitoring and audit of database transactions will reduce the risk of inappropriate use and will provide reassurance that information is being accessed only for lawful policing purposes. Failure to follow the provisions detailed within this procedure may expose the organisation to a breach of the Data Protection Act Procedure 4.1 Police National Computer (PNC) The scope and nature of the validation checks will be determined by the Audit and Compliance Manager with the agreement of the Head of SCMD in accordance with the ACPO Data Protection Manual of Guidance (Part 2 Audit) July A minimum of three daily validation checks concerning the use of the PNC will be made. The validation process will also focus on the initial reason given for the PNC transaction. Page 1 of 5

2 The validation process will be as follows: The Audit and Compliance Team will send an requesting persons to validate the transaction; On receipt, the person will verify they requested or carried out the transaction together with an explanation in writing as to why they did so; The will then be forwarded to their line manager to validate the transaction including an explanation from any third party who initiated the transaction; The Line Manager will confirm in writing all explanations provided, before forwarding by to the Audit and Compliance Team. The must be returned to the Audit and Compliance Team within 7 days of issue. If a reply is not received within this timescale, the matter will be referred to a Senior Manager together with the Audit and Compliance Manager. If it is not possible to reply within 7 days, the Audit and Compliance Team must be informed without delay. All responses will be recorded on the Access Database and managed within the Audit and Compliance Team. Failure to validate the transaction or the provision of an unsatisfactory response will be escalated to the Professional Standards Department. In the event that potential misuse of police information is identified the Audit and Compliance Manager will forward the relevant details to the Professional Standards Department for their consideration. Where misuse is confirmed the Information System Owners for the relevant information systems from involved will be informed. 4.2 Police National Database Daily validation checks will be undertaken; these will equate to at least 2% of overall usage. Dip samples will also be undertaken to ensure that PND functionality is being accessed correctly by users. Every active user will be subject to dip sampling on a rolling 6 month basis. Transactions will be audited in the event of concerns of inappropriate use being raised. The transaction validation process will be as follows: A date, user and transaction will be selected; The audit log entry for the PND transaction will be reviewed; The search justification will be assessed to ensure that it is sufficient and traceable; The information viewed and extracted will be assessed; If undertaken for a third party the 'on behalf of' field will be checked to confirm it contains a traceable individual; Page 2 of 5

3 A PND validation form (Appendix 1) will be ed to the PND user or third party requesting confirmation of the transaction together with sufficient reasoning to enable the legitimacy of the transaction to be assessed; The user will complete the form and it to their line manager to validate the transaction. The line manager will confirm in writing all explanations provided before ing the form to the PND Audit mailbox; In the case of Corporate Vetting a PND validation form (Appendix 2) will be ed to the Vetting Supervisor requesting the transaction is confirmed, its reason and necessity; The PND Validation Form must be returned to the PND Audit mailbox within 7 days of issue; If a reply is not received within this timescale, the matter will be referred to the Audit & Compliance Manager; The evidence provided will be reviewed to determine whether the PND transaction is / is not validated. Any indication of misuse of the PND or a failure to validate the transaction will be referred to the Audit and Compliance Manager who will pass the matter to the Professional Standards Department as appropriate. A Record of all PND validation forms will be maintained by the auditor. All audit documentation will be retained in accordance with G 0833 Procedure Retention and Disposal Permissions and Access Controls The PND systems administrator is responsible for administrative management of the system; this will be audited on a quarterly basis. A quarterly audit will be completed to ensure there is a signed copy of the PND user end entity agreement of those new members of staff who have completed training and are using the PND. The PND systems administrator is responsible for the management of the Sun Identity Manager (IDM); to ensure that PND users have the correct level of access, are placed in the correct user group(s), to identify any new PND users and confirm PND leavers have had their role access removed a quarterly audit of all PND accounts held in the Sun IDM will be undertaken. Any discrepancies highlighted by this audit will be referred to the Audit & Compliance Manager Usage Monitoring Information regarding force activity on PND will be monitored by the Force PND Lead in conjunction with the Audit & Compliance Manager. The continued accesses to the PND of users not accessing the PND for a period of 4 months or more will be identified and future access requirements reassessed. Page 3 of 5

4 4.2.3 Copy and Paste/Printing Data copied or printed from PND will be monitored to ensure it conforms to the Government Protective Marking Scheme (GPMS). All PND users are aware of their responsibilities Non Standard Service (NSS) The small NSS user community enables a minimum monitoring approach to be undertaken. All NSS searches should be in accordance with the covert searching principles Supervision and Dip Sampling The validation of the use of NSS to ensure the transaction is proportionate is the responsibility of the relevant line manager of the user and should involve a sampling of NSS transactions. The line manager should not need to access the audit capability in NSS to fulfil this responsibility as there will be sufficient detail available in the reports and log which will be supplied by the NSS Auditor. The line manager will endorse the log accordingly. Managers should undertake monthly dip sampling; a minimum of 5% of covert transactions should form the basis of the dip sample The Force NSS Auditor(s) will identify at least 3 NSS searches each month, and working with line managers conduct, an in-depth audit; validation processes will be agreed between the NSS auditors and the respective managers. This will ensure the NSS use is adequately validated and that the principles for covert search users are adhered to. A manager may request an in-depth audit which could be triggered as a result of local supervision activities. 5.0 Monitoring and Review This procedure will be reviewed by the Head of Information Management within three years of the date of publication to ensure that it remains accurate and compliant with legislation, local and national policies. 6.0 Related Procedures G 0801 Procedure Computer Use G 0802 Procedure Use of Communications G 0804 Procedure Information Security Breach G 0805 Procedure Information Security Owner G 0833 Procedure Retention and Disposal Page 4 of 5

5 7.0 Related Policies G 0800 Policy Information Management 8.0 Information Sources None Page 5 of 5

Compliance. Group Standard

Compliance. Group Standard Group Standard Compliance Serco is committed to good governance practices and the management of risks supported by a robust business compliance process SMS-GS-G2 Compliance July 2014 v1.0 Serco Public

More information

PROCEDURE Police Staff Discipline. Number: C 0901 Date Published: 9 May 2013

PROCEDURE Police Staff Discipline. Number: C 0901 Date Published: 9 May 2013 1.0 Summary of Changes Amendments to the 1 st bullet point of section 4.5 and the 3 rd, 4 th, 6 th and 7 th bullet point in section 4.8 have been made. Section 4.9 has been removed as the content is now

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

POLICY Identity Access Management. Number: G 0900 Date Published: 18 February 2014

POLICY Identity Access Management. Number: G 0900 Date Published: 18 February 2014 1.0 Summary of Changes This policy has been amended to include the new form A666 Identity Access Management (IAM) Variation Form, Removal of Application Access. 2.0 About this Policy This document describes

More information

Northamptonshire Police. Information Management Strategy

Northamptonshire Police. Information Management Strategy Northamptonshire Police Information Management Strategy If printed, copied or otherwise transferred from the Policies and Procedures Intranet/Internet Site this document must be considered to be an uncontrolled

More information

Preparation of a Rail Safety Management System Guideline

Preparation of a Rail Safety Management System Guideline Preparation of a Rail Safety Management System Guideline Page 1 of 99 Version History Version No. Approved by Date approved Review date 1 By 20 January 2014 Guideline for Preparation of a Safety Management

More information

Internal Audit Final Report Strategic Finance Accounts Receivable March 2014

Internal Audit Final Report Strategic Finance Accounts Receivable March 2014 Internal Audit Final Report Strategic Finance Accounts Receivable March 2014 Page 1 of 23 CONTENTS EXECUTIVE SUMMARY 3-4 Overview 3 Summary of Significant Risks 4 Summary of Significant Findings 4 Conclusion

More information

Data Quality Policy. Appendix A. 1. Why do we need a Data Quality Policy?... 2. 2 Scope of this Policy... 2. 3 Principles of data quality...

Data Quality Policy. Appendix A. 1. Why do we need a Data Quality Policy?... 2. 2 Scope of this Policy... 2. 3 Principles of data quality... Data Quality Policy Appendix A Updated August 2011 Contents 1. Why do we need a Data Quality Policy?... 2 2 Scope of this Policy... 2 3 Principles of data quality... 3 4 Applying the policy... 4 5. Roles

More information

INFORMATION GOVERNANCE POLICY & FRAMEWORK

INFORMATION GOVERNANCE POLICY & FRAMEWORK INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger

More information

Business Continuity Management Policy

Business Continuity Management Policy Governance: Business Committee Policy Owner: Chief Superintendent, Corporate Services Department: Corporate Services Policy Number: 002 Version: 3.0 Policy Writer: Business Continuity Co-ordinator Effective

More information

Information Governance Framework

Information Governance Framework Information Governance Framework March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aim 2 3 Purpose, Values and Principles 2 4 Scope 3 5 Roles and Responsibilities 3 6 Review 5 Appendix 1 - Information

More information

PS 172 Protective Monitoring Policy

PS 172 Protective Monitoring Policy PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Review Policy Reference Number Title CSD-014 Information Security Review Policy Version Number 1.2 Document Status Document Classification Active Open Effective

More information

Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion

Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion Essex Fire Authority Fleet Management Internal Audit Report (4.12/13) 28 February 2013 FINAL Overall Opinion Essex Fire Authority Fleet Management 4.12/13 CONTENTS Section Page Executive Summary 1 Action

More information

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff

More information

PROCEDURE Police Support Volunteers. Number: C 0515 Date Published: 6 June 2013

PROCEDURE Police Support Volunteers. Number: C 0515 Date Published: 6 June 2013 1.0 Summary of Changes This procedure has been rewritten from its original policy status, and renumbered from C 0100. It should be read by all members of staff who deal with policy support volunteers.

More information

Job Description / Person Specification

Job Description / Person Specification Job Description / Person Specification Job Title: Executive Support Manager Post Number: PO 2017 Division/Department/Section: Office of the Police and Crime Commissioner Line Manager Chief Executive PO

More information

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Name of Policy Author: Name of Review/Development Body: Ratification Body: Ruth Drewett Information Governance Steering Group Committee Trust Board : April 2015 Review date:

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Job Title: Responsible To: Position Purpose: FINANCIAL ACCOUNTANT Finance and Corporate Services Manger This job exists to: 1) To provide high quality, accurate and timely financial

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:

More information

Council, 14 May 2015. Information Governance Report. Introduction

Council, 14 May 2015. Information Governance Report. Introduction Council, 14 May 2015 Information Governance Report Introduction 1.1 The Information Governance function within the Secretariat Department is responsible for the HCPC s ongoing compliance with the Freedom

More information

Appendix 2e. DIRECTORATE OF AUDIT, FF RISK AND ASSURANCE Internal Audit Service to the GLA. Follow up Review of Sickness Monitoring and Control

Appendix 2e. DIRECTORATE OF AUDIT, FF RISK AND ASSURANCE Internal Audit Service to the GLA. Follow up Review of Sickness Monitoring and Control Appendix 2e DIRECTORATE OF AUDIT, FF RISK AND ASSURANCE Internal Audit Service to the GLA Follow up Review of Sickness Monitoring and Control EXECUTIVE SUMMARY 1. Background 1.1 This audit follows up the

More information

CONTROLLED DOCUMENT. Traffic Management Policy

CONTROLLED DOCUMENT. Traffic Management Policy CONTROLLED DOCUMENT CATEGORY: CLASSIFICATION: PURPOSE Controlled Number: Document Version Number: 1 Controlled Sponsor: Controlled Lead: Approved By: On: Document Document Policy Governance To set out

More information

1.1 Terms of Reference Y P N Comments/Areas for Improvement

1.1 Terms of Reference Y P N Comments/Areas for Improvement 1 Scope of Internal Audit 1.1 Terms of Reference Y P N Comments/Areas for Improvement 1.1.1 Do Terms of Reference: a) Establish the responsibilities and objectives of IA? b) Establish the organisational

More information

Records Management plan

Records Management plan Records Management plan Prepared for 31 October 2013 Audit Scotland is a statutory body set up in April 2000 under the Finance and Accountability (Scotland) Act 2000. We help the Auditor General for Scotland

More information

Information Integrity & Data Management

Information Integrity & Data Management Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is

More information

Cumbria Constabulary. Business Continuity Planning

Cumbria Constabulary. Business Continuity Planning Cumbria Constabulary Business Continuity Planning 0 Cumbria Shared Internal Audit Service Images courtesy of Carlisle City Council except: Parks (Chinese Gardens), www.sjstudios.co.uk, Monument (Market

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY Directorate of Performance Assurance INFORMATION GOVERNANCE POLICY Reference: DCP074 Version: 2.5 This version issued: 27/03/15 Result of last review: Minor changes Date approved by owner (if applicable):

More information

U 16 Internet Monitoring Policy & Investigation Protocol

U 16 Internet Monitoring Policy & Investigation Protocol Dartmoor National Park Authority U 16 Internet Monitoring Policy & Investigation Protocol February 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted

More information

Councillor role descriptions

Councillor role descriptions Councillor role descriptions All Councillors:- Community Leader Champion your division Deal with casework Represent the community within the Council and other agencies Campaign on local issues Keep in

More information

Voicemail &Telephone Call Handling (Policy & Procedure)

Voicemail &Telephone Call Handling (Policy & Procedure) Voicemail &Telephone Call Handling (Policy & Procedure) Publication Scheme Y/N Department of Origin Policy Holder Author Related Information Can be published on Force Website Force Contact Centre (FCC)

More information

CCG: IG06: Records Management Policy and Strategy

CCG: IG06: Records Management Policy and Strategy Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of

More information

Glasgow Life Performance Management. Final Report

Glasgow Life Performance Management. Final Report Glasgow Life Performance Management Final Report INTERNAL AUDIT October 2013 Glasgow City Council Internal Audit 1 GLASGOW LIFE Performance Management Table of Contents Section No Section Title 1 Introduction

More information

THE CLAIMS MANAGEMENT CODE ( the Code )

THE CLAIMS MANAGEMENT CODE ( the Code ) THE CLAIMS MANAGEMENT CODE ( the Code ) CONTENTS 1 Introduction 2 Principles 3 Publishing the Code 4 Training and Competence 5 Advertising, Marketing and Promotional Activities 6 Charges 7 Information

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary

Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary Avon and Somerset Constabulary Traffic Accidents Internal Audit Report (10.12/13) 12 February 2013 Overall Opinion: Amber/Green CONTENTS Section Page Executive Summary 1 Action Plan 5 Findings and Recommendations

More information

Data Protection Policy June 2014

Data Protection Policy June 2014 Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:

More information

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version) Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information Royal Borough of Kensington and Chelsea Data Quality Framework ACE: A Framework for better quality data and performance information March 2010 CONTENTS FOREWORD 2 A CORPORATE FRAMEWORK FOR DATA QUALITY

More information

Financial Services Guidance Note Outsourcing

Financial Services Guidance Note Outsourcing Financial Services Guidance Note Issued: April 2005 Revised: August 2007 Table of Contents 1. Introduction... 3 1.1 Background... 3 1.2 Definitions... 3 2. Guiding Principles... 5 3. Key Risks of... 14

More information

PROJECT MANAGEMENT FRAMEWORK

PROJECT MANAGEMENT FRAMEWORK PROJECT MANAGEMENT FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Executive Assistant to

More information

NOT PROTECTIVELY MARKED

NOT PROTECTIVELY MARKED PROTOCOL FOR THE CRISIS SUPPORT TEAM FOR ESSEX AND ESSEX POLICE SUMMARY SHEET Aim: To ensure that, in the event of a disaster, the Essex Police Family Liaison network and Crisis Support Team for Essex

More information

Internal Audit Report

Internal Audit Report Internal Audit Report CUSTOMER SERVICES DEPARTMENT Review of the Iken Case Management System November 2012 1 INTRODUCTION This report has been prepared as a result of the Internal Audit review of the Iken

More information

Human Resources Policy No. HR46

Human Resources Policy No. HR46 Human Resources Policy No. HR46 Maintaining Personal Files and ESR Records Additionally refer to HR04 Verification of Professional Registration HR33 Recruitment and Selection HR34 Policy for Carrying Out

More information

City Purchasing Card (PCard) Program Improving Controls Before Expanding the Program

City Purchasing Card (PCard) Program Improving Controls Before Expanding the Program STAFF REPORT ACTION REQUIRED City Purchasing Card (PCard) Program Improving Controls Before Expanding the Program Date: October 27, 2009 To: From: Wards: Audit Committee Auditor General s Office All Reference

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

Operations. Group Standard. Business Operations process forms the core of all our business activities

Operations. Group Standard. Business Operations process forms the core of all our business activities Standard Operations Business Operations process forms the core of all our business activities SMS-GS-O1 Operations December 2014 v1.1 Serco Public Document Details Document Details erence SMS GS-O1: Operations

More information

Information Paper for the Legislative Council Panel on Financial Affairs. Protection of Consumer Credit Data

Information Paper for the Legislative Council Panel on Financial Affairs. Protection of Consumer Credit Data LC Paper No. CB(1)691/03-04(01) Information Paper for the Legislative Council Panel on Financial Affairs Protection of Consumer Credit Data Purpose Pursuant to the request by the Panel vide the Clerk to

More information

RECORD KEEPING IN HEALTHCARE RECORDS POLICY

RECORD KEEPING IN HEALTHCARE RECORDS POLICY RECORD KEEPING IN HEALTHCARE RECORDS POLICY Version 6.0 Key Points The Policy provides a framework for the quality of the clinical record facilitates high quality, safe patient care and that subsequently

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information

Essex County Council Policy for Information Management and Security

Essex County Council Policy for Information Management and Security Essex County Council Policy for Information Management and Security Title Author/Owner Status Essex County Council Policy for Information Management and Security Information Management IS Final Version

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

Audit and Performance Committee Report

Audit and Performance Committee Report Audit and Performance Committee Report Date: 3 February 2016 Classification: Title: Wards Affected: Financial Summary: Report of: Author: General Release Maintaining High Ethical Standards at the City

More information

Technical Support Group Designation of a Technical Service Procedure

Technical Support Group Designation of a Technical Service Procedure Technical Support Group Designation of a Technical Service Procedure Vehicle Certification Agency 1 The Eastgate Office Centre Eastgate Road Bristol BS56XX Tel: 0300 330 5799 Email: enquiries@vca.gov.uk

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

TITLE C193 BUSINESS CREDIT CARDS POLICY AND PROCEDURES DEPARTMENT POLICY

TITLE C193 BUSINESS CREDIT CARDS POLICY AND PROCEDURES DEPARTMENT POLICY TITLE C193 BUSINESS CREDIT CARDS POLICY AND PROCEDURES DEPARTMENT Corporate Services POLICY DIRECTIVE To provide internal control procedures to ensure proper use and authorisation of Credit Card transactions.

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: Revised: Consultation: Ratified by: 1.0 Information Governance Committee Governance Committee Date ratified: 19 March 2008 Name of originator/author: David McGrath

More information

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2. Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments

More information

LSB Procurement Framework

LSB Procurement Framework LSB Procurement Framework Introduction Procurement covers the typical purchase of services, supplies and works required to enable project delivery and to manage the infrastructure. The Services Board (LSB)

More information

Information Security Policy

Information Security Policy (Policy & Security Incident Procedure) Reference No. CR-055-13 Policy Sponsor Director of Corporate Resources Policy Owner Head of Information Management Policy Author Redacted Information Security Manager

More information

06100 POLICY SECURITY AND INFORMATION ASSURANCE

06100 POLICY SECURITY AND INFORMATION ASSURANCE Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information

More information

HERTSMERE BOROUGH COUNCIL

HERTSMERE BOROUGH COUNCIL HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act

More information

RIPA (Regulations and Investigatory Powers Act)

RIPA (Regulations and Investigatory Powers Act) Dartmoor National Park Authority INTERNET MONITORING POLICY & INVESTIGATION PROTOCOL Approved: February 2010 Review Date: September 2010 1. Introduction Private use of the computer facilities is covered

More information

Anti-money laundering and countering the financing of terrorism the Reserve Bank s supervisory approach

Anti-money laundering and countering the financing of terrorism the Reserve Bank s supervisory approach Anti-money laundering and countering the financing of terrorism the Reserve Bank s supervisory approach Hamish Armstrong In September 2010, a Bulletin article set out the Reserve Bank of New Zealand s

More information

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective.

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective. Good Practice Audit outcomes analysis Police Forces April 2013 to April 2014 This report is based on the final audit reports the ICO completed in the Criminal Justice sector, specifically of Police forces,

More information

TREASURER S DIRECTIONS CASH MANAGEMENT TRANSACTION MANAGEMENT Section C3.3 : Corporate Credit Cards

TREASURER S DIRECTIONS CASH MANAGEMENT TRANSACTION MANAGEMENT Section C3.3 : Corporate Credit Cards TREASURER S DIRECTIONS CASH MANAGEMENT TRANSACTION MANAGEMENT Section C3.3 : Corporate Credit Cards STATEMENT OF INTENT The use of Corporate Credit Cards can provide an efficient and effective payment

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version

More information

WILTSHIRE POLICE FORCE POLICY

WILTSHIRE POLICE FORCE POLICY Template v4 WILTSHIRE POLICE FORCE POLICY BUSINESS CONTINUITY MANAGEMENT SYSTEMS (BCMS) Effective from: July 2013 Version: 2.0 Next Review Date: July 2015 POLICY STATEMENT Wiltshire Police has a statutory

More information

Online Research and Investigation

Online Research and Investigation Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law

More information

La Trobe University is committed to maintaining a comprehensive and effective Compliance Framework.

La Trobe University is committed to maintaining a comprehensive and effective Compliance Framework. La Trobe University Compliance Framework Introduction The Compliance Framework documents the system and Compliance Process through which La Trobe University can monitor, review and comply with its legislative

More information

Management Standards for Information Security Measures for the Central Government Computer Systems

Management Standards for Information Security Measures for the Central Government Computer Systems Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...

More information

University of Liverpool

University of Liverpool University of Liverpool Card Payment Policy Reference Number Title Version Number 1.0 Document Status Document Classification FIN-001 Card Payment Policy Active Public Effective Date 03 June 2014 Review

More information

NOT PROTECTIVELY MARKED FORCE PROCEDURES. Email Retention, Archiving and Destruction Procedure v1.2. Records Manager

NOT PROTECTIVELY MARKED FORCE PROCEDURES. Email Retention, Archiving and Destruction Procedure v1.2. Records Manager FORCE PROCEDURES Email Retention, Archiving and Destruction Procedure v1.2 Procedure Reference Number: 2010.08 Procedure Author: Samantha Hampson, Records Manager Procedure Review Date: 1 st April 2011

More information

OH&S Management Systems Audit Checklist (NAT, E3)

OH&S Management Systems Audit Checklist (NAT, E3) 3.1.2 3.1.1 Introduction OH&S Management Systems Audit Checklist (NAT, E3) This audit checklist is based on Element 3 (Implementation) of the National Self-Insurers OHS Audit Tool. For a full copy of the

More information

INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE

INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE CHARTERED INSTITUTE OF INTERNAL AUDIT DEFINITION OF INTERNAL AUDIT Internal auditing is an independent, objective assurance and consulting activity designed

More information

WORKPLACE HEALTH AND SAFETY AUDITING GUIDELINES

WORKPLACE HEALTH AND SAFETY AUDITING GUIDELINES WHS UNIT WORKPLACE HEALTH AND SAFETY AUDITING GUIDELINES Contents 1 Purpose... 1 2 Scope... 1 3 Definitions... 1 4 Responsibilities... 1 4.1 WHS Unit... 1 4.2 Auditor(s)... 1 4.3 Managers of Faculties

More information

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers: ITEM NO: 4 Report To: AUDIT PANEL Date: 23 March 2010 Reporting Officers: Subject: Report Summary: Recommendations: Links to Community Strategy: Policy Implications: Financial Implications: (Authorised

More information

Policy Title: Information and Communication Technologies (ICT) Service Management Policy. Policy Number: P60122

Policy Title: Information and Communication Technologies (ICT) Service Management Policy. Policy Number: P60122 Policy Title: Information and Communication Technologies (ICT) Service Management Policy Policy Number: P60122 Section Reference Policy Contents Page(s) 1. Policy Administration 2 2. Policy Objective,

More information

BIG LOTTERY FUND Document archive and retention policy

BIG LOTTERY FUND Document archive and retention policy BIG LOTTERY FUND Document archive and retention policy December 2010 Sonia Howe Head of Information Governance For further information regarding retention schedules please contact Page 1 of 18 Version

More information

Self assessment tool. Using this tool

Self assessment tool. Using this tool Self assessment tool How well does your organisation comply with the 12 guiding principles of the surveillance camera code of practice? Complete this easy to use self assessment tool to find out if you

More information

Procedure PS-TNI-001 Information Security Management System Certification

Procedure PS-TNI-001 Information Security Management System Certification Table of Contents 1. Purpose 2. Scope 3. Definitions 4. Responsibilities 4.1 Head of the Certification Body 4.2 QM Manager / Management Representative 4.3 Auditors 4.4 Order Service 4.5 Certification Service

More information

RISK MANAGEMENT FRAMEWORK

RISK MANAGEMENT FRAMEWORK RISK MANAGEMENT FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Manager Organisational Development

More information

How To Manage A University Computer System

How To Manage A University Computer System PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management

More information

Report of Don McLure, Corporate Director of Resources

Report of Don McLure, Corporate Director of Resources AUDIT COMMITTEE 29 June 2015 Annual Review of the System of Internal Audit 2014 / 2015 Report of Don McLure, Corporate Director of Resources Purpose of the Report 1. The purpose of this report is for members

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version 1.1 Responsible Person Information Governance Manager Lead Director Head of Corporate Services Consultation Route Information Governance Steering Group Approval Route

More information

Yes No. Management of Policy Development in the Metropolitan Police Service (MPS) - Standard Operating Procedures (SOPs). Version Version 3 Summary

Yes No. Management of Policy Development in the Metropolitan Police Service (MPS) - Standard Operating Procedures (SOPs). Version Version 3 Summary Freedom of Information Act Publication Scheme Protective Marking Not Protectively Marked Publication Scheme Y/N Title Yes No Management of Policy Development in the Metropolitan Police Service (MPS) -

More information

Auditing data protection a guide to ICO data protection audits

Auditing data protection a guide to ICO data protection audits Auditing data protection a guide to ICO data protection audits Contents Executive summary 3 1. Audit programme development 5 Audit planning and risk assessment 2. Audit approach 6 Gathering evidence Audit

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

Policy Checklist. Head of Information Governance

Policy Checklist. Head of Information Governance Policy Checklist Name of Policy: Information Governance Policy Purpose of Policy: To provide guidance to all staff on their responsibilities regarding information governance and to ensure that the Trust

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

ATHENA Ethical Framework (Version 1- February 2014)

ATHENA Ethical Framework (Version 1- February 2014) ATHENA Ethical Framework (Version 1- February 2014) ATHENA is co-funded by the European Commission, Executive Research Agency, Seventh Framework Programme (SEC call FP7-SEC-2012.6.1.30) 1. Introduction

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

Audit of Business Continuity Planning

Audit of Business Continuity Planning Cumbria Office of the Police & Crime Commissioner Audit of Business Continuity Planning 0 Cumbria Shared Internal Audit Service Images courtesy of Carlisle City Council except: Parks (Chinese Gardens),

More information