Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media

Size: px
Start display at page:

Download "Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media"

Transcription

1 Policy for the Re-use and Disposal of Computers, other IT Equipment and Data Storage Media The University has legal obligations to ensure that all computers, IT equipment, and data storage media (e.g. USB drives, DVDs, CDs, etc.) including the data and software held upon such equipment, are disposed of appropriately and legally. Equipment must be disposed of in line with the EU Waste Electrical and Electronic Equipment (WEEE) Directive; data in line with the Data Protection Act 1998, the University s Data Protection Policy and information security considerations of the University; and software in line with copyright legislation and software licensing provisions. To this end, members of the University must follow this policy for reuse and disposal of computers and IT equipment. This policy compliments the University Purchasing Policy on the specific re-use and disposal of IT equipment, as distinct from general equipment. This policy augments the key clause of the Purchasing Policy, but strengthens provisions required for data and software stored on IT equipment. Where goods are deemed by a Department to be surplus to requirements, details should first be circulated widely within the University. Such items may be transferred to another Department, at an agreed assessed value. If no interest is shown by other Departments, alternative arrangements for disposal should be made. These may include disposal to individuals or outside bodies. In this event, it is essential that items are properly valued at their full market price and all arrangements carefully documented, with invoicing and payment arranged via the Finance Office. If all attempts at disposal fail, the item should be scrapped. Exceptionally, if an item is declared to be scrap, it may be donated (obsolete scientific equipment may be of interest to schools, for example). Again, action must be carefully documented and the Finance Office kept fully informed, using the form attached as Annex D. Contents 1. Inclusions and exclusions 2. Options for the 'disposal' of IT equipment 3. Removal of data and software a. When a computer is being redeployed within the University b. When a computer is being sold to a member of the University or donated to an outside body c. When a computer is being scrapped d. Secure erasure of data/software from hard disks and other data storage media 4. Sale to a member of the University or sale/donation to an outside body 5. Disposal in an environmentally-friendly manner 6. Compliance

2 7. Updating equipment records 8. Acknowledgements 1. Inclusions and Exclusions All computer and IT equipment purchased by or on behalf of Bangor University is covered by this policy. This includes end-user equipment such as computers, monitors, TFT screens, laptops, smart phones, PDAs, Blackberries etc. and any other server or device which stores data, and/or has University licensed software installed upon it. The policy also covers all computer and data storage media used in the University s business e.g. CDs, DVDs, Flash drives/memory sticks, external hard drives, tapes etc. Disposal of photocopiers (some of which have data storage capacities) is separately covered under the photocopier agreement, and should be co-ordinated through the Finance Purchasing team. 2. Options for the re-use and disposal of IT equipment When equipment becomes redundant from its original use, the following options, listed in order of priority, should be considered: 1. Redeployment within the University 2. Sale to members of the University 3. Sale to outside bodies 4. Donation to a charitable or community organisation 5. Disposal in a secure and environmentally-friendly manner In cases 1-4 above, appropriate steps must be taken with regard to: the removal or retention of data and software In cases 2-4, the additional provisions of section 4 with respect to the sale/donation Sale to a member of the University or sale/donation to an outside body and, in all cases, to the updating of equipment records as described in the following sections. 3. Removal of data and software The removal and destruction of data prior to disposal is the responsibility of the organisational unit (i.e. college, school, department, etc) to whom the computer or data storage media belongs. Care must be taken not only to meet the requirements of Confidentiality Agreements, Third Party Contracts, the Data Protection and Copyright, Designs & Patents Acts and commercial sensitivity but must also to recognise that the release of data not covered by these acts may still

3 give rise to embarrassment for the University or damage to its business, if found by third parties. When a computer is being redeployed within the University: Data removal or transfer The original user should remove all data from the computer, unless the recipient has a business requirement for the transfer of some data with the computer. If any data are to be transferred with the computer, the original owner must ensure that he or she has the authority to transfer ownership of the data to the recipient and that any special terms under which the data are being held continue to be met. If the data being removed are sensitive (which, in the Data Protection Act, is defined as personal information related to such things as racial or ethnic origin, political opinions, religious beliefs, trade union membership, health, sexual life and criminal convictions), the disk should be reformatted, a secure wipe of the disk carried out with appropriate utility software - see section on Secure erasure below - and the operating system re-installed. In some cases it may be appropriate to install an updated version of the operating system (e.g. Windows XP in place of Windows 98). Contact ITS for advice on this. The Registrar s office can provide further advice on the Data Protection Act Software removal or transfer Only those items of software may be retained for which the University holds a licence and where that licence is being transferred to the new user; all other items of software must be removed. Software licence records must be updated accordingly and licence paperwork transferred appropriately - see section on Updating equipment records below. When a computer is being sold to a member of the University or donated to an outside body: Sale or donation of equipment should only be considered where the organisational unit has the resources to prepare the equipment suitably carrying out the secure erasure of data and software. All data and software must be removed. The most secure way to do this is by reformatting the hard disc and using the Secure erasure procedures described below, prior to reinstalling the original operating system and any bundled software that was originally provided with the system.

4 Under no account should any University-licensed software be distributed to a third party. When a computer is being scrapped: Equipment should be scrapped using the external disposal service coordinated by IT Services - see section on Disposal in an environmentallyfriendly manner below. This service provides for the secure destruction of equipment to a state where data recovery would be impossible, and provides the required records to the University in order to evidence the process. Prior removal of data and software is therefore not essential. Secure erasure of data/software from hard disks and other data storage media To ensure data are erased securely (i.e. cannot be recovered in whole or part using data recovery tools and techniques), all data areas on the disk/media must be overwritten. Re-formatting the hard disk/media is not sufficient for this. A specialised "disk wiping" utility to erase the entire contents of the disk must also be run. Where a computer is being re-used within the University, arrange for secure erasure of data and software, and configuration of the equipment for the new user by contacting the IT Services Helpdesk on helpdesk@bangor.ac.uk or ( ) IT Services will advise on appropriate processes for secure erasure of data/software on equipment destined for sale or donation, and plans to be able to offer this service. Where data storage media CDs/DVDs/Memory sticks/obsolete software disks are to be disposed of, they should be delivered to the IT Services helpdesk clearly marked For Secure Disposal 4. Sale to a member of the University or donation to an outside body Where equipment is being sold to a member of the University or donated for use by an outside body: Data and software must be removed from computers, as described in the preceding section. The equipment must be checked for health and safety the equipment must pass a visual safety check and PAT (Portable Appliance Test) test, both of which must de documented (see Updating Equipment Records) The value of the equipment to be sold should be calculated according to the following formula purchase price less 1/5 th of the purchase price multiplied by the age of the machine VAT must always be added (e.g. a 3 year old PC and screen costing 500 initially would be sold for 500- ( 100*3)= 200+VAT). The minimum sale value for a computer and screen in working order is considered to be 100. The asset disposal limits outlined in the University Financial Regulations should be adhered to

5 Donations must only be made to registered charities or community organisations such as schools, voluntary groups etc. The donation and recipient organisation must be approved by the college, school or department Care must be taken to ensure that the recipient is aware that the University makes no guarantee as to the safety, suitability or performance of this equipment and has no further responsibility towards the maintenance or upkeep of the equipment. The following form of words has been approved by the University Legal Advisor: Buyers are advised to inspect the goods in order to satisfy themselves, specifically with regard to safety and as to the fitness for purpose of the equipment. Whilst the Bangor University has made reasonable efforts to ensure the safety of the equipment, it makes no guarantee as to the safety, suitability or performance of this equipment and will accept no responsibility for injury, damage or loss relating to the supply or operation of the equipment, save for death or personal injury caused by negligence or for fraud. Where the item is sold, the sales invoice must specifically identify the equipment, for example, make, model and serial number. Further, credit should not be given before the equipment is removed, and the invoice should be paid before its removal and a signed collection receipt obtained from the buyer acknowledging that they have taken possession. Equipment records must be updated accordingly - see section on Updating equipment records below The Finance off can be contacted for for further advice on financial and legal matters pertaining to any sale. 5. Disposal in an environmentally-friendly manner Where equipment is to be disposed of and scrapped, the University is obliged to ensure this is done in a manner which complies with the EU Waste Electrical and Electronic Equipment (WEEE) Directive. The Directive aims to reduce the quantity of waste from electrical and electronic equipment and increase re-use, recovery and recycling. To arrange for disposal and scrapping of redundant equipment: For portable equipment (PDA s smartphones, laptops etc.) and portable data storage media (CDs/DVDs/memory sticks etc), hand-in to the IT Services Support Centre within Adeilad Deiniol For non-portable equipment (computers, servers etc.) ring or the IT Services Helpdesk IT Services will inspect equipment, re-use any appropriate equipment, and arrange collection and disposal of remaining equipment through the University s approved disposal contract.

6 6. Compliance The University has significant obligations in respect to disposal and re-use of IT equipment, under Confidentiality Agreements, Third Party Contracts, the Data Protection Policy and software licensing conditions. Failure to comply with this policy will be referred through the University disciplinary process. 7. Updating equipment records In all cases, details of the transfer or disposal of the equipment must be recorded. This should be done in the appropriate Equipment Database or Inventory, maintained by the organisational unit within the University to which the equipment belongs. These details should include: reason for transfer/disposal, to whom ownership has been transferred/sold or to whom equipment has been passed for disposal, the sales invoice, the date of transfer/disposal, and health and safety checks as per this policy. 8. Acknowledgements Bangor University wishes to acknowledge and thank the University of Aberdeen for allowing the University of Aberdeen guidelines on the Disposal of Computing and IT Equipment to be used and modified to form this policy for Bangor University.

Grasmere Primary School Asset Management Policy

Grasmere Primary School Asset Management Policy Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the

More information

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: info@it-trading.co.uk

More information

How To Manage A University Computer System

How To Manage A University Computer System PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management

More information

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the

More information

Asset Replacement Strategy and Procedure Draft

Asset Replacement Strategy and Procedure Draft Asset Replacement Strategy and Procedure Draft 1 Introduction Academies are required to establish systems of control to ensure that assets and resources used by the academy are recorded and adequately

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

Data Security Policy

Data Security Policy Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:

More information

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,

More information

IT06 - Information Technology (IT) Hardware and Software Policy

IT06 - Information Technology (IT) Hardware and Software Policy IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your

More information

University for the Creative Arts. Mobile Working and Remote Access Policy

University for the Creative Arts. Mobile Working and Remote Access Policy Mobile Working and Remote Access Policy Version 1.0 Date: 20 July 2009 Document History Version History 1.0 20 July 2009 Approved for publication by the IS Board after E&FC approval in June 2009 Title:

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files. Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely

More information

Enterprise Information Security Procedures

Enterprise Information Security Procedures GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3

More information

SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES

SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES 1 1 Definitions In these conditions:- We means Scotland s Commissioner for Children and Young People,

More information

Other terms are defined in the Providence Privacy and Security Glossary

Other terms are defined in the Providence Privacy and Security Glossary Subject: Device and Media Controls Department: Enterprise Security Executive Sponsor: EVP/COO Approved by: Rod Hochman, MD - President/CEO Policy Number: New Date: Revised 10/11/2013 Reviewed Policy Owner:

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:

More information

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

Data Compliance. And. Your Obligations

Data Compliance. And. Your Obligations Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:

More information

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc.

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc. DCAG Data Center Assistance Group, Inc. Revision Date: 5/20/2013 Asset Management Redeployment And Termination Services A Service Offering From Data Center Assistance Group, Inc. (DCAG) Prepared by: Thomas

More information

The Manchester College

The Manchester College The Manchester College The Manchester College Produced by TMC Prin DataProtect pol v1 11/2010 All rights reserved; no part of this publication may be photocopied, recorded or otherwise reproduced, stored

More information

Information Technology Policy and Procedures

Information Technology Policy and Procedures Information Technology Policy and Procedures Responsible Officer Author Ben Bennett, Business Planning & Resources Director Policy Development Group Date effective from April 2005 Date last amended February

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy

More information

University of Limerick Data Protection Compliance Regulations June 2015

University of Limerick Data Protection Compliance Regulations June 2015 University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

Guidance on Personal Data Erasure and Anonymisation 1

Guidance on Personal Data Erasure and Anonymisation 1 Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data

More information

Research Governance Standard Operating Procedure

Research Governance Standard Operating Procedure Research Governance Standard Operating Procedure The Management and Use of Research Participant Data for Secondary Research Purposes SOP Reference: Version Number: 01 Date: 28/02/2014 Effective Date: Review

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

Research Data Management Procedures

Research Data Management Procedures Research Data Management Procedures pro-123 To be read in conjunction with: Research Data Management Policy Version: 2.00 Last amendment: Oct 2014 Next Review: Oct 2016 Approved By: Academic Board Date:

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Data Protection and Privacy Policy

Data Protection and Privacy Policy Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.

More information

John Leggott College. Data Protection Policy. Introduction

John Leggott College. Data Protection Policy. Introduction John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1.

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1. Data Security Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2011 Owner Secure Research Database Analyst Change History

More information

Dell Service Description

Dell Service Description Dell Service Description IT Asset Donation - EMEA Introduction Dell is pleased to provide Asset Resale and Recycling Services (the Service(s) ) in accordance with this service description (the Service

More information

Acceptable Use of Information and Communication Systems Policy

Acceptable Use of Information and Communication Systems Policy Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help

More information

McGill University IT Asset Management Regulation

McGill University IT Asset Management Regulation Publication Date May 8, 2015 Revision V 1.1 McGill University IT Asset Management Regulation OVERVIEW McGill University seeks to provide its community with the necessary IT equipment, infrastructures and

More information

PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)

PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy) PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard

More information

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either:

2.2 If employees or Board Members wish to use mobile telephones or data devices provided by the Group for personal use they may opt to either: POLICY Use of Electronic Communication Systems Date: July 2011 1. Policy Statement 1.1 This policy aims to inform staff of The Housing Plus Group s views on use of its telephone systems, mobile phones,

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

Data Protection Policy

Data Protection Policy 1 Data Protection Policy Version 1: June 2014 1 2 Contents 1. Introduction 3 2. Policy Statement 3 3. Purpose of the Data Protection Act 1998 3 4. The principles of the Data Protection Act 1998 4 5 The

More information

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE

PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE ADOPTED ON 9 th January 2008 TABLE OF CONTENTS Page No. 1 Introduction...3 2 Glossary...3 3 Types of Personal Data held by Us...3 4 Obligations

More information

HERTSMERE BOROUGH COUNCIL

HERTSMERE BOROUGH COUNCIL HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act

More information

Guidelines on Digital Forensic Procedures for OLAF Staff

Guidelines on Digital Forensic Procedures for OLAF Staff Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to

More information

Disposal of Assets Policy

Disposal of Assets Policy Flinders Campus Community Services Disposal of Assets Policy First Approved by Board: December 2008 Meeting 6/08 Date last amendment: Contact person: Finance Manager 1. Introduction Flinders Campus Community

More information

Guidelines for Disposal of Goods & Equipment

Guidelines for Disposal of Goods & Equipment Guidelines for Disposal of Goods & Equipment Public Procurement Board Accra, Ghana Preface Procurement and disposal of goods and equipment by Procurement Entities under projects financed from the Public

More information

IT asset disposal for organisations

IT asset disposal for organisations ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk

More information

PROCEDURE FOR THE CONDEMNING & DISPOSAL OF EQUIPMENT

PROCEDURE FOR THE CONDEMNING & DISPOSAL OF EQUIPMENT Policy Document Control Page Title Title: Version: Reference Number: PROCEDURE FOR THE CONDEMNING & DISPOSAL OF EQUIPMENT V2 CO76 Keywords: (please enter tags/words that are associated to this policy)

More information

Data protection policy

Data protection policy Data protection policy Introduction The College is required to keep certain information about employees, students and other users to allow it to monitor performance, achievements, health and safety, recruitment

More information

Information Governance Policy

Information Governance Policy Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its

More information

Guidelines on Data Protection. Draft. Version 3.1. Published by

Guidelines on Data Protection. Draft. Version 3.1. Published by Guidelines on Data Protection Draft Version 3.1 Published by National Information Technology Development Agency (NITDA) September 2013 Table of Contents Section One... 2 1.1 Preamble... 2 1.2 Authority...

More information

Index. Definitions. What is Data Protection? Rights of Individuals. The 8 Principles of Data Protection

Index. Definitions. What is Data Protection? Rights of Individuals. The 8 Principles of Data Protection Data Protection Awareness Based on DIT s Data Protection Policy, the Data Protection Acts, 1988 & 2003 and guidance from the Office of the Data Protection Commissioner Index Definitions What is Data Protection?

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Data Protection Policy

Data Protection Policy Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and

More information

Data protection policy

Data protection policy Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data

More information

ATMD Bird & Bird. Singapore Personal Data Protection Policy

ATMD Bird & Bird. Singapore Personal Data Protection Policy ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1. Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage

More information

Harbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2008

Harbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2008 Document version: 2.8 Issued to: Harbinger Escrow Services Issued by: Harbinger Group Pty Limited Delivered on: 18 March 2008 Harbinger Group Pty Limited, Commercial in Confidence Table of Contents 1 Introduction...

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing

More information

Management of the Fixed Assets of ECHA

Management of the Fixed Assets of ECHA 1. Purpose This document outlines the provisions to manage the Agency s fixed assets system that includes - the fixed asset accounting system for the recording and reporting monetary amounts associated

More information

Policy and Procedure Title: Maintaining Secure Learner Records Policy No: CCTP1001 Version: 1.0

Policy and Procedure Title: Maintaining Secure Learner Records Policy No: CCTP1001 Version: 1.0 PROVIDER NAME: POLICY AREA: College of Computing Technology (CCT) Standard 10: Information Management, Student Information System & Data Protection Policy and Procedure Title: Maintaining Secure Learner

More information

GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4

GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 PREFACE The following provides general guidance on data protection

More information

The Manitowoc Company, Inc.

The Manitowoc Company, Inc. The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational

More information

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:

More information

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning

More information

EMMANUEL COLLEGE THE APPLICATION OF THE DATA PROTECTION ACT 1998. Contents

EMMANUEL COLLEGE THE APPLICATION OF THE DATA PROTECTION ACT 1998. Contents EMMANUEL COLLEGE THE APPLICATION OF THE DATA PROTECTION ACT 1998 Contents 1. Introduction Page 2 2. The Data Protection Act 1998 Page 2 3. Review of data used in College departments Page 3 4. Security

More information

Administrative Procedure

Administrative Procedure Administrative Procedure Number: 707 Effective: 5/13/2011 Supersedes: INTERIM Page: 1 of 11 Subject: RECORDS RETENTION, MANAGEMENT, AND DISPOSITION PROGRAM 1.0. PURPOSE: 1.1. To establish and administer

More information

WHO SHOULD READ THIS POLICY

WHO SHOULD READ THIS POLICY NEW YORK UNIVERSITY Asset Management Policies & Procedures (October, 2010) POLICY STATEMENT New York University requires every school, department, or unit to acquire, record, inventory, and dispose of

More information

CITY UNIVERSITY OF HONG KONG. Information Classification and

CITY UNIVERSITY OF HONG KONG. Information Classification and CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification

More information

Information Security Plan effective March 1, 2010

Information Security Plan effective March 1, 2010 Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

SJSU Electronic Data Disposition Standard

SJSU Electronic Data Disposition Standard SJSU Electronic Data Disposition Standard Page 1 Executive Summary University data is at risk as long as it is persistently stored on electronic media. This means that data must be properly cared for during

More information

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.

More information

IT Data Security Policy

IT Data Security Policy IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...

More information

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity Career Connection, Inc. Data Privacy Objectives This course is intended for CCI employees. The course gives guidance on data privacy concepts and describes how data privacy is relevant when delivering

More information

Encryption Policy Version 3.0

Encryption Policy Version 3.0 Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

How To Protect Your Personal Information At A College

How To Protect Your Personal Information At A College Data Protection Policy Policy Details Produced by Assistant Principal Information Systems Date produced Approved by Senior Leadership Team (SLT) Date approved July 2011 Linked Policies and Freedom of Information

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Investigation Report. 2006-048 Loss of custody of 41 computer data tapes containing personal and sensitive information

Investigation Report. 2006-048 Loss of custody of 41 computer data tapes containing personal and sensitive information Investigation Report 2006-048 Loss of custody of 41 computer data tapes containing personal and sensitive information Introduction/Purpose of Report On March 3, 2006 the Chief Information Officer, (CIO)

More information

E-SAFETY POLICY 2014/15 Including:

E-SAFETY POLICY 2014/15 Including: E-SAFETY POLICY 2014/15 Including: Staff ICT policy (Corporation approved) Data protection policy (Corporation approved) Staff guidelines for Data protection Data Security, awareness raising Acceptable

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1 Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees

More information

CORK INSTITUTE OF TECHNOLOGY

CORK INSTITUTE OF TECHNOLOGY CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of

More information

Processing Value Added Tax (Schools)

Processing Value Added Tax (Schools) Processing Value Added Tax (Schools) June 2015 Issued by the Chief Accountant s Team. For any queries on these procedures please email financetrainingteam@kent.gov.uk Processing Value Added Tax (VAT) Introduction

More information