Policy on Business Continuity
|
|
- Maximillian Dickerson
- 8 years ago
- Views:
Transcription
1 Status: Approved Custodian: Executive Office Date approved: Implementation date: Decision number: SAQA 07102/13 Due for review: File Number:
2 Table of contents 1 Preamble Purpose Ownership Scope of Practice Related Procedure: Type of Policy Definitions Responsibilities
3 1 Preamble The South African Qualifications Authority (SAQA) recognises the importance of comprehensive Business Continuity Planning so that SAQA can continue to operate, to some extent, during and after a disaster, to ensure the continued availability of employment of its employees and services for those we serve. 2 Purpose The purpose of the Business Continuity Policy is to have a plan in place to ensure the effective availability of essential information, products and services, to protect SAQA from, or minimise the impact of a disaster. 3 Ownership The Executive Office is the custodian of this Policy. 4 Scope of Practice 4.1 The Policy applies to all the key business processes of SAQA. All employees of SAQA will be bound by the Policy. Contractors and employees who are or may be in a position to affect the business processes or services of SAQA shall be required to acknowledge their acceptance of all or relevant sections of the Policy. 4.2 The Policy sets out the responsibilities of SAQA employees. It does not create any basis for one employee to become legally liable to another. 5 Related Policies and Procedures: The following policies and procedures relate to this Policy: 5.1 Policy on Information Security 5.2 Disaster Recovery Plan 5.3 Information Technology Disaster Recovery Plan 5.4 SAQA Procedure on Emergency Evacuation 6 Type of Policy This Policy is of strategic nature 7 Definitions None. 3
4 8 8.1 It is the policy of SAQA that a comprehensive Business Continuity Plan (BCP) is developed and maintained on an annual basis, to ensure that essential services and business can continue after a disaster. 8.2 The successful implementation of the Policy on Business Continuity (hereafter the Policy ) cannot be achieved without the cooperation of all directorates. It is crucial, therefore, that all are aware of, and fully comply with the general requirements outlined in the Policy and also those specific to their office and function. This includes existing policies such as the Policy on Information Security. 8.3 When implemented, the BCP should include those procedures and support agreements which ensure on-time availability and delivery of SAQA's required information and services. 8.4 Each directorate in SAQA is responsible for current and comprehensive Business Continuity Planning, which includes the regular (at least twice per year) updating of procedures and monthly updating of all contact details or as changes occur. 8.5 The BCP must be tested at least annually (in accordance with paragraph 9.2 below) in a simulated environment to ensure that it can be implemented in emergency situations and that the management and staff understand how it is to be executed. 8.6 All staff must be made aware of the BCP and their own respective roles. It is each Director s responsibility to make sure that staff knows about the policy. 9 Responsibilities 9.1 Executive Office The Deputy Chief Executive Officer is responsible for: Managing the Policy and granting sanction for specific and necessary deviation from the Policy. Facilitating a review, before the end of October every year, by the Executive Management Team, of the overall BCP as well as Directorates Business Continuity Plans. Ensuring the implementation of the Policy and its consequential procedures, including its associated administrative and monitoring procedures 4
5 9.2 Directorate: Information Technology The responsibilities of the IT Directorate will include: To advise the Executive Management Committee on the sufficiency and effectiveness of its Policy on Business Continuity and drafting any necessary amendments for the Executive Management Committee. To ensure adherence to the SAQA Disaster Recovery Plan as laid down by the Policy on Information Security. To ensure that an up-to-date copy of SAQA's BCP is stored safely at an off-site location To schedule, before the end of December each year, a test of the BCP and to report on the outcomes of the test to the following I & IT Steering Committee Meeting. 9.3 Directors 9.4 Staff It is a collective responsibility of Directors to implement the Policy within the operational procedures of their areas. Directors are responsible for ensuring that the Business Continuity Plan of their Directorate is kept up to date on an annual basis. Staff complement details are updated as changes occur. Directors are responsible to ensure that their staff are aware of the Business Continuity Policy and Plan, and how it relates to the operations of their Directorate. Directors are responsible for initiating any disciplinary measures against employees who fail to comply with the Policy. Each employee must be aware of the Policy. Each employee must understand and comply with the Policy. Each employee must be aware of his or her role and responsibilities as stipulated in the BCP. 9.5 Disciplinary procedure Any breach of the Policy or associated policies may result in SAQA taking disciplinary action against an employee. Details of the disciplinary process are in line with the Disciplinary Procure, and can be obtained from the Directorate: Human Resources. 5
BUSINESS CONTINUITY MANAGEMENT POLICY. October 2012
BUSINESS CONTINUITY MANAGEMENT POLICY October 2012 1 Policy Statement 1.1 PHSO s Business Continuity Management (BCM) arrangements aim to provide a mechanism for ensuring that any incidents affecting the
More informationAGRICULTURAL TRAINING INSTITUTES MODERATION AND PROCEDURE POLICY DIRECTORATE: SECTORAL COLLEGES
AGRICULTURAL TRAINING INSTITUTES MODERATION AND PROCEDURE POLICY DIRECTORATE: SECTORAL COLLEGES DRAFT: August 2012 1 TABLE OF CONTENTS 1. Preamble 3 2. Abbreviations 3 3 Principles 3 4. Moderators 4 5.
More informationin particular, those published by the University of Adelaide and the Queensland University of Technology,
The Australian College of Physical Education Policy Document ACPE Copyright Policy 1 Preamble The Copyright Act 1968 (Cth), and subsequent amendments, grants exclusive rights to copyright owners to use
More informationNHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
More informationICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS)
ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS) TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIMS OF THE POLICY...
More informationBusiness Continuity Policy and Business Continuity Management System
Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain
More informationInformation security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
More informationREMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
More informationHIPAA Privacy Rule Policies
DRAFT - Policies and Procedures PRIVACY OFFICE ASSIGNMENT AND RESPONSIBILITIES APPROVED BY: SUPERCEDES POLICY: Policy #1 ADOPTED: REVISED: REVIEWED: Purpose This policy is designed to assure the establishment
More informationDublin City University
Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset
More informationADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities
Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:
More informationCouncil Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
More informationInformation Security Policy. Chapter 11. Business Continuity
Information Security Policy Chapter 11 Business Continuity Author: Policy & Strategy Team Version: 0.5 Date: July 2008 Version 0.5 Page 1 of 6 Document Control Information Document ID Document title Sefton
More informationOFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
More informationinformation Records Management Checklist business people security preservation accountability Foreword Introduction Purpose of the checklist
Records Management Checklist Foreword We fi rst developed the Records Management Checklist in 2008 to complement our performance audit Records Management in the Victorian Public Sector. At that time the
More informationInformation Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
More informationInformation Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
More informationcommittee report Review of Discipline, Grievance and Bullying and Harassment Policies and Procedures
committee report Review of Discipline, Grievance and Bullying and Harassment Policies and Procedures Committee Personnel Date of Meeting 11 February 2011 Date of report 2 February 2011 Report by Assistant
More informationRecords Management Policy
Records Management Policy Policy Reference Number Responsible Department Related Policies 34CP Corporate & Community Services Code of Conduct for Elected Members, Code of Conduct for Employees, Internet,
More informationPUBLIC FINANCE MANAGEMENT ACT
LAWS OF KENYA PUBLIC FINANCE MANAGEMENT ACT CHAPTER 412C Revised Edition 2014 [2013] Published by the National Council for Law Reporting with the Authority of the Attorney-General www.kenyalaw.org [Rev.
More informationState Records Guideline No 25. Managing Information Risk
State Records Guideline No 25 Managing Information Risk Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 4 2 Risk Management and Information... 5 2.1 Overview... 5 2.2 Risk management...
More informationHead of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
More informationPROCUREMENT MANAGER Support Services. Salary range 30,843 to 33,315 (Subject to Job Evaluation)
PROCUREMENT MANAGER Support Services Salary range 30,843 to 33,315 (Subject to Job Evaluation) We are looking to appoint an innovative Procurement Manager to advise and support client departments and identify
More informationPolicy on Succession Planning
Status: Approved Custodian: Human Resources Directorate Date Approved: 2013-07-17 Decision number: SAQA 14100/13 Implementation date: 2013-07-18 Due for review: 2016-07-16 File number Page 1 of 6 Contents
More informationState Medicaid HIT Plan RFP #20100308. Responses to Submitted Questions. Section 1.1 of the RFP states in part the following.
State Medicaid HIT Plan RFP #20100308 Responses to Submitted Questions Question # RFP Section # RFP Page # Question Response Section 1.1 of the RFP states in part the following. 1 1.1 5 "This Request for
More informationLord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000
Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under
More informationPresented by Vuyelwa Toni Penxa, Samuel Isaacs, Joe Samuels and Mark Albertyn
Presented by Vuyelwa Toni Penxa, Samuel Isaacs, Joe Samuels and Mark Albertyn 1 Positioning The NQF And SAQA Change and Corporate Governance Annual Financial Report Continuity Matters raised previously
More informationHertsmere Borough Council. Data Quality Strategy. December 2009 1
Hertsmere Borough Council Data Quality Strategy December 2009 1 INTRODUCTION Public services need reliable, accurate and timely information with which to manage services, inform users and account for performance.
More informationFINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation
Facilitate Business Continuity Planning and disaster recovery for a Overview This unit is suitable for those working in risk management roles who have responsibility for facilitating business continuity
More informationBusiness Continuity Planning and Disaster Recovery Planning
4 Business Continuity Planning and Disaster Recovery Planning Basic Concepts 1. Business Continuity Management: Business Continuity means maintaining the uninterrupted availability of all key business
More informationUniversity Executive Committee. IT Steering Group. IT Back-up and Recovery Policy (Data)
University Executive Committee IT Steering Group IT Back-up and Recovery Policy (Data) Background In March 2007 the Audit Committee received an IT Position Audit report from the Business Assurance Service
More informationGENERAL CONDITIONS OF THE FEDERAL DEPARTMENT OF FOREIGN AFFAIRS FOR LOCAL MANDATES
Annex 3 GENERAL CONDITIONS OF THE FEDERAL DEPARTMENT OF FOREIGN AFFAIRS FOR LOCAL MANDATES 1. Phase Prior to Contract Conclusion 1.1. Up to the conclusion of the contract, withdrawal from the negotiations
More informationPrivacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
More informationLINCOLNSHIRE POLICE Policy Document
LINCOLNSHIRE POLICE Policy Document Code of Ethics All staff involved in carrying out functions under any force policy and associated procedures and appendices will do so in accordance with the principles
More informationCOUNCIL POLICY R180 RECORDS MANAGEMENT
1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.
More informationAgreements & Contracts: Bank to Bank Transfers User Agreement July 2012
Agreements & Contracts: Bank to Bank Transfers User Agreement July 2012 FRED HABERBERGER CHIEF INFORMATION OFFICER 207.858.2503 FHABERBERGER@SKOWSAVINGS.COM TABLE OF CONTENTS APPROVAL HISTORY... 3 REVISION
More informationHow To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
More informationOVERSTRAND MUNICIPALITY
C 3 / 001 OVERSTRAND MUNICIPALITY CONTRACT MANAGEMENT POLICY Approved by Council 28 May 2015 Implementation date: 1 July 2015 TABLE OF CONTENTS C 3 / 002 1. PRE-AMBLE 2 2. DEFINITIONS 3 3. ABBREVIATIONS
More informationDHHIT Network Security Standards and Procedures
DHHIT Network Security Standards and Procedures Contents 1. Introduction 2 2. Scope 2 3. Definitions 2 4 Employment practices 2 5 Employee responsibility 3 6 Physical security 3 7 Network and Systems Security
More informationInformation Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
More informationPost-Recognition Monitoring Report
Post-Recognition Monitoring Report Ascentis September 2010 Ofqual/11/4813 Contents Introduction... 3 Regulating qualifications... 3 Banked documents... 3 About this report... 4 About Ascentis... 5 Management
More informationUMHLABUYALINGANA MUNICIPALITY
UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of
More informationResponse to Questions regarding The City of Memphis Disaster Preparedness & Recovery Plan:
Response to Questions regarding The City of Memphis Disaster Preparedness & Recovery Plan: 1. Q. We did not find a required project completion date in the RFP. Since the plan to be developed is for 2014,
More informationINFORMATION GOVERNANCE STRATEGY NO.CG02
INFORMATION GOVERNANCE STRATEGY NO.CG02 Applies to: All NHS LA employees, Non-Executive Directors, secondees and consultants, and/or any other parties who will carry out duties on behalf of the NHS LA.
More informationF I N A N C I A L R E G U L A T I O N S
F I N A N C I A L R E G U L A T I O N S South Downs National Park Authority March 2014 Page 0 of 17 F I N A N C I A L R E G U L A T I O N S Contents Page 1 INTRODUCTION Purpose of Financial Regulations
More informationRecords Management plan
Records Management plan Prepared for 31 October 2013 Audit Scotland is a statutory body set up in April 2000 under the Finance and Accountability (Scotland) Act 2000. We help the Auditor General for Scotland
More informationINTERNATIONAL SOS. Data Retention, Archiving and Destruction Policy. Version 1.07
INTERNATIONAL SOS Data Retention, Archiving and Destruction Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: January 2009 Revised: 2015 All copyright in these materials
More informationGuidance Note XGN XXX.1
Guidance Note XGN XXX.1 Risk Assessment and Business Continuity Planning 1. This Guidance Note provides further detail on matters institutions should consider in assessing disruption scenarios and certain
More informationWATERBERG DISTRICT MUNICIPALITY
WATERBERG DISTRICT MUNICIPALITY CREDIT CONTROL & DEBT COLLECTION POLICY Reviewed WATERBERG DISTRICT MUNICIPALITY PREVIOUSLY APPROVED BY COUNCIL ON 29 JUNE 2010 DEBT COLLECTION & CREDIT CONTROL POLICY Preamble
More informationSALISBURY NHS FOUNDATIONTRUST
SALISBURY NHS FOUNDATIONTRUST PAPER SHC 1738 TITLE Information Governance Policy PURPOSE OF PAPER The Information Governance Policy was first approved in April 2005. It is currently due for review to ensure
More informationCONTRACT MANAGEMENT POLICY POLICY ADOPTED BY COUNCIL ON???? AT ITEM C.????
CONTRACT MANAGEMENT POLICY POLICY ADOPTED BY COUNCIL ON???? AT ITEM C.???? 1 1. PRE-AMBLE All transactions undertaken by the Cape Winelands District Municipality involves a contract whether explicitly
More informationUniversity of Brighton School and Departmental Information Security Policy
University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives
More informationEncryption Security Standard
Virginia Commonwealth University Information Security Standard Title: Encryption Security Standard Scope: Approval February 22, 2012 This document provides the encryption requirements for all data generated,
More informationInformation Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
More informationInformation Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
More informationwww.complianceriskmanagement.intranet
www.complianceriskmanagement.intranet ING Groep N.V., 2010 This document may not be distributed outside ING in any way without prior written consent of the ING Corporate Compliance Risk Management department.
More informationSignificant Revisions to OMB Circular A-127. Section Revision to A-127 Purpose of Revision Section 1. Purpose
Significant Revisions to OMB Circular A-127 Section Revision to A-127 Purpose of Revision Section 1. Purpose Section 5. Definitions Section 6. Policy Section 7. Service Provider Requirements Section 8.
More informationEXPLANATORY NOTES TO REVISED PROPOSED AMENDMENTS CONCERNING MORTGAGE INVESTMENT CORPORATIONS AND INVESTMENT CORPORATIONS
EXPLANATORY NOTES TO REVISED PROPOSED AMENDMENTS CONCERNING MORTGAGE INVESTMENT CORPORATIONS AND INVESTMENT CORPORATIONS Clause 1 Mortgage Investment Corporations Subclause 1(1) Definition of Mortgage
More informationMerthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
More informationCCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
More informationRecords Management Checklist. preservation. accountability. information. security. peoplep. A tool to improve records management
Records Management Checklist preservation accountability information security busine ess peoplep A tool to improve records management preservation people security business Foreword accountability information
More information3. Strategic Community Plan Approach. 4. Legislative Requirements and Corporate Policy Context
Co r p o r a t e Cr ed it Ca r d P o lic y Classification: Policy Name: First Issued / Approved: Last Reviewed: Council Policy Corporate Credit Card Policy 11 August 2015, C10311 11 August 2015, C10311
More informationPre-award monitoring. Off-site monitoring.
CPM 304 1 of 5 CONTRACT INTRODUCTION Contract monitoring is a review process used to determine a contractor s compliance with state and federal regulations, the terms of the agreement, and expected results
More informationIT Charter and IT Governance Framework
IT Charter and IT Governance Framework Status: Custodian: Approved Director: Information Technology Date approved: 2013-12-04 Implementation date: 2013-12-05 Decision number: SAQA 02102/13 Due for review:
More informationIM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
More informationCorporation tax: research and development tax credits: consumables
Corporation tax: research and development tax credits: consumables Who is likely to be affected? Companies carrying out research and development (R&D) activities. General description of the measure The
More informationACCOUNTING STANDARDS BOARD DIRECTIVE 10 APPLICATION OF THE STANDARDS OF GRAP BY PUBLIC FURTHER EDUCATION AND TRAINING COLLEGES
ACCOUNTING STANDARDS BOARD DIRECTIVE 10 APPLICATION OF THE STANDARDS OF GRAP BY PUBLIC FURTHER EDUCATION AND TRAINING COLLEGES Issued by the Accounting Standards Board March 2014 Directive 10 Copyright
More informationPearson Vocational Centre Detail Change Request Form (United Kingdom and the Republic of Ireland)
Pearson Vocational Centre Detail Change Request Form (United Kingdom and the Republic of Ireland) This form should only be completed electronically. This form is only to be used by centres that are currently
More informationCredit Card Policy and Procedure
Kingston District Council FA015 Credit Card Policy and Procedure Keywords: Reference Number: FA015 Strategic Plan: Classification: Finance & Administration Policy and Procedure First Issued/Approved: 18
More informationPublic Records (Scotland) Act 2011. Healthcare Improvement Scotland and Scottish Health Council Assessment Report
Public Records (Scotland) Act 2011 Healthcare Improvement Scotland and Scottish Health Council Assessment Report The Keeper of the Records of Scotland 30 October 2015 Contents 1. Public Records (Scotland)
More informationCOMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance
Back-up Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Back Up Policy Version Date 10/10/12 Effective
More informationHow To Manage A Disruption Event
BUSINESS CONTINUITY FRAMEWORK DOCUMENT INFORMATION DOCUMENT TYPE: DOCUMENT STATUS: POLICY OWNER POSITION: INTERNAL COMMITTEE ENDORSEMENT: APPROVED BY: Strategic document Approved Manager Organisational
More informationThe Importance of Organizing Your SJSU Information Assets
Standard: Asset Control Page 1 Executive Summary The Asset Control Standard defines the requirements for controlling and ensuring all SJSU computing hardware, software, and confidential assets are identified,
More informationNATIONAL TREASURY Republic of South Africa December 2003
NATIONAL TREASURY Republic of South Africa December 2003 REGULATIONS IN TERMS OF THE PUBLIC FINANCE MANAGEMENT ACT, 1999: FRAMEWORK FOR SUPPLY CHAIN MANAGEMENT AS PUBLISHED IN GAZETTE NO. 25767 DATED 5
More informationGUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK
GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK This Guideline does not purport to be a definitive guide, but is instead a non-exhaustive
More informationPrivate Health Insurance Amendment (Lifetime Health Cover Loading and Other Measures) Act 2013
Private Health Insurance Amendment (Lifetime Health Cover Loading and Other Measures) Act 2013 No. 105, 2013 An Act to amend the law relating to private health insurance, and for related purposes Note:
More informationRULES AND REGULATIONS. of the UNION SPORTIVE INTERNATIONALE DES POLICES ( USIP )
UNION SPORTIVE INTERNATIONALE DES POLICES المكتب الرئاسي لإلتحاد الدولي الرياضي للشرطة INTERNATIONAL POLICE SPORT UNION RECONNUE PARLE COMITE INTERNATIONAL OLYMPIQUE LE 15 JUNE 1995 RULES AND REGULATIONS
More informationNHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
More informationINFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
More informationInformation Security Policy. Information Security Policy. Working Together. May 2012. Borders College 19/10/12. Uncontrolled Copy
Working Together Information Security Policy Information Security Policy May 2012 Borders College 19/10/12 1 Working Together Information Security Policy 1. Introduction Borders College recognises that
More informationInsider Trading Policy
Insider Trading Policy Yancoal Australia Limited ACN 111 859 119 Approved 26 June 2012 Policy 1 Objective The purpose of this Policy is to incorporate into Yancoal s policies a prohibition of the types
More informationwww.portsmouth.gov.uk Part 3D - Officers' Employment Procedure Rules 1
Part 3D - Officers' Employment Procedure Rules 1 These rules determine procedures to be followed in the recruitment of senior officers of the council and in any disciplinary action which may become necessary
More information2.1 notes the statistics and information contained within this report;
DUNDEE CITY COUNCIL REPORT TO: Personnel Committee - 15 August 2005 REPORT ON: REPORT BY: Sickness Absence Management Assistant Chief Executive (Management) REPORT NO: 485-2005 1 PURPOSE OF REPORT 1.1
More informationPolicy and Procedure for approving, monitoring and reviewing personal data processing agreements
Policy and Procedure for approving, monitoring and reviewing personal data processing agreements 1 Personal data processing by external suppliers, contractors, agents and partners Policy and Procedure
More informationSchedule 13 - NHS Counter Fraud and Security
1. In this Schedule 13: Schedule 13 - NHS Counter Fraud and Security 1.1 CFSMS means the Special Health Authority established by the Counter Fraud and Security Management Service (Establishment and Constitution
More informationPORT SAFETY PLAN GUIDELINES
Schedule PORT SAFETY PLAN GUIDELINES 1 July 2015 Version 1.0 1 PREAMBLE... 3 1.1 Title... 3 1.2 Authority... 3 1.3 Application... 3 1.4 Applicable Legislation... 3 1.5 Applicable Standards... 3 1.6 Relevant
More informationInformation Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
More informationBusiness Continuity (Policy & Procedure)
Business Continuity (Policy & Procedure) Publication Scheme Y/N Can be published on Force Website Department of Origin Force Operations Policy Holder Ch Supt Head of Force Ops Author Business Continuity
More informationGuideline for Roles & Responsibilities in Information Asset Management
ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009
More informationBusiness Continuity Management
Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective
More informationBank of Papua New Guinea Prudential Standard BPS251: Business Continuity Management
Bank of Papua New Guinea Prudential Standard BPS251: Business Continuity Management Issued under Section 27 of the Banks and Financial Institutions Act 2000 Overview and Key Requirements Business Continuity
More informationOne Managed Investment Funds Limited. Adopted by the Board on 22 August 2014
One Managed Investment Funds Limited Policy Name: Securities Trading Policy Adopted by the Board on 22 August 2014 1. Introduction The One Investment Group and its controlled entities, hereafter OIG, including
More informationInternational Paralympic Committee Medical Code. December 2011
International Paralympic Committee Medical Code December 2011 This version of the IPC Medical Code has been approved by the IPC General Assembly December 2011. IPC Medical Code 1 Preamble 1. The Paralympic
More informationBusiness Continuity and Disaster Recovery Policy
Maine State Government Dept. of Administrative & Financial Services Office of Information Technology (OIT) Business Continuity and Disaster Recovery Policy I. Statement The Office of Information Technology
More informationPolicy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
More informationVersion No: 2 Date: 27 July 2015. Data Quality Policy. Assistant Chief Executive. Planning & Performance. Data Quality Policy
Version No: 2 Date: 27 July 2015 Data Quality Policy Assistant Chief Executive Planning & Performance Data Quality Policy Contents 1. Summary Statement 2. Context 3. Purpose 4. Scope 5. Detail of the policy
More informationBUSINESS CONTINUITY & STRATEGY POLICY
BUSINESS CONTINUITY & STRATEGY POLICY Authorship: Chris Wallace, Information Governance Manager Committee Approved: Quality and Clinical Governance Committee Approved date: 1 Feb 2014 Review Date: Jan
More informationRotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
More informationBOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy
BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy
More information