Ealing Council Corporate Information and Data Security Policy
|
|
|
- Thomas Phelps
- 9 years ago
- Views:
Transcription
1 Appendix 3 Ealing Council Corporate Information and Data Security Policy Classification: Internal Use Date Created: July 2008 Policy Ref: INFOSEC Author: Information & Data Management Owner: Business Services Group
2 Version Control Document Change Control Date Change Description Release Version 16/02/02 Initial document creation /07/08 Rewrite 2.02 Distribution This document has been distributed to: Name Title / Role Date of Issue Version Diane Malpass Head of Information & Data Management 28/07/ Clementine Knowledge Manager 28/07/ Adewumni Darren Bestley GIS Manager 28/07/ Paul Brill Process & Data Manager 28/07/ Mick Coppard Head of Strategy 28/07/ Mark Newton Head of Service Ealing 29/07/ Helen Harris Head of Legal Services 29/07/ Teresa Bengey Head of Audit & Investigation 29/07/ Jacqueline Wiltshire Director of Human Resources 29/07/ Anthony Kemp Director of Business Services Group 29/07/ CIDM Governance Board Diane Malpass Head of Corporate Information & Data Management (Chair CIDMGB) Mary Umrigar Social Services (Caldicot Guardian Member CIDMGB) Tim Moore Interim Head Client Management & Performance, Regeneration & Housing (Member CIDMGB) Nick Senior Business Manager, Legal & Democratic Services (Member CIDMGB) Polly Hicks Head of Improvement, Innovation and Information, Human Resources (core) (Member CIDMGB) Tim Yarnell Improvement Manager, Policy & Performance (Member CIDMGB) Alison Reynolds Interim Customer Services Director, Customer Services (Member CIDMGB) Polly Hicks Head of Improvement, Innovation and Information, Human Resources (core) (Member CIDMGB) Clementine Adewunmi Knowledge Manager, Information & Data Management Kastur Ashani Governance & Data Quality Manager Policy Approved By Title/Role Name Date approved Version Corporate Information & data Chair - see minutes of xx.xx Management Governance Board meeting Corporate Board Chief Executive see xx.xx minutes of meeting Cabinet Chair see minutes of meeting xx.xx I
3 Foreword In our business dealings with the Public, Partner Agencies and other organisations, we are entrusted with all types of information and data, from confidential to highly sensitive and personal information. The Council has a duty of care to ensure that the information and data it is entrusted with is responsibly maintained ensuring it is accurate, complete, relevant, kept up-to-date, reliable, authentic and stored extremely safely and securely. This policy also applies to the council s property portfolio and the physical security aspects associated with the effective management of buildings. The Government s agenda to transform the delivery and accessibility of public services by increasing the use of information and communications technology has created challenges for all local authorities in the way they manage, control and secure their information, data and associated information systems. Privacy legislation such as the Data Protection Act 1998, and the Human Right Acts 1998, are also fuelling demand for much improved information and data security practices. In recent months we have seen significant Information and data losses come to light that have encompassed both the public and the private sector. These losses have prompted Central Government to commission a number of reviews around Information and Data, the result, a plethora of information, recommendations, legislation and guidelines to review and consider how to implement. The Council places significant importance on the safety and security of information and data within its control and is currently building on its existing corporate Information and Data Management Policies and security aspects of its technical infrastructure, to ensure it keeps ahead of the rapid changes in today s age of progressive technology. The council s strategy for information and data security is standards based, working towards the implementation and accreditation with the International Standard for Information security known as ISO that provides a robust framework, which is measurable. We are currently developing an Information & Data Management Policy Framework to support ISO The Policy framework will provide the foundation, which we build on to meet our desired goal. This is the first policy to be developed within this framework. The Council welcomes and fully supports this policy, which places a responsibility and duty of care upon everyone who accesses, handles, stores, manipulates and processes data on behalf its behalf to ensure the responsible handling of the information and data they are entrusted with. Darra Singh, Chief Executive. II
4 1. Introduction Information, data and their processing systems are considered to be valuable assets of an organisation as they form the foundation upon which business decisions are made which leads to more efficient and effective service delivery, ultimately enhancing corporate performance. As the custodian of a large volume of information and data assets ranging from confidential to highly sensitive and personal information, the Council has a fundamental duty of care to protect them from unauthorised or accidental disclosure, unauthorised modification, loss, release or damage. The main objective of information and data security is to protect information and data assets from hazards and threats, as failure to do so could result in a loss of: o Confidentiality the accidental or unauthorised disclosure of information & data; o Integrity unauthorised modification or destruction of information and data; and o Availability the continuity of business processes and their recoverability in the event of a major disruption. The loss of confidentiality, integrity and availability (CIA), may in turn have an adverse impact on the efficiency of the Council s operations and ultimately, its reputation. Legislation, such as The Data Protection Act 1998 and The Freedom of Information Act 2000, are also key drivers in the protection of information and data assets, which places an obligation on the Council, to strike a balance between the perspectives of access and openness against their confidentiality, privacy and security. The Council s strategy to ensure the safe and secure management and handling of these extremely important assets is standards based. The Council has committed to the adoption, implementation and accreditation with the International Standard ISO for Information Security. ISO is achievable, measurable and demonstrable. The development of this policy supports ISO 27001; its implementation will lead to a robust corporate information and data management foundation and ICT infrastructure. The purpose of this high-level Information and Data Security Policy is to: Provide management direction and support for information and data security across the Council; Provide a robust, standards based framework for securing the information and data assets owned, leased or hired by the Council; Meet legislative and regulatory requirements (see appendix A); Clearly define the requirements for the use of information and data assets, ensuring that information assets are processed, handled and managed securely and accountability is evident; Identify the essential safeguards and controls that need to be put in place and provide adequate resources to minimise the risk of a security breach; Ensure the continuity of the Council and its services to its customers and business partners; Ensure that the principles of information and data security are consistently and effectively applied during the planning and development of Council activities; and Inform all people and businesses who have access to Council information and data assets of their responsibilities and obligations with respect to security and safe keeping of them. 1
5 Scope This policy applies to: All users of Council information, data, information systems and the council s property portfolio (its physical buildings), including service providers and consultants and encompasses data, information, software, systems, paper documents and personnel (see Appendix B). Policy Statement The Council will establish and maintain an information and data security management framework that will incorporate policies, procedures and processes to include organisational, technical and operational safeguards in order to preserve the CIA of its information and data assets aligning them with the international standard for Information Security Management, ISO The following measures will be implemented to support this policy. Where specific supporting information security policies are referenced within this policy, these documents will form part of the Corporate Information and Data Security Policy and are given equal significance: Organisational security A consolidated information and data and ICT strategy has been developed which promotes the implementation of a standards based approach to information and data security ISO Information security management. A corporate information and data management governance board will be established; membership will include a senior manager representative from each directorate to ensure communication, collaboration and cooperation with corporate colleagues. (See Appendix C); An independent review of the implementation of this policy will be undertaken periodically. Asset management To enable appropriate management and control, all information and data assets will be inventoried, allocated an owner, classified and labelled appropriately in accordance with the Corporate Information Asset Management, Classification and Control Policy; To determine the appropriate level of security measures to be applied, all information and data assets will be evaluated to determine their value and importance to the Council. To identify the threats associated with the information and data assets, the probability and impact of security failures that will enable selection of the appropriate control measure in accordance with the Corporate Information and Data Risk Management Policy; 2
6 Human resource security To reduce the risk of misuse, fraud, abuse, theft or human error by those employed by the Council, security responsibilities will be defined within all job descriptions; To minimise the likelihood of employing personnel who may pose a risk to the security of confidential information and data and key information systems, appropriate screening will be undertaken in accordance with the Corporate Human Resources Policy; Appropriate security awareness and training will be provided to all employees and users of all information and data assets and information systems in accordance with the Corporate Information Security Awareness and Training Policy; Procedures will be put in place to ensure the prompt removal of access rights and the return of information and data assets, information and data systems and access to buildings when an employee leaves the organisation; Physical and environmental security Appropriate physical and environmental controls will be implemented to prevent unauthorised access or damage to, loss or theft of, interference or interruption to the Council s information assets in accordance with the Corporate Physical and Environmental Security Policy; Information systems that process critical, sensitive or high availability information (as defined by the corporate Information Asset Management, Classification and Control Policy) will be located within secure areas; Use of Mobile Devices Abroad Generally, the use of Ealing Council devices will not be allowed abroad. In the extreme exception, the Head of department whose staff need to take Ealing Council mobile devices abroad, must submit a formal written request to the Head of Information & Data Management, prior to the event, to carry and use Ealing Council mobile devices abroad, these include (memory sticks, laptops, CD s, discs, tapes and hand held devices that is capable of storing corporate information and data. The request will be considered by the Head of Information and Data Management in conjunction with the Head of Service Ealing (ICT), to ensure the Council s business can be carried out abroad as safely and securely as possible through the use of intelligent encryption software or locking down devices, in whichever means is deemed most appropriate to the security and integrity of the councils information, data and systems. Communications and operations management To ensure the correct and secure operation of information and data processing systems and entry into the councils physical buildings, all procedures and processes will be fully documented, reviewed and updated on a annual basis; Third-party service delivery will be managed and monitored to ensure that information and data security controls are maintained; In accordance with the following corporate policies: o Virus Protection Policy; o Security Patching Policy; o Backup & Recovery Policy; and 3
7 o Change Control Policy The appropriate processes and procedures will be implemented to minimise the risk of systems failure; Controls will be implemented to protect the councils information and data and the infrastructure which they reside within from threats and will maintain the security Council s network in accordance with the Network Configuration Management Policy The handling, storage and exchange of information and the media it is held on will be governed by its classification in accordance with the Information and Data Asset Management, Classification and Control Policy, Data Handling Policy and ecommunications Policy; Information and data involved in electronic commerce or is published electronically, will be governed by the corporate ecommerce and Web Publishing Policy. Information processing activities will be logged and monitored with regular reviews being undertaken in accordance with the Audit Logging and Monitoring Policy and Intrusion Detection Policy. Access control Access to information and data assets will be managed in accordance to the Access Control and User Account Management Policy, Password and Authentication Policy and the Third-party Access Policy; Guidelines that support good security practises in the selection of passwords and the use of information assets will be developed and circulated to all Users; Controls will be implemented to manage and control remote access to the Council s information and data assets in accordance with the Mobile Computing and Remote Working Policy; Information systems acquisitions, development and maintenance Security requirements and controls will be detailed within the specifications for new information and data processing applications or enhancements to existing applications; All applications implemented will have controls governing the input, processing and output of information and data to ensure its accuracy, integrity, confidentiality, completeness and availability and importantly, its quality; To protect the confidentiality and integrity of information and data and to validate authenticity cryptographic which means - Public key encryption. This is when a message is encrypted with a recipient's public key which cannot be decrypted by anyone except the recipient possessing the corresponding private key. This is used to ensure confidentiality and is in accordance with the corporate Information and data asset Management, Classification and Control Policy and the Cryptography and Encryption Policy. In accordance with legislative requirements the use and control of application software will be governed by the corporate Software Licence Compliance Policy; 4
8 Procedures and controls will govern the development, maintenance and support of application system software; Appropriate measures will be taken to reduce the risk of exploitation of technical vulnerabilities. Information Security Incident Management Information security incidents, events and weaknesses will be investigated and responded to inline with the corporate Information and Data Security Incident Management Policy; Procedures and processes will be documented to ensure a consistent approach is applied to the investigation of all incidents, events and weakness reported or discovered; Business Continuity Management A business continuity management framework will be maintained in accordance with the corporate Business Continuity Management Policy. All business processes will be risk assessed to identify any threats and the possible impact they could have on the provision of services. Plans will be drawn up that detail how operations will be maintained or restored should those failures occur. Testing of plans will be undertaken on a regular basis; Compliance Appropriate measures will be implemented that support the Council s compliance with statutory and regulatory requirements relevant to information and data security (Appendix A); Adherence to procedures, processes and standards that support the implementation of the security polices will be reviewed periodically. Failure to comply will be considered a security breach which will be subject to an investigation and possible further action being taken Security policies will be reviewed annually. They will be amended in response to changes in legal and operational requirements to ensure the controls remain relevant and effective. Changes to policy can also be requested by completing the policy change request form; Exemption to any security policy will be stated within the specific security policy, where an operational function thinks there is a justifiable reason it cannot comply with a specific area within a policy, a policy exemption must be requested using the policy exemption request form, available from the Information and Data Management Compliance Team. Roles and Responsibilities Chief Executive The Chief Executive has overall responsibility for all matters of security within the Council. This responsibility is delegated to the following: - Corporate Board is responsible for ensuring that: Mechanisms are in place to comply with all legislative and regulatory requirements in respect of information and data security; 5
9 They endorse this and all supporting Information and Data Management policies; and Their endorsement is communicated to all users of the Council s information and data assets; The Executive Director of Corporate Resources Delegates responsibility for all matters of security to the Director, Business Services Group; The Director of Business Services Group delegates day to day responsibility for all matters of information and data management security to the Head of Information and Data Management; The Head of Information and Data Management is responsible for: Chairing the Information and Data Management Governance Board; Providing regular update reports to the Corporate Board and the Information and Data Management Member Champion; Ensuring that the corporate board and cabinet approve all corporate information and data management policies. Developing a consolidated Information and Data Management and ICT Strategy that actively promotes compliance with the International Security Standard ISO (formerly known as BS 7799); An Information and Data Management Policy Framework is developed to support ISO 27001; The development, production and communication of standards, procedures and guidelines to support the implementation of this and all supporting Information and Data Management Policies; Monitoring day-to-day compliance with this and all supporting information and Data Management policies; The on-going review of the effectiveness of this and all supporting information and Data Management policies; Corporate Information and Data Management Governance Board (CIDMGB) - is accountable to the Corporate Board. CIDMGB membership will comprise a senior manager from each directorate, their remit to review, amend and agree the corporate Information and Data Management Policy Framework prior to it being submitted to corporate board and cabinet for final approval and ratification. For clarity, the full suite of documents will be developed entirely by the corporate Information and data management department and then submitted to the IDMGB for review. The CIDMGB is responsible for: 6
10 Reviewing, amending and agreeing the content of the corporate Information and Data Management Policies on behalf of their directorate (see attached terms of reference); The promotion and clear communication of this and all supporting corporate Information and Data Management Framework Policies to their directorate Senior Management Teams and cascading these corporate documents to all users of the Council s information and data assets within their specific directorates. Ensuring the promotion and implementation of this policy and all other corporate Information and Data Management Policies within their directorates cascading policies to their senior management teams and then on to operational staff for implementation; The Head of Service Ealing is responsible for: The implementation of the appropriate technical and operational controls to protect the services, technical platforms and communications infrastructure that transport information ensuring alignment with the approved consolidated Information and Data Management and ICT Strategy and ISO Information Security standard; Advising information and data owners on the appropriate technical and operational solutions defined within the approved consolidated Information and Data Management and ICT Strategy; The Head of property services is responsible for: The physical and environmental security of the council s property portfolio where information, data and information systems reside. The Director of Human Resources is responsible for: Ensuring there are adequate procedures and processes in place to support human resources security; Incorporating the appropriate confidentiality agreements in contracts and terms and conditions of employment; The development, deployment and training of the Council workforce with regard to information security competencies Supporting training initiatives on information security, data protection, freedom of information and Caldicott. Ensuring that that all personnel are fully informed of their obligations and responsibilities with respect to standards, guidelines and procedures; The Caldicott Guardian is responsible for: Complying with the principles of the Caldicott Report and the implementation of the Social Care Information Governance Toolkit, which supports the continual improvement in the handling and protection of patient-identifiable (personal) information. 7
11 Executive Directors, Service Directors, Service Heads are responsible for: Identifying and managing all security risks to business activities performed under their management. They must ensure that the appropriate corporate information and data management and security policies, standards, procedures, guidelines and mechanisms are complied with in the performance of those activities. All personnel whether employees, contractors, consultants or business partners, must observe and comply with this policy and all supporting information security policies and the standards, procedures, guidelines and mechanisms put in place to implement these policies. They are to play an active role in protecting the information assets of the Council. They must not access or operate these assets without authority and must report security breaches or exposures that have come to their attention, in line with those policies and documented procedures. 8
12 Legal Framework Appendix A The following acts relate to the security and confidentiality of and access to information resources/assets and the use of information systems, the most significant legislation in this area is detailed below: The Data Protection Act governs how personal data should be processed, by laying down 8 principles of good data handling practice. The Act gives living Individuals the right to confidentiality and security for their information and also the right to access it. Human Rights sets out a number of rights and fundamental freedoms particularly the right to respect for private and family life. (Individual rights to privacy for themselves and their family members) Copyright, Designs and Patents Act makes it illegal to copy or use software without the owner s permission. Also see Copyright, etc. and Trade Marks (Offences and Enforcement) Act 2002 which increased the penalties. Computer Misuse Act Makes it an offence for any person to gain unauthorised access to information on a computer or make unauthorised modifications to or facilitate a crime using a computer. Also see Police & Justice Act 2006 which increased the penalties. Freedom of Information Act 2000 promotes the individuals right of access to general information held by public authorities. The Regulation of Investigatory Powers Act This Act regulates the interception of communications by public or private telecommunication systems. The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations these regulations dilute the requirements of RIPA and allow certain monitoring in the course of legitimate business practice. The public Interest disclosures Act known as the "the Whistle Blowers Act" protects employees who make a "Protected Disclosure". Protection of Children Act 1978; Criminal Justice Act 1988 These Acts make it a criminal offence to distribute or possess scanned, digital or computer-generated facsimile photographs of a child under 16 that are indecent. Common Law Duty of Confidentiality- unless there is a statutory requirement or a public interest justification, confidential information should only be used for those purposes that the provider of the information has been informed about and has consented to, either implicitly or explicitly. Waste Electrical and Electronic Equipment (WEEE) Directive promotes the eco-friendly disposal of electrical goods as well as goods containing electrical components. The Privacy and Electronic Communications (EC Directive) Regulations defines the rules on electronic marketing. All policies and their implementation will comply with the above acts as well as any relevant employment legislation and occupational health and safety regulations 9
13 Definitions Apprendix B Information resources/assets Facilities includes all equipment, as well as the physical and environmental infrastructure: Computer processors of all sizes, whether general or special purpose, and including personal computers; Peripherals, workstation, terminal equipment, mobile phones and blackberry s; Telecommunications and data communications cabling and equipment; Local and wide area network equipment; Environmental control systems, including air-conditioning and other cooling equipment, Alarms, and safety equipment; Required utility services, including electricity, gas and water; and Buildings and building improvements accommodating personnel and equipment Data includes both raw and processed data: Electronic data files, regardless of their storage media and including hard copies and data otherwise in transit; and Information derived from processed data, regardless of the storage or presentation media, including data and images held on peripherals. Software includes locally developed programs and those acquired from external sources: Operating system software and associated utility and support programs; Application enabling software, including database management, telecommunications and networking software; and Application software. Paper documents includes systems documentation, user manuals, continuity plans, contracts, minutes, agendas, service plans, reports, guidelines and procedures. Personnel include employees, members, contractors, consultants, service providers, representatives of customers and other bodies that access the Council s information and data. Cryptography Protecting the confidentiality of information by transforming it (encrypting it) into and unreadable format called cipher text. Only those who have the key can decipher (decrypt it) the information back into plain text. 10
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Network Security Policy
Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
Information & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Information security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
Information Governance Policy
Information Governance Policy Reference: Information Governance Policy Date Approved: April 2013 Approving Body: Board of Trustees Implementation Date: April 2013 Version: 6 Supersedes: 5 Stakeholder groups
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Guideline for Roles & Responsibilities in Information Asset Management
ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25
Information Security Policy Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25 Document Information Trust Policy Number : ULH-IM&T-ISP01 Version : 3.1 Status : Approved Issued by : Information Governance
University of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
INFORMATION RISK MANAGEMENT POLICY
INFORMATION RISK MANAGEMENT POLICY DOCUMENT CONTROL: Version: 1 Ratified by: Steering Group / Risk Management Sub Group Date ratified: 21 November 2012 Name of originator/author: Manager Name of responsible
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
Information Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
INFORMATION SECURITY PROCEDURES
INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures
Information Security Policy
Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014
Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
Information Security Policy Best Practice Document
Information Security Policy Best Practice Document Produced by UNINETT led working group on security (No UFS126) Authors: Kenneth Høstland, Per Arne Enstad, Øyvind Eilertsen, Gunnar Bøe October 2010 Original
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
How To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
Online Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
INFORMATION GOVERNANCE POLICY & FRAMEWORK
INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger
Information Security Policy
Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
An Approach to Records Management Audit
An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Marist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
