Supplier Assurance Framework Good Practice Guide
|
|
|
- Susanna Potter
- 9 years ago
- Views:
Transcription
1 Supplier Assurance Framework Good Practice Guide Version 2.0 February P a g e V e r s i o n 2. 0 F e b 1 5
2 Contents INTRODUCTION... 3 SUPPLIER ASSURANCE FRAMEWORK OVERVIEW... 4 USING THE STATEMENT OF ASSURANCE... 4 QUESTIONS ABOUT THE FRAMEWORK PART 2 - COMMON CRITERIA FOR ASSESSING RISK (CCFAR) USING THE CCFAR COMMON CRITERIA FOR ASSESING RISK WORKSHEET CCFAR WORKSHEET GUIDANCE GLOSSARY ADDITIONAL DOCUMENTATION STATEMENT OF ASSURANCE QUESTIONNAIRE (Spreadsheet) TEMPLATE SUPPLIER INVITE TO COMPLETE THE STATEMENT OF ASSURANCE 2 P a g e V e r s i o n 2. 0 F e b 1 5
3 Introduction The Supplier Assurance Framework is an approach to managing supplier risk built around two tools and good management practice principles. It is intended to provide assistance to departments and government organisations and while it will be incorporated into the Security Policy Framework (SPF) its use is not mandated. The supplier assurance framework consists of two elements: 1. The Statement of Assurance (SoA) 2. The Common Criteria for Assessing Risk (CCFAR) Either of these tools can be used separately or together: Providing a flexible yet consistent approach to managing information risk in third party supplier contracts at the OFFICIAL level. Being adaptable it can accommodate an organisation s existing processes and governance structures and can be implemented in stages over time. Providing corporate visibility of risk by bringing together business, commercial and security staff in aligning the proportionate management of information risk to the organisation s risk appetite and levels of risk tolerance. The Framework provides a straightforward, proportionate and transparent overall approach to supplier information by: Consistency in government s approach to suppliers; A common standards related question set; Greater transparency to drive up accountability; Standardised contractual terms; The acknowledgement that not all suppliers are the same and some services carry potentially greater risks than others so the degree of assurance required may be greater Improve suppliers understanding and application of information risk management and enhance accountability. Cabinet Office February P a g e V e r s i o n 2. 0 F e b 1 5
4 1. The Supplier Assurance Framework Overview The supplier assurance framework applies to contracts at the OFFICIAL level. It should: enable the early identification of high risk projects; provide a framework for the risk management of contracts that is consistent, light touch but effective, understood by both government, stakeholders and suppliers and enable information sharing and accountability; and inform the assurance approach taken to high, medium and low risk contracts. It can be adapted for use in the wider government community as it allows organisations to interpret and apply it according to their business needs; it is particularly relevant where information is shared through contracts or agreements. Using the Statement of Assurance (SoA) The Statement of Assurance (SoA) is an assessment question set, based on ISO criteria and aligned to the SPF, for completion by third party suppliers, used to capture and analyse the responses from suppliers and flag issues. The SoA spreadsheet return provides a basic means of achieving supplier accountability. It can be used by departments and government organisations as part their annual compliance process when assessing the management of information risk in third party supplier contracts at the OFFICIAL level (including OFFICIAL-SENSITIVE). The level of risk carried by a contract, as assessed by the department or government organisation e.g. high, medium or low, will be an indicator of the level of assurance required from the supplier on how that risk is being managed. For example a department or government organisation may accept an annual self assessment from a supplier providing a low risk service or product but will require a more in depth validation of the SoA assessment and some interaction with a supplier for a high risk service or product. The second tool in this framework Common Criteria for Assessing Risk (CCFAR), can be used to help identify the level of risk carried by suppliers. Purpose of the SoA A. The SoA can be used by government organisations to assess the management of information risk in existing contracts at OFFICIAL, as part of its annual compliance processes. B. or The SoA can be used as part of the procurement or contract management process. Operating Principles The SoA has been designed as a flexible tool: Not all of the criteria may be valid for every contract; the SoA should be reviewed and amended to suit the business requirements of the contract. All amendments should be recorded. Suppliers should have a good understanding of the purpose of the SoA, its role in the assurance process and the use that will be made of the information they provide. 4 P a g e V e r s i o n 2. 0 F e b 1 5
5 A completed SoA is the record of an assessment carried out on a service or product and can be used as an audit trail over the life of the service or product provided. The SoA template is a living document, it will need to reflect emerging risks such as increased supplier use of bring your own device (BYOD) and cloud services to remain relevant. Any major amendments should be subject to an approvals process. Government community use of a common set of assessment criteria (SoA) will support a consistent approach to managing information risk in third party suppliers. Scenario A The SoA can be used by departments or government organisations to assess the management of information risk in existing contracts at OFFICIAL, as part of its assurance processes. Statement of Assurance Tool (SoA) (Spreadsheet) is used to capture and analyse the responses from suppliers and flag issues. Suppliers should be briefed on the SoA, its purpose and role in the assurance process. This might be done during informal discussions or at supplier briefing days, though these events are often resource intensive to organise. Open and fair competition must prevail and can be achieved; for instance, as part of premarket engagement, however the organisation needs to ensure that the responses to any queries raised are shared among all the suppliers. Contact the suppliers concerned, identify a point of contact and ensure they have a good understanding of the purpose of the SoA. Make any necessary amendments to the SoA to tailor it to the contract and remove questions that don t apply. Send the SoA is only available as an Excel spreadsheet so organisations will need to decide whether they send it out in this format or devise another method of delivery. Review the completed assessments: o Circulate all or the relevant parts of the completed assessments to those who will have input to the assessment, e.g. security/ia, business/iao, contracts, etc. o Consider whether all of the critical criteria have been answered as expected. o Identify the key issues taking into account the overall level of information risk - high, medium or low in the contract.. o Decide whether any further clarification is required from the supplier, for high risk contracts this may be an iterative process. o Agree what further action is required to bring the supplier into compliance. 5 P a g e V e r s i o n 2. 0 F e b 1 5
6 o Record outcomes from the assessment and ensure key stakeholders are informed of significant outcomes. o Contact the supplier to inform them of the outcome. Agree next steps with the supplier: o High risk contracts may require some fairly detailed clarification of their assessment resulting in a further compliance check/visit. A compliance plan will then be agreed and may be followed up at any point with a preannounced visit to assess progress. o Medium risk contracts, depending on the issue, may also require further clarification of their SoA response. Organisations may decide to agree a compliance plan with the supplier or request that the next SoA assessment be subject to independent validation. The company carrying out that validation should, as part of the process, compare the most recent SoA assessment with the preceding one. o Low risk contracts, depending on their risk management policy, organisations should at a minimum acknowledge the receipt of a completed SoA return from a supplier. Review the outcomes as a result of the assessment it is possible the risk status of some contracts may be raised or lowered. At this point it may be beneficial to review the initial Common Criteria for Assessing Risk (CCFAR) assessment to identify changes or amendments to the contract. Use the SoA as part of a structured process to inform risk based decision making and to prioritise resources for assurance and compliance activities. Scenario B Using the SoA as part of the procurement or contract management process. The SoA is adaptable and can be used at various stages in the procurement or contract management process. Pre-requirement project stage: The SoA questions could be turned into a proportionate checklist and incorporated into the planning process, following the CCfAR. Pre-contract: At the pre-contract stage the SoA questions can form part of the contractual requirements to be built into the Terms & Conditions, as an assessment of compliance capability or returned by the supplier with the tender document. Compliance audits: The SoA can be used as an audit checklist or a pre-engagement document for Compliance Audits, reducing the burden on suppliers particularly if a number of organisations adopted this approach. If the supplier is delivering the same service to more than one organisation this would enable joint audits to take place. On going contract management: SoA outcomes can also be used to inform regular, ongoing and proportionate discussions between contract managers and suppliers to monitor their delivery of security as part of the wider assurance of value for money (VFM) in the contract. 6 P a g e V e r s i o n 2. 0 F e b 1 5
7 Questions about the framework Q1. What is the purpose of the Statement of Assurance (SoA) self-assessment questionnaire? A1. Good information assurance requires any organisation to understand the risks posed to their information assets within their third party supply chains. The Statement of Assurance (SoA) is designed as a basis to help suppliers, and their client organisations, to understand and have greater visibility of these risks in the supplier s own organisation throughout the contract The SoA asks the supplier to self-assess what security policies, systems and processes they have implemented in order to ensure that they are handling government data and assets securely and in accordance with HMG security requirements, namely the Cabinet Office Security Policy Framework (SPF). Q2. Is this SoA self-assessment compulsory? A2. Some government contracts already specify in their Terms and Conditions a requirement for the supplier to comply with the department or organisation s information assurance (IA) regime. Some, probably older, contracts may not contain this provision. The Government is fully committed to ensuring that its information assets are appropriately protected. A supplier invited by a department or organisation to complete a SoA self assessment is strongly encouraged to do so; its completion will provide the requester with a level of the assurance which is required to continue to share or host government information with the supplier. If you have any queries or concerns about completing a SoA contact the department or organisation s Procurement and/or Commercial team or equivalent. Q3. A supplier has already completed a SoA self-assessment questionnaire for another Government Department (OGD). Do they still need to complete one for another government department or organisation? A3. It is important to establish whether or not the supplier is providing the same or broadly similar product or service, carrying the same level of risk, to both organisations and if a previously completed SoA might be sharable. If the product or service being provided are very different and/or for example have different end-products or recipients, process or store data in different ways or locations, then a new self-assessment may be required. However, if the products or services are comparable then the supplier should contact the security or IA unit in the department or organisation for whom they completed the first SoA to discuss how the information can be made available to the requesting organisation. Then 7 P a g e V e r s i o n 2. 0 F e b 1 5
8 the department or organisation should inform the requesting organisation that they are consulting with the supplier on the release of their previously completed SoA and indicate when to expect a response. Both suppliers and government departments may benefit from sharing this information as it reduces their overheads and results in more effective governance. Q4. Which individual in the company should complete the self-assessment for the specified contract? A4. Ideally, the person in the company with the lead responsibility for information security and assurance should ensure that the information in the completed return is accurate and complete. They may complete parts of the questionnaire and co-ordinate input from their counterparts in other areas of the organisation who will be experts in their respective areas of security and have knowledge of the organisation s policies in each of the security areas covered by the self-assessment Q5. Does the SoA self-assessment cover just the prime supplier or does it include all the sub-contractors involved in providing the product or service? A5. The SoA assessment applies to the prime supplier and all the subcontractors involved in delivering the product or service to the department or organisation. Government organisations expect that their data will be protected appropriately throughout the supply chain. The expectation is that the prime supplier is responsible for ensuring that this requirement is built in throughout the supply chain. Q6. How often will the supplier need to complete a SoA self-assessment? A6. As often as agreed between the department or organisation and the supplier. The aim is to ensure that suppliers continue to ensure that their business processes and data handling policies are resilient and compliant with government security requirements and is an appropriate level of due diligence is applied. Where there are any changes suppliers must inform the department or organisation and highlight their likely impact on the SoA assessment. Q7. The supplier already has the necessary security policies in place and does not wish to complete the self-assessment. A7. This is an ongoing programme of supplier self-assessment that provides suppliers with an opportunity to demonstrate, to their advantage, their capabilities to client departments or organisations including their ability to keep abreast of changing threats. In many cases this will already be a requirement of the contract 8 P a g e V e r s i o n 2. 0 F e b 1 5
9 Q8. Where can a supplier get more information about completing the SoA selfassessment? A8. For existing contracts the supplier should contact their department or organisation s contract manger. If a supplier has been requested to complete a SoA as part of the tendering process then they should contact the department or organisation s procurement/commercial team or their equivalent. Q9. What level (classification) of data does the SoA apply to? A9. The SoA self assessment applies to information or data classified as OFFICIAL. Data classified as above OFFICIAL is subject to the List X process. If any supplier is unsure of the classification of the data/information assets covered by the contract they should contact one of the following; the security unit of the department or organisation that owns the information, their contact in its commercial or procurement team or an equivalent for guidance. Q10. A supplier does not handle any information that might be considered sensitive as part of the contract. Do they still need to complete the SoA questionnaire? A10. When assessing the risks to the department or organisation s information assets it is not only the type of data that is considered but a number of related criteria, for example the volume of data, the number of transfers between sites where it is held, how many subcontractors are involved and how it is processed. Contracts supplying physical assets designed to hold data such as blank identity documents, for example passports, though not containing personal data are attractive items for criminals and should be appropriately protected. If a supplier is unsure, they should contact the department or organisation s security unit for further guidance. Q11. The supplier is delivering a service on the department s premises using the department s own facilities, e.g. IT equipment. Does the supplier still need to complete the SoA questionnaire? A11. Even when delivering a service on the department s premises and using their equipment suppliers need to demonstrate that they have a clear understanding of the security policies and practices both theirs and the departments - that apply to the delivery of the product or service and their responsibilities in complying with them. Q12. The supplier already has ISO27001 and does not wish to complete the self assessment. 9 P a g e V e r s i o n 2. 0 F e b 1 5
10 A12. This is an ongoing programme of supplier self-assessment that provides suppliers with the opportunity to demonstrate, to their advantage that their systems or services have been independently assessed by an external body. Suppliers can supplement any questions with evidence from their ISO27001 ISMS. Please ensure that the scope of the certification matches the requirements of the contract and send a copy of the relevant certificate. Q 13. The supplier already has Cyber Essentials or Cyber Essentials Plus and does not wish to complete the self assessment. A13. This is an ongoing programme of supplier self-assessment that provides suppliers with the opportunity to demonstrate, to their advantage that their systems or services have been independently assessed by an external body. Suppliers can supplement any questions with evidence from their Cyber Essentials evidence. Government requires all relevant third parties to have Cyber Essentials or equivalent therefore if you have either please ensure that the scope of the certification matches the requirements of the contract and send a copy of the relevant certificate. Cyber Essentials may not cover all the requirements of the contract. Q14. Having completed the SoA self-assessment what happens next? Q12. If the SoA self-assessment is for a current contract, the department or organisation will contact the supplier and work with them to agree any follow-up actions the supplier needs to take. If the SoA self-assessment has been completed as part of the tendering process, the department or organisation may be in contact regarding any gaps and potential remedial action. Q15. Will the results of the suppliers SoA self-assessment be shared with other government departments or organisations? A13. Sharing of the supplier s self-assessment results would not occur without the supplier s permission. Possible considerations where sharing the results would be beneficial are: If a government department or organisation invites the supplier to complete a selfassessment and the supplier has already completed one for another department where the supplier provides the same product or service. Both the department and the supplier s permission must be obtained before the information can be shared. This form of data sharing is good practice if the service or product being supplied to one department is the same as that provided to another government organisation. Sharing of this data prevents duplication of work across the department and its delivery partners and across the rest of Government; it allows available resources to be used as efficiently as possible. 10 P a g e V e r s i o n 2. 0 F e b 1 5
11 It will also help to reduce the impact on the supplier s time and resources and will provide the requesting department with relevant information on the supplier s capabilities and IA management. 11 P a g e V e r s i o n 2. 0 F e b 1 5
A GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information
Royal Borough of Kensington and Chelsea Data Quality Framework ACE: A Framework for better quality data and performance information March 2010 CONTENTS FOREWORD 2 A CORPORATE FRAMEWORK FOR DATA QUALITY
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
INTRODUCTION. The Merlin Principles. The Elements of each Principle
0 INTRODUCTION The development of the Merlin Standard has been progressed as a joint exercise between the Department for Work and Pensions (DWP) and its providers operating in the Welfare to Work (W2W)
Managing Supply Chain Impacts
Managing Supply Chain Impacts Increasing shareholder, public and media scrutiny means that any irregular or irresponsible practices within an organisation's supply chain can permanently damage an organisation's
Procurement Policy Note Use of Cyber Essentials Scheme certification
Procurement Policy Note Use of Cyber Essentials Scheme certification Action Note 09/14 25 September 2014 Issue 1. Government is taking steps to further reduce the levels of cyber security risk in its supply
Info sheet : Considering labour standards in the procurement process
Info sheet : Considering labour standards in the procurement process In line with the EU procurement rules and the Government s value for money principle, contracting authorities can take steps to consider
State Records Guideline No 25. Managing Information Risk
State Records Guideline No 25 Managing Information Risk Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 4 2 Risk Management and Information... 5 2.1 Overview... 5 2.2 Risk management...
Subcontractors and Supply Chain Partners Management Fee Policy
Subcontractors and Supply Chain Partners Management Fee Policy Finance Lead Responsibility Chief Financial Officer Effective From 1st November 2015 Policy Applicable to Approved by Subcontractors and Supply
Internal Audit Quality Assessment Framework
Internal Audit Quality Assessment Framework May 2013 Internal Audit Quality Assessment Framework May 2013 Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format
Digital Continuity in ICT Services Procurement and Contract Management
Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage
Performance Management Framework
Performance Management Framework Steve Harman Strategic Performance Manager Performance in a Nutshell BAD GOOD Introduction A Performance Management Framework (PMF) brings together the strategies, plans,
Supplier Information Assurance Assessment Framework and Guidance UNCLASSIFIED
January 2011 Issue No: 1.0 Supplier Information Assurance Assessment Framework and Guidance UNCLASSIFIED Supplier Information Assurance Assessment Framework and Guidance Issue No: 1.0 January 2011 The
Business Continuity Management
Business Continuity Management Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not
Operations. Group Standard. Business Operations process forms the core of all our business activities
Standard Operations Business Operations process forms the core of all our business activities SMS-GS-O1 Operations December 2014 v1.1 Serco Public Document Details Document Details erence SMS GS-O1: Operations
National Approach to Information Assurance 2014-2017
Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version
IIA South West Event. A look at key supply chain risks and why contracting is a key step 14 January 2015
IIA South West Event A look at key supply chain risks and why contracting is a key step 14 January 2015 Objectives and agenda Page The contact at KPMG with respect to this presentation is: Iain Prince
Network Rail Infrastructure Projects Joint Relationship Management Plan
Network Rail Infrastructure Projects Joint Relationship Management Plan Project Title Project Number [ ] [ ] Revision: Date: Description: Author [ ] Approved on behalf of Network Rail Approved on behalf
Integrated Assurance & Approval Strategy and Integrated Assurance & Approval Plans
Integrated Assurance & Approval Strategy and Integrated Assurance & Approval Plans A guide to implementing integrated assurance and approvals Version 1.0 - May 2011 Contents Introduction 03 Integrated
Cyber Essentials Scheme
Cyber Essentials Scheme Assurance Framework January 2015 December 2013 Contents Introduction... 3 Change from June 2014 version... 3 Overview... 4 Stage Definitions... 5 Stage 1 Cyber Essentials: verified
ADVERT POSITION: SPECIALIST: CONTRACTS MANAGEMENT JOB LEVEL: 6 DURATION 3 YEAR CONTRACT LOCATION: NATIONAL OFFICE PORTFOLIO: DSU
ADVERT POSITION: SPECIALIST: CONTRACTS MANAGEMENT JOB LEVEL: 6 DURATION 3 YEAR CONTRACT LOCATION: NATIONAL OFFICE PORTFOLIO: DSU PURPOSE: To lead and facilitate effective organisation-wide contracts development,
SCHEDULE 8 Generalist Project Services Framework 2015
SCHEDULE 8 Generalist Project Services Framework 2015 Nominal Insurer And Schedule 8 (Project Services Framework) Page: 1 of 6 Schedule 8 Generalist Project Services Framework Contents Overview... 3 1.
Business Continuity Management Policy
Business Continuity Management Policy Business Continuity Policy Version 1.0 1 Version control Version Date Changes Author 0.1 April 13 1 st draft PH 0.2 June 13 Amendments in line with guidance PH 0.3
Leeds City Council Procurement Strategy October 2013
Leeds City Council Procurement Strategy October 2013 Contents 1. Introduction 2. Background 3. Our ambition 4. Our strategy 5. Who we will work with 6. What we will achieve and how we will achieve it 7.
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
ISO 27001 Information Security Management Services (Lot 4)
ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...
Information Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
BUSINESS CONTINUITY MANAGEMENT FRAMEWORK
BUSINESS CONTINUITY MANAGEMENT FRAMEWORK Document Author: Civil Contingencies Service - Authorised by the CCS Joint Management Board - Version 1.0. Issued December 2012 Page 1 FRAMEWORK STATEMENT Business
ISO/IEC 27001:2013 Your implementation guide
ISO/IEC 27001:2013 Your implementation guide What is ISO/IEC 27001? Successful businesses understand the value of timely, accurate information, good communications and confidentiality. Information security
Proposed guidance for firms outsourcing to the cloud and other third-party IT services
Guidance consultation 15/6 Proposed guidance for firms outsourcing to the cloud and other third-party IT services November 2015 1. Introduction and consultation 1.1 The purpose of this draft guidance is
HOW MUCH MONEY HAVE YOU WASTED ON G-CLOUD?
Winning on G-Cloud & The Digital Marketplace 6 TIPS FROM SUCCESSFUL SUPPLIERS HOW MUCH MONEY HAVE YOU WASTED ON G-CLOUD? As of 2 February, there were a total of 1,852 suppliers registered on the G-Cloud
www.etenders.gov.ie Electronic Tender Management System Quick User Guide Supplier
Electronic Tender Management System Quick User Guide Supplier Page 1 Contents 1. Using the system 1.1 1.2 Supplier registration Finding published tenders 2. Responding to a public advertisement / notice
Victorian Government Risk Management Framework. March 2015
Victorian Government Risk Management Framework March 2015 This document reproduces parts of the AS/NZS ISO 31000:2099 Risk Management Principles and Guidelines. Permission has been granted by SAI Global
The World Bank Risk Assessment Methodology
The World Bank Risk Assessment Methodology 1. Background World Bank has attached high importance to money laundering and terrorist financing risk assessment from the early years of the recognition of risk
(Joint) Information Management Strategy 2014-2017. April 2014
49 (Joint) Information Management Strategy 2014-2017 April 2014 49 50 CONTROL SHEET FOR: (Joint) Information Management Strategy Strategy Details Comments / Confirmation (Joint) Information Management
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
Overview. Service Description: BCP & DR Strategy (L6)
Service Description: BCP & DR Strategy (L6) Government Enterprise Architecture Specialists T: 07966 457 571 E: [email protected] Overview Visionist will help your organisation develop a Business Continuity
Confident in our Future, Risk Management Policy Statement and Strategy
Confident in our Future, Risk Management Policy Statement and Strategy Risk Management Policy Statement Introduction Risk management aims to maximise opportunities and minimise exposure to ensure the residents
1.1 Terms of Reference Y P N Comments/Areas for Improvement
1 Scope of Internal Audit 1.1 Terms of Reference Y P N Comments/Areas for Improvement 1.1.1 Do Terms of Reference: a) Establish the responsibilities and objectives of IA? b) Establish the organisational
Overview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
Risk Management Policy and Process Guide
Risk Management Policy and Process Guide Status: pending Next review date: December 2015 Page 1 Information Reader Box Directorate Medical Nursing Patients & Information Commissioning Operations (including
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
CONTRACT MANAGEMENT FRAMEWORK
CONTRACT MANAGEMENT FRAMEWORK August 2010 Page 1 of 20 Table of contents 1 Introduction to the CMF... 3 1.1 Purpose and scope of the CMF... 3 1.2 Importance of contract management... 4 1.3 Managing contracts...
Sustainable Supplier Charter. UNIT4 Business Procedures
UNIT4 Business Procedures Table of Contents OUR VISION... 3 IMPLEMENTATION... 3 2. ETHICS: POLICY AND PRINCIPLES... 3 2.1 LOYALTY... 3 2.2 CODE OF CONDUCT... 4 2.3 INDEPENDENCE, BRIBERY AND CORRUPTION...
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
PROCUREMENT & LOGISTICS DEPARTMENT
PROCUREMENT & LOGISTICS DEPARTMENT Tender/OJEU Procedure Overview This procedure applies to all purchases over 50,000 not covered by existing contracts and should be followed in conjunction with the Tender/OJEU
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
SUMMARY OF MONITOR S WELL-LED FRAMEWORK FOR GOVERNANCE REVIEWS: GUIDANCE FOR NHS FT S PUBLICATION Report by Trust Secretary
SUMMARY OF MONITOR S WELL-LED FRAMEWORK FOR GOVERNANCE REVIEWS: GUIDANCE FOR NHS FT S PUBLICATION Report by Trust Secretary 1. Introduction Under the Risk Assessment Framework and in line with the NHS
Steve Turpie, Chair of Audit Committee David Swales, Assistant Director of Finance
PRESENTED BY: PREPARED BY: DATE PREPARED: 27 June 2013 1 Background 1.1 The Audit Committee of West Suffolk NHS Foundation Trust is established under Board delegation with approved Terms of Reference that
How to gain accreditation for a G-Cloud Service
www.ascentor.co.uk How to gain accreditation for a G-Cloud Service Demystify the process As a registered supplier of G-Cloud services you will be keenly aware that getting onto the G-Cloud framework does
Senate. SEN15-P17 11 March 2015. Paper Title: Enhancing Information Governance at Loughborough University
SEN15-P17 11 March 2015 Senate Paper Title: Enhancing Information Governance at Loughborough University Author: Information Technology & Governance Committee 1. Specific Decision Required by Committee
DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy
Not Protectively Marked Item 6 Appendix B DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Management Policy The Dorset & Wiltshire Fire and Rescue Authority () is the combined fire and rescue authority for
ACADEMIC POLICY FRAMEWORK
ACADEMIC POLICY FRAMEWORK Principles, Procedures and Guidance for the Development & Review of Academic Policies [V.1] Page 2 of 11 TABLE OF CONTENTS 1. FRAMEWORK OVERVIEW... 3 2. PRINCIPLES... 4 3. PROCESS...
Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open
Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Chayuth Singtongthumrongkul
IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional
Learning and Development Programme
Learning and Development Programme INCLUDES WEBINAR AND E-LEARNING COURSES Learning and Development Programme We are pleased to share with you the HEPA programme of events for September 2015 to July 2016.
NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015
NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 [email protected]
Software Quality Subcontractor Survey Questionnaire INSTRUCTIONS FOR PURCHASE ORDER ATTACHMENT Q-201
PURCHASE ORDER ATTACHMENT Q-201A Software Quality Subcontractor Survey Questionnaire INSTRUCTIONS FOR PURCHASE ORDER ATTACHMENT Q-201 1. A qualified employee shall be selected by the Software Quality Manager
The Transport Business Cases
Do not remove this if sending to pagerunnerr Page Title The Transport Business Cases January 2013 1 Contents Introduction... 3 1. The Transport Business Case... 4 Phase One preparing the Strategic Business
Application Guidance CCP Penetration Tester Role, Practitioner Level
August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document
Third Party Supplier Security
Third Party Supplier Security Managing risk and compliance through external due diligence audits. Presented by: Stephen Higgins 6 th December 2012 To cover When third party supplier security goes wrong...
Digital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
Compliance. Group Standard
Group Standard Compliance Serco is committed to good governance practices and the management of risks supported by a robust business compliance process SMS-GS-G2 Compliance July 2014 v1.0 Serco Public
ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: 0207 444 4080 Email: [email protected].
ediscovery G-Cloud V Service Definition Lot 4 SCS Tender Validity Period: 120 days from 10/04/14 Contact us: Danielle Pratt Email: [email protected] Contents About... 1 Specialist Cloud
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
G-Cloud. http://www.publicsectorshow.co.uk/ Lifting the digital cloud
G-Cloud http://www.publicsectorshow.co.uk/ Lifting the digital cloud Public Sector Show 23rd June 2015 Suzanne Williams G-Cloud Category Lead Crown Commercial Service Lucy Belsey G-Cloud Category Manager
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
1.1 An initial request to enter into a contractual arrangement may be initiated by either Massey University or another party (Other Party).
CONTRACT MANAGEMENT PROCEDURE Section Risk Management Contact Risk Manager Last Review February 2013 Next Review February 2016 Approval Not required Procedures Contract Initiation Request Mandatory Guidance
Growth Through Excellence
Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...
SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT
SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT Issue 1.0 Date 24/03/2011 Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration
CONTRACTS STANDING ORDERS (CSOs) 2015 / 2016 CSO 2015-6 1
CONTRACTS STANDING ORDERS (CSOs) 2015 / 2016 CSO 2015-6 1 PART 3G Contracts Standing Orders 2015/16 Definitions Aggregation is the combining together of the total contract value from separate contracts
MAKING YOUR ORGANISATION S INFORMATION ACCESSIBLE FOR ALL IMPLEMENTING THE GUIDELINES FOR ACCESSIBLE INFORMATION
MAKING YOUR ORGANISATION S INFORMATION ACCESSIBLE FOR ALL IMPLEMENTING THE GUIDELINES FOR ACCESSIBLE INFORMATION project has been funded with support from the European Union. publication reflects the views
Our risk management framework Reviewed quarterly by our executive committee
Our risk management framework Reviewed quarterly by our executive committee Our risk management framework helps us identify and mitigate risks. It is reviewed quarterly and updated to reflect changes particularly
EPRR: BCP - Checklist
NHS England Business Continuity Management Toolkit EPRR: BCP - Checklist Appendix 3.2 1 [Intentionally Blank] INTRODUCTION The purpose of this document is to assist those who are developing a business
Which MPA Assurance Review?
Which MPA Assurance? A guide to choosing which MPA Assurance s to include in the Integrated Assurance and Approvals Plan for your Major Project Version 1.0 March 2012 Copyright and contacts Crown copyright
Business Continuity Policy and Business Continuity Management System
Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain
International Workshop Agreement 2 Quality Management Systems Guidelines for the application of ISO 9001:2000 on education.
ISO 2002 All rights reserved ISO / IWA 2 / WD1 N5 Date: 2002-10-25 Secretariat: SEP-MÉXICO International Workshop Agreement 2 Quality Management Systems Guidelines for the application of ISO 9001:2000
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Client information note Assessment process Management systems service outline
Client information note Assessment process Management systems service outline Overview The accreditation requirements define that there are four elements to the assessment process: assessment of the system
G-Cloud IV Services Service Definition Accenture Cloud Security Services
G-Cloud IV Services Service Definition Accenture Cloud Security Services 1 Table of contents 1. Scope of our services... 3 2. Approach... 3 3. Assets and tools... 4 4. Capabilities... 5 5. Expected Outcomes...
Reputation. Further excellence. business continuity. risk management. Data security
Reputation competitive advantage speed to market safety Further excellence trust Data security risk management business continuity HOW CAN YOU CREATE AND SECURE SUSTAINABLE BUSINESS? SOLUTIONS FOR MANAGING
Avondale College Limited Enterprise Risk Management Framework 2014 2017
Avondale College Limited Enterprise Risk Management Framework 2014 2017 President s message Risk management is part of our daily life, something we do regularly; often without realising we are doing it.
Supplier Registration System
Supplier Registration System www.sse.com/potentialsuppliers A guide for Suppliers www.sse.com/potentialsuppliers 03 ONE WAY OF WORKING We are keen to introduce one way of working in procurement, making
Complaints Management Policy
Complaints Management Policy Effective date This policy will take effect from 15 March 2012. This document has an information security classification of PUBLIC. The State of Queensland (Department of Transport
Identifying Information Assets and Business Requirements
Identifying Information Assets and Business Requirements This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Third Party Agent Registration and PCI DSS Compliance Validation Guide
Visa Europe Third Party Agent Registration and PCI DSS Compliance Validation Guide May 2016 Version 1.3 Visa Europe 2015 Contents 1 Introduction... 4 1.1 Definitions of Agents... 4 2 Registration Process...
