Data Transfer Policy. Data Transfer Policy London Borough of Barnet
|
|
|
- Denis Campbell
- 9 years ago
- Views:
Transcription
1 Data Transfer Policy Data Transfer Policy London Borough of Barnet
2 Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based). This policy outlines the restrictions and necessary data security processes that must be followed when transferring data. Document Author 1) Team and 2) Officer and contact details Status 1) Information Management Team 2) Lucy Martin, ext: 2029 Final Version (Live/ Draft/ Withdrawn) Last Review Date September 2015 Next Review Due Date April 2017 Approval Chain: Head of Information Management Date Approved April 2016 Version Control Version no. Date Author Reason for New Version V.1 Dec 2010 Pattison Gbormittah New Policy V.1.2 Dec 2012 Lucy Wicks Review No change V.2 Apr 2014 Lucy Martin / Dennis Hunt Review V3 September 2015 Lucy Martin / Dennis Hunt Annual Review. Review needed to account for changes in law and internal process.
3 Contents 1. Introduction Purpose and scope Initial considerations Data transfer methods Via Via standard GCSx Via encrypt and send Transfer of electronic data via the internet using File Transfer Protocol (FTP & Secure FTP) Removable storage devices (CD, DVD, USB drive & memory stick) Telephone / mobile phone Internet based collaborative sites Sending information by post Use of internal mail Hand delivery / collection Transferring data outside of the United Kingdom / EEA Reporting data incidents Policy review Associated policies... 13
4 1. Introduction There are many occasions when transfer of council data is required between internal departments, third party service providers, public bodies, commercial organisations and individual officers to perform business functions. It is essential that any transfer is done in a way that is appropriate for the type of data being transferred. If the information is personal or sensitive personal data as defined by the Data Protection Act 1998 (DPA) or considered business confidential it is essential that the transfer is performed in a way that adequately protects the information. Throughout this policy, data of this nature is referred to as controlled data. The DPA regulates the use of personal or sensitive personal information and lists 8 Principles that must be followed when handling personal data. Data can potentially be transferred in a wide variety of media and methods both into and out of the council, in electronic and/or paper format. In every transfer there is a risk that the information may be lost, misappropriated or accidentally released. Where this data is controlled data, this represents a risk to the council of breaching our responsibilities under the DPA and could lead to regulatory action, including significant fines. 2. Purpose and scope This policy lays out the practical methods that need to be applied in undertaking a transfer of data, and will provide additional guidance more specifically on the transfers of controlled data. This policy is applicable to anyone handling council information that may have a need to transfer council data, including: employees of the council contractors agency staff Councillors handling council information contractual third party suppliers agents and partners of the council. 3. Initial considerations Before you undertake a physical data transfer, ensure you have the appropriate authorisation to do so. Bear in mind any restrictions in place for the sharing or transfer of controlled data. 4
5 Never automatically assume someone is entitled to the information just because they have told you they need it, regardless of whether they are an internal or external requester. When dealing with third parties consider whether there are any data sharing agreements or contracts in place that cover the transfer of data. Check whether there are any stipulations in place regarding the method of transfer that should be used. Think about whether a non-disclosure agreement is required to cover security and use of the data. Check that you are not providing more information than is necessary for the identified purpose. Do not just send a whole document or spreadsheet because it is easier, when only one section or specific columns are required. Can the objective / purpose be met using anonymised data instead? Consider the most appropriate (not necessarily the easiest) transfer or access method. What risk does the transfer or access to information pose (if any)? For all transfers of information containing controlled data, it is essential that you appropriately establish the identity and authorisation of the recipient. N.B. If you are you are in doubt you should seek further advice from the Information Management Team. 4. Data transfer methods This section lists the main methods of data transfer and also sets out any restrictions and requirements for the secure transfer of controlled data. Before choosing your method of transfer you must consider the following: o the nature of the information, its sensitivity, confidentiality or possible value o the size of the data being transferred o the damage or distress that may be caused to individuals as a result of any loss during transfer o the implications any loss would have for the council You must only send information that is necessary for the stated purpose. You must remove any unnecessary data, and any data not required should be redacted or removed completely (as appropriate) before transfer. 5
6 4.1. Via There are 3 main routes that can be considered when transferring data via . These are outlined below, with relevant restrictions highlighted. All transfers of data by must be done in a way that complies with the council s Acceptable Use Policy. As stated: Sensitive Personal Data (as defined by the Data Protection Act 1998) and highly confidential information when sent externally must only be sent via secure such as GCSx or Encrypt and Send. Users are responsible for considering the sensitivity of data in an before they send it and choosing the most appropriate method of transfer. General rules Secure should not be used for transfer of large amounts of data or significant numbers of records. The file size of an is restricted to 30Mb, therefore, if you are sending large volumes of data that are likely to exceed your system s capacity, you should consider an alternative transfer method as explained in paragraph 4.5 below. messages must contain clear instructions on the recipient s responsibilities and instructions on what to do if they are not the correct recipient. Information sent must, where practical, be enclosed in an attachment. Be careful as to what information you place in the subject line of your or in the accompanying message. Filename or subject line must not reveal the full contents of attachments or disclose any sensitive personal data Via standard When sending information internally between barnet.gov.uk addresses, this is already secure and does not require any additional actions, as the information being sent is not leaving the Barnet network. However, using your Barnet account to send information to a non-barnet address (i.e. something other over the open internet is not secure. This method of transfer should not be used to send any controlled data. If you do need to apply an extra level of security for controlled data you can encrypt and apply a password to an attachment. In Microsoft Office 2010, you can use passwords and encryption to help prevent other people from opening or modifying your documents, workbooks, and presentations. It's important to know that if you don't remember your password the missing password cannot be retrieved and therefore the file will not be accessible. Instructions on how to encrypt documents and construct passwords can be found using the Microsoft Help system. 6
7 All password(s) assigned to encrypted documents must conform to the minimum corporate Password Policy. All password(s) required to open the encrypted attached file must be transferred separately to the recipient either via a telephone call to an agreed number, or by SMS text message Be careful as to what information you place in the subject line of your or in the accompanying message. Filename or subject line must not reveal the contents of the encrypted file. Note encryption is not required if the message is being sent internally on domain GCSx GCSx is an assured transport network between public bodies, local authorities, Health, Police, Criminal Justice and other PSN (Public Sector Network) connected organisations. If you have a GCSx account in Outlook you can send information securely by without any additional security providing that the recipient also has an address on an approved secure domain (pnn, NHS.net, CJSM etc.) address. A GCSx account can be requested from IS self-service. GCSx accounts must be used when sending sensitive personal data or information you consider to be highly confidential. Encryption or password protection of the document prior to transfer is not required if you are using GCSx because the network is inherently secure and encrypted files are blocked by the PSN infrastructure. The mail should be marked in accordance with the Government Security Classification (GSC) scheme which would normally be OFFICIAL OR OFFICIAL SENSITIVE (or similar sub-classification). Further information can be found in the council s Protective Marking Policy. REMEMBER - GCSx communications are only secure if both the recipient and the sender are a public body, local authorities, Health, Police, Criminal Justice and / or other PSN (Public Sector Network) connected organisation. Further guidance is available here Via encrypt and send Encrypt and Send is the current council method of ing information in a secure manner from a Barnet mail account, to an individual who does not have a GCSx account or is not on the PSN network. 7
8 In the absence of the preferred GCSx, Encrypt and Send will protect the content and attachment against unauthorised access. s sent using Encrypt and Send are not sent directly to a recipient address they are stored on a Secure Message Server which protects the sensitive information against unauthorised access. The recipient will need to undertake an initial registration to the message server site in order to be able to retrieve the message and respond. The information is accessed via the Web browser and the actions a user can perform are limited. Encrypt and Send should be used when: (a) sending sensitive business and sensitive personal information via to an individual or organisation outside of the London Borough of Barnet s secure network; and / or (b) it is not possible to use the GCSx secure method. Users should refer to the Encrypt and Send Guide for Internal Users and the Encrypt & Send Secure Message Centre Guide (for external users). N.B. Where the GCSx secure connection is available this must be used instead of Encrypt and Send Transfer of electronic data via the internet using File Transfer Protocol (FTP & Secure FTP) The File Transfer Protocol (FTP) is a standard network tool used to transfer computer files from one host to another over a TCP-based network, such as the Internet. This is not normally available to users without contacting IT. Standard FTP without encryption is inherently insecure and must not be used for transmitting any controlled data under any circumstances. Secure FTP (SFTP) file transfers are acceptable for transferring controlled data. This should be arranged via Barnet IS department. Secure FTP (SFTP) uses the Secure Shell protocol (SSH) to transfer files. Unlike FTP, SFTP encrypts both commands and data, preventing passwords and sensitive information from being transmitted openly over the network. It is the responsibility of the sender to ensure that the use of such a system is appropriate for the use they propose. If in doubt, seek advice from the IS Security Manager, [email protected]. 8
9 4.6. Removable storage devices (CD, DVD, USB drive & memory stick) When the size of the data being transferred or other restrictions (such as nonavailability of FTP or SFTP) make transfer methods inappropriate, removable media should be considered to transfer data. Where you are considering the transfer of controlled data the media used to perform encryption must conform to the AES 256 standard. Where a user has a machine with CheckPoint End point Security installed, an enabled USB port and an approved encrypted USB memory stick the user may be able to perform the operation of writing the data themselves. An enabled USB port will only be available to users who have been granted a policy exception (see Policy Exceptions Policy). The information transferred to the approved encrypted USB memory stick will be automatically encrypted. However the provisions required for communication of passwords detailed below must still be followed. For users who are required to write (copy / move) data to removable media and the USB port is not enabled on your computer or the quantity of data to be transferred is too large for memory stick, or CD/DVD, then assistance should be sought from IS. Where a removable/portable storage device is used, copying will be undertaken by IS to an encrypted data stick. All removable or portable storage devices used for data transfer must be encrypted by IS to AES 256 standards. Ownership of the media used must be established. The media must be returned to the owner on completion of the transfer and the transferred data must be securely erased from the storage device after use. Encrypted portable storage devices must be password protected with a strong password as set out in the council s Password Policy. The password itself must be conveyed to the third party in a separate communication from that covering the controlled data itself. You should provide clear instructions on the recipient s responsibilities and instructions on what to do if they are not the intended recipient. An accompanying message or filename must not reveal the contents of the encrypted file. The sender must check at an appropriate time that the transfer has been successful and obtain a receipt. An confirming receipt is acceptable. Report any issues to their line manager and in the case of missing or corrupt data to IS and IMT immediately. 9
10 4.7. Telephone / mobile phone As phone calls may be monitored, overheard or intercepted either deliberately or accidentally, care must be taken as follows:- Controlled data must not be transferred / discussed over the telephone unless you have confirmed the identity and authorisation of the recipient. When using answer phones do not leave sensitive or confidential messages, or include any personal data. Only provide a means of contact and wait for the recipient to speak to you personally. When listening to answer phone messages left for yourself, ensure you do not play them in open plan areas which risks others overhearing Internet based collaborative sites The use of peer to peer (P2P) or cloud file sharing programs such as Dropbox, Google Docs or Office 365 to exchange controlled data over the internet is not permitted unless specifically authorised by the IS Security Manager. They are inherently insecure if not implemented in a secured corporate environment. Where you believe you have a requirement to use this type of transfer you must speak with the IS Security Manager who will provide appropriate advice. Some organisations have secure portals for the transfer of information using appropriate protocols (SFTP etc.). These may be used after confirming that the organisation is entitled to receive the information and the portal is secure. If in doubt you should check with the IS Security Manager 4.9. Sending information by post As a local authority we will routinely send letters containing personal information to our customers for example in connection with council tax or benefit claims. However, whilst this is routine, care must still be taken to ensure that the information is correctly addressed to a named recipient and information is not sent in error to the wrong recipient. Mail going to the wrong person is a danger to the individual whose information is being sent. It also puts the council at risk of breaching our responsibilities under the DPA. You, as the sender, are responsible for making sure that: The postal address is correct. The envelope is clearly marked for the attention of the intended recipient. No information relating to another customer / service user has been included in error, either in a letter/ or an attached document. That you choose the most appropriate method of transfer. 10
11 You are responsible for the package up until its successful arrival at its destination. You must therefore ensure you choose the most appropriate method of transfer and mitigate any potential loss or risk to the information. Posting of sensitive / confidential data An extra level of protection must be applied when sending: a large amount (e.g. a file) of personal data (as defined by the DPA) or; Any amount of controlled data. It is essential that the document or file, whether sent on a media device or in paper form, is kept secure in transit, tracked during transit, and delivered to the correct individual. So you must ensure that: the package is securely and appropriately packed, clearly addressed and has a seal, which must be broken to open the package. the package must have a return address and contact details. the package must be received and signed for by the addressee, e.g. the use of special or recorded delivery. Successful delivery / transfer of the item must be checked as soon as possible. Any issues must be reported immediately to your line manager. NOTE: Staff members or teams who wish to send sensitive information in a way different to that prescribed above, must apply for a formal policy exception as outlined in the council s Policy Exception Policy, stating clear business reasons as to why an exception is required. An exception should be sought for one off requests as well as requests for an alternate way of working. Any exception granted will be reviewed annually. Staff and managers who do not abide by the above requirements will be in breach of council policy, which may lead to disciplinary action Use of internal mail The electronic sharing of information is preferable. However, where the use of internal mail is deemed appropriate, you must ensure that: post sent through the internal mail system is clearly and correctly addressed to the intended recipient. files or documents containing controlled data must not be transferred loose and should be appropriately packaged, in a sealed envelope, to avoid disclosure to others or loss of information. 11
12 if information is deemed reasonably high risk if lost or mislaid, where possible this should be hand delivered to the recipient department Hand delivery / collection Hand delivery or collection of a document is also an approved method of transfer. Remember however, if you are taking paper records off site you still need to ensure you are complying with the Paper Records Secure Handling and Transit Policy. Also when arranging for an individual to collect information, you should satisfy yourself that they are who they say they are and seek an appropriate form of identification before you hand over any documentation. 5. Transferring data outside of the United Kingdom / EEA You must speak to the Information Management Team before agreeing or undertaking any transfers of any data outside of the EEA. This is especially important when handling controlled data. You must check, as part of information management due diligence that any service providers you procure are not planning to process personal data outside the EEA. E.g. some service providers may use cloud based systems for data storage which are not UK based. Principle Eight of the Data Protection Act 1998 (DPA), requires that personal data must not be transferred to a country or territory outside the European Economic Area (EEA) unless the country or territory can provide an adequate level of protection for the rights and freedoms of the individuals whose data is being transferred. It is important to note that all other principles of the Data Protection Act are still relevant and must be complied with. 6. Reporting data incidents Staff must report any suspected or actual security breaches related to data transfer in line with the council s Security and Data Protection Incident Management Policy available on the intranet. 7. Policy review This policy will be reviewed on an annual basis or sooner as is required where there are changes in legislation or recommended changes to improve best practice. 12
13 8. Associated policies This policy forms part of a suite of Information Management policies which are all available on the intranet. The policies provide further guidance on council information standards, data security and working practices which must be adhered to. Further advice and guidance on transfer methods is available from the service desk [email protected] Tel: (020) or dial ext: 3333 If you are in any doubt whether a transfer can be undertaken in line with the Data Protection Act, please seek advice from the Information Management Team. [email protected] Tel: (020) or dial ext:
Data Transfer Policy London Borough of Barnet
London Borough of Barnet DATA PROTECTION 11 Document Control Document Description Data Transfer Policy Version v.2 Date Created December 2010 Status Authorisation Name Signature Date Prepared By: IS Checked
Information Security Policy. Appendix B. Secure Transfer of Information
Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008 Document Control Information Document ID Document
Policy Document Control Page
Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council
Remote Access and Home Working Policy London Borough of Barnet
Remote Access and Home Working Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Remote Access and Home Working Policy Document Description This policy applies to home and
Encrypt and Send Email Guide for Internal Users. How to send business or personally sensitive emails securely
Encrypt and Send Email Guide for Internal Users How to send business or personally sensitive emails securely Document control Description Encrypt and Send Email Guide for Internal Users Version V.2 Created
GCSx Email Guide for Internal Users. How to send sensitive business and personal information securely
GCSx Email Guide for Internal Users How to send sensitive business and personal information securely Document control Description Version V.2 Created May 2013 GCSx Email Guide for Internal Users Status
Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
Somerset County Council - Data Protection Policy - Final
Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)
Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How
Portable Devices and Removable Media Acceptable Use Policy v1.0
Portable Devices and Removable Media Acceptable Use Policy v1.0 Organisation Title Creator Oxford Brookes University Portable Devices and Removable Media Acceptable Use Policy Information Security Working
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
SECURITY POLICY REMOTE WORKING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:
Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers
IG Toolkit Version 8 Information Security Assurance Requirement 322 Detailed Guidance on Secure Transfers IG Toolkit Version 8 Requirement 322: Detailed guidance on secure transfers Page 1 of 7 All transfers
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
The best advice before you decide on what action to take is to seek the advice of one of the specialist Whistleblowing teams.
Whistleblowing Policy (HR Schools) 1.0 Introduction Wainscott school is committed to tackling unlawful acts including fraud, corruption, unethical conduct and malpractice regardless of who commits them,
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )
ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
Summary Electronic Information Security Policy
University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1
ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments
Borough of Poole Staff (Adult Social Care) Encryption: Sending secure, encrypted e- mails & attachments V8 Contents What is Encryption?...3 Why do I need to know about it?...3 How do I use it?...3 What
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information
Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Im&t directorate\policies\approved ig policiesprocedures.1 Index 1. Purpose... 3 2. Introduction... 3 3. Scope...
Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy
Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy Computer Security Policy Contents 1 Scope... 3 2 Governance... 3 3 Physical Security... 3 3.1 Servers... 3 3.2
Encryption Policy Version 3.0
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines
(This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3
Paper 9 Non ASPH Trust Staff - DATA ACCESS REQUEST Page 1/3 Please ensure that all THREE pages of this contract are returned to: Information Governance Manager, Health Informatics, Chertsey House, St Peter
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
Data Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy
School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3
Information Security Incident Protocol
Information Security Incident Protocol Document Owner Caroline Dodge Tel: 01622-221652 [email protected] Version Version 2: July 2013 Contents 1. Protocol Objectives 2. Scope 3. Protocol Statement
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
Records Management Policy & Guidance
Records Management Policy & Guidance COMMERCIALISM Document Control Document Details Author Nigel Spencer Company Name The Crown Estate Department Name Information Services Document Name Records Management
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
Data Protection Procedures
Data Protection Procedures PROCEDURE OVERVIEW: This Procedure outlines Down District Council s ( the Council ) commitment to the Data Protection Act 1998 ( the Act ) and provides a framework for the Council
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST 2011. Version 2.0
MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST 2011 Version 2.0 Western Health and Social Care Trust Page 0 of 6 Management of User Accounts Policy Policy Title MANAGEMENT OF USER ACCOUNTS AND
Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology
getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Information Security Policy. Chapter 12. Asset Management
Information Security Policy Chapter 12 Asset Management Author: Policy & Strategy Team Version: 0.5 Date: April 2008 Version 0.5 Page 1 of 7 Document Control Information Document ID Document title Sefton
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents:
Storage and Transfer of Person Identifiable Information Policy Trust Wide Policy number: ULH-IM&T-AUP03 Version: 1.1 New or Replacement: New Approved by: Executive Board Date approved: 14 th April 09 Name
Personal Data Handling and Sharing Policy
Personal Data Handling and Sharing Policy Originator Richard Gibson Date 20 June 2012 Verifier Lynda Oliver Date 20 June 2012 Reviewed Richard Gibson, Lynda Oliver Date July 2013 Contents Page 1. Introduction
LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3
LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website
Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
INFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
