USB Data Stick Procedure

Size: px
Start display at page:

Download "USB Data Stick Procedure"

Transcription

1 SH IG 41 INFORMATION SECURITY SUITE OF POLICIES Procedure for the Management of Personal Data Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review : This procedure details the process for ordering an encrypted data stick for use by staff as part of the management of personal information procedures. Data stick; USB stick; information security; mobile working; data transfers; All staff employed by Southern Health NHS Foundation Trust, Non-Executive Directors and Contractors. April 2019 (or earlier if required). Approved & Ratified by: Information Governance Group of meeting: 14/03/2016 issued: Author: Sponsor: Sharon France Information Governance Manager Lesley Barrington Head of Information Assurance 1

2 Version Control Change Record Author Version Page Reason for Change 02/04/2013 S France V1 All Update for SHFT 24/05/2013 S France V1 All IGG Approved 22/01/2016 S France V2 Formal review/general update, to include: The use of unencrypted data sticks for non PID. Pooled Assets Information Asset Owner Audit and Accountability. Loss of Data sticks. Update to Appendix A. Appendix B and C added. 25/01/16 P Whittle V2 All Formatting and added reallocation step Reviewers/contributors Name Position Version Reviewed & Lesley Barrington Head of Information Assurance V1 02/04/2013 Information Governance Group Membership for review V1 02/04/2013 Ed Purcell IT Security Specialist V2 10/02/2016 Donna Woolley Information Governance Facilitator V2 10/02/2016 Information Governance Group Membership for review V2 14/03/2016 2

3 Contents 1 Introduction 4 2 When to User a Data Stick 4 3 Alternatives to Data Sticks 4 4 Applying for an Encrypted Data Stick 5 5 Information Asset Owner (IAO) - Audit and Accountability 5 6 Lost or Stolen Data Stick Unencrypted Encrypted 6 Page Appendices A Encrypted USB Data Stick Request Form 7 B Unencrypted USB Data Stick Request Form 8 C Register for Data Sticks being used as a Pooled Asset 9 3

4 1 Introduction 1.1 Data sticks are small in size but can hold a significant amount of data. These characteristics make the devices convenient mechanisms to transfer electronic data but these same characteristics also increase the potential for the loss or theft of a device and the subsequent loss of data held on the device. This risk is effectively mitigated through the use of an encrypted stick as all the data on the device is unreadable, without the password to enable access to the files on the device. 2 When to Use a Data Stick 2.1 A data stick is NOT recommended for long term storage and should only be used as a means of safe transportation from one location to another. All Trust data should be downloaded as soon as practical and stored on secure network drives that are regularly backed-up. 2.2 Personal Information - Trust preferred Data sticks 2.3 If personal information is to be transferred via a data stick it must be via a Trust approved encrypted device which will be purchased via the Information Assurance Team, on completion of an approved request form - Appendix A. 2.4 Non-personal Information Unencrypted Data Sticks 2.5 These must NEVER be used for personal identifiable, or corporate sensitive information. The Information Asset Owner must be able to assure the Trust that unencrypted data sticks will only be used for the transfer of non-personal or non-sensitive information such as training resources (not considered commercially sensitive). 2.6 The use of these must also be noted by the Information Assurance Team and documented as an exception to using the Trust preferred SafeStick. 3 Alternatives to Data Sticks 3.1 The Information Asset Owner (IAO) has the responsibility of taking ownership of local asset control, risk assessment and management processes. Before approving a request for a data stick the IAO must: 3.2 Consider other alternative methods to transferring data before proceeding with the request for an encrypted device. 3.3 NHSmail considered NHSmail is the Trust preferred method and a secure way of transferring information but it has some limitations. The user needs an NHSmail account to send the message. The transfer will be secure if the data is sent to another NHSmail account or an account with one of the other public service organisations that are listed in SH IG 42 Procedure for the Management of Personal Information, available on the Trust web site. The maximum file size for an NHSmail transfer is 20MB. Data which is not Person Identifiable can be sent by ordinary Outlook . 4

5 3.4 Staff to have an encrypted laptop with a checkpoint account which allows for the data to be kept on a secure Trust server whilst the user gains access to the server/shared drives from a remote location (e.g. if working from home). 3.5 Staff to have a smart working laptop that is fully encrypted, and allows access to secure drives via 3G. 3.6 Staff are able to access to the NHS Secure File Transfer (SFT) process. Secure File Transfer (SFT) also requires the people at both ends to have NHSmail accounts but it can transfer files up to 1GB in size. SFT can be used from any Internet connection. More information about SFT is available at For use of file encryption to protect attachments sent via outlook please contact IT Service Desk Applying for an Encrypted Data Stick 4.1 If the alternatives listed above are not suitable and the member of staff wishes to proceed to use an encrypted data stick they should complete the request form, appendix A. 4.2 On receipt of the request form, if the Team Manager wishes to support the request they should sign it and provide the relevant budget code then pass to the relevant IAO for final authorisation. 4.3 The request form should be sent to the IG team for processing 4.4 hp-tr.informationassuranceteam@nhs.net 5 Information Asset Owner (IAO) - Audit and Accountability 5.1 IAO must keep a register of approved data sticks and their keepers, on their local IT equipment asset registers, for accountability and identification purposes. 5.2 Safesticks are allocated with a unique asset label by Information Governance (IG) that cross references the internal software serial number. 5.3 Note: nothing must be attached to the data stick that Identifies it belongs to the NHS or SHFT Identifies contents or data held on the data stick 5.4 Do not reveal the Password. 5.5 Some teams have a local process which requires a pool of data sticks. The IAO must ensure these data sticks are locally recorded and tracked on the Register for Data Sticks being used as a pooled Asset. Refer to Appendix D 5.6 IAO must notify the IG Team immediately if they plan to reallocate a Data Stick to another user and also complete Appendix A (for the new user). 5.7 IAO must retrieve any Datasticks from leavers and return them to IG for reallocation, please contact the IG Team on Any unencrypted datastick must be passed from hand to hand: it may not be posted or sent by courier. 5

6 5.9 IAO must review the purpose and need for each data stick at least annually and report back to the IG Team if there are any anomalies 6 Lost or Stolen Data Stick 6.1 Unencrypted In the event that an Unencrypted USB Data Stick is lost or stolen, the member of staff, upon discovery, must immediately: Report the loss to their Team Manager to enable; a) The amendment of the local IT Asset Register b) The loss is escalated to the relevant IAO Complete an incident form on Ulysses. The incident type - general category will be Information Governance and Confidentiality Breach and the subcategory will be Lost or Stolen Electronic/Equipment In the event that the Data Stick has Personal Information stored on it, a full assessment of the potential data breach MUST be undertaken to enable appropriate recording of severity and impact of the incident Inform the Information Assurance team NOTE: Transporting/storing personal identifiable information on an unencrypted USB Data Stick could result in disciplinary actions, or in the case where there is a potential breach of the data protection act, the incident may be reportable to the Information Commissioners Office. 6.2 Encrypted In the event that an encrypted USB Data Stick is lost or stolen, the member of staff, upon discovery, must immediately: Report the loss to their Team Manager to enable; a) The amendment of the local IT Asset Register b) The loss is escalated to the relevant IAO Complete an incident form on Ulysses. The incident type - general category will be Security Concern and the subcategory will be Loss or Missing Property Inform the Information Assurance team to enable them to update the Trust s Data Stick Asset Register. 6

7 Appendix A - Encrypted USB Data Stick Request Form Name Team Division Full base Location / Postal Address Contact Number Team Budget Cost Code (Sxxxxx) (Cost = per 4GB USB data stick) For what purpose is the USB data stick to be used? Please confirm the following in next column: It is not practical to retain the data on a secure Trust server and use Check Point for remote access. It is not practical to the data (using encrypted i.e. NHSmail, for personal data). It is not practical to transport the data on an encrypted Trust laptop. It is not practical to transfer the data via NHS Secure File Transfer (SFT) or approved dropbox, or WINZIP encryption The USB data stick will be used for appropriate information in accordance with the Data Protection Act. The USB data stick will be kept in a secure place, using the same level of care as is applied to laptops. The USB data stick will be returned to Information Asset Owner if it is no longer required or its use no longer authorised. Does the Information Asset Owner accept the proposed use of the data stick? (please circle Y or N) Y / N The Information Asset Owner (IAO) has the responsibility of taking ownership of local asset control, risk assessment and management processes before approving this request for a data stick. The requester is accountable to the IAO for ensuring appropriate use of the USB data stick. Is this request for a new Datastick or reallocation of previous purchase (Please circle New or Reallocation) Signature of Requester NEW REALLOCATION PRINT Requester s name Signature of Line Manager PRINT Line Manager s name Signature of Information Asset Owner (IAO) PRINT IAO s name Send completed forms to hp-tr.informationassuranceteam@nhs.net 7

8 Appendix B Unencrypted USB Data Stick Request Form For the transfer of Non-Personal and Non-Corporate Sensitive Information Name Team Division Contact Number Full base Location / Postal Address For what purpose is the USB data stick to be used? Please confirm the following in next column: The Unencrypted USB data stick will only be used for the transfer of Non-Personal Information The Unencrypted USB data stick will not be used for the transfer of Corporate Sensitive Information It is not practical to transport the data on an encrypted Trust laptop. The USB data stick will be returned to Information Asset Owner if it is no longer required or its use no longer authorised. Does the Information Asset Owner accept the proposed use of the data stick? (please circle Y or N) Y / N The Information Asset Owner (IAO) has the responsibility of taking ownership of local asset control, risk assessment and management processes before approving this request for a data stick. The requester is accountable to the IAO for ensuring appropriate use of the USB data stick. Signature of Requester PRINT Requester s name Signature of Information Asset Owner (IAO) PRINT IAO s name Send completed forms to hp-tr.informationassuranceteam@nhs.net 8

9 Appendix C - Register for Data Sticks being used as a Pooled Asset Division / Team Base Location Information Asset Owner (IAO) Your datastick will have an asset sticker similar to the example on the left. This is a unique number and is cross referenced with the serial number in our asset data base. It is the responsibility of the IAO to ensure datasticks are accounted for and to be able to demonstrate this during any audit spot checks. Datastick asset No. Where is the Datastick being assigned to e.g. clinic, training session etc. taken DD/MM/YY Print Name Signature returned DD/MM/YY Contents erased Y/N Print name Signature 9

ICT Password Protection Policy

ICT Password Protection Policy SH IG 30 Information Security Suite of Policies ICT Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This document describes the information security

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):

More information

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Number: THCCGCG36 Version: 01 Executive Summary This Policy defines the Security requirements for data encryption upon laptops, physical media and Secure File Transfer within the

More information

Standard Operating Procedure. Secure Use of Memory Sticks

Standard Operating Procedure. Secure Use of Memory Sticks Standard Operating Procedure Secure Use of Memory Sticks DOCUMENT CONTROL: Version: 2.1 (Amendment) Ratified by: Finance, Infrastructure and Business Development Date ratified: 20 February 2014 Name of

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

Use of Scanned Signatures Procedure

Use of Scanned Signatures Procedure SH IG 57 Information Security Suite of Policies Use of Scanned Signatures Procedure Summary: This procedure describes the Southern Health NHS Foundation Trust (the Trust) process for the use of scanned

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Please be aware that this printed version of the Policy may NOT be the latest version. Staff are reminded that they should always refer to the Intranet for the latest version. Purpose

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

Policy for the Secure Use of USB Memory Sticks. Choice, Responsiveness, Integration & Shared Care

Policy for the Secure Use of USB Memory Sticks. Choice, Responsiveness, Integration & Shared Care Policy for the Secure Use of USB Memory Sticks Choice, Responsiveness, Integration & Shared Care Worcestershire Mental Health Partnership NHS Trust Information Reader Box Document Type: Document Purpose:

More information

Data Quality Policy SH NCP 2. Version: 5. Summary:

Data Quality Policy SH NCP 2. Version: 5. Summary: SH NCP 2 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: The Trust provides a framework to ensure all data that is recorded by the Trust is accurate and complies to

More information

Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents:

Name of responsible committee: Information Governance Board Date issued: 15 th April 09 Review date: 14 th April 11 Referenced Documents: Storage and Transfer of Person Identifiable Information Policy Trust Wide Policy number: ULH-IM&T-AUP03 Version: 1.1 New or Replacement: New Approved by: Executive Board Date approved: 14 th April 09 Name

More information

Bulk Data Transfer Guidelines

Bulk Data Transfer Guidelines Bulk Data Transfer Guidelines This procedural document supersedes: CORP/ICT 20 v.1 Bulk Data Transfer. Did you print this document yourself? The Trust discourages the retention of hard copies of policies

More information

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY Putting Barnsley People First BARNSLE CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLIC Version: 2.0 Approved By: Governing Body Date Approved: Feb 2014 (initial approval), March

More information

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers IG Toolkit Version 8 Information Security Assurance Requirement 322 Detailed Guidance on Secure Transfers IG Toolkit Version 8 Requirement 322: Detailed guidance on secure transfers Page 1 of 7 All transfers

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information

Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Safe Haven Procedure for the Secure Transmission of Personally Identifiable Information Im&t directorate\policies\approved ig policiesprocedures.1 Index 1. Purpose... 3 2. Introduction... 3 3. Scope...

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers

Information Governance Toolkit. Information Security Assurance. Detailed Guidance on Secure Transfers Information Governance Toolkit Information Security Assurance Detailed Guidance on Secure Transfers Information Transfers/Flows - Security Measures 1. The outcomes of information mapping and identified

More information

Incident reporting procedure

Incident reporting procedure Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Information Technology and Governance Committee

Information Technology and Governance Committee Information Technology and Governance Committee Paper Title: Enhancing Information Governance at Loughborough University Author: Information Governance Sub-Committee 1. Specific Decision Required by Committee

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

Remote Working and Portable Devices Policy

Remote Working and Portable Devices Policy Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review

More information

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Data Transfer Policy. Data Transfer Policy London Borough of Barnet Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third

More information

Policy Document. IT Computer Usage Policy

Policy Document. IT Computer Usage Policy Policy Document IT Computer Usage Policy ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Author IT Services Manager Version 4.1 Issue Issue Date

More information

Information Governance Framework

Information Governance Framework Information Governance Framework Authorship: Chris Wallace, Information Governance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date: March

More information

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework Putting Barnsley People First Barnsley Clinical Commissioning Group Information Governance Policy and Management Framework Version: 1.1 Approved By: Governing Body Date Approved: 16 January 2014 Name of

More information

your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO:

your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW10-110 SOP 3 SOP NO: VERSION NO: STANDARD OPERATING PROCEDURE: Safe Haven Procedure SOP NO: VERSION NO: APPROVING COMMITTEE: DATE THIS VERSION APPROVED: TW10-110 SOP 3 3 Information Governance Committee July 2013 RATIFYING COMMITTEE:

More information

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1. Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

USE OF PERSONAL MOBILE DEVICES POLICY

USE OF PERSONAL MOBILE DEVICES POLICY Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014

More information

Introduction to the NHS Information Governance Requirements

Introduction to the NHS Information Governance Requirements Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely

More information

Information Governance Management Framework

Information Governance Management Framework Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Document History Document Reference: Document Purpose: Date Approved: Approving Committee: To set out the technical capabilities of the chosen security solution Airwatch

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

Policies and Procedures. Policy on the Use of Portable Storage Devices

Policies and Procedures. Policy on the Use of Portable Storage Devices Policies and Procedures Policy on the Use of Date Approved by Trust Board Version Issue Date Review Date Lead Person One May 2008 Dec 2012 Head of ICT Two Dec 2012 Dec 2014 Head of ICT Procedure /Policy

More information

Remote Access Policy

Remote Access Policy BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is

More information

Ixion Group Policy & Procedure. Remote Working

Ixion Group Policy & Procedure. Remote Working Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises

More information

Mobile Phone and Remote Access Policy

Mobile Phone and Remote Access Policy Mobile Phone and Remote Access Policy Reference No: Version: 2 Ratified by: P_IG_23 LCHS Trust Board Date ratified: 29 th July 2014 Name of originator/author: Name of approving committee/responsible individual:

More information

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid. Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,

More information

Information Governance Policy

Information Governance Policy Policy Policy Number / Version: v2.0 Ratified by: Audit Committee Date ratified: 25 th February 2015 Review date: 24 th February 2016 Name of originator/author: Name of responsible committee/individual:

More information

INFORMATION GOVERNANCE POLICY & FRAMEWORK

INFORMATION GOVERNANCE POLICY & FRAMEWORK INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

Mobile and Remote Working Policy

Mobile and Remote Working Policy Mobile and Remote Working Policy UNIQUE REF NUMBER: AC/IG/018/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

Why do we need to protect our information? What happens if we don t?

Why do we need to protect our information? What happens if we don t? Warwickshire County Council Why do we need to protect our information? What happens if we don t? Who should read this? What does it cover? Linked articles All WCC employees especially mobile and home workers

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information Security Policy. Version 2.0

Information Security Policy. Version 2.0 1 Intranet and Website Upload: Intranet Website Keywords: Electronic Document Library CCGs G Drive Location: Location in FOI Publication Scheme Information, Security, Information Governance, IG, Data Protection.

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

IT change management policy

IT change management policy IT change management policy Document Description Document Type Guidance Service Application NHS Birmingham South Central CCG (BSC) Version 0.3 Ratification date 20 June, 2013 Review Date March 2014 Name

More information

Information Security and Governance Policy

Information Security and Governance Policy Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

Information Security Assurance Plan 2015/16

Information Security Assurance Plan 2015/16 Information Security Assurance Plan 2015/16 Policy number: N/A Version 2.0 Approved by Name of author/originator Owner (Exec Director) Date of approval August 2015 Date of last review July 2015 Next due

More information

Information Security Suite of Policies. Email Policy. Version 1. May 2019 or sooner if required. Information Governance Group (IGG)

Information Security Suite of Policies. Email Policy. Version 1. May 2019 or sooner if required. Information Governance Group (IGG) SH IG 59 Information Security Suite of Policies Email Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This policy details how email

More information

Human Subject Research: HIPAA Privacy and Security. Human Research Academy 101

Human Subject Research: HIPAA Privacy and Security. Human Research Academy 101 Human Subject Research: HIPAA Privacy and Security Human Research Academy 101 Your Enterprise Privacy Officer Christine Adams, CHC, CHPC Enterprise Privacy Officer Compliance & Enterprise Risk Management

More information

Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation

Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation Northumberland, Newcastle North and East, Newcastle West, Gateshead, South Tyneside, Sunderland, North Durham, Durham Dales, Easington and Sedgefield, Darlington, Hartlepool and Stockton on Tees and South

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Encryption Policy Version 3.0

Encryption Policy Version 3.0 Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

INFORMATION RISK MANAGEMENT POLICY

INFORMATION RISK MANAGEMENT POLICY INFORMATION RISK MANAGEMENT POLICY DOCUMENT CONTROL: Version: 1 Ratified by: Steering Group / Risk Management Sub Group Date ratified: 21 November 2012 Name of originator/author: Manager Name of responsible

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

Information Security Policy

Information Security Policy Document reference: Version 3.0 Date issued: April 2015 Contact: Matthew Jubb Information Security Policy Revision History Version Summary of changes Date V1.0 First version finalised. February 2006 V1.1

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Policy Summary This policy outlines the organisation s approach to the management of Information Governance and information handling. It explains the accountability and reporting

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Supplier Remote Access Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Purpose or aim...3. 3. Scope...3. 4. Definitions...

Supplier Remote Access Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Purpose or aim...3. 3. Scope...3. 4. Definitions... Supplier Remote Access Policy Board library reference Document author Assured by Review cycle P157 Information Security and Technical Assurance Manager Finance and Planning Committee 1 year This document

More information

CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY

CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY CONTACTING SERVICE USERS BY TEXT MESSAGES (SMS) POLICY POLICY NUMBER 098/Corporate POLICY VERSION 1 RATIFYING COMMITTEE Information Governance Group DATE RATIFIED May 2012 DATE OF EQUALITY & HUMAN RIGHTS

More information

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:

E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience: E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:

More information

Remote Access and Network Security Statement For Apple

Remote Access and Network Security Statement For Apple Remote Access and Mobile Working Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Remote Access and

More information

Mobile Devices Security Policy

Mobile Devices Security Policy Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU

More information

Data Transfer Policy London Borough of Barnet

Data Transfer Policy London Borough of Barnet London Borough of Barnet DATA PROTECTION 11 Document Control Document Description Data Transfer Policy Version v.2 Date Created December 2010 Status Authorisation Name Signature Date Prepared By: IS Checked

More information

SMS Text Messaging to Service Users Policy

SMS Text Messaging to Service Users Policy SMS Text Messaging to Service Users Policy Reference No: Version: 2 Ratified by: P_IG_24 LCHS Trust Board Date ratified: 29 th July 2014 Name of originator/author: Name of responsible committee/individual:

More information

Informatics Policy. Information Governance. Network Account and Password Management Policy

Informatics Policy. Information Governance. Network Account and Password Management Policy Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information

More information

Personal Identifiable Data Security Policy

Personal Identifiable Data Security Policy Personal Identifiable Data Security Policy Number: THCCGCG43 Version: 01 Executive Summary This Policy defines the Security requirements for all Staff involved in handling Person Identifiable Data (PID)

More information

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review:

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review: POLICY DOCUMENT Burton Hospitals NHS Foundation Trust INFORMATION SECURITY POLICY Approved by: Executive Management Team On: 16 January 2014 Review Date: December 2015 Corporate / Directorate Clinical

More information

POLICY DOCUMENT. Policy on Mobile / Portable Computing Devices and Data Security. Release: Final Date Created: 3 March 2009

POLICY DOCUMENT. Policy on Mobile / Portable Computing Devices and Data Security. Release: Final Date Created: 3 March 2009 POLICY DOCUMENT Policy on Mobile / Portable Computing Devices and Data Security Release: Final Date Created: 3 March 2009 Owner: David Priest Compiled by: David Priest Document Reference: Page 1 of 8 Printed:

More information

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3

More information

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective.

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective. Good Practice Audit outcomes analysis Police Forces April 2013 to April 2014 This report is based on the final audit reports the ICO completed in the Criminal Justice sector, specifically of Police forces,

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version 1.1 Responsible Person Information Governance Manager Lead Director Head of Corporate Services Consultation Route Information Governance Steering Group Approval Route

More information

Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs

Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs NOTE: This is a CONTROLLED Document. Any documents appearing in paper

More information

Central London Community Healthcare NHS Trust. Data protection audit report

Central London Community Healthcare NHS Trust. Data protection audit report Central London Community Healthcare NHS Trust Data protection audit report Executive Summary July 2014 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with

More information

MOBILE COMPUTING & REMOTE WORKING POLICY AND PROCEDURE. Documentation Control. Consultation undertaken Information Governance Committee

MOBILE COMPUTING & REMOTE WORKING POLICY AND PROCEDURE. Documentation Control. Consultation undertaken Information Governance Committee MOBILE COMPUTING & REMOTE WORKING POLICY AND PROCEDURE Documentation Control Reference GG/INF/020 Date Approved 13 Approving Body Directors Group Implementation date 13 Supersedes Not Applicable Consultation

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):

More information