Digital Continuity to Support Forensic Readiness
|
|
|
- Homer Fisher
- 9 years ago
- Views:
Transcription
1 Digital Continuity to Support Forensic Readiness This guidance is produced by the Digital Continuity Project and is available from
2 Crown copyright 2011 You may re-use this document (not including logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit or write to the Information Policy Team, The National Archives, Kew, Richmond, Surrey, TW9 4DU; or Any enquiries regarding the content of this document should be sent to Page 2 of 14
3 Contents 1. Introduction What is the purpose of this guidance? Who is this guidance for? What is digital continuity? What does digital continuity loss look like? The process of managing digital continuity Digital continuity and forensic readiness Managing the digital continuity of your evidence Plan for action Define your digital continuity requirements Identify your information assets Define how you need to use your information Map the technical dependencies of your information assets Assess and manage risks to digital continuity Maintain digital continuity Further reading...14 Page 3 of 14
4 1. Introduction Digital continuity is the ability to use your information in the way that you need, for as long as you need. This means managing digital information effectively through periods of change so it remains complete, available and therefore usable as required. Managing digital continuity can help to provide your organisation with assurance that you are effectively managing information to meet your forensic readiness requirements. Digital continuity and forensic readiness are mutually supportive. If you are working through the process of managing your digital continuity, 1 the details of your forensic readiness policy will form one of the business requirements, and the forensic evidence must be evaluated as part of your information asset identification. If on the other hand you are developing your forensic readiness policy, you must consider the risks of losing the digital continuity of your evidence assets and guard against these losses. You will need to ensure that your information management and IT teams understand those needs, and manage your organisation s information assets and technical environment to provide the usability you need. If your forensic readiness needs change, you need to update your information management and IT teams so that they, in turn, can update their information asset and IT management processes. 1.1 What is the purpose of this guidance? This guidance will: help you understand what digital continuity is explain how digital continuity supports forensic readiness explain how you can manage the digital continuity of your forensic assets. Digital Continuity and Forensic Readiness is part of a suite of guidance 2 that The National Archives has delivered as part of a digital continuity service for government, in consultation with central government departments. 1 See more on the four-stage process of managing digital continuity in our guidance nationalarchives.gov.uk/information-management/our-services/dc-step-by-step-guidance.htm 2 For more information and guidance, visit nationalarchives.gov.uk/dc-guidance Page 4 of 14
5 This guidance assumes you are familiar with, or working through the CESG Good Practice Guide on Forensic Readiness 3 which explains in detail your responsibilities, best practices and a template for the forensic readiness policy itself. 1.2 Who is this guidance for? This guidance is targeted at the person responsible for forensic readiness in an organisation, generally the Senior Information Risk Owner (SIRO) or a delegated representative. 3 CESG, Good Practice Guide No. 18, (2009) Forensic Readiness, Issue No: 1.0 Page 5 of 14
6 2. What is digital continuity? Managing digital continuity means managing information over time and through change so that it remains complete, available and therefore usable. The digital continuity of your information is maintained when your technology and information management processes support your information assets in meeting your business requirements both now, and in the future. This is when: you know what information you have, what it is about and where it is you understand how you want to use it, now and in the future your technology and information management process enables you to use your information, and is agile enough to cope with your changing requirements. Digital continuity is achieved when your technology supports the business use you need from your information assets. 2.1 What does digital continuity loss look like? Digital continuity loss can manifest itself in five ways, leaving you unable to: find the information you need open the information you need use the information in the way you need (e.g. to export it or filter it) understand what your information is about trust your information is what it says it is. Sometimes it is possible to recover your information once digital continuity is lost, but this may be expensive, time consuming or not possible at all. 2.2 The process of managing digital continuity The SIRO is required to ensure all information risks are recognised and managed in an organisation, and this includes risks to digital continuity. However, SIROs will likely delegate the responsibility for driving forward action on digital continuity to a Senior Responsible Owner (SRO) who may, for instance, be the Head of Knowledge and Information Page 6 of 14
7 Management (KIM). The SRO will then work alongside other members of the organisation including the IT team and the Information Asset Owners (IAOs). The key stages in managing your digital continuity are: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital continuity Stage 4: Maintain digital continuity Page 7 of 14
8 3. Digital continuity and forensic readiness Forensic Readiness is the achievement of an appropriate level of capability by an organisation in order for it to be able to collect, preserve, protect and analyse Digital Evidence so that this evidence can be effectively used in any legal matters, in disciplinary matters, in an employment tribunal or in a court of law CESG, Good Practice Guide No. 18, Forensic Readiness Digital continuity is vital to forensic readiness because once you have identified what evidence you may be required to produce, you must consider how you are going to retrieve and make use of that information when you need it. Managing digital continuity and including the business need for forensic readiness in that management will ensure that you retain the usability you need from your information. The CESG Good Practice Guide on Forensic Readiness (Good Practice Guide No. 18) describes twelve significant principles that organisations should observe as part of their adoption of forensic readiness. Principles 9 and 10 are heavily related to digital continuity: Principle 9 Organisations should maintain the quality and effectiveness of their records management systems in order that specific business records can be produced as evidence in court or to address any legal or regulatory requirement. 4 Principle 10 Organisations should provide appropriate records retrieval processes and mechanisms in order that any requirement to disclose information can be efficiently and securely dealt with. Such disclosures MUST be handled in accordance with all relevant legislation and regulations. 5 GPG 18 also states It is important that the retrieval process is effective, efficient and secure The technology and methods used should support the selective release of information so that the appropriate information can be retrieved and isolated for release. 6 If you have lost the digital continuity of your evidence, you will not be able to retrieve it effectively and efficiently. 4 CESG, Good Practice Guide No. 18, (2009) Forensic Readiness, Issue No: 1.0, p 29 5 CESG, Good Practice Guide No. 18, (2009), p 30 6 CESG, Good Practice Guide No. 18, (2009), p 31 Page 8 of 14
9 4. Managing the digital continuity of your evidence Your organisation may already have policies and processes in place to manage digital continuity. The organisation s SIRO or Head of KIM should be able to provide more information and make sure that your requirements and assets are included in the policies and processes if they have not already done so. If however your organisation has not already included your requirements for digital continuity in the policies and processes, you can do it yourself. You can apply the four-stage process of managing digital continuity, described below, to just your own section of information without having to take on the responsibility of creating processes for the whole organisation. 4.1 Plan for action You need to consider the scope of your work and your priorities. One of the most important aspects of both forensic readiness and digital continuity is the time-value of digital assets. Digital continuity is all about ensuring information is available over time and through change, so you must understand how long you need to keep information for and set appropriate retention schedules for particular types of digital evidence. Depending on the type of evidence you are creating, it may be that you should not keep information for any lengthy period of time, so it is possible that losing digital continuity is only a very minor risk to your forensic readiness. For example, you should not keep personal information longer than is necessary for the purpose for which it was created. Other information needs to be subject to a similar review process log files, for example, can be very large and difficult to search and it may not be necessary to keep them for more than 12 months. 4.2 Define your digital continuity requirements The steps below are covered in greater detail by two pieces of guidance Identifying Information Assets and Business Requirements 7 which will help you identify information 7 See Identifying Information Assets and Business Requirements nationalarchives.gov.uk/documents/information-management/identify-information-assets.pdf Page 9 of 14
10 assets and their requirements and help you assemble an Information Asset Register (IAR), and Mapping the Technical Dependencies of Information Assets and their Business Requirements 8 which is aimed at your IT team and will help them to provide the information you need on the technology mapping Identify your information assets As part of putting together your forensic readiness policy, you will have identified the sorts of information and evidence you need to gather and how you may need to use them. These are your information assets. 9 You should then compile the information you have on these assets and their requirements into an IAR Define how you need to use your information How you need to use your information covers everything from how you find it, through how you access it to what you do with it. You must also consider any surrounding or supporting information which is important. There are five questions you will need to answer and record in your IAR: 1. How will you find the information? (i.e. where is it?) 2. Who can access the information and how? (i.e. who owns the information, who is the key contact regarding this asset? How quickly do you need to be able to access it? How long do you need it to be accessible for?) 3. What do you need to be able to do with the information? (i.e. do you need to able to read it, print it, publish it, share it with others, interrogate or query it, use it to generate reports?) 4. What do you need to be able to understand about your information? (i.e. what level of context do you need what metadata exists? Do you need related information assets in order to interpret it?) 5. Do you trust your information is what it claims to be? (i.e. what do you need from your information in order for it to be used as evidence for a forensic investigation?) 8 See Mapping the Technical Dependencies of Information Assets nationalarchives.gov.uk/documents/information-management/mapping-technical-dependencies.pdf 9 An information asset is a body of information, defined and managed as a single unit so it can be understood, shared, protected and exploited effectively. For more on information assets, see Identifying Information Assets and Business Requirements nationalarchives.gov.uk/documents/information-management/identify-information-assets.pdf Page 10 of 14
11 For each of these issues you must consider what the requirements are at the moment, and how they might change over time. This will encompass the retention schedules imposed on your assets. For forensic records, the security and access regimes are also very important and so should be covered in detail here. These questions above form the core of digital continuity what usability you need to maintain for your information over time and through change. If you lose the ability to find, access, use, understand and trust your information in the way that you need, you have lost its digital continuity Map the technical dependencies of your information assets The next step is to put together a comprehensive list of the technologies that are required to support each of the information assets; this will help provide better understanding of where issues could arise day-to-day and through change. This audit will cover all aspects of technology that might impact upon your evidence storage, backups, security, software, search tools. To do this we recommend liaising with your Head of IT who will be able to provide this information. When you have gathered this information and added it against each record in your IAR, you will have a list of all your sources of evidence, their key information, how you need to use them, and the technology that they rely on. This list will allow you to manage your digital continuity in the future. 4.3 Assess and manage risks to digital continuity The third stage of managing your digital continuity is to do an assessment to determine whether your assets are at risk of losing their digital continuity. For the purposes of forensic readiness, you will probably have noticed potential risks as you went through the process of identifying the assets and their requirements. Key risks are not being able to find the information you are looking for and not being able to verify that it is what it claims to be. This risk assessment should be performed alongside the preparation of the rest of your forensic readiness policy which will cover the security issues. Page 11 of 14
12 Many of the risks to the sort of information assets you will be using for forensic readiness are technology related, so it is vital to work closely with your IT teams to perform risk assessments and take mitigating action. The risks should be documented and a follow up schedule planned. You should assess your risks corresponding to the requirements you ve outlined in section above. Key questions to ask yourself on the risks to your digital continuity requirements: Am I at risk of not being able to find the right information when I need to? Do I know where it s kept, how to find or search for it? What is the back up process, how is it being managed and how do I retrieve it? Am I at risk of not being able to access the information when I need it? What technology do I need to maintain in order to access it? What access permissions are needed? Am I going to be able to use the information as I need to? What technology might I need to maintain in order to use it? Do I need to keep it in a particular format in order to use it as I need to? Am I at risk of not being able to understand the information? What contextual or related information am I dependent on to be able to interpret it correctly? Am I at risk of not being able to trust in the information? How will I be able to use it as evidence and prove its authenticity and reliability? 4.4 Maintain digital continuity Once you have documented your information and what the usability requirements are to enable it to be used as evidence, you must make sure that its digital continuity is protected through time and change. As the digital continuity guidance makes clear, 10 the main risks to digital information are organisational and technological change. Information is most likely to be lost when systems are replaced or organisations restructured. It is important to understand how changes might 10 See The National Archives digital continuity guidance nationalarchives.gov.uk/dc-guidance Page 12 of 14
13 impact on the usability of your forensic assets and to see whether the information assets, technology and usability requirements will still align following change. It must be clear whether assets which have a long-term forensic value can continue to be accessible. Principle 6 Organisations should closely integrate Forensic Readiness plans with incident management and other related business planning activities. It is important that Forensic Readiness is not treated as an isolated discipline as this would lead to both inefficiencies and inevitable conflict. Consider a situation where a digital forensic investigation is launched only to find the ICT target of interest has been rebuilt to apply a software upgrade: the evidence would have been destroyed. 11 The IAR you have developed should provide a clear guide to which pieces of information are linked to which pieces of technology. Maintaining good communications between the information asset owners and the corresponding owners of the technologies means any changes can be planned so that they do not compromise the value of the information. For more information on how to take care of your information assets through change, there will be several pieces of guidance 12 available on The National Archives website. 11 CESG, Good Practice Guide No. 18, (2009), p For more information and guidance, visit nationalarchives.gov.uk/digitalcontinuity Page 13 of 14
14 5. Further reading The following texts will help you to find out more about forensic readiness: CESG, Good Practice Guide No. 18, (2009) Forensic Readiness, Issue No: 1.0 Provides good practice that can help to define and implement an approach to the development of Forensic Readiness Policy and associated planning and practice activities. The guidance provided is generic and includes information on how it can be applied to suit the requirements of individual organisations. Rowlingson, R. (2004) A Ten Step Process for Forensic Readiness, International Journal of Digital Evidence, Volume 2, Issue 3 This paper is intended for those with responsibility for, or potential involvement in, computer investigations... The aim of this document is to present the outline of a forensic readiness planning process that an organisation can adopt and adapt to its specific requirements. You can download the paper here: df You can also read more guidance on managing digital continuity online: nationalarchives.gov.uk/information-management/our-services/dc-step-by-step-guidance.htm Page 14 of 14
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Embedding Digital Continuity in Information Management
Embedding Digital Continuity in Information Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Identifying Information Assets and Business Requirements
Identifying Information Assets and Business Requirements This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Digital Continuity for Change Managers
Digital Continuity for Change Managers This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and address risks to digital continuity Stage
Digital Continuity in ICT Services Procurement and Contract Management
Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage
Guide 1 What is records management?
Guide 1 What is records management? This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by the Lord Chancellor under section
MANAGING DIGITAL CONTINUITY
MANAGING DIGITAL CONTINUITY Project Name Digital Continuity Project DRAFT FOR CONSULTATION Date: November 2009 Page 1 of 56 Contents Introduction... 4 What is this Guidance about?... 4 Who is this guidance
Information Management Advice 39 Developing an Information Asset Register
Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if
Guide 4 Keeping records to meet corporate requirements
Guide 4 Keeping records to meet corporate requirements This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by the Lord Chancellor
Good Practice Guide: the internal audit role in information assurance
Good Practice Guide: the internal audit role in information assurance Janaury 2010 Good Practice Guide: the internal audit role in information assurance January 2010 Official versions of this document
Guide 2 Organisational
Guide 2 Organisational arrangements to support records management This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by
The Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS
PRIORITY RECOMMENDATIONS R1 BIS to elevate the profile of information risk in support of KIM strategy aims for the protection, management and exploitation of information. This would be supported by: Establishing
Right to challenge parking policies
Right to challenge parking policies Traffic Management Act 2004: Network Management Duty Guidance March 2015 Department for Communities and Local Government Crown copyright, 2015 Copyright in the typographical
Firefighter fitness standards and assessment
Firefighter fitness standards and assessment Consultation response December 2014 Department for Communities and Local Government Crown copyright, 2014 Copyright in the typographical arrangement rests with
Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth
Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth January 2014 Purpose of this document The duty to have regard to the desirability of promoting economic growth (the growth duty )
Records management in SharePoint 2010
Records management in SharePoint 2010 Implications and issues Crown copyright 2011 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open
National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation
National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation London:
Right to Buy Service Charge Loans
Right to Buy Service Charge Loans May 2015 Department for Communities and Local Government Crown copyright, 2015 Copyright in the typographical arrangement rests with the Crown. You may re-use this information
WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public
WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY CONTENTS 1. POLICY STATEMENT... 3 2. PRINCIPLES... 3 DEFINITIONS... 4 3. OBJECTIVES... 4 4. SCOPE... 4 5. OWNERSHIP & RESPONSIBILITIES...
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
Queensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
Management of Official Records in a Business System
GPO Box 2343 ADELAIDE SA 5001 Tel (08) 8204 8773 Fax (08) 8204 8777 DX:467 [email protected] www.archives.sa.gov.au Management of Official Records in a Business System October 2011 Version
Digital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
Archiving and Backup - The Basics
Introduction Backup and archiving are useful tools for managing data, especially volumes of ageing data. Agency policies for retention and access necessitate that these tools should be used to implement
SPECIFICATION OF APPRENTICESHIP STANDARDS FOR ENGLAND
SPECIFICATION OF APPRENTICESHIP STANDARDS FOR ENGLAND Contents Introduction Paragraph Number 1 Intermediate Level Apprenticeship Frameworks Qualifications Related to the Sector 2-5 Functional Skills /
OFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
Cyber Essentials Scheme. Summary
Cyber Essentials Scheme Summary June 2014 Introduction... 3 Background... 4 Scope... 4 Assurance Framework... 5 Next steps... 6 Questions about the scheme?... 7 2 Introduction The Cyber Essentials scheme
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Integrating the operation of income tax and National Insurance contributions. A call for evidence
Integrating the operation of income tax and National Insurance contributions A call for evidence July 2011 Integrating the operation of income tax and National Insurance contributions A call for evidence
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
The CPS incorporates RCPO. CPS Data Protection Policy
The CPS incorporates RCPO CPS Data Protection Policy Contents Introduction 3 Scope 4 Roles and Responsibilities 4 Processing Criminal Cases 4 Information Asset Owners 5 Information Asset Register 5 Information
Office of the Regulator of Community Interest Companies: Introduction and guidance notes. Chapter 3: Limited Companies NOVEMBER 2012
Office of the Regulator of Community Interest Companies: Introduction and guidance notes Chapter 3: Limited Companies NOVEMBER 2012 Contents 3.1. Community interest companies - limited liability companies...
Company Investigations What we do.
Company Investigations What we do. What we do Company Investigations has the power to investigate limited companies where information we receive suggests corporate abuse; this may include serious misconduct,
GOLD-PLATING REVIEW The Operation of the Transposition Principles in the Government s Guiding Principles for EU Legislation
GOLD-PLATING REVIEW The Operation of the Transposition Principles in the Government s Guiding Principles for EU Legislation MARCH 2013 Contents Summary... 3 Review of the Operation of the Transposition
CCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
Integrated Assurance & Approval Strategy and Integrated Assurance & Approval Plans
Integrated Assurance & Approval Strategy and Integrated Assurance & Approval Plans A guide to implementing integrated assurance and approvals Version 1.0 - May 2011 Contents Introduction 03 Integrated
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Records Management Policy Version 4.0 Page 1 of 11 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: File Location: Approval
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
UNIVERSITY OF MANITOBA PROCEDURE
UNIVERSITY OF MANITOBA PROCEDURE Procedure: Parent Policy: Effective Date: June 23, 2015 Revised Date: Review Date: June 23, 2025 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;
PRIVACY POLICY Our Privacy Commitment Glo Light Pty Ltd A.C.N. 099 730 177 trading as "Lighting Partners Australia of 16 Palmer Parade, Cremorne, Victoria 3121, ( LPA ) is committed to managing your personal
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic
Information Integrity & Data Management
Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is
Next steps to zero carbon homes
Next steps to zero carbon homes Small sites exemption November 2014 Department for Communities and Local Government Crown copyright, 2014 Copyright in the typographical arrangement rests with the Crown.
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open
Protective Monitoring as a Service Version: 2.1, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating
Community Infrastructure Levy collection and enforcement. Information document
Community Infrastructure Levy collection and enforcement Information document Crown copyright, 2011 Copyright in the typographical arrangement rests with the Crown. You may re-use this information (not
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
Cyber Essentials Scheme
Cyber Essentials Scheme Assurance Framework January 2015 December 2013 Contents Introduction... 3 Change from June 2014 version... 3 Overview... 4 Stage Definitions... 5 Stage 1 Cyber Essentials: verified
Information Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
Parish Polls. Consultation on the Government s intentions to modernise parish poll regulations
Parish Polls Consultation on the Government s intentions to modernise parish poll regulations December 2014 Department for Communities and Local Government Crown copyright, 2014 Copyright in the typographical
Information Governance Policy
Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise
Council Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
Changes to the Energy Performance of Buildings Framework. Policy update 5 Energy Performance Certificate compliance and enforcement
Changes to the Energy Performance of Buildings Framework Policy update 5 Energy Performance Certificate compliance and enforcement Changes to the Energy Performance of Buildings Framework Policy update
SHARIAH-COMPLIANT STUDENT FINANCE. Consultation on a Shariacompliant. product APRIL 2014
SHARIAH-COMPLIANT STUDENT FINANCE Consultation on a Shariacompliant alternative finance product APRIL 2014 Contents Contents...2 A Sharia-compliant alternative finance product for students...3 1. Foreword
Office of the Regulator of Community Interest Companies: information and guidance notes. Chapter 9: Corporate Governance MARCH 2013
Office of the Regulator of Community Interest Companies: information and guidance notes Chapter 9: Corporate Governance MARCH 2013 Contents 9.1. Role of Directors and Members...3 9.1.1. Corporate Governance
Searching, screening and confiscation. Advice for headteachers, school staff and governing bodies
Searching, screening and confiscation Advice for headteachers, school staff and governing bodies February 2014 Contents Summary 3 About this departmental advice 3 Expiry or review date 3 Who is this advice
2011 Review of Functional Skills Standards in Mathematics
2011 Review of Functional Skills Standards in Mathematics April 2012 Ofqual/12/5146 Contents 2011 Review of Functional Skills Standards in Mathematics Executive summary... 2 Introduction... 4 What we aimed
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Information and records management. Purpose. Scope. Policy
Information and records management NZQA Quality Management System Policy Purpose The purpose of this policy is to establish a framework for the management of corporate information and records within NZQA.
Recruitment Sector. Consultation on prohibiting employment agencies and employment businesses from advertising jobs exclusively in other EEA countries
Recruitment Sector Consultation on prohibiting employment agencies and employment businesses from advertising jobs exclusively in other EEA countries JULY 2014 Contents Contents... 2 Prohibiting employment
Your property and blight
Safe roads, reliable journeys, informed travellers Your property and blight An executive agency of the Department for Transport Your property and blight 1. Introduction The Highways Agency is an Executive
Planning Act 2008: Guidance on Changes to Development Consent Orders. December 2015 Department for Communities and Local Government
Planning Act 2008: Guidance on Changes to Development Consent Orders December 2015 Department for Communities and Local Government Crown copyright, 2015 Copyright in the typographical arrangement rests
RECORDS MANAGEMENT POLICY
[Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body
Mobile Homes Act 2013 - new licensing enforcement tools
Mobile Homes Act 2013 - new licensing enforcement tools Advice for Park Home Site Owners February 2014 Department for Communities and Local Government Crown copyright, 2014 Copyright in the typographical
FOLLOW UP TO FINAL STATEMENT BY THE UK NATIONAL CONTACT POINT FOR THE OECD GUIDELINES FOR MULTINATIONAL ENTERPRISES
FOLLOW UP TO FINAL STATEMENT BY THE UK NATIONAL CONTACT POINT FOR THE OECD GUIDELINES FOR MULTINATIONAL ENTERPRISES Complaint from the International Union of Food, Agricultural, Hotel, Restaurant, Catering,
What will happen to my bank account? Information about your bank account when you are made bankrupt
What will happen to my bank account? Information about your bank account when you are made bankrupt This leaflet covers the questions you are most likely to ask about your bank account if you are made
Research Data Management Framework: Capability Maturity Guide
ANDS Guides Research Data Management Framework: Capability Maturity Guide Introduction The outline set out below shows five levels of attainment or maturity which institutions may achieve in managing their
BUILDING THE BRITISH BUSINESS BANK: INVESTMENT PROGRAMME. Question & Answers FEBRUARY 2014
BUILDING THE BRITISH BUSINESS BANK: INVESTMENT PROGRAMME Question & Answers FEBRUARY 2014 Contents Contents... 2 Submission... 3 Target Market... 4 Match Funding... 4 Pari Passu Terms... 5 Legal, Structure
Feedback Ferret. Security Incident Response Plan
Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret
Policy Document RECORDS MANAGEMENT POLICY
The District Council Of Elliston Policy Document RECORDS MANAGEMENT POLICY Date Adopted: 16 th December 2005 Review Date: Ongoing, as necessary Minute Number: 300. 2005 E:\WPData\Jodie\My Documents\policies
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Introduction Agencies have systems which hold business information, such as
Changes to disclosure and barring: What you need to know
Changes to disclosure and barring: What you need to know 2 Changes to disclosure and barring: what you need to know What is the purpose of this leaflet? This leaflet tells you about important changes which
Guidance for Employers and Code of Practice
WHISTLEBLOWING Guidance for Employers and Code of Practice MARCH 2015 Contents What is whistleblowing?... 3 What are an employer s responsibilities in regards to whistleblowing?... 3 Recognising workers
How to claim for the effects on your property of new or altered roads
How to claim for the effects on your property of new or altered roads Front cover image GeoPerspectives Highways England acknowledges the assistance of Transport for London and the Welsh Assembly Government
Information sharing. Advice for practitioners providing safeguarding services to children, young people, parents and carers
Information sharing Advice for practitioners providing safeguarding services to children, young people, parents and carers March 2015 Contents Summary 3 About this government advice 3 Who is this advice
All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.
Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,
Guidance for Stationary Refrigeration & Air- Conditioning
Department for Environment, Food and Rural Affairs Guidance for Stationary Refrigeration & Air- Conditioning Guidance: F Gas and Ozone Regulations Information Sheet RAC 5: Qualifications & Certificates
The Draft Consumer Credit (Total Charge For Credit) (Amendment) Regulations 2012
NOTES ON : The Draft Consumer Credit (Total Charge For Credit) (Amendment) Regulations 2012 MAY 2012 Department for Business, Innovation and Skills Notes on: THE DRAFT CONSUMER CREDIT (TOTAL CHARGE FOR
Records Management retention scheduling
Records Management retention scheduling 3. Accounting records Crown copyright 2012 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open
Changes to the smaller authorities local audit and accountability framework: a guide
Changes to the smaller authorities local audit and accountability framework: a guide March 2015 Department for Communities and Local Government Crown copyright, 2015 Copyright in the typographical arrangement
