Security Overview. A guide to data security at AIMES Data Centres. TEL: enquiries@aimes.
|
|
|
- Brianne Randall
- 9 years ago
- Views:
Transcription
1 Security Overview A guide to data security at AIMES Data Centres TEL: [email protected]
2 Page 1 of 10 Contents I. Protecting our clients data...2 II. Information Security...3 ISO Information Security Management System (ISMS)... 3 NHS IG Toolkit Compliance... 4 G-Cloud Assured Supplier... 4 III. Physical Onsite Security...5 Secure Location... 5 Two form factor authentication & anti tailgating security lobby... 5 Tablet based Photo ID Access Control... 5 CCTV Monitoring... 6 IV. Staff Security...7 V. Onsite Access Control...8 VI. Contact...9
3 Page 2 of 10 Protecting our clients data AIMES provides specialist ISO data centre services to a range of industries, including pharmaceutical, health, automotive, professional services and the digital and creative sectors. Our Data Centre information security management system (ISMS) was audited by BUREAU VERITAS and granted ISO certification in December 2007 (Certificate No. UK ), and has passed further audits each year between For us maintaining our ISO certification is just as much about running our data centre securely as it is about providing our clients with evidence of our compliance. At AIMES, we continually seek to improve our processes and systems to protect our business and to offer the best possible service to our customers. The security regime and security standards that we adhere to can be summarised into two main headings: Information Security Physical Security The following document provides specific details on each of these aspects of security at AIMES. If you still have any questions or queries regarding our security, then please do not hesitate to contact me using the details below. Paul Langan Information Security Manager [email protected]
4 Page 3 of 10 Information Security ISO Information Security Management System (ISMS) ISO27001 Certification is one of the most widely recognized independent global standards for security an organization can achieve. Certification to the standard involves a lengthy process whereby every facet of the b usiness is examined from a security and process standpoint. All of AIMES business systems, technologies, processes and data centres have been carefully examined to ensure they are compliant to the highest security and management standards We have implemented and had audited 135 individual security controls at our data centre to ensure security and to protect our client s information assets. These controls are grouped under the following categories: Security Policy: Organisation of Information Security Asset Management. Human Resources Security. Physical and environmental security. Communications and operations management. Access control. Information systems acquisition, development and maintenance. Information security incident management. Business Continuity Management. Compliance. Benefits to AIMES customers It provides basis for sharing information with other organisations in a secure manner A system for due corporate governance and a framework for legal compliance Ensures that we keep our customer's confidential information secure Managing & minimising our customer's risk exposure We publish a Statement of applicability document each year which identifies the security controls chosen for our data centre, and explains how and why they are appropriate. If you would like to receive a copy ISO certificate or statement of applicability then please contact our Information Security Manager. Paul Langan Information Security Manager [email protected]
5 Page 4 of 10 NHS IG Toolkit Compliance The Information Governance Toolkit is a performance tool produced by the Department of Health (DH) and hosted by the Health and Social Care Information Centre (HSCIC). It draws together the legal rules and central guidance relating to Information Governance and presents them in one place as a set of information governance requirements. The online system allows NHS partners to assess themselves against Department of Health Information Governance policies and standards. AIMES (Organisation Code 8J121) complete the Toolkit on an annual basis and our version 10 submission for 2013 has been reviewed and classed as meeting the NHS criteria for information security and governance (Level 2). Our status can be viewed on the IG Toolkit website via the IGT Reports section: This means that, in addition to our pre-existing ISO certification for information security, our Data Centres now also meets the NHS criteria for information security and governance (Level 2). G-Cloud Assured Supplier AIMES is a G-Cloud Assured supplier and has been selected by the Government Procurement Service to deliver key elements of the G- Cloud program through the G-Cloud Framework Agreement. The G-Cloud Framework delivers fundamental changes in the way the public sector procures and operates ICT and allows all UK public sector organisations flexibility and freedom of choice in procuring cost effective, industry-leading cloud based services and solutions. Congratulating AIMES on its achievement Marie-Helene Durif, Head of Sourcing & Category Management ICT at the Government Procurement Service stated, At the Government Procurement Service our priority is to provide procurement savings for organisations across the UK public sector. The inclusion of AIMES in the G-Cloud Framework will strengthen our offering and provide public sector buyers with a tried and tested route to achieve value for money. AIMES is pleased to be able to offer secure Cloud based services through this new framework agreement
6 Page 5 of 10 Physical Onsite Security AIMES have implemented a range of strong physical security precautions onsite to protect the data centres and our customers systems from unauthorised access. Secure Location AIMES is located in a designated technology park, which is surrounded by secure metal fencing. There is a single point of entry, each with a security lodge that is manned on a 24-hour basis. Within the security lodge guards control the external CCTV and perimeter protection cameras. The guards carry out random hourly foot patrols during quiet hours. Security will register and issue a personalised access pass to all employees, which allows them access only to those areas required for them to carry out their duties. The AIMES Information Security Management System Manager (ISMS) advises Security of any changes to access required if duties change. Two form factor authentication & anti tailgating security lobby Access to our Kilby House Data Centre is achieved using secure 2 factor authentication access controls. Pin Code and personalised access control passes are used to secure entry. Tailgating is the act of an unauthorized individual following an authorized person through a door without their knowledge. AIMES has eliminated tailgating by locating an anti tailgating security lobby in between each of the two access controls. The enclosed area has one door in the public area and another door into the secure area. AIMES trained security personal ensure that they have not been followed into the security lobby and that the first door is fully closed before opening the 2 nd door and entering the secure data centre area. Tablet based Photo ID Access Control Bespoke Photographic ID Records Application for Visitor Sign in to ensure security compliance requirements in accordance with our ISO27001 terms and conditions All individuals are required to check-in at the reception upon arriving at the AIMES Data Centre. If it is their first visit, clients must produce identification. They will then be photographed and required to sign the Data Centres Terms & Conditions in order to gain access to their designated cabinet or cage. On following visits they will be photographed again, and this will be checked against the photograph provided during their first visit to ensure it is the same authorized individual requesting access.
7 Page 6 of 10 Rack Security AIMES racks are subject to physical and login access controls on a need-to-use basis. Cabinets are individually secured with key locks front and back or alternatively, can be secured by a proximity card system, if required. Rack Access PX-HID protects cabinets from unauthorised access. This IP-based system uses electronic locks to secure enclosures and access is granted through HID-based proximity cards or the secure Web interface. Alarm notification options, such as , indicate a compromised security state. Administrators can easily configure access for individual employees, schedule access to equipment for maintenance purposes, and view audit trails. CCTV Monitoring Data Centre CCTV monitoring from secure admin area. Monitoring our data centre buildings 24 hours a day, 365 days a year is vital and we have put in place some of the very latest security technology to protect the data centre from any unauthorised access.
8 Page 7 of 10 Staff Security To ensure the security of client data, AIMES has introduced controls that deal with staff security prior to, during and after employment. The procedures have been successfully audited and are detailed below: Prior to Employment: AIMES has introduced a number policies and procedures that ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities. o Roles and responsibilities: AIMES ensures that the security roles and responsibilities of its employees, contractors and third party users are defined and documented in accordance with the organization s information security policy. o Screening: AIMES ensures that background verification checks on all candidates for employment, contractors, and third party users are carried out prior to employment o Terms and conditions of employment: As part of their contractual obligation, all AIMES employees, contractors and third party users have to agree and sign the terms and conditions of their employment contract, which state their and the organization s responsibilities for information security. During employment: AIMES has introduced a number policies and procedures that ensure that all employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error. o Information security awareness, education and training: All employees of AIMES and, where relevant, contractors and third party users receive appropriate awareness training and regular updates in organizational policies and procedures, as relevant for their job function. o Disciplinary process: AIMES has a formal disciplinary process for employees who have committed a security breach. After Employment: AIMES has introduced a number policies and procedures that ensure that employees, contractors and third party users exit our organization or change employment in an orderly manner. o Termination responsibilities: AIMES ensure that all responsibilities for performing employment termination or change of employment are clearly defined and assigned. o Return of assets: AIMES ensures that all employees, contractors and third party users return all of the organization s assets in their possession upon termination of their employment, contract or agreement. o Removal of access rights: AIMES ensures that the access rights of all employees, contractors and third party users to information and information processing facilities are removed upon termination of their employment, contract or agreement.
9 Page 8 of 10 Onsite Access Control AIMES operate an ISO27001 certified facility. As part of our ISO terms and conditions as well as general company policy, we ask the following of our customers when visiting AIMES for the first time. Please give up to 7 working days notice prior to a kit install. This is compulsory for out of hours installs. Complete a RAMS (Risk Assessment and Method Statement) document. The RAMS allows us to identify risks, undertake remedial action to mitigate risk, and be prepared for any assistance which is required of AIMES. Provide the full names of those attending on site A full list of kit to be installed Upon arrival All individuals are required to check-in at the reception upon arriving at the AIMES Data Centre. If it is their first visit, clients must produce identification. They will then be photographed and required to sign the following entry terms & Conditions in order to gain access to their designated cabinet or cage. Access Procedure Standard Access Customers, who wish to access the AIMES facilities for standard installation, maintenance, upgrades, etc., are required to provide notice a minimum of 24 hours in advance of the desired access time. Standard access is available from 9am 5pm Monday through Friday. Access outside these hours must be arranged with at least 5 working days notice (emergency access excluded) Login to the Issue management portal (IMP) and raise a change request for your project. Please set the Request Severity dropdown to either minor or medium as appropriate. Emergency Access In the case of failure or malfunction of any of the Customer s Equipment or any other reason requiring urgent repairs necessitating unscheduled access to the Co-Location Space, the Customer must notify the AIMES as soon as practicable to make appropriate arrangements for access to the Co-Location Space. Login to the Issue management portal (IMP) and raise a change request for your project. Please set the Request Severity dropdown to either Major and please state the reason why this is an emergency.
10 Page 9 of 10 Contact If you want to discuss any aspect of our Information security policies and procedures then please contact us. We will be happy to provide more detail on any of the elements and provide you with a more complete outline of our security policies, procedures and on-going strategy ARRANGE A VISIT If you would like to inspect our Data Centre facilities and security arrangements in person, please contact us to arrange a tour. We will be happy to show you around the data centre and discuss any aspects of our policy in more detail with you. Head Office: London Office: [email protected]
HSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 20/04/2016 HSCIC Audit of Data Sharing
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
C-TPAT Self-Assessment - Manufacturing & Warehousing
Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name
Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.
TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building
Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview
Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority. Due to the attacks
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
Digital Forensics G-Cloud Service Definition
Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Security Criteria for C-TPAT Foreign Manufacturers in English
Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
C-TPAT Importer Security Criteria
C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources
CCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
Intermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
Introduction to the NHS Information Governance Requirements
Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
INFORMATION ASSURANCE
Service Definition Thomson Reuters Legal Matter Management service (Serengeti Tracker) is the highest rated legal matter management, e-billing and analytics system designed for inhouse legal departments.
Data Protection Breach Reporting Procedure
Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval
ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE
AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas
ISO/IEC 27001 Information Security Management. Securing your information assets Product Guide
ISO/IEC 27001 Information Security Management Securing your information assets Product Guide What is ISO/IEC 27001? ISO/IEC 27001 is the international standard for information security management and details
Partners in Protection / C-TPAT Supply Chain Security Questionnaire
Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
QUALIFICATION HANDBOOK
QUALIFICATION HANDBOOK Level 2 Extended Certificate in Health Informatics (7450-12) February 2012 Version 1.0 Qualification at a glance Subject area City & Guilds number 7450 Health Informatics Age group
Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy
Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
CONFORMED COPY. Method Statement Helpdesk Services. Revision History. Revision Date Reviewer Status. 23 March 2007 Project Co Final Version
CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 23 March 2007 Project Co Final Version Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...
SCHOOL SECURITY POLICY & PROCEDURES
ORWELL PARK SCHOOL Nacton, Ipswich IP10 0ER SCHOOL SECURITY POLICY & PROCEDURES Date: January 2013 Status: Approved Review Date: January 2014 1 ORWELL PARK SCHOOL SECURITY POLICY AND PROCEDURES 1. PURPOSE
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
Customs & Trade Partnership Against Terrorism (C TPAT)
Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs
Protecting your business interests through intelligent IT security services, consultancy and training
Protecting your business interests through intelligent IT security services, consultancy and training The openness and connectivity of the digital economy today provides huge opportunities but also creates
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
DataCentre Access Policies & Procedures
DataCentre Access Policies & Procedures Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Global Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
Information Governance Policy
Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
University of Brighton School and Departmental Information Security Policy
University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives
TRANSPORT FOR LONDON (TfL) LOW EMISSIONS CERTIFICATE (LEC) GUIDANCE NOTES FOR THE COMPANY AUDIT PROCESS. LEC (Company Audit) Guidance Notes
TRANSPORT FOR LONDON (TfL) LOW EMISSIONS CERTIFICATE (LEC) GUIDANCE NOTES FOR THE COMPANY AUDIT PROCESS LEC (Company Audit) Guidance Notes Glossary of Terms Transport for London (TfL) London Low Emission
C-TPAT Customs Trade Partnership Against Terrorism
Food and Agriculture Border Gateway Summit C-TPAT Customs Trade Partnership Against Terrorism Robert Gaydo, Senior Trade Advisor A.N. DERINGER, INC. Feb. 20, 1014 Who can participate? Air/Rail/Sea Carriers
Remote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.
Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release
For inclusion in the shortlist to be invited to tender for the provision of Manned Security Services to S4C. Date of publication: 9 December 2013
Pre-Qualification Questionnaire For inclusion in the shortlist to be invited to tender for the provision of Manned Security Services to S4C Date of publication: 9 December 2013 Deadline for further questions:
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
Colocation, Cloud and Managed Services
Colocation, Cloud and Managed About Node4 At Node4 our growing team of passionate individuals are dedicated to delivering the most effective application of technology to optimise business performance.
Information Security Policy. Chapter 10. Information Security Incident Management Policy
Information Security Policy Chapter 10 Information Security Incident Management Policy Author: Policy & Strategy Team Version: 0.4 Date: December 2007 Version 0.4 Page 1 of 6 Document Control Information
SOC 2 Report Seattle, WA (SEF)
SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
TELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
Abu Dhabi EHSMS Regulatory Framework (AD EHSMS RF)
Abu Dhabi EHSMS Regulatory Framework (AD EHSMS RF) Technical Guideline Audit and Inspection Version 2.0 February 2012 Table of Contents 1. Introduction... 3 2. Definitions... 3 3. Internal Audit... 3 3.1
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Eskom Registration Authority Charter
REGISTRATION WWW..CO.ZA Eskom Registration Authority Charter Version 2.0 applicable from 20 November 2009 Megawatt Park Maxwell Drive Sunninghill, SOUTH AFRICA, 2157 Phone +27 (0)11 800 8111 Fax +27 (0)11
Datacentre Studley. Dedicated managed environment for mission critical services. Six Degrees Group www.6dg.co.uk
Dedicated managed environment for mission critical services www.6dg.co.uk Our datacentres are the core of our business. At we own and manage 30,000 square feet of highly available, geographically diverse
Outsourcing and third party access
Outsourcing and third party access This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Information Security and Governance Policy
Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information
Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants
2014 Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants This document provides general advice and guidance on security
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By
Site Security and Access Policy and Procedures Written By Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By David Neild Last Reviewed date Autumn 2014 (VERSION 4)
Safety & Security Intruder Fire Access CCTV VeriSafe Alarms Alarms Systems Systems Keeping people safe & businesses compliant www.veriserv.co.
Safety & Security VeriSafe Intruder Alarms Fire Alarms Access Systems CCTV Systems Keeping people safe & businesses compliant www.veriserv.co.uk Security is about more than complying with standards and
NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY
INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY 1. PURPOSE In respect to this policy the term physical and environmental security refers to controls taken to protect
Network Password Management Policy & Procedures
Network Password Management Policy & Procedures Document Ref ISO 27001 Section 11 Issue No Version 1.3 Document Control Information Issue Date April 2009, June 2010, September 2011 Status Approved By FINAL
Information Security Policy. Chapter 13. Information Systems Acquisition Development and Maintenance Policy
Information Security Policy Chapter 13 Information Systems Acquisition Development and Maintenance Policy Author: Policy & Strategy Team Version: 0.3 Date: June 2008 Document Control Information Document
Finance and Resources Committee
Finance and Resources Committee 10.00am, Thursday 9 June 2016 Supply of Temporary Security Alarm Systems from 1 July 2016 31 March 2017 Item number Report number Executive/routine Wards All Executive summary
UK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment
06100 POLICY SECURITY AND INFORMATION ASSURANCE
Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information
Security Profile. Business Partner Requirements, Security Procedures (Updated)
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
