United Kingdom Nirex Limited CONTEXT NOTE. 4.5: Security. September 2005 Number:

Size: px
Start display at page:

Download "United Kingdom Nirex Limited CONTEXT NOTE. 4.5: Security. September 2005 Number: 484118"

Transcription

1 United Kingdom Nirex Limited CONTEXT NOTE 4.5: Security September 2005 Number:

2

3 CONTEXT NOTE 4.5: Security September 2005 Number:

4 Conditions of Publication This technical note is made available under Nirex s Transparency Policy. In line with this policy, Nirex is seeking to make information on its activities readily available, and to enable interested parties to have access to and influence on its future programmes. This document may be freely used for non-commercial purposes. However, all commercial uses, including copying and re-publication, require Nirex s permission. All copyright, database rights and other intellectual property rights reside with Nirex. Applications for permission to use this technical note commercially should be made to the Nirex Business Development Manager. Although great care has been taken to ensure the accuracy and completeness of the information contained in this publication, Nirex can not assume any responsibility for consequences that may arise from its use by other parties. United Kingdom Nirex Limited All rights reserved Bibliography If you would like to see other publications available from Nirex, a complete listing can be viewed at our website or please write to Corporate Communications at the address below, or info@nirex.co.uk. Feedback Readers are invited to provide feedback to Nirex on the contents, clarity and presentation of this report and on the means of improving the range of Nirex reports published. Feedback should be addressed to: Corporate Communications Administrator United Kingdom Nirex Limited Curie Avenue Harwell Didcot Oxfordshire OX11 0RH UK Or by to: info@nirex.co.uk

5 FOREWORD This Context Note is one in a series, prepared by United Kingdom Nirex Limited (Nirex), that summarises the issues, experience and status in each of 30 topic areas that are relevant to the phased development of a geological facility for the long-term management of intermediate-level and certain low-level radioactive waste in the UK the Nirex Phased Geological Repository Concept (PGRC). It is the view of Nirex that sufficient work has been done to demonstrate the viability of the generic Nirex Phased Geological Repository Concept: to support packaging advice; and to provide enough confidence to proceed with a site selection process in the UK. The aim of the Context Notes is to provide the documentation to support this view. The starting point for the notes has been an identification of issues based on extensive examination of reviews and published scrutiny of Nirex work and programmes over the past 20 years. This has been supplemented by more recent discussion meetings with knowledgeable and concerned organisations and discussion meetings within Nirex. The issues have been analysed according to their importance with respect to the future implementation of a geological repository in the UK, screened and sorted into topic areas. Then, for each topic, a Context Note has been prepared that presents the key issues, relevant experience, directions for further development and overall status in the topic area. The Context Notes are intended to provide a focus for discussion of issues and priorities of future work within Nirex, and as a means of communication to stakeholders. The Notes provide support to Nirex Report N/122, which presents an overview of the viability of the Nirex Phased Geological Repository Concept. 1

6 CONTENTS FOREWORD 1 1 INTRODUCTION 3 2 SECURITY TOPICS How is Security Regulated Nirex Generic PGRC Security Plan Why most security measures cannot be disclosed to the general public? How threats to security are identified and countered The current status of development of Security Plans Future Security 5 2

7 CONTEXT NOTE 4.5: SECURITY 1 INTRODUCTION The aim of this Context Note is to inform the reader that Nirex takes security very seriously and considers that integrated and well planned security measures are essential to counter a number of perceived threats which range from the malicious, through theft to irresponsible interference of radioactive waste at a planned radioactive waste repository. Security considerations are built into the design process and the operational planning, although specific details are not revealed since this would defeat their object. At each stage of security planning the Office for Civil Nuclear Security (OCNS) is consulted, for their approval and guidance, in their role as nuclear industry security regulator. The keys security issues and their evaluation are shown in Table 1. 2 SECURITY TOPICS 2.1 How is Security Regulated OCNS, which is part of the DTI, regulates the civil nuclear industry. On a day-to-day basis we are required to have a Company Security Policy, an IT Security Policy and Company Security Instructions in place as well as a Business Continuity Plan. These are routinely inspected by OCNS. Nirex is directed under Regulation 22(3)(b) and (c) of the Nuclear Industries Security Regulations 2003 SI 2003/403 by the Secretary of State for the Department of Trade & Industry (DTI) to: Adopt the security procedures and standards in force from time to time for the purpose of safeguarding sensitive nuclear information. This entails reference to the Classification Guide: The Physical Protection of Nuclear Materials (CWP/G8) issued by OCNS when originating protectively marked information. Also ensuring that all protectively marked information is safeguarded in accordance with the Manual of Protective Security issued by DCNSy (prior to becoming OCNS) in Apr 95. The Nuclear Industries Security Regulations 2003 were made under powers provided in the Anti-terrorism, Crime & Security Act 2001, an Act introduced as a direct result of the events in the USA on 11 Sep 01, as a result security requirements and standards were considerably tightened. This has had a corresponding impact on the release of and content of nuclear and security related information available to the general public. Nirex staff have all received briefings on the impact of the above legislation and its impact on our Transparency Policy. Nirex continues to publish as much information as possible and regularly challenges itself, its contractors and its shareholders on the need for a protective marking on information. The publication in June 2004 by OCNS of the document "Finding a Balance - Guidance on the Sensitivity of Nuclear and Related Information and its Disclosure" will go a long way to inform the general public and members of the industry of what can and cannot be released, more importantly the document gives reasons for non-disclosure. 3

8 2.2 Nirex Generic PGRC Security Plan The Company has a Security Plan for a Generic PGRC Design which has received interim approval by OCNS, it is being used now to ensure that: Basic security designs and measures are incorporated in the generic drawings and documents. Our generic document set remains within the law by not disclosing sensitive security information. Practical security measures required to counter known threats to a repository can be debated, researched and properly incorporated into the design. Markers are placed in the road map to prevent key security issues i.e. necessary security actions and appointments of security staff, from being overlooked. Security costings becoming more visible at an earlier stage. The different levels of physical security required for protecting Categories III, II and I waste are visible. Suitable assurance is given that security planning is advanced, designed in, stringently regulated and counters all perceived threats. 2.3 Why most security measures cannot be disclosed to the general public? In order to produce a Security Plan for a site holding a given type of radioactive waste, a threat assessment is carried out using information provided by OCNS (which is usually protectively marked SECRET). This information is obviously on limited dissemination. The specific security counter measures employed on a site attract a protective marking and would be rendered useless if disclosed to the general public. 2.4 How threats to security are identified and countered The potentially catastrophic consequences of malicious activity at civil nuclear facilities make it vitally important that security measures are both appropriate to the threat and fully effective. It is also important that resources are not wasted on ineffective or nugatory security measures. There is, therefore, a requirement for a definitive statement of the possible hostile activity and capability that could be faced by civil nuclear facilities. The Design Basis Threat (DBT), issued by the DTI s Office for Civil Nuclear Security (OCNS), meets this requirement for the United Kingdom. As the UK s independent regulator for civil nuclear security, the DTI s Director of Civil Nuclear Security (DCNS) has sole responsibility for establishing the DBT. However, if it is to be an effective guide to the operators, the DBT and the regulatory process that it supports must be reasonable and proportionate. The DBT should also, in so far as this is possible, reflect the concerns of all stakeholders. However, it is the responsibility of the DCNS to decide which hostile groups, types of activity and capabilities have to be countered by civil nuclear facilities subject to regulation. OCNS have a DBT as recommended in INFCIRC/225/Rev4. This document is a definitive compilation of physical protection measures for nuclear material drawn up by member States under the auspices of the International Atomic Energy Authority (IAEA). 4

9 The DBT: provides the basis for the design, implementation and management of security measures and systems by the regulated civil nuclear operators and site licensees; is used by OCNS to develop security standards and guidance, to evaluate the security plans of civil nuclear facilities, and to monitor compliance. The paper incorporates the comments on an earlier draft circulated widely within the industry and Government. The main body of the paper provides the rationale for the DBT. Its purpose is to set a framework, particularly of language, within which the DBT can be understood and accepted by all interested parties. The paper includes assessments of the threats produced by the Security Service, the police and other agencies, including information provided by foreign counterparts of OCNS. The paper considers: the consequences of malicious activity that are unacceptable to stakeholders; the threats that might create those unacceptable consequences; the risks to be managed. The DCNS, drawing on these assessments, decides which specific capabilities the operators and licensees must be able to counter. This is the Design Basis Threat proper. The DBT excludes hostile groups or capabilities that are judged by the DCNS not to be relevant to the civil nuclear industry in the UK, and takes account of the availability of countermeasures and other precautions provided by other, usually national, authorities (e.g. contingency arrangements to intercept hijacked aircraft) The current status of development of Security Plans Nirex has a Security Plan for a Generic PGRC which has received interim approval from OCNS. However, any change to the PGRC concept will result in the requirement to revise the existing Security Plan or, if necessary, the writing of a new one. Any such changes to the Security Plan will require approval from OCNS. The Security Plan follows a formula outlined at Annex A, Part One of the Nuclear Industries Security Regulations 2003, Guidance Document, issued by OCNS (which is protectively marked). Work is now underway to integrate the security measures in the approved Security Plan into the Generic PGRC layout drawings. 2.6 Future Security During the care and maintenance period, following emplacement and before closure, the waste may be easier to protect underground than in a surface store. This approach has several key advantages: An underground facility is more robust than a surface facility in respect of certain malicious threats, e.g. firing weapons at or attempting to steal waste or sabotage the facility. 1 Whole of Para 2.4 is the Management Summary of the OCNS, DTI paper on National Security & Civil Nuclear Facilities Developing the Design Basis Threat (protectively marked SECRET). 5

10 By placing the waste several hundred metres underground, the geological barrier created provides effective long term security resulting in a reduced need for an active security presence. If a future repository were to remain open this would detract from the security measures in place and considerably increase the running costs for the repository. In addition it would leave the repository vulnerable to human intrusion should there be a natural or man-made catastrophe or a breakdown in society. The level of cost of security (e.g. increased terrorism threat or issues of protest/reaction to decisions or activities) for all options would need to be continually assessed and revised as appropriate. Also security costs for all options need to be addressed in isolation of overall site security for active facilities as this will highlight the true cost of security when sites are being used purely for waste storage. 6

11 Table 1 Key Issues and Their Evaluation Issue Security is mandatory and therefore taken seriously Countering the threat of Terrorism/Theft/Sabotage Security of a deep repository versus surface storage Regulation of Security Evaluation The public need to be given assurances that the minimum security measures are planned into the Generic PGRC in order to secure the waste from misuse/theft/terrorism etc. Very real threats are countered by the Nirex Generic PGRC Security Plan. Detailed security measures are not published for obvious reasons. Access to radioactive waste stored underground is made very difficult due to the few number of controlled access points. Many more threats are viable to surface stores. Security of civil nuclear establishments is now governed by the NISR 2003 and regulated by OCNS Status The security measures required are in the NISR 2003 Technical Guidance Manual (Protectively marked RESTRICTED). Security measures factored into the Nirex Generic PGRC Security Plan are approved by OCNS. Reasoning is given in NISR 2003 and clarified to the public in the OCNS Finding A Balance guidance document on disclosure and non-disclosure of information. Another argument for accelerated implementation of deep geological repository projects has focused on national security, due to the reduced vulnerability of underground facilities to possible terrorist threats. Security measures are embedded in the generic design planning. 7

12

13 United Kingdom Nirex Limited Curie Avenue Harwell, Didcot Oxfordshire OX11 0RH t +44 (0) f +44 (0) e nirex.co.uk w

Office for Nuclear Regulation

Office for Nuclear Regulation Generic Design Assessment New Civil Reactor Build Step 4 Security Assessment of the Westinghouse AP1000 Reactor Assessment Report: ONR-GDA-AR-11-015 10 November 2011 PROTECTIVE MARKING IF APPLICABLE Crown

More information

Waste Transfer Pricing Methodology for the disposal of higher activity waste from new nuclear power stations

Waste Transfer Pricing Methodology for the disposal of higher activity waste from new nuclear power stations Waste Transfer Pricing Methodology for the disposal of higher activity waste from new nuclear power stations December 2011 Contents Contents... i Introduction... 1 Executive Summary... 1 Background...

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author

More information

Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov

Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a

More information

Security and Safeguards Considerations in Radioactive Waste Management. Canadian Nuclear Safety Commission

Security and Safeguards Considerations in Radioactive Waste Management. Canadian Nuclear Safety Commission Security and Safeguards Considerations in Radioactive Waste Management Raoul Awad Director General, Directorate of Security and Safeguards Canadian Nuclear Safety Commission Radioactive Waste Management

More information

Corporate Communications Strategy

Corporate Communications Strategy Corporate Communications Strategy 2014 Office for Nuclear Regulation page 1 of 6 Introduction Effective communications is an important part of ONR s success and supports our reputation as a trusted, independent

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

National Occupational Standards. Compliance

National Occupational Standards. Compliance National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them? National Occupational Standards (NOS) are statements

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

Comparison of internet connection records in the Investigatory Powers Bill with Danish Internet Session Logging legislation

Comparison of internet connection records in the Investigatory Powers Bill with Danish Internet Session Logging legislation Comparison of internet connection records in the Investigatory Powers Bill with Danish Internet Session Logging legislation We consider that, on balance, there is a case for Internet Connection Records

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL

DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL DRAFT DATA RETENTION AND INVESTIGATORY POWERS BILL INTRODUCTION EXPLANATORY NOTES 1. These explanatory notes relate to the Draft Data Retention and Investigatory Powers Bill. They have been prepared by

More information

Business Continuity Policy. Version 1.0

Business Continuity Policy. Version 1.0 Business Continuity Policy Version.0 January 206 Contents Contents Version control Foreword Policy. Scope.2 Aim and objectives.3 Methods and standards.4 Responsibilities.5 Governance.6 Training and exercises

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security- Perspective for Management Information Security Management Program Concept

More information

INFORMATION SECURITY MANAGEMENT POLICY

INFORMATION SECURITY MANAGEMENT POLICY INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June

More information

OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE CREATE COMPETITIVE ADVANTAGE A PLATFORM FOR INNOVATION

OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE CREATE COMPETITIVE ADVANTAGE A PLATFORM FOR INNOVATION National Standardization Strategic Framework OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE A PLATFORM FOR INNOVATION CREATE COMPETITIVE ADVANTAGE Foreword Standards influence everything we do.

More information

Final Draft Guidance on Audit Committees

Final Draft Guidance on Audit Committees Guidance Corporate Governance April 2016 Final Draft Guidance on Audit Committees The FRC is responsible for promoting high quality corporate governance and reporting to foster investment. We set the UK

More information

NHS Hardwick Clinical Commissioning Group. Business Continuity Policy

NHS Hardwick Clinical Commissioning Group. Business Continuity Policy NHS Hardwick Clinical Commissioning Group Business Continuity Policy Version Date: 26 January 2016 Version Number: 2.0 Status: Approved Next Revision Due: January 2017 Gordon Stevens MBCI Corporate Assurance

More information

Information Security Management System Policy

Information Security Management System Policy Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the

More information

Cyber security organisational standards: call for evidence

Cyber security organisational standards: call for evidence Cyber security organisational standards: call for evidence Department for Business Innovation and Skills This is an Engineering the Future response to the Business Innovation and Skills Cyber security

More information

Security Management Systems (SEMS) for Air Transport Operators. Executive Summary

Security Management Systems (SEMS) for Air Transport Operators. Executive Summary Security Management Systems (SEMS) for Air Transport Operators Executive Summary March 2011 Security Management Systems (SeMS) for Air Transport Operators Introduction and Scope Executive Summary In early

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

Seoul Communiqué 2012 Seoul Nuclear Security Summit

Seoul Communiqué 2012 Seoul Nuclear Security Summit Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to

More information

General Dental Council Website Review: Dental Professionals Survey Invitation to Tender

General Dental Council Website Review: Dental Professionals Survey Invitation to Tender General Dental Council Website Review: Dental Professionals Survey Invitation to Tender Summary 1. The General Dental Council (GDC) invites tender proposals for a research project on the usability of the

More information

Reporting Service Performance Information

Reporting Service Performance Information AASB Exposure Draft ED 270 August 2015 Reporting Service Performance Information Comments to the AASB by 12 February 2016 PLEASE NOTE THIS DATE HAS BEEN EXTENDED TO 29 APRIL 2016 How to comment on this

More information

Police use of Firearms

Police use of Firearms CODE OF PRACTICE ON Police use of Firearms and Less Lethal Weapons Contents 1. Introduction 1.1 Purpose of the code 1 1.2 Statutory basis of the code 1 1.3 Weapons covered by this code 2 1.4 Armed support

More information

United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework.

United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework. United Nations High-Level Meeting on Countering Nuclear Terrorism with a Specific Focus on Strengthening the Legal Framework 28 September 2012 Chair s Summary The United Nations High-Level Meeting on Countering

More information

Strategic Alliance. Business Continuity Policy

Strategic Alliance. Business Continuity Policy Version 1.1 April 2016 Contents Contents Version control Foreword Policy Scope Aim and objectives Methods and standards Responsibilities Governance Training and exercises Page i ii 1 2 2 2 Version 1.1

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

DHHIT Network Security Standards and Procedures

DHHIT Network Security Standards and Procedures DHHIT Network Security Standards and Procedures Contents 1. Introduction 2 2. Scope 2 3. Definitions 2 4 Employment practices 2 5 Employee responsibility 3 6 Physical security 3 7 Network and Systems Security

More information

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199

EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199 EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of

More information

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)

More information

Scotland s National Action Plan to tackle Child Sexual Exploitation

Scotland s National Action Plan to tackle Child Sexual Exploitation Scotland s National Action Plan to tackle Child Sexual Exploitation Ministerial Foreword Aileen Campbell The safety and wellbeing of all children and young people is a key priority for the Scottish Government.

More information

Value and Challenges of Regularised Consultations and Information Sharing between Facility Security Managers 1

Value and Challenges of Regularised Consultations and Information Sharing between Facility Security Managers 1 Page 1 of 8 Value and Challenges of Regularised Consultations and Information Sharing between Facility Security Managers 1 Dr Roger Howsley Executive Director, World Institute for Nuclear Security (WINS)

More information

Information Security Management System Information Security Policy

Information Security Management System Information Security Policy Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been

More information

Insights of the Periodic Reviews Regarding the Physical Protection of Nuclear Power Plants Designed to Earlier Standards

Insights of the Periodic Reviews Regarding the Physical Protection of Nuclear Power Plants Designed to Earlier Standards Insights of the Periodic Reviews Regarding the Physical Protection of Nuclear Power Plants Designed to Earlier Standards A. Hagemann Systems Technology and Operating Experience Division Gesellschaft für

More information

Exposure Draft: Improving the Structure of the Code of Ethics for Professional Accountants Phase 1

Exposure Draft: Improving the Structure of the Code of Ethics for Professional Accountants Phase 1 Ken Siong IESBA Technical Director IFAC 6 th Floor 529 Fifth Avenue New York 10017 USA 22 April 2016 Dear Mr Siong Exposure Draft: Improving the Structure of the Code of Ethics for Professional Accountants

More information

Office for Nuclear Regulation

Office for Nuclear Regulation ONR GUIDE Function and Content of a Safety Management Prospectus Document Type: Nuclear Safety Technical Assessment Guide Unique Document ID and Revision No: NS-TAST-GD-072 Revision 2 Date Issued: April

More information

Business Case. for an. Information Security Awareness Program

Business Case. for an. Information Security Awareness Program Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security

More information

Appendix 15 CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT

Appendix 15 CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT Appendix 15 CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT The Code This Code sets out the principles of good corporate governance, and two levels of recommendations: code provisions; and recommended

More information

When being a good lawyer is not enough: Understanding how In-house lawyers really create value

When being a good lawyer is not enough: Understanding how In-house lawyers really create value When being a good lawyer is not enough: Understanding how In-house lawyers really create value Contents Foreword... 3 Do you really understand how In-house lawyers create value?... 4 Why creating value

More information

THE DECOMMISSIONING OF THE UK NUCLEAR INDUSTRY S FACILITIES

THE DECOMMISSIONING OF THE UK NUCLEAR INDUSTRY S FACILITIES THE DECOMMISSIONING OF THE UK NUCLEAR INDUSTRY S FACILITIES Introduction 1. This statement of the UK Government and devolved administrations policy on the decommissioning of nuclear facilities updates

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

Licensing a Repository at Yucca Mountain

Licensing a Repository at Yucca Mountain 2008 Licensing a Repository at Yucca Mountain DOE PROJECTED SCHEDULE FOR LICENSING A GEOLOGIC REPOSITORY Churchill County Nuclear Waste Oversight Program 85 North Taylor St., Fallon, NV 89406 Licensing

More information

BSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012

BSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012 To: From: Subject: Status: Date of Meeting: BSO Board Director of Human Resources & Corporate Services Business Continuity Policy For Approval 28 February 2012 The Board is asked to agree the attached

More information

Guidance for audit committees. The internal audit function

Guidance for audit committees. The internal audit function Guidance for audit committees The internal audit function March 2004 The Combined Code on Corporate Governance July 2003 C.3 Audit Committee and Auditors Main Principle: The board should establish formal

More information

FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS

FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS IAEA NUCLEAR SECURITY SERIES NO. FUNDAMENTALS OF A STATE S NUCLEAR SECURITY REGIME: OBJECTIVE AND ESSENTIAL ELEMENTS Revision 17.04 Page 1 of 20 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME]

More information

SCHOOL ONLINE SAFETY SELF REVIEW TOOL

SCHOOL ONLINE SAFETY SELF REVIEW TOOL SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: esafety@swgfl.org.uk

More information

Business Continuity Policy

Business Continuity Policy Business Continuity Policy Page 1 of 15 Business Continuity Policy First published: Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/14 Vicky Ryan Updated to include

More information

Risk management systems of responsible entities: Further proposals

Risk management systems of responsible entities: Further proposals CONSULTATION PAPER 263 Risk management systems of responsible entities: Further proposals July 2016 About this paper This paper sets out our proposals to provide guidance to responsible entities on our

More information

A specification for security-minded building information modelling, digital built environments and smart asset management

A specification for security-minded building information modelling, digital built environments and smart asset management Introduction to PAS 1192-5:2015 A specification for security-minded building information modelling, digital built environments and smart asset management Introduction PAS 1192-5:2015 is a specification

More information

Guidelines on SPECIAL BRANCH WORK in the United Kingdom

Guidelines on SPECIAL BRANCH WORK in the United Kingdom Guidelines on SPECIAL BRANCH WORK in the United Kingdom Foreword Within the police service, Special Branches play a key role in protecting the public and maintaining order. They acquire and develop intelligence

More information

7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers

7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers Contents Page 1 Introduction 2 2 Objectives of the Strategy 2 3 Data Quality Standards 3 4 The National Indicator Set 3 5 Structure of this Strategy 3 5.1 Awareness 4 5.2 Definitions 4 5.3 Recording 4

More information

IMPACT OF CORPORATE GOVERNANCE ON PERFORMANCE OF COMPANIES IGOR TODOROVIĆ 1

IMPACT OF CORPORATE GOVERNANCE ON PERFORMANCE OF COMPANIES IGOR TODOROVIĆ 1 MONTENEGRIN IMPACT OF JOURNAL CORPORATE OF ECONOMICS GOVERNANCE Vol. 9, ON No. PERFORMANCE 2 Special Issue OF COMPANIES (May, 2013), 47-53 47 IMPACT OF CORPORATE GOVERNANCE ON PERFORMANCE OF COMPANIES

More information

Information Security Law: Control of Digital Assets.

Information Security Law: Control of Digital Assets. Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security

More information

Process for advising on the feasibility of implementing a patient access scheme

Process for advising on the feasibility of implementing a patient access scheme Process for advising on the feasibility of implementing a patient access scheme INTERIM September 2009 Patient Access Schemes Liaison Unit at NICE P001_PASLU_Process_Guide_V1.3 Page 1 of 21 Contents (to

More information

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I. International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction

More information

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014 NSS 2014 UK NATIONAL PROGRESS REPORT March 2014 1. Support for the Convention on the Physical Protection of Nuclear Material and the International Convention for the Suppression of Acts of Nuclear Terrorism

More information

DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy

DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy Part Two Part One Not Protectively Marked DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy. The Dorset & Wiltshire Fire and Rescue Authority (DWFRA)

More information

INTERNATIONAL ATOMIC ENERGY AGENCY WAGRAMERSTRASSE 5, P.O. BOX 100, A-1400 VIENNA, AUSTRIA FACSIMILE: (+43 1) 26007, TELEPHONE: (+43 1) 2600

INTERNATIONAL ATOMIC ENERGY AGENCY WAGRAMERSTRASSE 5, P.O. BOX 100, A-1400 VIENNA, AUSTRIA FACSIMILE: (+43 1) 26007, TELEPHONE: (+43 1) 2600 INTERNATIONAL ATOMIC ENERGY AGENCY WAGRAMERSTRASSE 5, P.O. BOX 100, A-1400 VIENNA, AUSTRIA FACSIMILE: (+43 1) 26007, TELEPHONE: (+43 1) 2600 - CRAFT - The International Project on COMPLIMENTARY SAFETY

More information

RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay

RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay RC-17 Radiation Protection in Waste Management and Disposal Implementing the Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management Alejandro V. Nader

More information

Risk Management & Business Continuity Manual 2011-2014

Risk Management & Business Continuity Manual 2011-2014 ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page

More information

Developing the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments

Developing the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments 1 Developing the International Law Framework to Better Address Cyber Threats: Role of Non-Binding Instruments J. Herbach 1 1 Centre for Conflict and Security Law, University of Amsterdam E-mail contact

More information

Corporate Risk Management Policy

Corporate Risk Management Policy Corporate Risk Management Policy Managing the Risk and Realising the Opportunity www.reading.gov.uk Risk Management is Good Management Page 1 of 19 Contents 1. Our Risk Management Vision 3 2. Introduction

More information

PROCEDURES FOR ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING OF INVESTMENT PROJECTS

PROCEDURES FOR ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING OF INVESTMENT PROJECTS PROCEDURES FOR ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING OF INVESTMENT PROJECTS Approved 10 July 2015 CONTENTS 1. INTRODUCTION 1 2. OVERVIEW OF THE ENVIRONMENTAL AND SOCIAL APPRAISAL AND MONITORING

More information

THE COMBINED CODE PRINCIPLES OF GOOD GOVERNANCE AND CODE OF BEST PRACTICE

THE COMBINED CODE PRINCIPLES OF GOOD GOVERNANCE AND CODE OF BEST PRACTICE THE COMBINED CODE PRINCIPLES OF GOOD GOVERNANCE AND CODE OF BEST PRACTICE Derived by the Committee on Corporate Governance from the Committee s Final Report and from the Cadbury and Greenbury Reports.

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Nuclear Security Glossary

Nuclear Security Glossary IAEA NUCLEAR SECURITY SERIES NO. Nuclear Security Glossary Revision 3E Draft 17 March 2010 Page 1 of 16 FOREWORD [TO BE PROVIDED BY THE SECRETARIAT AT A LATER TIME] Page 2 of 16 Introduction The Nuclear

More information

The Long-Term Safety Strategy for the Geological Disposal of Radioactive Waste

The Long-Term Safety Strategy for the Geological Disposal of Radioactive Waste Belgian agency for radioactive waste and enriched fissile materials Geological Disposal Programme The Long-Term Safety Strategy for the Geological Disposal of Radioactive Waste SFC1 level 4 report: second

More information

ICSA Response. DCLG Codes of conduct for local authority members and employees A consultation

ICSA Response. DCLG Codes of conduct for local authority members and employees A consultation ICSA Response DCLG Codes of conduct for local authority members and employees A consultation Submission Number: 08.40.379 Date 24.12.2008 INSTITUTE OF CHARTERED SECRETARIES & ADMINISTRATORS Response to

More information

Rating agency approval Guidelines Insurance Sector

Rating agency approval Guidelines Insurance Sector Rating agency approval Guidelines Insurance Sector Insurance Policy Prudential Supervision Department December 2010 Purpose of this guideline 1 This document sets out the Reserve Bank of New Zealand s

More information

Information security policy

Information security policy Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current

More information

FINANCIAL SERVICES FLASH REPORT

FINANCIAL SERVICES FLASH REPORT FINANCIAL SERVICES FLASH REPORT UK Outlines New Action Plan for Anti-Money Laundering and Counter-Terrorist Finance May In April, the United Kingdom s Home Office and Her Majesty s Treasury (HMT) issued

More information

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5 Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose

More information

Information Governance Strategy

Information Governance Strategy Information Governance Strategy THCCGCG9 Version: 01 The information governance strategy outlines the CCG governance aims and the key objectives of its governance policies. The Chief officer has the overarching

More information

DIRECTIVE 2014/32/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

DIRECTIVE 2014/32/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL 29.3.2014 Official Journal of the European Union L 96/149 DIRECTIVE 2014/32/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 26 February 2014 on the harmonisation of the laws of the Member States relating

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012

More information

Management of Radioactive Waste & Materials Inventory Data

Management of Radioactive Waste & Materials Inventory Data Management of Radioactive Waste & Materials Inventory Data Critical Enabler Contents Executive Summary... 3 1. Introduction... 4 2. Inventory Data Users... 5 3. Current Situation... 7 3.1 Management of

More information

The Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS

The Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS PRIORITY RECOMMENDATIONS R1 BIS to elevate the profile of information risk in support of KIM strategy aims for the protection, management and exploitation of information. This would be supported by: Establishing

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY

NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY NHS ISLE OF WIGHT CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY POLICY AUTHOR/ APPROVAL DETAILS Document Author Written By: Human Resources Authorised Signature Authorised By: Helen Shields Date: 20

More information

Introduction. Clarification of terminology

Introduction. Clarification of terminology Initiating a dialogue about the security of digital built assets: a guide for managers (with regard to PAS 1192-5, A Specification for security-minded building information modelling, digital built environments

More information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information Royal Borough of Kensington and Chelsea Data Quality Framework ACE: A Framework for better quality data and performance information March 2010 CONTENTS FOREWORD 2 A CORPORATE FRAMEWORK FOR DATA QUALITY

More information

Corporate Governance in New Zealand Principles and Guidelines

Corporate Governance in New Zealand Principles and Guidelines CONSULATION DRAFT: November 2014 CONSULTATION DRAFT November 2014 Corporate Governance in New Zealand Principles and Guidelines A handbook for directors, executives and advisers Auckland Office Level 5,

More information

Guidelines on Appointments to State Boards Department of Public Expenditure and Reform, November 2014

Guidelines on Appointments to State Boards Department of Public Expenditure and Reform, November 2014 Guidelines on Appointments to State Boards Department of Public Expenditure and Reform, November 2014 Introduction and Context 1. Background 1.1 In 2011 the Government introduced new arrangements for appointments

More information

Practice Note. 10 (Revised) October 2010 AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM

Practice Note. 10 (Revised) October 2010 AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM October 2010 Practice Note 10 (Revised) AUDIT OF FINANCIAL STATEMENTS OF PUBLIC SECTOR BODIES IN THE UNITED KINGDOM The Auditing Practices Board (APB) is one of the operating bodies of the Financial Reporting

More information

Guidance for ISO liaison organizations Engaging stakeholders and building consensus

Guidance for ISO liaison organizations Engaging stakeholders and building consensus Guidance for ISO liaison organizations Engaging stakeholders and building consensus ISO in brief ISO is the International Organization for Standardization. ISO has a membership of 163* national standards

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective

More information

Compliance. Compliance Toolkit. Protecting Charities from Harm. Chapter 2 Due Diligence, Monitoring and Verification of End Use of Charitable Funds

Compliance. Compliance Toolkit. Protecting Charities from Harm. Chapter 2 Due Diligence, Monitoring and Verification of End Use of Charitable Funds Compliance Compliance Toolkit Protecting Charities from Harm Chapter 2 Due Diligence, Monitoring and Verification of End Use of Charitable Funds The Charity Commission The Charity Commission is the independent

More information

BUSINESS CONTINUITY POLICY

BUSINESS CONTINUITY POLICY BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

AUDIT COMMITTEE TERMS OF REFERENCE

AUDIT COMMITTEE TERMS OF REFERENCE AUDIT COMMITTEE TERMS OF REFERENCE 1. Purpose The Audit Committee will assist the Board of Directors (the "Board") in fulfilling its oversight responsibilities. The Audit Committee will review the financial

More information

MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY. Ensuring Information is Accurate and Fit for Purpose

MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY. Ensuring Information is Accurate and Fit for Purpose MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY Index: Introduction Information is a Corporate Resource Personal Responsibility Information Accessibility Keeping Records of what we do Ensuring

More information