Business System Recordkeeping Assessment - Digital Recordkeeping Compliance

Size: px
Start display at page:

Download "Business System Recordkeeping Assessment - Digital Recordkeeping Compliance"

Transcription

1 Introduction The following assessment will assist to identify whether the system complies with State Records Authority of NSW Standards on Records Management The broad Principles of this standard are as follows; 1. Principle 1: Organisations take responsibility for records and information management 2. Principle 2: Records and information management support business 3. Principle 3: Records and information are well managed Purpose: This guide provides a checklist against which an existing or new business system may be assessed to determine: whether the business the system supports is subject to any recordkeeping requirements how well the system is currently functioning as a recordkeeping system what action may be required to enable the system to meet recordkeeping requirements For further information go to: This information will enable system owners to decide whether a business system will require remedial work and/or connection with a dedicated recordkeeping system to ensure records are made and kept of the business it supports. Part 5 Risk Assessment Checklist for Storing Records Outside NSW with Cloud Service Providers, will need to be completed for systems that will utilise a service provider that is outside the State of NSW. This checklist will For further information go to Please forwards all completed assessments to records@newcastel.edu.au D10/20767 Page 1 of 14

2 Instructions The checklist is in five parts; 1. System identification details 2. Determine whether the system is subject to any recordkeeping requirements 3. Assess the system s existing recordkeeping functionality 4. Determine strategies to bridge any gaps in recordkeeping capability 5. Risk Assessment Checklist for Storing Records Outside NSW with Cloud Service Providers Part 1: System identification details System being assessed Date: Summarise the business function the system undertakes/supports Business Process Owner (Who owns the data?) Name: Position: Phone: Business Unit/Faculty: System Administrator Name: Details of person completing form Name: Phone: Position and Faculty/Business Unit D10/20767 Page 2 of 14

3 Part 2: Determine whether the system is subject to any recordkeeping requirements This part of the checklist is designed to help you to decide whether a business system will require remedial work and/or connection with a dedicated recordkeeping system to ensure records are made and kept of the business it supports. Requirement Explanation Response a) Is the information kept in this system unique evidence of official business? (i.e. not published or duplicate information) If the information in the system is required by officers and agencies to demonstrate that they performed their work appropriately then there is a need for a recordkeeping assessment. If the system contains duplicate information that has already been captured in an official recordkeeping system or which does not relate to official business of the organisation, there is no need for the recordkeeping assessment to continue. - If please complete part 3 No - If No there is no requirement to complete part 3 b) Does the system relate to a business activity for which there is an identifiable disposal class in a General Retention & Disposal Authority or your organisation's Functional Retention & Disposal Authority? c) Are there any legislative or business requirements to make and keep records of the business the system supports? d) Are these records already being created and kept in another system? If there is a disposal class for records of the business the system supports in an authorised disposal authority which indicates a retention period that is in effect a recordkeeping requirement. (refer to State Records NSW disposal authorities below) GDA 23 University Records Disposal Authority GA28 Administrative Records Disposal Authority See Step C of the DIRKS Manual, Identification of recordkeeping requirements for more guidance on how to identify requirements. List recordkeeping requirements on a separate sheet. See the DIRKS Manual for information on using risk assessment to determine the final set of requirements. - If please complete part 3 No - If No there is no requirement to complete part 3 - If please complete part 3 No - If No there is no requirement to complete part 3 - If there is no requirement to complete part 3 No - If No please complete part 3 D10/20767 Page 3 of 14

4 e) Did this system replace a previous system or systems? If yes, were records kept of the business supported by the previous system? If the answer is yes to this question, it is likely that this system will need to keep the same types of records. No If please complete part 3 Part 3. Assess the system s recordkeeping functionality Complete all questions to identify potential gaps in system compliance. Based on your responses enter the following information in the Comment/Action Column : YES Explain how the system complies with the requirement Partial (requirement can be met with configuration / procedure changes). Explain how the gap can be remedied NO (where the system is not capable): The system may need to be re-developed/enhanced, or another system used for recordkeeping purposes such as TRIM. Requirement Response Comments 3.1 Can the system capture read-only versions of digital records? The system should be able to keep a fixed and complete version of each record that is defined, whether in documentary form or a collection of data representing a transaction. The system should be able to maintain relationships between all components where the record is made up of more than one component. The system should have the capacity to capture externally generated records in addition to any that are created within the system if these have been defined as required records of the business supported by the system. Some business systems are designed to be current with minimal redundancy of data. If a business system that is being assessed for its recordkeeping capabilities allows for the continual updating of information without keeping a record where required the option of exporting records to an external recordkeeping system should be employed. Partial - can be done with changes to D10/20767 Page 4 of 14

5 3.2 Can the system retrieve and present the defined digital records in human readable form? The system should be able to store and retrieve the defined records along with their associated metadata and including all components of the records, for example attachments to messages along with messages. 3.3 Can the system restrict read/write access to digital records to specific individuals or groups as required? Based on defined access rules and user identification the system should be able to permit or limit access to records or groups of records. Minimum Required recordkeeping metadata The system should be able to capture and manage core recordkeeping metadata. This may mean the ability to: automatically capture metadata acquired directly from an authoring application or operating system where the record is received by the business system rather than created by the business system, and/or automatically capture metadata acquired from an EDRMS or IAMS system, where records are retained in the business system but managed by an IAMS, and/or automatically capture metadata generated by the business system itself, such as a date, reference number or user ID, and/or permit the manual entry of metadata by an operator. Metadata may be applied to individual records or aggregations of records up to whole systems Point of Capture Metadata Requirement Response Additional Detail 3.4 Does the system create a unique identifier for records? (e.g. URI uniform resource indicator, or Primary Key) The system should be capable of uniquely identifying each record as defined, for example with a system generated reference, a document number or other identifier. Each requisition and candidate file created in the e-recruitment system has an automatically generated reference number. D10/20767 Page 5 of 14

6 3.5 Does the system capture a Title or Subject for each record? The system should be capable of capturing and retaining information indicating what each record is for example, a subject line from an , a system generated report name or a manually entered document title. 3.6 Does the system capture the date each record was created? The system should be capable of capturing and retaining the date of each record s creation. 3.7 Does the system identify who or what process created the record? The system should be capable of capturing and retaining information on who or what created the record for example a name, a user ID or a system ID. In some cases this metadata might be captured from an external identity management system. 3.8 Does the system identify the business function and/or process that the record relates to? The system should be capable of capturing and retaining information on the business function or process the record relates to. This may be met by information which is also used as the Title, or it may be met at a higher level of aggregation; for example at the level of a group of records or all records in the system (for example all records generated by the Finance system are tagged accordingly). 3.9 Does the system identify the application used to create the record? The system should be capable of capturing and retaining information on the business function or process the record relates to. This may be met by information which is also used as the Title, or it may be met at a higher level of aggregation; capable of this capable of this. capable D10/20767 Page 6 of 14

7 for example at the level of a group of records or all records in the system (for example all records generated by the Finance system are tagged accordingly) Does the system identify the format or record type? Is the system capable of capturing and retaining metadata which indicates the record s type or form? In business systems there may only be a limited number of types for example reports and transactional records. It is possible to apply this metadata via another element such as Title and/or at an aggregate level (e.g. across the entire system). of this. capable of this. Process metadata Requirements Response Additional Detail 3.11 Does the system capture the date each record was first registered into the system? The system should be capable of capturing and retaining metadata which records the date the record was registered (may be the same as the date of its creation particularly if the record is being retained within the business system), and an identification of who/what registered the record. May be found in audit trail information 3.12 Does the system identify who or what process registered the record? No the system is not capable to do this Changed access rules Requirement Response Additional Detail 3.13 Does the system capture the date access rights on the record were applied and/or changed? D10/20767 Page 7 of 14

8 The system should be capable of capturing and retaining metadata which records the date the access rule was changed, what the new rule is and an identification of who/what made the change. May be found in audit trail information for aggregates of records Does the system identify who or what process changed an access rule? 3.15 Does the system identify what access rule was applied or changed? Transfer of control Requirement Response Additional Detail 3.16 Does the system identify that a record was transferred from UoN control in the event of administrative change? The system should be capable of capturing and retaining metadata about the date the record was transferred Does the system capture the date a record was transferred from UoN control? The system should be capable of capturing and retaining metadata about the date the record was transferred. D10/20767 Page 8 of 14

9 3.18 Does the system identify who or what process transferred the control of a record? The system should be capable of capturing and retaining metadata about who/what undertook the transfer Does the system capture the reference number of the authorisation for the transfer of records from the UoN control? An authorisation reference for the transfer (e.g. FA ; GA ; By court order; NAP etc.) should also be recorded Does the system identify who the control of a record was transferred to? The system should be capable of capturing and retaining metadata about the name of the receiving organisation. Destruction/deletion of records Requirement Response Additional Detail 3.21 Does the system identify that a record was destroyed/deleted from the system? The system should be capable of capturing and retaining metadata which records that a record has been destroyed Does the system capture the date a record was destroyed/deleted from the system? The system should be capable of capturing and retaining metadata which records D10/20767 Page 9 of 14

10 the date a record was destroyed Does the system identify who or what process destroyed/deleted the record from the system? The system should be capable of capturing and retaining metadata which records who/what undertook the destruction Does the system capture the reference number of the authorisation for the destruction/deletion of the records from the system? The system should be capable of capturing and retaining metadata which records an authorisation reference (e.g. FA ; GA ; By court order; NAP etc) 3.25 Is the system able to maintain a metadata profile over time maintaining links to the record and accumulating process metadata for the record as events occur? 3.26 Is the system able to export the records and their associated metadata to another system or to an external medium? 3.27 Are the records and their associated metadata able to be exported in suitable formats? (eg non-proprietary, readable, able to be managed in successor system/s?) D10/20767 Page 10 of 14

11 Risk Assessment Checklist for Storing Records outside NSW with Cloud Service Providers Public cloud computing usually involves transferring content to or creating content in data stores maintained by the provider and geographically remote from the customer. As a result, there are particular risks around ensuring compliance with: legislative requirements for the management of information, e.g. managing personal information government requirements, e.g. managing information security, disaster recovery and business continuity community expectations, e.g. ensuring that the University information is safely and securely stored and not available to be used for unauthorised purposes. State Records has approved the General authority for transferring records out of NSW for storage with or maintenance by service providers based outside of the State (GA35). This general authority gives approval to transfer records outside of NSW for storage with or maintenance by service providers based outside the State. However, this permission is given on the condition that an appropriate risk assessment has been made and the records are managed in accordance with all the requirements applicable to State records under the State Records Act In addition, all other legislative requirements for the management of information should also be met before entering any arrangements. In particular the University must: assess and address risks involved in taking and sending records out of the State for storage with or maintenance by service providers based outside of NSW ensure that the facilities, systems and services (including software products, storage systems) of the service provider conform to requirements in standards issued by State Records ensure that contractual arrangements and controls are in place to ensure the security, safe keeping and on-going accessibility of records ensure that contractual arrangements are in place to ensure the exportability and return of records and information is addressed ensure that the ownership of the records remains with the University ensure appropriate controls are in place to manage lawful, approved deletion or disposal of information and records monitor the arrangement to ensure the service provider is meeting all relevant requirements. There are potentially a number of business and information risks associated with using cloud computing services. These risks include: Sensitive data is hosted or stored outside of the organisation s own networks and servers. D10/20767 Page 11 of 14

12 Critical data is only accessible through the cloud service provider. This may build too much dependency on the provider. As data is managed and/or stored externally, business continuity and disaster recovery processes are outside the organisation s control and in the hands of the provider. The organisation may not be able to control the relevant information and records hosted in the cloud adequately, and may therefore fail to meet the requirement of s.11(1) of the State Records Act to ensure the safe custody and proper preservation of State records. A person in another State or country may claim ownership or otherwise take control of the records. The records may be subject to local laws and therefore be discoverable in those jurisdictions. The service provider may not have in place robust backup and disaster recovery strategies/systems. The service provider may not be able to preserve records with long retention periods. The service provider may destroy or deleted records without approval, unlawfully or inappropriately. The service provider may not be able to perform and document common records management tasks such access control, transfer and disposal. The records may not be returned upon request or at the conclusion of the contract. The records may be returned to the organisation but in a format that the organisation cannot readily access or use. The provider or owner of the business may go out of business and the data may not be recoverable. In order to manage the recordkeeping risks associated with cloud computing, the University should complete the checklist below and forward to the Records Management Office. Can the University confirm that.? /No 1. A risk assessment of keeping University records under cloud computing arrangements has been conducted and the service provider complies with the conditions listed in the General Authority for transferring records out of NSW for storage with or maintenance by service providers based outside of the State (GA35)? 2. The records to be made and kept in the cloud are not highly sensitive in nature? If so adequate safeguards are in place. 3. The ownership of records remains with the University? 4. Records are kept in accordance with the recordkeeping functionality and metadata requirements of the NSW Standards on digital recordkeeping? D10/20767 Page 12 of 14

13 5. The service provider has offsite back-up and disaster recovery measures in place? 6. A full restoration of information is possible within a reasonable timeframe in the event of an incident? 7. The provider will return all required records and associated metadata in readable formats to the University when requested? Can the Service Provider confirm.. 1. How they will meet the recordkeeping requirements specified by the University, for example additional metadata fields, to meet regulatory or business recordkeeping requirements. 2. Whether any additional charges would be levied by the service provider in the event of the University seeking to remove information from the cloud 3. If they will commit to storing and processing University information in specific jurisdictions that have legal frameworks more compatible with Australia environment. 4. That they can offer long term information accessibility. 5. That they can partition data so that key long term information can be exported and preserved and time expired data destroyed. 6. Whether they will make a contractual commitment to comply with privacy requirements on behalf of their customers both local to the University and in the location or locations(s) where the information is stored. 7. An assurance that no copy of the records or information is retained by the service provider after the termination of the contract. 8. That the University is able to regularly specify records to be destroyed? And that the provider is prepared to provide the University with certificates of destruction? 9. Whether they are regularly subjected to external security audit or certification processes. 10. How many administrators will have access to your records and details of controls over their access? 11. That University records cannot be used for applications not specified in the contract (for example, to data match with databases owned by other clients of the contractor) 12. That the University will be consulted regarding any third parties seeking to access to our records? 13. How third party access to records would be managed, for example if required by a government watchdog organisation in the jurisdiction in which the records are stored. D10/20767 Page 13 of 14

14 14. If they have measures such as multiple geographically separated back-up sites in place, so that they can do a complete restoration of your records if needed, and how long this would take. 15. How will they go about finding and restoring particular specified records or sets of records that need to be restored and what timeframes will they guarantee for this. For example, if someone accidentally deletes some records or if some data becomes corrupted. 16. When restoring records, can they ensure that the structure of records (not just the content) and associated metadata is maintained? 17. Whether service providers subcontract part of their service offering to third parties and, if so, what contractual agreements they operate under. 18. If there any standards they are certified as meeting? 19. Will the service provider guarantee acceptable parameters for service provision in respect to possible disruptions? What actions will they take in the event of service disruption, do they offer any recompense? D10/20767 Page 14 of 14

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0

ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0 ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after

More information

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,

More information

9. GOVERNANCE. Policy 9.8 RECORDS MANAGEMENT POLICY. Version 4

9. GOVERNANCE. Policy 9.8 RECORDS MANAGEMENT POLICY. Version 4 9. GOVERNANCE Policy 9.8 RECORDS MANAGEMENT POLICY Version 4 9. GOVERNANCE 9.8 RECORDS MANAGEMENT POLICY OBJECTIVES: To establish the framework for, and accountabilities of, Lithgow City Council s Records

More information

NSW Government. Cloud Services Policy and Guidelines

NSW Government. Cloud Services Policy and Guidelines NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations

More information

Records Management - Department of Health

Records Management - Department of Health Policy Directive Records Management - Department of Health Document Number PD2009_057 Publication date 24-Sep-2009 Functional Sub group Corporate Administration - Records Ministry of Health, NSW 73 Miller

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

Records Management Plan. April 2015

Records Management Plan. April 2015 Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised

More information

NHS Business Services Authority Records Management Audit Framework

NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Corporate Secretariat NHSBSARM019 Issue Sheet Document Reference Document Location Title Author Issued

More information

Union County. Electronic Records and Document Imaging Policy

Union County. Electronic Records and Document Imaging Policy Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability

More information

Information Management Advice 18 - Managing records in business systems: Overview

Information Management Advice 18 - Managing records in business systems: Overview Information Management Advice 18 - Managing records in business systems: Overview Introduction The purpose of this Advice is to assist agencies to identify and manage State records in business systems,

More information

Records Management Policy

Records Management Policy Records Management Policy Responsible Officer Chief Operating Officer Approved by Vice-Chancellor Approved and commenced April, 2014 Review by April, 2017 Relevant Legislation, Ordinance, Rule and/or Governance

More information

Considerations for Outsourcing Records Storage to the Cloud

Considerations for Outsourcing Records Storage to the Cloud Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage

More information

COUNCIL POLICY R180 RECORDS MANAGEMENT

COUNCIL POLICY R180 RECORDS MANAGEMENT 1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems

Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Introduction Agencies have systems which hold business information, such as

More information

WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public

WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY CONTENTS 1. POLICY STATEMENT... 3 2. PRINCIPLES... 3 DEFINITIONS... 4 3. OBJECTIVES... 4 4. SCOPE... 4 5. OWNERSHIP & RESPONSIBILITIES...

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact

More information

An Approach to Records Management Audit

An Approach to Records Management Audit An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

Cloud Software Services for Schools. Supplier self-certification statements with service and support commitments. SafeGuard Software Limited

Cloud Software Services for Schools. Supplier self-certification statements with service and support commitments. SafeGuard Software Limited Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone SafeGuard Software Limited

More information

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents West Midlands Police and Crime Commissioner Records Management Policy 1 Contents 1 CONTENTS...2 2 INTRODUCTION...3 2.1 SCOPE...3 2.2 OVERVIEW & PURPOSE...3 2.3 ROLES AND RESPONSIBILITIES...5 COMMISSIONED

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Records Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy...

Records Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy... Council Policy Records Management Table of Contents Table of Contents... 1 Policy... 2 Policy Objectives... 2 Policy Statement... 2 Records Management Program... 2 Accountability Requirements... 3 General

More information

Transition Guidelines: Managing legacy data and information. November 2013 v.1.0

Transition Guidelines: Managing legacy data and information. November 2013 v.1.0 Transition Guidelines: Managing legacy data and information November 2013 v.1.0 Document Control Document history Date Version No. Description Author October 2013 November 2013 0.1 Draft Department of

More information

Staffordshire County Council. Records Retention and Disposal Policy

Staffordshire County Council. Records Retention and Disposal Policy Staffordshire County Council Records Retention and Disposal Policy Version Author Approved By Date Published Review V. 1.1 Information Governance Unit Philip Jones, Head of Information Governance 2/11/2012

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Request for information on the document re: cloud and secure storage posted on the DfE website, response provided by DfE and Schools Commercial team: The focus of the project is on data security/safety

More information

Management of Official Records in a Business System

Management of Official Records in a Business System GPO Box 2343 ADELAIDE SA 5001 Tel (08) 8204 8773 Fax (08) 8204 8777 DX:467 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Management of Official Records in a Business System October 2011 Version

More information

Archiving and Backup - The Basics

Archiving and Backup - The Basics Introduction Backup and archiving are useful tools for managing data, especially volumes of ageing data. Agency policies for retention and access necessitate that these tools should be used to implement

More information

OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable)

OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable) OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable) 4.1 General Requirements 4.2 OHS policy Has the organisation an established and maintained

More information

NSW Government. Cloud Services Policy and Guidelines

NSW Government. Cloud Services Policy and Guidelines NSW Government Cloud Services Policy and Guidelines August 2013 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4 2.1

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the

REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the maintenance, retention and submission of electronic records.

More information

UNIVERSITY OF MANITOBA PROCEDURE

UNIVERSITY OF MANITOBA PROCEDURE UNIVERSITY OF MANITOBA PROCEDURE Procedure: Parent Policy: Effective Date: June 23, 2015 Revised Date: Review Date: June 23, 2025 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:

More information

information Records Management Checklist business people security preservation accountability Foreword Introduction Purpose of the checklist

information Records Management Checklist business people security preservation accountability Foreword Introduction Purpose of the checklist Records Management Checklist Foreword We fi rst developed the Records Management Checklist in 2008 to complement our performance audit Records Management in the Victorian Public Sector. At that time the

More information

Recordkeeping for Good Governance Toolkit. GUIDELINE 14: Digital Recordkeeping Choosing the Best Strategy

Recordkeeping for Good Governance Toolkit. GUIDELINE 14: Digital Recordkeeping Choosing the Best Strategy Recordkeeping for Good Governance Toolkit GUIDELINE 14: Digital Recordkeeping Choosing the Best Strategy i The original version of this guideline was prepared by the Pacific Regional Branch of the International

More information

Privacy and Cloud Computing for Australian Government Agencies

Privacy and Cloud Computing for Australian Government Agencies Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy

More information

orldox GX3 Cloud for Financial Services Worldox GX3 Cloud Compliance Outline The Best of both Worlds. / Whenever. Wherever.

orldox GX3 Cloud for Financial Services Worldox GX3 Cloud Compliance Outline The Best of both Worlds. / Whenever. Wherever. Award-winning Document Management / Whenever. Wherever. orldox GX3 Cloud The Best of both Worlds. Worldox GX3 Cloud Compliance Outline for Financial Services May 2013 Table of Contents Table of Contents...

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

IT SERVICE CONTINUITY AS RELATED TO THE MANAGEMENT OF ELECTRONIC RECORDS POLICY

IT SERVICE CONTINUITY AS RELATED TO THE MANAGEMENT OF ELECTRONIC RECORDS POLICY Department of Health Government of Western Australia IT SERVICE CONTINUITY AS RELATED TO THE MANAGEMENT OF ELECTRONIC RECORDS POLICY 2004 Document Control Date Version Notes Author 10/11/2003 0.1 Initial

More information

Monitoring records management. Catherine Robinson Senior Project Officer, Government Recordkeeping

Monitoring records management. Catherine Robinson Senior Project Officer, Government Recordkeeping Monitoring records management Catherine Robinson Senior Project Officer, Government Recordkeeping Monitoring framework Available at http://www.records.nsw.gov.au/recordkeeping/state-records-act-1998 Outlines

More information

Information Technology: This Year s Hot Issue - Cloud Computing

Information Technology: This Year s Hot Issue - Cloud Computing Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.

More information

Public Records (Scotland) Act 2011. Healthcare Improvement Scotland and Scottish Health Council Assessment Report

Public Records (Scotland) Act 2011. Healthcare Improvement Scotland and Scottish Health Council Assessment Report Public Records (Scotland) Act 2011 Healthcare Improvement Scotland and Scottish Health Council Assessment Report The Keeper of the Records of Scotland 30 October 2015 Contents 1. Public Records (Scotland)

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information

Records Management. 1. Introduction. 2. Strategic Plan Desired Outcomes

Records Management. 1. Introduction. 2. Strategic Plan Desired Outcomes Records Management Classification: Policy Name: First Issued / Approved: Last Reviewed: Council Policy Records Management 13/9/2011, CCS0036 12 August 2014, Cl9829 24 February 2015, C10054 Next Review:

More information

Information Sheet: Cloud Computing

Information Sheet: Cloud Computing info sheet 03.11 Information Sheet: Cloud Computing Info Sheet 03.11 May 2011 This Information Sheet gives a brief overview of how the Information Privacy Act 2000 (Vic) applies to cloud computing technologies.

More information

Records Management - Risk Assessment Tool

Records Management - Risk Assessment Tool Introduction This Risk Assessment Tool is designed to: - Provide business units with a quick reference to identify obvious risks to their records and recordkeeping systems - Assess additional risks within

More information

IS INFORMATION SECURITY POLICY

IS INFORMATION SECURITY POLICY IS INFORMATION SECURITY POLICY Version: Version 1.0 Ratified by: Trust Executive Committee Approved by responsible committee(s) IS Business Continuity and Security Group Name/title of originator/policy

More information

Public Records (Scotland) Act 2011. NHS Health Scotland Assessment Report. The Keeper of the Records of Scotland. 5 th August 2015

Public Records (Scotland) Act 2011. NHS Health Scotland Assessment Report. The Keeper of the Records of Scotland. 5 th August 2015 Public Records (Scotland) Act 2011 NHS Health Scotland Assessment Report The Keeper of the Records of Scotland 5 th August 2015 Contents 1. Public Records (Scotland) Act 2011... 3 2. Executive Summary...

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Records Management. Training 101

Records Management. Training 101 Records Management Training 101 Learning Objectives This training is designed to help you: Understand the importance of Records Management and why records are maintained Understand your RM responsibilities

More information

Records Management Policy & Guidance

Records Management Policy & Guidance Records Management Policy & Guidance COMMERCIALISM Document Control Document Details Author Nigel Spencer Company Name The Crown Estate Department Name Information Services Document Name Records Management

More information

CCG: IG06: Records Management Policy and Strategy

CCG: IG06: Records Management Policy and Strategy Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of

More information

ANU Electronic Records Management System (ERMS) Manual

ANU Electronic Records Management System (ERMS) Manual ANU Electronic Records Management System (ERMS) Manual May 2015 ERMS Manual May 2015 1 Contents The ERMS Manual 1. Introduction... 3 2. Policy Principles... 3 3. The Electronic Records Management System...

More information

OFFICIAL. NCC Records Management and Disposal Policy

OFFICIAL. NCC Records Management and Disposal Policy NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

STATE RECORDS COMMISSION. SRC Standard 6 OUTSOURCING. A Recordkeeping Standard for State Organizations

STATE RECORDS COMMISSION. SRC Standard 6 OUTSOURCING. A Recordkeeping Standard for State Organizations STATE RECORDS COMMISSION SRC Standard 6 OUTSOURCING A Recordkeeping Standard for State Organizations State Records Commission of WA Perth, Western Australia February 2002 Table of Contents Definitions

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY [Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body

More information

Records Management Policy

Records Management Policy Records Management Policy Document Number SOP2006-073 File No. 07/7 Date issued 1 September 2006 Author Branch Records and Mail Services Unit Branch contact 9320.7722 Division Finance & Data Services Summary

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Isuz Ltd. trading as Schoolcomms

More information

Last updated: 30 May 2016. Credit Suisse Privacy Policy

Last updated: 30 May 2016. Credit Suisse Privacy Policy Last updated: 30 May 2016 Credit Suisse Please read this privacy policy (the ) as it describes how we intend to collect, use, store, share, and safeguard your information. By accessing, visiting or using

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

39C-1 Records Management Program 39C-3

39C-1 Records Management Program 39C-3 39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.

More information

FWBC Records Management Policy TRIM Records. Version 1.0. October 2012

FWBC Records Management Policy TRIM Records. Version 1.0. October 2012 FWBC Records Management Policy TRIM Records Version 1.0 October 2012 Document Status Approved Authorised by: Chris Cahill Director Agency Conformance Dated: October 2012 NOTE: This is a CONTROLLED Document

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY ADOPTED BY COUNCIL 13 JUNE 2006 REVIEWED BY COUNCIL 6 NOVEMBER 2006 REVIEWED BY COUNCIL 10 MAY 2010 1. INTRODUCTION The State Records Act 1997 governs the obligations and responsibilities

More information

E-mail Management: A Guide For Harvard Administrators

E-mail Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005 Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad Toronto, Ontario June 14, 2005 Outsourcing Update: New Contractual Options and Risks Lisa K. Abe June 14, 2005

More information

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE Guiding Principles on Cloud Computing in Law Enforcement Cloud computing technologies offer substantial potential benefits to law enforcement and government

More information

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management

More information

Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1

Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1 Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1 Document Control Document history Date Version No. Description Author September 2013 1.0 Final Department of

More information

Cloud Service Contracts: An Issue of Trust

Cloud Service Contracts: An Issue of Trust Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,

More information

APES GN 30 Outsourced Services

APES GN 30 Outsourced Services APES GN 30 Outsourced Services Prepared and issued by Accounting Professional & Ethical Standards Board Limited ISSUED: [DATE] Copyright 2012 Accounting Professional & Ethical Standards Board Limited (

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact

More information

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure

More information

State Records Office Guideline. Management of Digital Records

State Records Office Guideline. Management of Digital Records State Records Office Guideline Management of Digital Records An Information Management Guideline for State Organizations Version 2 January 2015 www.sro.wa.gov.au Contents GLOSSARY... 2 PURPOSE... 5 BACKGROUND...

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) David J. Chavolla, Esq. and Gary L. Kemp, Esq. Casner & Edwards, LLP 303 Congress Street Boston, MA 02210 A. Document and Record Retention Preservation

More information

This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.

This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid. Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

Council Policy. Records & Information Management

Council Policy. Records & Information Management Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant

More information

Records Management plan

Records Management plan Records Management plan Prepared for 31 October 2013 Audit Scotland is a statutory body set up in April 2000 under the Finance and Accountability (Scotland) Act 2000. We help the Auditor General for Scotland

More information

New Relic EU Data Protection Whitepaper

New Relic EU Data Protection Whitepaper New Relic EU Data Protection Whitepaper November 2015 New Relic, Inc. 188 Spear Street San Francisco, CA 94105 1 Table of Contents I. Introduction II. Purpose III. Overview of Directive 95/46/EC IV. New

More information

Corporate Records Management Policy

Corporate Records Management Policy Corporate Records Management Policy Introduction Part 1 Records Management Policy Statement. February 2011 Part 2 Records Management Strategy. February 2011 Norfolk County Council Information Management

More information

Records Management Policy.doc

Records Management Policy.doc INDEX Pages 1. DESCRIPTORS... 1 2. KEY ROLE PLAYERS... 1 3. CORE FUNCTIONS OF THE RECORDS MANAGER... 1 4. CORE FUNCTIONS OF THE HEAD OF REGISTRIES... 1 5. PURPOSE... 2 6. OBJECTIVES... 2 7. POLICY... 2

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Office 365 Data Processing Agreement with Model Clauses

Office 365 Data Processing Agreement with Model Clauses Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081

More information

Cloud Computing in a Government Context

Cloud Computing in a Government Context Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important

More information

Indicative Requirements for Cloud Service Providers. connect communicate collaborate

Indicative Requirements for Cloud Service Providers. connect communicate collaborate Requirements Document Cloud Services connect communicate collaborate www.geant.net This document has been produced with the financial assistance of the European Union. The contents of this document are

More information

Migrating digital records

Migrating digital records Migrating digital records A guideline for Queensland public authorities June 2012 Version 1.0 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details

More information

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network... Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless

More information