Information Security Policy. Appendix B. Secure Transfer of Information
|
|
|
- Aileen Tyler
- 9 years ago
- Views:
Transcription
1 Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008
2 Document Control Information Document ID Document title Information Security Policy Appendix B - Secure Transfer of Information Policy. Version 0.7 Status Draft for comments Author R.Roscoe Job title Data Protection and Information Security Officer Department Information Services Publication date Approved by Next review date Distribution
3 Contents 1. SECURE TRANSFER OF INFORMATION OVERVIEW SCOPE EXCLUSIONS POLICY STATEMENT DEFINITIONS ROLES AND RESPONSIBILITIES THE SENDER IT AUDITOR DEPARTMENTAL MANAGERS INDIVIDUAL EMPLOYEES DEPARTMENTAL INFORMATION MANAGEMENT SPECIALISTS RISK ASSESSMENT THE SENDER S RESPONSIBILITY IS THE TRANSFER LEGAL AND NECESSARY? IS IT PERSONAL INFORMATION? IS IT CONFIDENTIAL INFORMATION? DOES PUBLIC INFORMATION NEED ANY SPECIAL CONTROLS? REQUIREMENTS FOR TRANSFERRING PERSONAL OR CONFIDENTIAL INFORMATION ELECTRONIC MAIL ELECTRONIC DATA TRANSFER (FTP, SECURE FTP, BACS, DCSF S COLLECT) ELECTRONIC MEMORY, (CD, DVD, FLOPPY, USB DRIVE, MEMORY CARD) FAX TRANSMISSION DELIVERY BY POST OR BY HAND TELEPHONE/MOBILE PHONE INTERNET BASED COLLABORATIVE SITES TEXT MESSAGING (SMS), INSTANT MESSAGING (IM) APPENDIX 1 - THE PRINCIPLES OF DATA PROTECTION APPENDIX 2 - OTHER RESOURCES AND LINKS... 10
4 1. Secure Transfer of Information 1.1. Overview There are many occasions when information is transferred between departments, to third-party service providers, to other public bodies, commercial organisations and individuals. This is done using a wide variety of media and methods, in electronic and paper format. In every transfer there is a risk that the information may be lost, misappropriated or accidentally released. The Council often has a duty of care in handling information. Recent high-profile losses have highlighted this. For legal reasons such as confidentiality or data protection, and to maintain the trust of our service users and partners it is essential that the transfer is performed in a way that adequately protects the information. It is the role of the Sender to assess the risks and ensure that adequate controls are in place. This policy outlines the responsibilities attached and the minimum security requirements for transfer Scope This policy states the minimum security requirements for physical transfer of information into, across and out of the organisation, in any format. For the purpose of this document, Information refers to both textual information (e.g. word-processed documents, reports and spreadsheets), and raw unformatted data (e.g. backup tapes), in any format and on any medium. This policy applies to all employees of the Authority and any Third-party that processes the organisation information Exclusions This policy does not cover the transfer of information over the Sefton internal network, which has its own automated security controls. It does not cover proprietary secure transfer mechanisms such as BACS financial transfers that have their own separately implemented security requirements Policy Statement The organisation recognises its responsibility to process its information correctly and in line with all legal, regulatory and internal policy requirements. It is the Sender s responsibility to risk assess what they are intending to do and ensure that all associated risks are adequately understood and covered, and that the transfer is properly authorised. The baseline security requirements for various methods are listed below. The IT Auditor in Internal Audit will monitor compliance with this Policy. If a user is found to have breached this policy, they may be subject to the Council s disciplinary procedure. If they have broken the law then they may be subject to prosecution. If a user does not understand the implications of this policy or how it may apply to them, they should seek advice from either their Caldicott Guardian or the Council s Data Protection Officer. 2. Definitions Requester Any individual that requests records from a Council department. They may be another Council department, a Service provider, or an external Agency.
5 Sender - The Sender is the individual acting for the Council that initiates a Data Transfer. They must have the authority, and the sufficient knowledge of the nature of the data to determine whether it should be sent, and that it is sent securely. Where the final actual task is delegated to administrative, untrained or inexperienced staff, the original Sender remains responsible for ensuring the Transfer complies with this policy. Information Owner - Every major type of record (e.g. Invoices, Purchase Orders, Adoption case files) must be assigned an owner within the Council who will be responsible for it throughout its lifecycle. This Owner may work in any department but must have sufficient ability, authority and experience to understand the contents and approve the processing of the record. Record owners must be formally documented. 3. Roles and Responsibilities Proper definitions of roles and responsibilities are essential to assure compliance with this Policy. In summary these are: 3.1. The Sender The Sender is responsible for ensuring the following requirements of this Policy are met. Assessing the information to be sent, in line with Section 2 of this policy. Ensuring that the identity and authorisation of the recipient has been formally confirmed and documented. Obtaining the consent of the Data Owner for the transfer. Ensuring that the information is sent and tracked in an appropriate manner in compliance with section 3 of this policy IT Auditor The IT Auditor in the Internal Audit section will monitor and audit departments to ensure compliance with all statutory and regulatory obligations, and internal policies Departmental Managers Departmental managers are responsible for ensuring that this Policy is communicated and implemented within their area of responsibility, and for ensuring that any issues such as resourcing or funding are communicated back to their strategic directors in a timely manner Individual employees Individual employees will be responsible for familiarising themselves with this Policy and ensuring that any information transfer for which they are responsible is done in a compliant manner. Individual employees must report any suspected or actual security breaches related to data transfer in line with the Organisations Incident Management Policy Departmental information management specialists Departmental information management specialists will provide first line advice to departments on Information transfer related issues.
6 4. Risk assessment 4.1. The sender s responsibility With each information transfer there is a risk that the information may be lost, misappropriated or accidentally released. It is the responsibility of the sender to assess all risks and ensure that adequate controls are in compliance with this policy. This section contains some of the things that must be considered before transferring information. If in doubt, contact your Data Protection Officer or Caldicott Guardian Is the transfer legal and necessary? It is dangerous to assume that because someone asks for information that they are necessarily authorised or legally entitled to have it. If you are in doubt then you should check with your manager. Once you are sure that the transfer is legal and necessary then you must decide what kind of information you are dealing with. This will determine what security is appropriate. To transfer personal or confidential information without these checks may leave the Council open to Legal and Reputational damage and the sender may be subject to disciplinary action Is it Personal information? Personal information is about a living, identifiable individual. If it contains details of racial or ethnic origin, political opinions, religious beliefs, trade union membership, physical or mental health, sexual life, commission of offences, court appearances and sentences it is further classified as sensitive personal information. Anything we do with personal information must comply with the Data Protection Act Basic requirements of the Act are listed in Appendix 1. If in doubt contact the Data Protection Officer or the Caldicott Guardian. Before you make any transfer you must: Ensure transfers to Media organisations are approved by the Communications Department. Obtain and document the approval of the Information Owner for transfer Ensure that the transfer is legal (in particular under the Data Protection Act. See Appendix below) Ensure that the transfer is necessary (is there a less intrusive way) Remove or blackout anything that is not essential for the recipient's purpose Have a documented agreement in place to ensure the recipient understands their responsibilities under the law, particularly what to do with the transfer file after they have extracted the information to their system 4.4. Is it confidential information? Confidential information is that for which the Council has a duty of confidentiality. This may include information that affects the business interests of a third party, or for which the sender does not hold copyright e.g. bank details, salary details, contracts, agreements. Unauthorised release of confidential information can leave the Council open to legal sanction or litigation. It can also erode the trust of the Public and its Partners in the Council itself. Before you transfer you must: Ensure transfers to Media organisations are approved by the Communications Department Obtain and document the approval of the information owner for transfer Ensure that you are not breaching a Duty of Confidentiality
7 Ensure that the transfer is necessary (is there a less intrusive way) Remove anything that is not essential for the recipient's purpose Have a documented agreement in place to ensure the recipient understands their responsibilities under the law, particularly what to do with the transfer file after they have extracted the information to their system 4.5. Does Public information need any special controls? Public information is any information that is freely released or exchanged and presents minimal risk to the Council in terms of content, quality or timeliness e.g. promotional brochures. In general there are no special security requirements for transfer of Public information because their release represents no special risk. Public information will be transferred in the most cost-effective method available. Before you transfer you must still: Ensure any transfers to Media organisations are approved by the Communications Department. Seek the permission of the Department that produced or owns this information before making any transfer, even if the transfer appears harmless. 5. Requirements for Transferring Personal or Confidential Information Having decided what kind of information you have, and prepared it for transfer, the sender must consider the various methods of transfer available and whether they are appropriate. This section lists the main methods and sets out any restrictions and the requirements for secure transfer of Personal or Confidential information. For all transfers of Personal or Confidential information it is essential that the identity and authorisation of the recipient has been appropriately authenticated by the sender Electronic Mail Information must be enclosed in an attachment and encrypted using a product approved by the Council set at an appropriate strength. Minimum standard for encryption is AES (256 bit). WINZIP 11.1 and above offer this. Any password must be to Organisation standard. 7 characters, mix of alpha and numeric. Further details of the password policy can be found in Chapter 7 of the Information Security policy. Any password to open the attached file must be transferred to the recipient using a different method than , e.g. a telephone call to an agreed telephone number, closed letter. message must contain clear instructions on the recipient s responsibilities and instructions on what to do if they are not the correct recipient. An accompanying message and the filename must not reveal the contents of the encrypted file. Check with the recipient that their system will not filter out or quarantine the transferred file. The sender must check at an appropriate time that the transfer has been successful, and report any issues to their line manager Electronic Data Transfer (FTP, Secure FTP, BACS, DCSF s COLLECT) Standard FTP without encryption is inherently insecure and should not be used for transmitting personal or confidential information. SFTP file transfers are acceptable but such transfers must be set up and administered by the Information Services department. External secure transmission systems such as BACS or DCSF s COLLECT system are designed to be secure provided that they are implemented configured and used correctly. However, it is the responsibility
8 of the sender to ensure that the use of such a system is appropriate for the use they propose. If in doubt, advice should be sought from the system owner Electronic memory, (CD, DVD, Floppy, USB drive, Memory Card) Information must be enclosed in a file and encrypted using a product approved by the Council set at an appropriate strength. Minimum standard for encryption is AES (256 bit). WINZIP 11.1 and above offer this. Any password must be to Organisation standard. 7 characters, mix of alpha and numeric. Further details of the password policy can be found in Chapter 7 of the Information Security policy. Any password to open the attached file must be transferred to the recipient using a different method than , e.g. a telephone call to an agreed telephone number, closed letter. An accompanying message should contain clear instructions on the recipient s responsibilities, and instructions on what to do if they are not the correct recipient. An accompanying message and the filename must not reveal the contents of the encrypted file. The sender must check at an appropriate time that the transfer has been successful, and report any issues to their line manager FAX Transmission FAX is inherently insecure and is not recommended for transfer of sensitive information. However it is acknowledged that certain circumstances demand it. Sender must check that the Fax number is correct and that the receiver is awaiting transmission. For high sensitivity information the number must be double-checked by a colleague before transmission, and telephone contact should be maintained throughout transmission. Both sender and receiver must have an agreed process to avoid their copy being left on the Fax machine, and a clear requirement to securely destroy the message when no longer required. The message should contain clear instructions on the recipient s responsibilities and instructions on what to do if they are not the correct recipient. The sender must check at an appropriate time that the transfer has been successful, and report any issues to their line manager Delivery by Post or by Hand It is essential that the file, whether electronic or paper is kept secure in transit, tracked during transit, and delivered to the correct individual. An appropriate delivery mechanism must be used. Package must be securely and appropriately packed, clearly labelled and have a seal, which must be broken to open the package. Package must have a return address and contact details. The label must not indicate the nature or value of the contents. Package must be received and signed for by addressee. The sender must check at an appropriate time that the transfer has been successful, and report any issues to their line manager Telephone/Mobile Phone As phone calls may be monitored, overheard or intercepted either deliberately or accidentally, care must be taken as follows. Transferred information must be kept to a minimum. Personal or Confidential information must not be transferred over the telephone unless the identity and authorisation of the receiver has been appropriately confirmed.
9 5.7. Internet Based Collaborative Sites Must not be used for Personal or Confidential information Text messaging (SMS), instant Messaging (IM) Must not be used for Personal or Confidential information.
10 6. Appendix 1 - The principles of data protection The Data Protection Act 1998 stipulates that anyone processing personal information must comply with Eight Principles of good practice. These Principles are legally enforceable. The Principles require that personal information: 1. Shall be processed fairly and lawfully and in particular, shall not be processed unless specific conditions are met. 2. Shall be obtained only for one or more specified and lawful purposes and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Shall be adequate, relevant and not excessive in relation to the purpose or purposes for which it is processed. 4. Shall be accurate and where necessary, kept up to date. 5. Shall not be kept for longer than is necessary for that purpose or those purposes. 6. Shall be processed in accordance with the rights of data subjects under the Act. 7. Shall be kept secure i.e. protected by an appropriate degree of security. 8. Shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate level of data protection. In most cases the consent of the data subject is required. The Act provides conditions for the processing of any personal data. It also makes a distinction between personal data and sensitive personal data. Sensitive personal data is defined as personal data consisting of information as to: Racial or ethnic origin; Political opinion; Religious or other beliefs; Trade union membership; Physical or mental health or condition; Sexual life; Criminal proceedings or convictions. The data subject also has rights under the act. These consist: The right to be informed that processing is being undertaken; The right of access to one s personal information within the statutory 40 days; The right to prevent processing in certain circumstances; The right to correct, rectify, block or erase information regarded as wrong information. 7. Appendix 2 - Other resources and links Internal guidance on implementation of the Data Protection Act, Information Security and related documents are available to Organisation Staff via the Organisation Intranet at: The Data Protection and information Security Officer for Organisation can be contacted via the I.S. department on The Caldicott Guardian for Organisation can be contacted on ####
Data Transfer Policy. Data Transfer Policy London Borough of Barnet
Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).
Information Security Policy. Chapter 12. Asset Management
Information Security Policy Chapter 12 Asset Management Author: Policy & Strategy Team Version: 0.5 Date: April 2008 Version 0.5 Page 1 of 7 Document Control Information Document ID Document title Sefton
Little Marlow Parish Council Registration Number for ICO Z3112320
Data Protection Policy Little Marlow Parish Council Registration Number for ICO Z3112320 Adopted 2012 Reviewed 23 rd February 2016 Introduction The Parish Council is fully committed to compliance with
Data Transfer Policy London Borough of Barnet
London Borough of Barnet DATA PROTECTION 11 Document Control Document Description Data Transfer Policy Version v.2 Date Created December 2010 Status Authorisation Name Signature Date Prepared By: IS Checked
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
DATA PROTECTION ACT 1998 COUNCIL POLICY
DATA PROTECTION ACT 1998 COUNCIL POLICY Page 1 of 5 POLICY STATEMENT Blackpool Council recognises the need to fully comply with the requirements of the Data Protection Act 1998 (DPA) and the obligations
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
Policy Document Control Page
Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
Data Protection Policy
Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
Policy Document Control Page
Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
Information security incident reporting procedure
Information security incident reporting procedure Responsible Officer Author Date effective from 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended
Human Resources and Data Protection
Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council
Data Protection Policy
Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third
Summary Electronic Information Security Policy
University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture
Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk
Data Protection Act 1998 The for the Borough Council of King's Lynn & West Norfolk 1 Contents Introduction 3 1. Statement of Intent 4 2. Fair Obtaining I Processing 5 3. Data Uses and Processes 6 4. Data
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
Data Protection Guidance
53 September 2010 Management Circular No. 53 Glasgow City Council Education Services Wheatley House 25 Cochrane Street Merchant City GLASGOW G1 1HL To Heads of all Educational Establishments Data Protection
GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4
GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 PREFACE The following provides general guidance on data protection
The Manchester College
The Manchester College The Manchester College Produced by TMC Prin DataProtect pol v1 11/2010 All rights reserved; no part of this publication may be photocopied, recorded or otherwise reproduced, stored
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Somerset County Council - Data Protection Policy - Final
Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council
Guidelines on Data Protection. Draft. Version 3.1. Published by
Guidelines on Data Protection Draft Version 3.1 Published by National Information Technology Development Agency (NITDA) September 2013 Table of Contents Section One... 2 1.1 Preamble... 2 1.2 Authority...
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
Abertay Data Storage Policy
Abertay Data Storage Policy Author Louise Cardno, Business Analyst Reviewer Frazer Greig, ICT Operations Manager Approved by Michael Turpie, Head of Information Services Approval date(s) 03-Jun-2015 Review
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
Information Security Incident Management Policy and Procedure
Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure
Information Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
Data protection policy
Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
University of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
John Leggott College. Data Protection Policy. Introduction
John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
Data Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Policy and Procedure Title: Maintaining Secure Learner Records Policy No: CCTP1001 Version: 1.0
PROVIDER NAME: POLICY AREA: College of Computing Technology (CCT) Standard 10: Information Management, Student Information System & Data Protection Policy and Procedure Title: Maintaining Secure Learner
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
Index. Definitions. What is Data Protection? Rights of Individuals. The 8 Principles of Data Protection
Data Protection Awareness Based on DIT s Data Protection Policy, the Data Protection Acts, 1988 & 2003 and guidance from the Office of the Data Protection Commissioner Index Definitions What is Data Protection?
Information Classification and. Handling Policy
Information Security Document Information Classification and 1 Version History Version Date Detail Author 1.0 27/06/2013 Approved by Information Governance Jo White Group 2.0 31/07/2013 Approved by Information
Enterprise Information Security Procedures
GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
Data Protection Procedures
Data Protection Procedures PROCEDURE OVERVIEW: This Procedure outlines Down District Council s ( the Council ) commitment to the Data Protection Act 1998 ( the Act ) and provides a framework for the Council
CORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
Incident reporting procedure
Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
DATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
USE OF PERSONAL MOBILE DEVICES POLICY
Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website
Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,
DATA PROTECTION POLICY. Examples of personal data which TWM may require from clients include the following and for the reasons ascribed to each;
DATA PROTECTION POLICY Introduction TWM Solicitors maintain certain personal data about individuals for the purposes of satisfying operational and legal obligations. The Data Protection Act sets rules
Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy
Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information
Rick Parsons Information Governance Officer County Hall 01865 323593 [email protected]
Rick Parsons Information Governance Officer County Hall 01865 323593 [email protected] 1 THE DATA PROTECTION ACT 1998 2 Requirements of the Act Roles & Responsibilities Best Practice 3 The
VEHICLE LOCATION SYSTEM POLICY. Version 0.2. Paul Robinson, Strategic Director, Richard Kniveton, Fleet and Depot Manager
VEHICLE LOCATION SYSTEM POLICY Version 0.2 Document owner Paul Robinson, Strategic Director, Neighbourhoods Document author Richard Kniveton, Fleet and Depot Manager Document manager Richard Kniveton,
IT Data Security Policy
IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Security Incident Management Policy
Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
RECORDS MANAGEMENT POLICY
[Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body
Data Protection Act. Privacy & Security in the Information Age. April 26, 2013. Ministry of Communications, Ghana
Data Protection Act Privacy & Security in the Information Age April 26, 2013 Agenda Privacy in The Information Age The right to privacy Why We Need Legislation Purpose of the Act The Data Protection Act
Data Protection and Data security Policy
Data Protection and Data security Policy Statement of policy and purpose of Policy 1. Somer Valley Community Radio Ltd (the Employer) is committed to ensuring that all personal information handled by us
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
GENERAL ELECTRIC COMPANY EMPLOYMENT DATA PROTECTION STANDARDS
GENERAL ELECTRIC COMPANY EMPLOYMENT DATA PROTECTION STANDARDS December 2005 2 GENERAL ELECTRIC COMPANY EMPLOYMENT DATA PROTECTION STANDARDS I. OBJECTIVE... 1 II. SCOPE... 1 III. APPLICATION OF LOCAL LAWS...
An overview of UK data protection law
An overview of UK data protection law Our team Vinod Bange Partner +44 (0)20 7300 4600 [email protected] Graham Hann Partner +44 (0)20 7300 4839 [email protected] Chris Jeffery Partner +44
DATA PROTECTION POLICY
DATA PROTECTION POLICY DATA PROTECTION POLICY Document Control Information Title Data Protection Policy Version V1.0 Author Diana Watt Date Approved 21 February 2013 Review Date Annually, on the anniversary
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
ATMD Bird & Bird. Singapore Personal Data Protection Policy
ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:
Information Security Policy. Chapter 13. Information Systems Acquisition Development and Maintenance Policy
Information Security Policy Chapter 13 Information Systems Acquisition Development and Maintenance Policy Author: Policy & Strategy Team Version: 0.3 Date: June 2008 Document Control Information Document
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
INFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.
Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the
Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:
Secure Storage, Communication & Transportation of Personal Information Policy Version No: 3.0 Prepared By: Information Governance, IT Security & Health Records Effective From: 20/12/2010 Review Date: 20/12/2011
Data Protection for the Guidance Counsellor. Issues To Plan For
Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)
1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established
Network Security ProPosal Form Important Please answer all questions from each section and complete in block capitals. Tick the appropriate boxes where necessary and supply any further information requested.
DATA PROTECTION AUDIT GUIDANCE
DATA PROTECTION AUDIT GUIDANCE CONTENTS Section I: Section II: Audit of Processing of Personal Data Audit Procedure Appendices: A B C D E Audit Form List of Purposes List of data subjects List of data
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
