Information Security Incident Protocol
|
|
|
- Regina Williamson
- 9 years ago
- Views:
Transcription
1 Information Security Incident Protocol Document Owner Caroline Dodge Tel: Version Version 2: July 2013 Contents 1. Protocol Objectives 2. Scope 3. Protocol Statement 4. In the event of a suspected breach 5. Non-compliance with protocol 6. Assistance and guidance 7. Definitions 8. Appendix A - 9. Appendix B Information Security Incident Protocol version 2 July of 11
2 1. Protocol Objectives Any information that could identify a living individual is classed as personal data. All data subjects have a right to access their own personal data that is held by KCC as Data Controller. Consequently, KCC can be considered to be the custodian of that information and has, therefore, the responsibility of ensuring its confidentiality. KCC is committed to ensuring the security and integrity of that information by implementing and maintaining appropriate controls and procedures for handling and storing of personal and sensitive information. KCC has, therefore, the responsibility of taking appropriate steps in the event of the loss, theft or uncontrolled exposure of personal or sensitive information for which it is the custodian. This protocol sets out the steps that must be followed in the event of loss, theft or uncontrolled exposure of personal or sensitive information for which KCC has responsibility. 2. Scope of this Protocol The protocol applies to all KCC staff and volunteers and, through contractual arrangements to KCC, suppliers, partners, contractors, agents, consultants and commissioned services, in the course of functions carried out for or on behalf of KCC. Members (elected Councillors) have similar responsibilities. These are set out in the Members Code of Conduct. Throughout this document the word information refers to information that relates to personally identifiable individuals (as is defined within the Data Protection Act) or is commercial or political information of a sensitive/confidential nature. Computerised equipment, for the purposes of this protocol, includes, but is not limited to: personal computers (PCs laptops, notebooks, tablets and palmtops); application servers, file/print servers; Personal Digital Assistants (PDAs); Blackberries and mobile phones. It also includes all types of: removable storage media; peripheral devices and; accessories physically attached, or connected by wireless networks, to the computerised equipment. 3. Protocol Statement Anyone who handles personal or sensitive information for and/or on behalf of KCC must: take all reasonable steps to ensure the security of that information to minimise the risk of an information security breach, including the loss of personal or sensitive information; Information Security Incident Protocol version 2 July of 11
3 follow the procedure outlined below in the event of any breach of security. 4. In the event of a suspected information security breach: DO NOT WAIT ACT and REPORT ANY INCIDENTS IMMEDIATELY It is crucial to act quickly in the event of a suspected information security incident, in order to minimise the impact of the incident and safeguard the privacy of individuals as far as possible and minimise the risk to KCC. The initial steps that should be taken to alert managers about an incident will vary depending on whether the incident involved a member of KCC staff, a supplier or commissioned service, a service user or a member of the public. The flow charts and supporting sections in this document set out the steps that should be followed in the event of an information security incident for each of these three circumstances: A member of KCC staff or a Member or a volunteer identifies a potential information security incident; A supplier or provider of commissioned services identifies and reports a potential information security incident; A service user or a member of the public identifies and reports a potential information security incident. Information Security Incident Protocol version 2 July of 11
4 Information Security Incident Protocol version 2 July of 11
5 Information Security Incident Protocol version 2 July of 11
6 Information Security Incident Protocol version 2 July of 11
7 5. Non-compliance with this Protocol Failure to comply with this Protocol by: KCC employees: may result in disciplinary action and may, in cases of Gross Misconduct (including negligence or deliberate non-compliance), result in termination of employment; KCC Members: may be referred to the Standards Committee, which can recommend disciplinary measures to the Council; Third-Parties (agents, contractors and consultants) engaged to carry out work for and on behalf of Kent County Council: may result in the termination of the contract and/or litigation. 6. Assistance and Guidance If you do not understand this Protocol or if you need clarification or more details regarding any of its points then contact KCC s: Information Resilience and Transparency Team; Information Systems Security Officer, ICT Division, Business Strategy & Support; Senior Information Risk Owner, Governance & Law, Business Strategy & Support. 7. Definitions and additional information Information takes many forms and includes information printed or written on paper (including photocopies and faxes), stored electronically (e.g. on computers or networked storage, disk media, digital tape, memory cards or sticks), transmitted by post or using electronic means, images, stored negatives, prints, slides, tape or video, spoken in conversation or via telephone. Personal information is information about an identifiable individual as defined in the Data Protection Act Sensitive information is information that if lost, stolen or inappropriately disclosed would adversely affect the privacy or safety of an individual, or harm the business interests or reputation of KCC or third parties. A Security Incident is awareness of the possibility or actuality of a breach of security. This can take many forms, e.g. unauthorised access to, or the loss or theft of, KCC computerised equipment; the mislaying of a client s manual case file or the inappropriate disclosure of information (verbally, in writing or electronically) to someone who has no right or need to access it. Examples of Information security incidents which would need to be reported include: Information Security Incident Protocol version 2 July of 11
8 Overhearing of confidential information; Unauthorised access to KCC computerised equipment; Loss of KCC computerised equipment. Examples of more serious breaches which will require immediate remedial action include: Loss of one or more confidential case files; containing personal or sensitive information sent to the wrong address; Fax containing personal or sensitive information sent to wrong fax number; Loss of KCC computerised equipment containing personal or sensitive information. Loss In the event of the item being knowingly lost as opposed to stolen, all of the above applies except that the Police will not report a crime and cannot issue a crime number. Lost and Stolen applies to hard copy information as well as computerised equipment, e.g. file left in a vehicle or on public transport or stolen with car or snatched in a bag, etc. Also applies to any personal details or sensitive information passed to an unauthorised individual in any manner or overheard by an unauthorised individual during a conversation. Confirming, assessing and evaluating the situation may take at least 48 hours before being able to contact the affected person(s) or organisation(s) and may be heavily impacted upon if over a weekend. However, management are strongly advised to contact the affected persons at the earliest opportunity when facts are known. A sensitive, short but accurate letter must be sent with contact information for anyone who may be affected by the loss or disclosure of the information. In some circumstances, service users are vulnerable adults and children and being informed of the security breach may be alarming. In these circumstances, the Corporate Director or their nominated deputy will consider appropriate communication strategies. It may be important to point out that at this early stage there is no indication that their personal security has been breached but the member of the public must remain vigilant and will be advised of any change in security status. If any of the information relates to personal finance details then the individual should be advised to contact their bank or building society urgently and to monitor their bank/building society account(s). The Corporate Director or nominated deputy will need to prepare a briefing for all the necessary parties within a single , copied to the appropriate contacts. Depending upon the potential seriousness of the security breach, contact is advised by phone as well as face to face. Any significant change to status will require follow-up communication. The incident must remain in the OPEN status, until finally resolved and only CLOSED after it has been resolved, reviewed and any Information Security Incident Protocol version 2 July of 11
9 requirements for training, disciplinary and/or procedural changes have been identified. As well as OPEN/CLOSED it is recommended that the incident has a traffic light (Red Amber Green) status which is reviewed regularly, both through any information governance and directorate risk management procedures. Information Security Incident Protocol version 2 July of 11
10 Review History Review Date Reviewed By Changes Necessary? 25 th July 2013 A.J. Cordina Yes Appendix A: - Document Version Control Revision History Revision Date Revision Summary of Changes 25 th July 2013 V 1.0 To reflect PSN CoCo requirements. Approvals Name Title Date of Issue Version Appendix B: Distribution and disclosure of this document and its contents The contents of this document have been given the UNCLASSIFIED category under HMG s National Protective Marking Scheme. The National Protective Marking Scheme (often referred to as the Government Protective Marking System/Scheme or GPMS) is Her Majesty s Government s administrative system to ensure that access to information and other assets is correctly managed and safeguarded to an agreed and proportionate level throughout their lifecycle, including creation, storage, transmission and destruction. The system is designed to support government business and meet the requirements of relevant legislation, international standards and international agreements. The Protective Marking System comprises five markings. In descending order of sensitivity they are: TOP SECRET, SECRET, CONFIDENTIAL, RESTRICTED, PROTECT and UNCLASSIFIED. These markings can be applied to any government assets, although they are most commonly applied to information held electronically or in paper documents. For Local Authorities, such as Kent County Council, the protective markings which will be most commonly seen in the workplace are UNCLASSIFIED, PROTECT and RESTRICTED. Out of these it is anticipated that UNCLASSIFIED and PROTECT will be the most common. Information Security Incident Protocol version 2 July of 11
11 Unclassified documents have no classification requirements and, therefore, must not include personal, confidential or sensitive information. Unclassified documentation is that which includes terms of reference, minutes from open meetings, policies etc. and can, therefore, be placed into the public domain or published on the Internet. Information Security Incident Protocol version 2 July of 11
Somerset County Council - Data Protection Policy - Final
Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
SECURITY POLICY REMOTE WORKING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
Data and Information Security Policy
St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration
INFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
Data Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
Information Classification and. Handling Policy
Information Security Document Information Classification and 1 Version History Version Date Detail Author 1.0 27/06/2013 Approved by Information Governance Jo White Group 2.0 31/07/2013 Approved by Information
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
Data Transfer Policy. Data Transfer Policy London Borough of Barnet
Data Transfer Policy Data Transfer Policy London Borough of Barnet Document Control POLICY NAME Data Transfer Policy Document Description Policy surrounding data transfers (electronic and paper based).
Portable Devices and Removable Media Acceptable Use Policy v1.0
Portable Devices and Removable Media Acceptable Use Policy v1.0 Organisation Title Creator Oxford Brookes University Portable Devices and Removable Media Acceptable Use Policy Information Security Working
Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)
Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
PRIVACY BREACH POLICY
Approved By Last Reviewed Responsible Role Responsible Department Executive Management Team March 20, 2014 (next review to be done within two years) Chief Privacy Officer Quality & Customer Service SECTION
Records Management Policy & Guidance
Records Management Policy & Guidance COMMERCIALISM Document Control Document Details Author Nigel Spencer Company Name The Crown Estate Department Name Information Services Document Name Records Management
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures
SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Information Security Incident Management Policy and Procedure
Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé
NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
Security Incident Policy
Organisation Title Author Owner Protective Marking Somerset County Council Security Incident Policy Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council will
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Information Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
Information Governance Framework
Information Governance Framework March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aim 2 3 Purpose, Values and Principles 2 4 Scope 3 5 Roles and Responsibilities 3 6 Review 5 Appendix 1 - Information
Information Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
Remote Working and Portable Devices Policy
Remote Working and Portable Devices Policy Policy ID IG04 Version: V1 Date ratified by Governing Body 29/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
Information Security Policy. Chapter 12. Asset Management
Information Security Policy Chapter 12 Asset Management Author: Policy & Strategy Team Version: 0.5 Date: April 2008 Version 0.5 Page 1 of 7 Document Control Information Document ID Document title Sefton
Mobile Phone Device Policy
Version 2.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
06100 POLICY SECURITY AND INFORMATION ASSURANCE
Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
Acceptable Use Guidelines
Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines
Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014
Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Security Incident Management Policy
Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015
ISO IEC 27002 2005 (17799 2005) TRANSLATED INTO PLAIN ENGLISH
13.1 REPORT INFORMATION SECURITY EVENTS AND WEAKNESSES 1 GOAL Make sure that information system security incidents are promptly reported. 2 GOAL Make sure that information system security events and weaknesses
PS177 Remote Working Policy
PS177 Remote Working Policy January 2014 Version 2.0 Statement of Legislative Compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data Protection
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Data Protection Breach Reporting Procedure
Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval
LSE PCI-DSS Cardholder Data Environments Information Security Policy
LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project
BLACKPOOL COUNCIL Topic Social Media Policy
1. Introduction 1.1 The widespread use of social media, particularly social networking sites, necessitates Blackpool has a policy in place to ensure that appropriate control mechanisms exist to minimise
Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy
Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Merthyr Tydfil County Borough Council. Information Security Policy
Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
Social Media Policy. Policies and Procedures. Social Media Policy
Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4
THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31
THE MORAY COUNCIL Guidance on data security breach management Information Assurance Group DRAFT Based on the ICO Guidance on data security breach management under the Data Protection Act 1 Document Control
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Encryption Policy Version 3.0
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
VEHICLE LOCATION SYSTEM POLICY. Version 0.2. Paul Robinson, Strategic Director, Richard Kniveton, Fleet and Depot Manager
VEHICLE LOCATION SYSTEM POLICY Version 0.2 Document owner Paul Robinson, Strategic Director, Neighbourhoods Document author Richard Kniveton, Fleet and Depot Manager Document manager Richard Kniveton,
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire
Information Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
Information Circular
Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
ENISA s ten security awareness good practices July 09
July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject
Data Protection Guidance
53 September 2010 Management Circular No. 53 Glasgow City Council Education Services Wheatley House 25 Cochrane Street Merchant City GLASGOW G1 1HL To Heads of all Educational Establishments Data Protection
Disciplinary and Dismissals Policy
Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary
University of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
