PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Management and Data Storage Policy. Version 1.4
|
|
|
- Elmer Franklin
- 10 years ago
- Views:
Transcription
1 PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Management and Data Storage Policy Version 1.4
2 Document Control Title: Reference: Original Author(s): Owner: Distribution: Reviewed by: Quality Assured by: File: Signature: Authority: management and data storage policy Suzanne Wright Suzanne Wright All staff - published on Intranet Bill Richardson, Tom Stoddart Bill Richardson, Records Management Project Board Approved by Executive Board Change History Version Date Status Last update Comment /12/08 Approved 16/12/08 Approved by EB at meeting of 12/08/ /11/11 Draft 22/11/11 Reviewed by Suzanne Wright and updated /11/11 Draft 28/11/11 Reviewed by Tom Stoddart /12/11 Draft 22/12/11 Updated following review by Bill Richardson /02/12 Draft 09/02/12 Updated following Equality Impact Assessment and submitted to EB for approval 2 Management and Data Storage Policy
3 Contents 1. Purpose Policy statement Scope Principles Objectives Outcomes Monitoring and compliance Review... 6 Annex 1 - Background context... 7 Annex 2 - Which s are records?... 9 Annex 3 - management and storage Annex 4 - Access to mail accounts during absences Management and Data Storage Policy
4 1. Purpose 1.1 The purpose of this policy is to provide a framework for the effective management of PHSO s s in accordance with all statutory and business requirements. Compliance with this policy supports PHSO s commitment to be exemplary in its administration. 2. Policy statement 2.1 The Ombudsman recognises that effective records management is fundamental to good administration and operational effectiveness and is an enabler to the achievement of our strategic aims and objectives. The Ombudsman is therefore committed to implementing and maintaining good record keeping practices. 2.2 While PHSO is not covered by the Public Records Act 1958, nor required to adopt the Code of Practice on the Management of Records, the Ombudsman has decided to adopt an approach to records management which is consistent with the legal obligations and best practice principles embodied in them. 2.3 PHSO is subject to and will comply with the Freedom of Information Act 2000 and the Data Protection Act 1998, taking into account the statutory bar on the disclosure of information obtained in the course of investigations other than in specific circumstances. 3. Scope 3.1 This policy applies to s that are received, created, or held in the course of PHSO s business. It should be read in conjunction with the ICT Acceptable Use policy which details security, content and legal liability, and acceptable use. 3.2 This policy applies to all permanent, contract and temporary staff and any organisation or body acting as agents of PHSO where contractual arrangements are in place, who have access to PHSO s computer system and who use . Everyone should ensure that they are familiar with the content of the policy and use it as a point of reference when dealing with messages. 4 Management and Data Storage Policy
5 4. Principles Principle 1 All business and case management data held on PHSO's IT systems (including s and documents) belong to PHSO and not any individual or group. This data should therefore be stored in the appropriate corporate system and be available for management and operational use subject to normal access controls. Principle 2 My Workspace in Meridio is available for limited personal storage. Personal s or those containing sensitive information should be filed in My Workspace. This area must not contain s related to PHSO s business. Staff are required to perform regular electronic housekeeping on their My Workspace to ensure that data that is no longer required is deleted. Principle 3 When an is sent or received a decision must be made about whether it needs to be captured as a record (see Annex 2 for further information). Once an message has been captured as a record it should be deleted from all mailboxes. Principle 4 s not retained in a corporate system within a reasonable period of time (currently defined as 90 days) will be automatically deleted from the system (Outlook). 5. Objectives The key objectives of this policy are to: 5.1 Ensure appropriate management arrangements are in place to ensure messages that form records of business activities are stored appropriately 5.2 Ensure all employees have a clear understanding of their personal and collective responsibilities in managing their 5.3 Ensure messages that form records of business activities are stored appropriately 5.4 Ensure messages are managed in order to comply with Data Protection and Freedom of Information legislation 5.5 Help staff manage their electronic information better 5.6 Mitigate against the risks of excessive and inappropriate data storage which includes: important corporate information not being shared (data is held in private drives) inappropriate non-corporate files being stored on PHSO IT systems out-of-date and duplicate information using up storage capacity. 5 Management and Data Storage Policy
6 6. Outcomes 6.1 This policy will deliver the following outcomes: Work is conducted more efficiently as it will enable staff to locate all the information relating to specific areas of the business IT system performance is improved and we reduce the risks and costs of excessive data storage PHSO s reputation is protected because we have systems in place to manage so that we can comply with Freedom of Information and Data Protection legislation. 7. Monitoring and compliance 7.1 The Head of Information and Records Management is responsible for monitoring this policy to ensure it is up-to-date, relevant and continues to support strategic aims and objectives. 7.2 Compliance with this management policy will be regularly assessed and included within the internal audit programme. 7.3 Reviews will seek to: identify examples of good practice which can be used throughout PHSO highlight where non-compliance is occurring; and if appropriate, recommend remedial action to ensure exemplary records management standards are achieved and maintained. 8. Review 8.1 The policy will be reviewed every three years, unless there is a significant change in relevant legislation which requires a review before then. 6 Management and Data Storage Policy
7 Annex 1 - Background context 1.1 As an exemplary organisation all our records should be managed in line with the Lord Chancellor s Code of Practice on the management of records under Section 46 of the Freedom of Information Act This states that the principal issues for the management of electronic records are the same as those for the management of any record, including the creation of authentic records, the tracking of records, review and retention of records and disposal arrangements. 1.2 This policy has been developed in line with The National Archives guidance on managing s. The National Archives are widely regarded across both the public sector and private sector as leading on records management issues is increasingly becoming the primary business tool for both internal and external written communication and as a result should be treated with the same level of attention given to drafting and managing any other documents. messages should not be treated as an extension of the spoken word because their written nature means they are treated with greater authority. As well as taking care over how messages are written it is necessary to manage messages appropriately after they have been sent or received messages are available until deleted by both the sender and recipient. All non-deleted messages are subject to Data Protection and Freedom of Information Legislation and can also form part of the corporate record. They could therefore be subject to discovery action and used against PHSO. 1.5 Staff should also be aware that corporate messages could be used as evidence in legal or employment proceedings. Members of staff are responsible for what they have written in an message. 1.6 The consequence of all this is that after corporate/ business-related s have been created, these are potential records and are required to be stored in the corporate file plan (i.e. not Outlook). s which are not records should be deleted within an appropriate time. This policy puts in place PHSO s arrangements for managing s appropriately. 1.7 Specifically the policy ensures that PHSO has in place adequate mechanisms to: ensure messages facilitate effective communication and ensure that appropriate records of those communications are maintained in accordance with the PHSO Management and Records Management policies; ensure compliance with information legislation that applies to including Data Protection Act and, Freedom of Information Act ensure appropriate business records are maintained for audit and accountability purposes; mitigate against the risks of inappropriate and excessive data storage. 1.8 A record is defined in PHSO s Records Management policy as recorded information created, received and maintained by PHSO in pursuance of its legal obligations or in the transaction of business. When deciding whether an message constitutes a record, the context and content of the message 7 Management and Data Storage Policy
8 need to be considered. A guiding principle on identifying records might be that as soon as the needs to be forwarded for information purposes it should be considered a record. 1.9 The management policy compliments the ICT Acceptable Use policy, specifically: 3.2 Content and Legal Liability; 4. Personal Use of the ICT system; and 5. Unacceptable use of the ICT system The policy applies to everyone employed by PHSO who has access to its computer system and who uses . Staff should ensure that they are familiar with the content of the policy and use it as a point of reference when dealing with messages All employees have a clear understanding of their personal and collective responsibilities in managing their Management and Data Storage Policy
9 Annex 2 - Which s are records? 2.1 To help identify records, a record is defined in PHSO s Records Management Policy as recorded information created, received and maintained by PHSO in pursuance of its legal obligations or in the transaction of business. Messages that might constitute a record are likely to contain information about: substantive contributions to the development of legislation, policy or procedures including factual evidence and interpretative material relating to changes as well as accepted and rejected options; evidence of how far Office objectives have been met; material that relates to the main functions of the Office and its development, including major projects, special measures and initiatives; background material to decisions, rulings, opinions and advice issued to the public, MPs, bodies within jurisdiction, staff, etc; text of statements, speeches, Select Committee submissions, answers to Parliamentary Questions, etc along with briefing papers and background material; public or other notable events which gave rise to significant contemporary interest or controversy; contracts and contract changes as well as procedures used to select external suppliers; authorisation for payment of suppliers, contractors, staff, etc; measures taken to comply with legal and other obligations and regulations such as Health and Safety legislation, Data Protection Act, etc; and an individual s terms of employment or conditions with PHSO, collected through HR or management processes and which form a part of the worker s employment relationship with PHSO. 2.2 This list is indicative but not exhaustive and staff are advised to seek further guidance from their Local Information and Records Adviser or the Information and Records Manager if in doubt. 9 Management and Data Storage Policy
10 Annex 3 - management and storage 3.1 messages can constitute part of the formal record of a transaction. All members of staff are responsible for identifying and managing messages that constitute a record of their work. 3.2 When an is sent or received a decision needs to be made about whether the needs to be captured as a record in the appropriate area of the corporate file plan. Once an message has been captured as a record it should be deleted from your mailbox s will be treated in the same way as other corporate records in terms of retention and disposal. The information asset register sets out the retention periods for each section of the corporate file plan and these will ensure that records that are no longer required for ongoing business or historical reasons are deleted as soon as reasonably possible. 3.4 All important documents and s that demonstrate action or contribute to policy or decision making must be stored in Visualfiles (where it is related to a specific case) or in the appropriate place in the corporate file plan for longer term retention and review messages that can be considered to be records should be captured as soon as possible. Most messages will form part of an conversation string. Where an string has formed as part of a discussion, it is not necessary to capture each new part of the conversation separately. There is no need to wait until the end of the conversation before capturing the string as several subjects might have been covered. strings should be captured as records at significant points during the conversation, rather than waiting to the end of the conversation because it might not be apparent when the conversation has finished messages relating to casework must be filed in Visualfiles. 3.7 As messages can be sent to multiple recipients there are specific guidelines to indicate who is responsible for capturing an as a record: For internal messages, the sender of an message, or initiator of an dialogue that forms a string of messages; For messages sent externally, the sender of the message; For external messages received by one person, the recipient; and For external messages received by more than one person, the person responsible for the work relating to the message. If this is not clear it may be necessary to clarify who this is with the other people who have received the message. 3.8 Where an has an attachment a decision needs to be made as to whether the message, the attachment or both should be kept as a record. The 10 Management and Data Storage Policy
11 decision on whether an and/or its attachment constitute a record depends on the context within which they were received. In most instances the attachment should be captured as a record with the message as the message will provide the context within which the attachment was used. Where further work is required on an attachment, the initial message and attachment will be one record, and the copy attachment used for further work will become a completely separate record. 3.9 The subject line of an message does not always reflect the reason for capturing an as a record and therefore might not be the most appropriate name for the when it is transferred to Meridio or Visualfiles. This can be avoided by following the naming convention guidelines (available on Ombudsnet) for naming s at the point they are created. Re-naming s is particularly important when they represent different parts of an string as it helps to identify the relevant aspects of the conversation During the 90 days after the creation of the , a decision needs to be made as to whether the is a record. If it is it should be transferred to an appropriate place either in Visualfiles (for casework) or in the appropriate place in the corporate file plan. Any s still in Outlook after 90 days will automatically be deleted A further option is storage on an individual s My Workspace. However, this is only to be used for personal or sensitive, non-business s. Any records held there must be transferred to the corporate file plan or Visualfiles as soon as possible. 11 Management and Data Storage Policy
12 Annex 4 - Access to mail accounts during absences 4.1 In the case of planned absences (eg holidays) staff should use the Out of Office Assistant. The auto-reply message should ideally give an alternative contact and state when a full reply can be expected. s should be forwarded to another member of staff during a prolonged absence. Alternatively, where this can be done securely, access to a mailbox should be delegated to another member of a team to ensure urgent messages are dealt with. 4.2 Shared mailboxes can be created where there are a group of people responsible for the same area of work (eg an investigation team, a working group, project team or a section in Corporate Resources). This will help to ensure that queries are answered if members of the team are away from the office. One person should be identified as the owner of a shared mailbox or public folder. The owner is responsible for the overall management of that mailbox or folder. 4.3 In the case of unplanned absences and/or where the member of staff has not made arrangements for access (eg sickness) the manager should arrange redirection of ; authorisation should be requested from the Head of HR Operations and Head of ICT. Access should be in the presence of the line manager. On return, the staff member should be told when and why their mailbox was accessed. 4.4 There may be occasions when it is necessary to access messages from an individual s mailbox when a person is away from the office for an extended period. Authorisation should be requested from the Head of HR Operations and Head of ICT. Access should be in the presence of the line manager. On return, the staff member should be told when and why their mailbox was accessed. The reasons for accessing an individual s mailbox are to action: Subject access request under the Data Protection Act; Freedom of Information request; Evidence in legal proceedings; Evidence in a criminal investigation; Line of business enquiry; and Evidence in support of disciplinary action. 4.5 Staff should ensure that any personal or sensitive s are filed in My Workspace. This area would not be subject to the review outlined in 4.3 above. 12 Management and Data Storage Policy
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Records Management Policy Version 4.0 Page 1 of 11 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: File Location: Approval
Information Governance and Assurance Framework Version 1.0
Information Governance and Assurance Framework Version 1.0 Page 1 of 19 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: Meridio Location: Approval Body: Policy and Guidance
OFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
Guidelines on developing a policy for managing email
Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government
West Midlands Police and Crime Commissioner Records Management Policy 1 Contents
West Midlands Police and Crime Commissioner Records Management Policy 1 Contents 1 CONTENTS...2 2 INTRODUCTION...3 2.1 SCOPE...3 2.2 OVERVIEW & PURPOSE...3 2.3 ROLES AND RESPONSIBILITIES...5 COMMISSIONED
Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention
Table of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2
Table of Contents Chapter Subject Page No. 1. Introduction 1 2. Objective 1 3. E-mail Use Compliance 1 4. Definitions 2 5. Roles and Responsibilities 2 6. Creation and Use of E-mails 3 7. Managing E-mails
Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000
Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
Information and Compliance Management Information Management Policy
Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and
Information Integrity & Data Management
Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is
E-Mail Use Policy. All Staff Policy Reference No: Version Number: 1.0. Target Audience:
E-Mail Use Policy Authorship: Barry Jackson Information Governance, Security and Compliance Manager Committee Approved: Integrated Audit and Governance Committee Approved date: 11th March 2014 Review Date:
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
Corporate Records Management Policy
Corporate Records Management Policy Introduction Part 1 Records Management Policy Statement. February 2011 Part 2 Records Management Strategy. February 2011 Norfolk County Council Information Management
Council Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public
WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY CONTENTS 1. POLICY STATEMENT... 3 2. PRINCIPLES... 3 DEFINITIONS... 4 3. OBJECTIVES... 4 4. SCOPE... 4 5. OWNERSHIP & RESPONSIBILITIES...
How to Manage Email. Guidance for staff
How to Manage Email Guidance for staff 1 Executive Summary Aimed at Note Purpose Benefits staff Necessary skills to All staff who use email This guidance does NOT cover basic IT literacy skills. Staff
Data Protection. Policy and Application July 2009
Data Protection Policy and Application July 2009 Produced for staff of the House of Commons Service by the Department of Resources Information Rights and Information Security (IRIS) Service Data Policy:
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY Version 8.0 Purpose: For use by: This document is compliant with /supports compliance with: To outline the lifecycle of a record and to provide guidance on retention and disposal
CORPORATE RECORDS MANAGEMENT POLICY
1.1 Introduction Derbyshire County Council is dependent on its records to operate efficiently and to account for its actions. This policy defines a structure for Derbyshire County Council to ensure that
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY
IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY Purpose The purpose of this policy is to provide the IFRS Foundation with a framework to govern management decisions on whether particular documents
SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September 2015. Information Governance Manager
SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY Report to the Trust Board 22 September 2015 Sponsoring Director: Author: Purpose of the report: Key Issues and Recommendations: Director
State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
E-Mail Management & Retention
E-Mail Management & Retention Maine State Archives Records Management Division Basic Information What is e-mail? Formally, it is a document created or received on an electronic mail system including brief
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Records Management Policy & Guidance
Records Management Policy & Guidance COMMERCIALISM Document Control Document Details Author Nigel Spencer Company Name The Crown Estate Department Name Information Services Document Name Records Management
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY Section Institute Governance and Management Approval Date 20.08.2012 Approved by Senior Management Team Next Review Aug 2015 Responsibility Director of Finance and Corporate Services
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
Lexcel England and Wales v6 Guidance notes for in-house legal departments Excellence in practice management and client care. 2015 The Law Society.
Excellence in practice management and client care 2015 The Law Society. Contents Introduction... 3 PART ONE - GUIDANCE AGAINST LEXCEL STANDARD REQUIREMENTS... 4 1 - Structure and strategy... 4 2 - Financial
West Dunbartonshire Council. Follow-up data protection audit report
West Dunbartonshire Council Follow-up data protection audit report Auditors: Lee Taylor (Audit Team Manager) Jonathan Kay (Engagement Lead Auditor) Data controller contacts: Michael Butler (Data Protection/Information
INTERNET, E-MAIL USE AND
INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
Use the Navigation Pane This section covers items like: Changing the size of the Navigation Pane Minimising and expand the Navigation Pane
Level 2 Outlook Introducing Outlook Explore the Outlook modules The different elements of the Outlook program window The different modules that make up Outlook Use the Navigation Pane Changing the size
FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT
FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT November 2003 Laid before the Scottish Parliament on 10th November 2003 pursuant to section 61(6) of the Freedom of Information
Data Protection and Data security Policy
Data Protection and Data security Policy Statement of policy and purpose of Policy 1. Somer Valley Community Radio Ltd (the Employer) is committed to ensuring that all personal information handled by us
LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER
LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER SECTION 46 OF THE FREEDOM OF INFORMATION ACT 2000 NOVEMBER 2002 Presented to Parliament by the Lord Chancellor Pursuant to section
Email Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:
Version: 1.1 Ratified by: NHS Bury CCG IM&T Steering Group Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual: Greater Manchester CSU - IT Department NHS Bury
Guide 4 Keeping records to meet corporate requirements
Guide 4 Keeping records to meet corporate requirements This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by the Lord Chancellor
NOT PROTECTIVELY MARKED FORCE PROCEDURES. Email Retention, Archiving and Destruction Procedure v1.2. Records Manager
FORCE PROCEDURES Email Retention, Archiving and Destruction Procedure v1.2 Procedure Reference Number: 2010.08 Procedure Author: Samantha Hampson, Records Manager Procedure Review Date: 1 st April 2011
Information Management Policy
Title Information Management Policy Document ID Director Mark Reynolds Status FINAL Owner Neil McCrirrick Version 1.0 Author Deborah Raven Version Date 26 January 2011 Information Management Policy Crown
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Staffordshire County Council. Records Retention and Disposal Policy
Staffordshire County Council Records Retention and Disposal Policy Version Author Approved By Date Published Review V. 1.1 Information Governance Unit Philip Jones, Head of Information Governance 2/11/2012
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
Human Resources Policy No. HR46
Human Resources Policy No. HR46 Maintaining Personal Files and ESR Records Additionally refer to HR04 Verification of Professional Registration HR33 Recruitment and Selection HR34 Policy for Carrying Out
Scope and Explanation
The Moray Council Retention & Disposal Schedule for documents and records [paper and electronic] Scope and Explanation 1 Document Control Sheet Name of Document: The Moray Council Records Retention Schedule
Electronic Communications Monitoring Policy
Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew
Information Governance Framework
Information Governance Framework March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aim 2 3 Purpose, Values and Principles 2 4 Scope 3 5 Roles and Responsibilities 3 6 Review 5 Appendix 1 - Information
Records Management Security of University Records Procedures
Records Management Security of University Records Procedures pro-064 To be read in conjunction with: Records Management Policy Version: 2.00 Last amendment: Nov 2014 Next Review: Nov 2016 Approved By:
NHS CHOICES COMPLAINTS POLICY
NHS CHOICES COMPLAINTS POLICY 1 TABLE OF CONTENTS: INTRODUCTION... 5 DEFINITIONS... 5 Complaint... 5 Concerns and enquiries (Incidents)... 5 Unreasonable or Persistent Complainant... 5 APPLICATIONS...
Information Management Advice 50 Developing a Records Management policy
Information Management Advice 50 Developing a Records Management policy Introduction This advice explains how to develop and implement a Records Management policy. Policy is central to the development
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Data protection policy
Data protection policy Introduction The College is required to keep certain information about employees, students and other users to allow it to monitor performance, achievements, health and safety, recruitment
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data. Directive 7.08 Protection of Personal Data
Akzo Nobel N.V. Executive Committee Rules 7.08.2 Privacy Rules for Customer, Supplier and Business Partner Data Source Directive Content Owner Directive 7.08 Protection of Personal Data AkzoNobel Legal
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1
COMPUTER USER REGULATIONS INFORMATION TECHNOLOGY POLICY 1 1. INTRODUCTION The purpose of this policy is to: I. Regulate access to Manukau Institute of Technology ( MIT ) Computer Systems ensuring they
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
LINCOLNSHIRE COUNTY COUNCIL. Information Security Policy Framework. Document No. 8. Email Policy V1.3
LINCOLNSHIRE COUNTY COUNCIL Information Security Policy Framework Document No. 8 Email Policy V1.3 Document Control Reference V1.3 Email Policy Date 17 July 2015 Author Approved by Version History David
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
State of Montana E-Mail Guidelines
State of Montana E-Mail Guidelines A Management Guide for the Retention of E-Mail Records for Montana State Government Published by the: Montana State Records Committee Helena, Montana September 2006 Based,
GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective
GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective Abstract This document highlights some of the South African rules and regulations that require the effective management of email. It looks
Guide 2 Organisational
Guide 2 Organisational arrangements to support records management This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
House of Commons Corporate Governance Framework
House of Commons Corporate Governance Framework What is Corporate Governance? 1. Good corporate governance is fundamental to any effective organisation and is the hallmark of any well-managed corporate
IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 02) E-Mail Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&TPP No. 2 Email Policy Version 3.04
INFORMATION GOVERNANCE STRATEGY NO.CG02
INFORMATION GOVERNANCE STRATEGY NO.CG02 Applies to: All NHS LA employees, Non-Executive Directors, secondees and consultants, and/or any other parties who will carry out duties on behalf of the NHS LA.
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
Information Sharing Policy
Information Sharing Policy REFERENCE NUMBER IG 010 / 0v3 February 2013 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee 5.2.13 REVIEW DUE DATE February 2016 West Lancashire CCG is committed
Senate. SEN15-P17 11 March 2015. Paper Title: Enhancing Information Governance at Loughborough University
SEN15-P17 11 March 2015 Senate Paper Title: Enhancing Information Governance at Loughborough University Author: Information Technology & Governance Committee 1. Specific Decision Required by Committee
Guide 1 What is records management?
Guide 1 What is records management? This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by the Lord Chancellor under section
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
ATTENDANCE MANAGEMENT POLICY
ATTENDANCE MANAGEMENT POLICY Co-ordinator: Director of HR Reviewer: Grampian Area Partnership Forum Approver: Grampian Area Partnership Forum Signature Signature Signature Identifier: NHSG/POL/39/HR Review
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Information Management Policy. Retention and Destruction Policy
Information Management Policy Retention and Destruction Policy July 2015 Title: Information Management Policy: Retention and Destruction Policy Author: Directorate/ Division/ Branch acronym / cost centre
