INFORMATION SECURITY MANAGEMENT POLICY
|
|
|
- Noreen Rodgers
- 10 years ago
- Views:
Transcription
1 INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June 2010 Life 3 Years Review Annual Management Review Full review by June 2013 Owner The Assistant Secretary 1
2 Foreword to Information Security Policy In the age of the knowledge economy and information society information in all its forms has become, more than ever before, the currency of everyday interactions, debate, enlightenment, education, commerce, controversy and concern. In acquiring this level of importance in society information has naturally accrued a culture of rights and responsibilities which has in many cases - such as the protection of personal data, and intellectual property and the need for public transparency - been formalised by both legislation and regulatory requirements to which the IOE is subject. Where information is held by Institutions we are expected to ensure that we have proper regard to its: Confidentiality to the extent that the nature of the information requires this. Integrity - so that confidence can be had in the information s origin, content, relevance and accuracy. Availability - such that appropriate individuals and groups can access, update, read, interpret or monitor the information. Information security management is the means by which we ensure that we are taking account of these three factors. The aim of this policy to ensure that staff and students of the IOE all understand the importance of Information Security Management as defined above and in the policy as it relates to the information they gather, process and store and the legal and ethical responsibilities that are incumbent on them both as individuals and as members of the IOE staff. With this aim in mind I commend this policy to you and ask to have proper regard to it in your daily working lives. Professor Geoff Whitty Director Institute of Education, University of London November
3 Contents 1. Policy 3 2. Scope 4 3. Definitions 4 4. Information Security Principles 5 5. Legal and Regulatory Obligations 6 6. Information Classification 8 7. Roles and Responsibilities 9 8. Compliance, Policy Awareness and Disciplinary Procedures Incident Handling Supporting Policies, Codes of Practice, Procedures and Guidelines 11 3
4 1. Policy Statement 1.1 Information is vital to the success of the Institute of Education, University of London (IOE). How information is acquired, processed and shared, both on an academic and a business level, defines critical components of the Institute s stated mission. Behind all the Institute s activities lies the critical requirement for effective data security to ensure the confidentiality, integrity and availability of its data and information systems. 1.2 This information security management policy outlines the IOE s approach to information security management. It provides the framework for describing the guiding principles and responsibilities necessary to safeguard the security of the Institute s information systems. These principles responsibilities are set out in this policy and supporting policies, codes of practice, procedures and guidelines. 1.3 The IOE is committed to a robust implementation of Information Security Management. It aims to ensure the confidentiality, integrity and availability of its data by adherence to the principles defined in this policy, which will be applied to all of the physical and electronic information assets for which the IOE is responsible. 1.4 The IOE is also specifically committed to preserving the confidentiality, integrity and availability of documentation and data supplied by, generated by and held on behalf of third parties pursuant to the carrying out of work agreed by contract in accordance with the requirements of ISO 27001: 2005 Information technology security techniques information security management systems (ISMS) requirements. 1.5 These commitments are made in the recognition that adherence to these principles is consistent with the mission and values of the IOE and critical to its core business; strategic plans; and legal, regulatory and contractual requirements. 1.6 These commitments will be embedded within the IOE s strategic and business planning and its risk management, major incident recovery and business continuity arrangements. 1.7 To meet the requirements of the ISO27001 for documentation and data supplied by, generated by and held on behalf of third parties pursuant to the carrying out of work agreed by contract, the IOE will establish and maintain a specific Information Security Management System (ISMS). This ISMS will be subject to regular, systematic review and improvement and will be embedded in the IOE s strategy and risk management framework. For information assets falling within the scope of the ISO27001, a risk assessment, Statement of Applicability and risk treatment plan will identify how related risks are controlled. 4
5 2. Scope 2.1 This policy applies to all members of the IOE (staff, students, external members of statutory committees); visitors to the IOE; partners with and sub-contractors to the IOE; and any other authorized users of the IOE s information. 2.2 The policy relates to the use of all IOE-owned information assets (both physical and system based), to all privately owned systems when connected directly or indirectly to the Institute s network and to all Institute-owned and/or licensed or sanctioned software/data and equipment. 3. Objectives 3.1 The primary objectives of this policy are to: Ensure the protection of all Institute information systems (including but not limited to all computers, networking equipment, software and data) and to mitigate the risks associated with the theft, loss, misuse, damage or abuse of these systems Make certain that users are aware of and comply with all current and relevant UK and EU legislation Provide a safe and secure information systems working environment for staff, students and any other authorised users Make certain that all the Institute s authorised users understand and comply with this policy and any other associated policies, and also adhere to and work within the relevant codes of practice Protect the Institute from liability or damage through the misuse of its information systems facilities Ensure that all users understand their own responsibilities for protecting the confidentiality and integrity of the data that they handle. 4. Definitions - Data: Raw or undifferentiated information components. Often used interchangeably with the word Information. - Information: Data on its own carries no meaning. Information is data that has been interpreted been given or and taken on a meaning. Sometimes used interchangeably with the term data. - Record: an account in permanent form, especially in writing, preserving knowledge or information or data about facts or events 5
6 - Information Security: preservation of Confidentiality and Integrity and provision of Availability of information. Additionally refers to other properties, such as authenticity, accountability, nonrepudiation, and reliability. - Confidentiality: the prevention of the availability and disclosure of information to unauthorised individuals, entities or processes. - Integrity: the safeguarding of the accuracy and completeness of (information) assets. - Availability: The accessibility and usability of information upon demand by an authorised entity. - Information assets: information or data and the media and systems upon which they are recorded for which the IOE is responsible. - Information Security Incident: an event or series of events that have a significant probability of compromising business operations and threatening information security. 5. Information Security Principles 5.1 The following eight information security principles provide overarching governance for the security and management of information at the IOE. i. Information should be classified according to an appropriate level of confidentiality, integrity and availability (see Section 7. Information Classification and Section 5 of the Data Security Policy) and in accordance with relevant legislative, regulatory and contractual requirements and IOE policy (see Section 6. Legal and regulatory Obligations). ii. iii. iv. Staff with particular responsibilities for information (see Section 8. Roles and Responsibilities) are responsible for ensuring the classification of that information; for handling that information in accordance with its classification level; and for any policies, procedures or systems for meeting those responsibilities. All users covered by the scope of this policy (see Section 2. Scope) must handle information appropriately and in accordance with its classification level. Information must be complete, accurate, timely and consistent. v. Information should be both secure and available to those with a legitimate need for access in accordance with its classification level. vi. vii. viii. Information will be protected against unauthorized access and processing in accordance with its classification level. Information will be protected against loss or corruption. Breaches of this policy must be reported (see Sections 9. Compliance and 10. Incident Handling). 6
7 6. Legal & Regulatory Obligations 6.1 The Institute of Education has a responsibility to abide by and adhere to all current UK and EU legislation as well as a variety of regulatory and contractual requirements. Relevant legislation includes: The Computer Misuse Act 1990 Data Protection Act 1998 The Freedom of Information Act 2000 Regulation of Investigatory Powers Act 2000 Copyright, Designs and Patents Act 1988 Defamation Act 1996 Obscene Publications Act 1959 Protection of Children Act 1978 Criminal Justice Act 1988 Digital Economy Act A non-exhaustive summary of the legislation and regulatory and contractual obligations that contribute to the form and content of this policy is provided in Sections 6.3 to 6.7 below. Related policies (see Section11.) will detail other applicable legislative requirements or provide further detail on the obligations arising from the legislation summarised below. Relevant Legislation 6.3 The Data Protection Act 1998 (DPA1998) provides a safeguard for personal privacy in relation to computerised or other systematically filed information; it regulates the use of personal data meaning info. about living human beings. It is an offence to process personal data except in strict accordance with the 8 principles of the DPA1998. Personal data must be: 1. Fairly and lawfully processed 2. Processed for limited purposes 3. Adequate, relevant and not excessive 4. Accurate and up to date 5. Not kept for longer than is necessary 6. Processed in line with your rights 7. Secure 8. Not transferred to countries outside the EEA without adequate safeguards 6.4 The Freedom of Information Act 2000 (FOIA2000) is a general right of public access to all types of recorded info. held by public authorities in order to promote a culture of openness and accountability. 7
8 6.5 The Computer Misuse Act 1990 defines offences in relation to the misuse of computers as: 1. Unauthorised access to computer material. 2. Unauthorised access with intent to commit or facilitate commission of further offences. 3. Unauthorised modification of computer material. Regulatory & contractual obligations 6.6 The Model Financial Memorandum between HEFCE and institutions (2008/19) requires the Institute to have effective arrangements for the management and quality assurance of data submitted to HESA, HEFCE and other funding bodies. This includes: 1. Student data 2. Staff Data 3. Financial Data 4. Estates Data 6.7 Many government and related contractors of our services now require compliance with the international standard ISO 27001: 2005 Information technology - security techniques information security management systems (ISMS) requirements. 8
9 7. Information Classification 7.1 The following table provides a summary of the information classification levels that have been adopted by the IOE and which underpin the 8 principles of information security defined in this policy. Detailed information on defining information classification levels and providing appropriate levels of security and access is provided in the Data Security Policy. Security Level Definition Examples FOIA2000 / DPA1998 status 1. Confidential Normally accessible only to specified members of IOE staff Sensitive personal data; salary information; bank details; draft research reports; passwords 2. Restricted Normally accessible only to specified members of IOE staff or the student body 3. Protected Normally accessible only to members of the IOE staff or the student body 4. Public Accessible to all members of the public Personal Data; reserved committee business; draft reports, papers and minutes; systems; Internal correspondence, final working group papers and minutes, committee papers, information held under license Annual accounts, minutes of statutory and other formal committees, pay scales etc. Information available on the IOE website or through the IOE s Publications Scheme. Subject to significant scrutiny in relation to appropriate exemptions/ public interest and legal considerations. Subject to significant scrutiny in relation to appropriate exemptions/ public interest and legal considerations. Subject to scrutiny in relation to appropriate exemptions/ public interest and legal considerations Freely available on the website or through the IOE s Publication Scheme. 9
10 8. Roles & Responsibilities 8.1 Members of the Institute (See Section 2 Scope): all members of the IOE will be users of information. This carries with it the responsibility to abide by this policy and its principles and relevant legislation, supporting policies, procedures and guidance. No individual should be able to access information to which they do not have a legitimate access right. Systems will be in place to ensure that this is the case, but not withstanding this, no individual should knowingly contravene this policy, nor allow others to do so. 8.2 Data Guardians: Many members of the IOE will have specific or overarching responsibilities for preserving the confidentiality, integrity and availability of information. These include: Principal Investigators/ Project administrators: are responsible for the information security of information produced, provided or held in the course of carrying out research, consultancy or knowledge transfer activities. This including user administration (access rights, security mechanisms) and information administration (access controls, backup, retention and disposal) Heads of Department/ Systems administrators: are responsible for the information systems (e.g. HR/ Registry/ Finance/ CRM) manual and electronic that support the IOE s work. Including user administration (access rights, security mechanisms) and information administration (access controls, backup, retention and disposal) Heads of Department/ Section/ Line managers: are responsible for specific area of IOE work including all the supporting information and documentation that may include working documents/ contracts/ staff or student information Information Services Staff: are responsible for ensuring that the provision of the IOE s IS infrastructure is consistent with the demands of this policy and current good practice Senior Management: the Senior management of the IOE have overarching responsibility for ensuring that the IOE s commitment to this policy is met Directorate: the Director of Administration is responsible for the review, development and enforcement of this policy and for ensuring that appropriate action is taken in the event of a security incident or non-compliance that may result in a security incident. 10
11 9. Compliance, Policy Awareness and Disciplinary Procedures 9.1 Compliance with this policy and related policies will be enforced according to the IOE s Conduct Policy and Procedures (for staff) and Code of Conduct (for students). 9.2 In the case of a contractor failing to comply with this policy the result may be that the contract with the 3rd party is cancelled and where appropriate reported to the relevant authorities, including the police. 9.3 Any security breach of the Institute s information systems could lead to the possible loss of confidentiality, integrity and availability of personal or other confidential data stored on these information systems. The loss or breach of confidentiality of personal data is an infringement of the Data Protection Act 1998 and may result in criminal or civil action against the Institute. The loss or breach of confidentiality of contractually assured information may result in the loss of business, financial penalties or criminal or civil action against the Institute. Therefore it is crucial that all users of the Institute s information systems adhere to the Information Security Management Policy and its support policies as well as the Institute s Data Protection Policy. 9.4 A copy of this policy will be distributed to all new members of staff by the Human Resources Department; to all new students by the Registry and to all contracted services by the contracting department. All current staff, students and other authorised users will be informed of the existence of this policy and the availability of supporting policies, codes of practice and guidelines. 10. Incident Handling 10.1 If a member of the University (staff or student) is aware of an information security incident (see Section 2. Definitions) then they must report it to the Assistant Secretary/ Records manager in the first instance or failing that the Director of Administration, or use the IOE s Public Interest Disclosure (whistleblowing) policy. The Assistant Secretary/ Records Manager Directorate Institute of Education, 20, Bedford Way, London, WC1H 0AL T: ; F: ; E: [email protected] or [email protected] Director of Administration Directorate Institute of Education, 20, Bedford Way, London, WC1H 0AL T: ; F: ; E: [email protected] 10.2 In the event of a suspected or actual security breach Information Services or States and Facilities may, after consultation with the relevant head of department/faculty, authorise action to remove or restrict access to IOE systems, facilities and information or anything else deemed reasonable to secure information for which the IOE is responsible. 11
12 11 Supporting Policies, Codes of Practice, Procedures and Guidelines 11.1 Supporting policies have been developed to strengthen and reinforce this policy statement. These, along with associated codes of practice, procedures and guidelines are published together and are available for viewing on the Institute s website. All staff, students and any third parties authorised to access the Institute s network are required to familiarise themselves with these supporting documents and to adhere to them in the working environment Supporting polices: Policy 1: Data Protection Act 1998 Compliance Policy 2: Electronic Messaging Policy 3: Conditions of Use of the Information Systems (Draft 1) Policy 4: Conditions of Use for Computer Users - Staff form Policy 5: Conditions of Use for Computer Users Students form Policy 6: Data Security Policy 7: Information Systems Monitoring Policy 8: Remote Access & Mobile Working Policy Policy 9: Desktop Computer Security Policy Policy 10: Server Security Policy 12
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology
London School of Economics & Political Science Information Management and Technology Guidelines Remote Access and Mobile Working Guidelines Jethro Perkins Information Security Manager Summary This document
Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.
London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Information Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Data Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Information Governance Policy A council-wide information management policy. Version 1.0 June 2013
Information Governance Policy Version 1.0 June 2013 Copyright Notification Copyright London Borough of Islington 2012 This document is distributed under the Creative Commons Attribution 2.5 license. This
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
Information Governance Policy
Information Governance Policy Reference: Information Governance Policy Date Approved: April 2013 Approving Body: Board of Trustees Implementation Date: April 2013 Version: 6 Supersedes: 5 Stakeholder groups
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
(4) THAMES VALLEY POLICE of Oxford Road, Kidlington, OX5 2NX ("Police Force"),
DATE OF INFORMATION SHARING AGREEMENT JULY 2015 PARTIES (1) LIVE NATION (MUSIC) UK LIMITED (Company Number 02409911) whose registered office is at 2 nd Floor, Regent Arcade House, 19-25 Argyll Street,
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :
GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Ulster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title IT Monitoring Policy 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information Services
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
TELEFÓNICA UK LTD. Introduction to Security Policy
TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
OFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
HP Laptop & Apple ipads
Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview
Policy. London School of Economics & Political Science. Application Control. Jethro Perkins Information Security Manager IMT
London School of Economics & Political Science IMT Policy Application Control Jethro Perkins Information Security Manager Summary This document outlines IMT s application control policy, as endorsed by
EA-ISP-001 Information Security Policy
Technology & Information Services EA-ISP-001 Information Security Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 13/03/2015 Document Security Level: PUBLIC Document Version: 2.41 Document Ref:
Information and Compliance Management Information Management Policy
Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Institute of Education University of London Computer Security Policy
Institute of Education University of London Computer Security Policy Contents 1 Information Security Policy Statement... 3 1.1 Introduction... 3 1.2 Regulatory compliance environment... 4 1.3 Usage monitoring...
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
Standard. Information Security - Information Classification. Jethro Perkins. Information Security Manager. Page 1 of 12
Standard Information Security - Information Classification Jethro Perkins Information Security Manager Page 1 of 12 Document control Distribution list Name Title Department Nick Deyes Director of Information
Information Governance Policy
Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Lancashire County Council Information Governance Framework
Appendix 'A' Lancashire County Council Information Governance Framework Introduction Information Governance provides a framework for bringing together all of the requirements, standards and best practice
Data Security Breach Incident Management Policy
Data Security Breach Incident Management Policy Contents 1. Background... 1 2. Aim... 1 3. Definition... 2 4. Scope... 2 5. Responsibilities... 2 6. Data Classification... 2 7. Data Security Breach Reporting...
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Information Security and Governance Policy
Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
Information Security Management System Policy
Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
RECORDS MANAGEMENT POLICY
Reference number RM001 Approved by Information Management and Technology Board Date approved 23 rd November 2012 Version 1.1 Last revised July 2013 Review date May 2015 Category Records Management Owner
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Corporate Policy and Strategy Committee
Corporate Policy and Strategy Committee 10am, Tuesday, 30 September 2014 Information Governance Policies Item number Report number Executive/routine Wards All Executive summary Information is a key asset
Information security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Records Management Policy Version 4.0 Page 1 of 11 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: File Location: Approval
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
Council Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
Information Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
Data Protection Policy
Data Protection Policy Version: 1.0 Date: October 2013 Table of Contents 1 Introduction The need for a Data Protection Policy... 3 2 Scope... 3 3 Principles... 3 4 Staff Roles & Responsibilities... 4 5
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
