How To Manage A University Computer System
|
|
|
- Britton Walton
- 5 years ago
- Views:
Transcription
1 PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management and inventory Who formally approved this policy, procedure or regulation? Information Technology Resources Steering Group (ITRSG) Who has responsibility for its update? Information Services To whom does this policy, procedure or regulation apply? All University staff, students and other members of the University a) Date of approval December 2014 b) Proposed date of review 2016 Introduction Information Services is charged with keeping the University s IT equipment inventory - PCs, laptops, netbooks, notebooks, tablets, ipads and Macs (generically referred to as PCs within this document for ease of reading) and has a delegated responsibility for purchasing, managing and reporting on the PC estate. The inventory includes PCs bought from University funds (from whatever source). All assets remain the property of the University. Purpose This policy provides the overall framework for the management of PCs from procurement to disposal. This policy draws from the Financial Regulations and a range of other policies and procedures which have now been incorporated into this one document. It defines responsibilities that relate to the implementation of this policy. Scope This policy applies to all staff, students and other entities of the University who hold PCs purchased by the University such as Business Villages and Students Union. Policy statement The University is committed to managing the life-cycle of its PCs so that it can: Protect the University against loss of IT assets State commitment to legal compliance Enable regular audits of IT assets Gather appropriate management information This policy shall be reviewed and updated on a regular basis to ensure that it remains appropriate in the light of any relevant changes to the law, organisational policies or contractual obligations. 1
2 Guidance This document draws together a number of procedures in relation to PCs: PC replacements Appendix A Cascading and disposing Appendix B Responsibilities The Director of IS has overall responsibility for the implementation of this policy in the University. Responsibility of the day-to-day operation is delegated to IS and departments as detailed below: Area IT Resources Steering Group (ITRSG) IS Resources Team Other departments purchasing PCs University departments Senior Managers / Business Managers Responsibility Approve and oversee the PC asset management policy and related procedures, taking appropriate action in the event of a breach Receive information half yearly on the standard PC replacements Receive non-standard PC replacement requests on an adhoc basis Receive reports about externally/project funded PCs and receive information about these assets when the project is ending as to how they will be managed disposal or cascade Receive reports on asset management and disposal from IS Resources Receive report on Third Party Providers performance against service levels Ensure appropriate and thorough cascading of information, policy and procedure back in own department This is an administrative role: focussing on the data required for the PC bid presented by DIS and administering, monitoring and reporting on the processes and outcomes from the system. Oversee the asset management process and report to the Director of IS regarding procedural issues and propose procedural developments Maintain the asset management system from which the standard PC replacements lists are determined and made available to the champions Progress standard replacement IAP via usual process and progress subsequent orders Provide support and guidance to Asset Champions including training on asset management system and review of policies and procedures Overview of any items in quarantine, taking appropriate action in liaison with the IS Service Desk team and Asset Champions to address and remove item from quarantine Monthly review and check of disposed items and cross reference to asset management system Provide reports on asset management to Director of IS and Managers Review results of annual IT audit and compare with records on Snow. Report any discrepancies with Asset Champions Provide regular communication to IT equipment holders via RSS about the importance of complying with this policy and reminding staff of their obligations Any other staff purchasing IT hardware will use preferred suppliers and where possible the chosen third party provider Senior management ownership and responsibility for asset management Promote this Policy within their respective departments and take responsibility for any asset issues or discrepancies Allocate resource within department to undertake the role of Asset Champion Take overall responsibility of assets within their department and allocate the resource to undertake a physical audit of the staff and student PCs (see below) 2
3 University departments - Co-ordinated by Asset Champions IT equipment holders (e.g. member of staff) Local ownership and responsibility for the physical safekeeping and management of the assets under their control. Monitor and maintain the IT asset management inventory with local information in the fixed fields such as owner and location particularly key after a move or cascade Check the list for PC replacements and confirm those items for like for like replacement If additional equipment, non-standard replacement or replacement before its due date is required, complete the bespoke IT hardware approval process form and submit to ITRSG. If approved, complete IAP and submit via usual process. Provide asset information to IT Resources If equipment is required from external funding, follow the same procedure as non-standard but note that these items are not automatically included in subsequent PC replacements. Provide ITRSG with information about when the project is ending and a recommendation as to how the asset is then managed (disposed/cascaded) Support the PC replacement process by reminding department colleagues that they must have their old PC ready for collection when the new one is installed. The third party provider will not install the new one if they cannot remove the current one apart from exceptional circumstances of having to load and check specialist software these cases will be overseen by the asset champion who will contact the third party provider to arrange collection of the old kit Ensure that colleagues complete the necessary paperwork for IT Resources Undertake a physical audit of the staff and student PCs this will be a spot check on quarterly basis, checking a different area each quarter to include all areas of responsibility during a 12 month period. The focus should be on staff machines as these are often more mobile. Compare the results with Snow and investigate discrepancies. Additional resources from the department may be required to assist this should be agreed with senior management. Update the asset management system to indicate which machines have been checked by adding the audit date in the appropriate field Attend communication and development events in relation to PC asset management and ensure appropriate cascading of policy and procedure throughout own department Ensure that all PCs are connected to the University network at least once per month to ensure the equipment receives the appropriate updates and is recognised on the asset management system Understand that all PCs purchased from University funds remain the property of Staffordshire University and should only be used for University business. Any inappropriate deviation from this could result in disciplinary action being taken Equipment holders will retain responsibility for equipment issued to them until it has been returned to the third party provider for redeployment or disposal. They will sign a receipt on delivery. Ensure that all data has been removed from an existing machine prior to the replacement being delivered and installed. The third party provider is instructed not to leave a replacement PC if they cannot remove the obsolete one Equipment holders are not permitted to transfer their responsibilities to another member of the University without the completion of the appropriate forms supplied by IT Resources and the asset champion must be made aware Equipment holders must present mobile assets such as laptops and tablets to their asset champion for auditing purposes within one week of request. Equipment may be audited at any time PC holders must make every effort to ensure that the equipment asset marking is not damaged or destroyed whilst in their care. Report in to the IT call centre (3800) any equipment which is damaged or not working properly 3
4 IS IT and Learning Technical Support Third party providers (Phoenix) Third party disposal company Report loss or theft of equipment to IT Resources providing the serial number of the equipment and any other information relating to the loss Return all PCs to IT via the third party provider upon replacement, equipment redundancy (i.e. no longer required for University business) or when the holder or University no longer have any affiliation (e.g. the member of staff leaves the University). This also applies to externally/project funded equipment. Equipment purchased as part of a fellowship grant is not included in this policy and should not have the University operating system or software installed Conduct annual IT spot check audit of all IS PCs (staff and student) Work with IS Resources and third party providers to ensure IT assets are managed appropriately (installs, moves, cascades and disposals) Work with Staffordshire University to ensure installs, moves, cascades and disposals are managed in accordance with agreed procedures and contractual obligations Complete all paperwork within the timeframe required Liaise with IT Resources and IS Technical support to address any operational issues immediately Report back on Service Levels to the Supplier Management Board, providing detailed explanation for any failure against SLA Liaise with the PC disposal company to ensure collection of redundant equipment and that correct procedures are used for disposal Attend quarterly operational group meetings to discuss operational issues relating to the management of the PC estate Ensure that all equipment is disposed of in accordance with current legislation Provide detailed monthly reports to IT Resources Reporting Any actual or suspected breach of the PC asset management policy must be reported to the IS Director, who will take appropriate action and inform the relevant internal and external authorities. Disciplinary action will result if deliberate breach is identified. 4
5 Appendix A PC replacements one person, one PC Introduction PCs are an asset of the University rather than an individual department; a central asset management database is maintained. This automatically identifies replacements to be included in a funding application and equipment available for cascading within the University. PCs purchased with external funding or via bids to the IAP made by individual departments are not be included in the PC replacement policy but are still an asset of the University and will be recorded on the asset management database and managed via the same governance structure and policy. Purpose The co-ordination of planned replacement of PCs (staff every 5 years, students every 4 years), centrally coordinated via Information Services. One Person, one PC. Manage and control the number of PCs across the institution whilst increasing the overall quality Rationalisation of the number of staff PCs with individuals entitled to one PC or laptop Consistent provision of PCs across the institution to meet the needs of users The replacement of students PCs based on current utilisation and planned developments The cascading of PCs throughout the University Replacement policy PCs will be replaced on a rolling programme. The recommended replacement period is 5 years for staff PCs and 4 years for student PCs. A PC includes the monitor. Funding applications are submitted on a 6 monthly (May and October) basis by Information Services on behalf of the University. PC replacements within student and staff areas are identified via a central asset management database and included in a funding application. The database will also identify equipment available for cascading within the University. The University will provide staff with a single device dependent upon job role. It is anticipated that staff will have one only device unless an appropriate case is made. The equipment specifications will be reviewed (led by Information Services) on a six monthly basis (more frequently if necessary) with formal approval via IT Resources Steering Group. The specifications also need to be aware of changes to software specifications and link to the software asset management policy. PC requirements for new starters should be satisfied from existing machines within the individual department and in exceptional circumstances will be provided from the University cascade pool. Investment approval On a twice-yearly basis a list will be sent to each asset champion detailing the items due for replacement in the next funding application. Each department will be required to check the list for their department and: 5
6 Confirm the items which are due to be replaced Note any items which are not required for replacement, explaining why Add in any items from the main asset database (not included on the original list) which are required for replacement before the standard 4/5 year cycle, explaining why All replacements will be satisfied from the cascade pool, where possible and appropriate. Information Services will co-ordinate the overall investment submission. PCs are delivered and installed with a standard image by a third party provider and are only installed on a one inone out basis. If the equipment holder is not willing to hand over their old machine, the new device will not be left in the department and will be reported back to IT Resources See flow chart 6
7 Appendix B Cascading and disposing of PCs Introduction This procedure: Complies with new obligations under European Environmental Legislation Fulfils its commitment to the Waste Electronic and Electrical Equipment (WEEE) Directive Meets software license obligations Prevents the risk of sensitive data being released to unauthorised persons Fulfils its obligation to ensure that such cascaded IT equipment is safe and fit or purpose Cascading of PC equipment The University will use the following procedure with regard to the cascading of equipment, including any surplus or unwanted equipment. This process will be managed via Information Services supported by the third party provider appointed by the University and co-operation from the departments. Precise details of machines to cascade and entitlement will be determined as the need arises. Equipment will be recorded on the University Asset Management system. PC equipment will be automatically replaced and cascaded after a pre-defined period (or disposed of as applicable depending on age), in accordance with the University policy in relation to the replacement cycles of PC equipment. If there is no further use for an item of equipment, the department will inform 3800 giving details of the equipment, its location and asset number. The approved third party provider will then make appropriate arrangements to remove the item, and to update the asset register. The equipment will be cascaded or disposed of as applicable. It is the equipment owner s responsibility to ensure that any local user data (e.g. on a PC hard disk drive) which needs to be retained is backed up and all sensitive data erased from equipment prior to collection for cascading. If the PCs is being cascaded, it will be thoroughly cleaned prior to being cascaded by the third party provider. Obtaining cascaded PC equipment Cascaded PC equipment will be allocated to existing staff and/or for use in student learning areas, in accordance with the University policy in relation to the replacement cycles of equipment. If a department is aware that a staff member who is leaving will be replaced, the asset can be retained and snow updated once the new starter arrives. If not, the equipment will be taken back into the central cascade pool. If the equipment is mobile, the asset champion should ensure that it is kept secure until the new starter takes ownership. In the event of an additional item of PC equipment being required, place a call to 3800 to request the item. If the request for an additional PC is approved and suitable item is held in store, the approved IT equipment supplier will arrange a suitable delivery/installation date/time. The asset register will be updated. 7
8 Disposal of PC equipment PC equipment will be disposed of in accordance with current WEEE legislation when it is no longer of any use within the University, as defined within the University strategy in relation to the replacement cycles of equipment. Where an additional item of equipment is identified for disposal, the department will contact 3800 and log the request for the equipment to be removed giving details of its location and include type, make, model and serial of each item and asking for the asset register to be updated. It is the Faculty/School/Service responsibility to ensure that any local user data (e.g. on a PC hard disk drive) which needs to be retained is backed up and all sensitive data erased from equipment prior to collection for disposal. All data and University owned software must be completely and systematically erased from the equipment s nonvolatile memory. The approved third party provider will be responsible for collecting the equipment, wiping all data (to agreed standards) and arranging for the disposal of it in accordance with current WEEE legislation, recording specific agreed details to be provided to the university. Monthly data is provided to IS about disposals, as required under current legislation. See flow chart 8
9 Standard PC Replacements Resources Asset Champion Third party provider Customer Twice yearly submit RSS reminder about PC replacements and disposal procedures 7 weeks before IAP submission, Asset Champions to review their reports Check reports on Snow and make appropriate amendments Run master report and prepare summary spreadsheet and IAP proposal Send to SMT for approval and on to Executive If approved, obtain cost centre from Finance Place order with Phoenix Receive delivery notes Receive order and spreadsheet. Place order with HP (6 week lead time) Receive machines and install image Send delivery notes to Resources Complete pre-installation form and return to Phoenix, If staff machine, send pre-installation form to customer include serial number and instructions of how to find it If student machine, send pre-installation form to Asset Champion Complete pre-installation form and return to Phoenix, copy to Resources 9
10 Check serial number lists against original spreadsheet. Run report of any mismatches and send queries back to Phoenix to investigate Update Snow with disposals and cascades copy to Resources Install new machines and remove old ones and inform Resources of the serial numbers installed and removed Assess which machines being replaced are suitable to retain for cascade and inform Resources Create disposal report for IS Director to sign and send on to Finance Each week scan machines for disposal and send list of serial numbers to Resources Scan machines for cascade and send list of serial numbers to Resources Confirm with Resources that all installs are complete after each specified bid 10
11 Mac replacements staff machines Resources Third party provider Asset champion IS IT Technician Receive delivery from Sheffield. Arrange (Image maintained on server delivery to faculty and notify Resources by IS technician) Receive approval via IAP. Place order with Apple, requesting delivery to Phoenix in Sheffield Create computer name. Load image with Snow agent. Install. Notify IS Technician Update snow with fixed field information and computer name for new Macs. Remove and store replaced Macs. Agrees date with staff. Transfers data. Notify Faculty Technician on completion. Discuss with Faculty re resale items and items to send to broker. Confirm resale price. Manage resale process. Complete Phoenix disposal/resale form. Notify Resources Raise sales invoice. Update Snow. Complete Finance Disposal Form for Director to sign. Cross reference on Snow, PC Replacement list and Phoenix list of purchases. Spot check, sign and send disposal form to Resources. Remove Macs. Agree quantity and price. Request invoice to be raised Agree date for collection. Spot check serial numbers and sign disposal form 11
12 Mac replacements student machines Resources Third party provider Asset champion Receive delivery from Sheffield. Arrange delivery to faculty Receive approval via IAP. Place order with Apple, requesting delivery to Phoenix in Sheffield Create computer name. Load image with snow agent. (Image maintained on server by IS technician) Install Update snow with fixed field information and computer name for new Macs. Remove and store replaced Macs. Discuss with Faculty re resale items and items to send to broker. Confirm resale price. Manage resale process. Complete Phoenix disposal/resale form. Agree quantity and price. Raise sales invoice. Update Snow. Complete Finance Disposal Form for Director to sign. Cross reference to Snow, PC Replacement list and Phoenix list of purchases. Spot check, sign and send disposal form to Resources. Remove Macs. Request invoice to be raised Agree date for collection. Spot check serial numbers and sign disposal form. 12
13 Disposals outside standard programme Asset Champion 3800 Third party provider Resources Log call with 3800 Assign to Phoenix Send form to Asset Champion to complete Complete and return form Arrange appropriate time with champion to collect the machine Collect the machine and store for disposal Send form to Resources Scan serial numbers of all machines for disposal prior to leaving the University send update to Resources File form. Remove serial number from Snow. Complete Finance Disposal form for Director to sign. Cross check with Snow Receive WEEE certificate. Pass to Estates 13
14 PC move Asset Champion 3800 Third party provider Resources Log call with 3800 to have PC moved Assign to Phoenix Send form to Asset Champion to complete Complete and return form Arrange appropriate time with champion to move the machine Move the machine Update Snow with fixed field information (and for labs, update the computer name) Send form to Resources File form. Snow will automatically update change 14
Grasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
University of Liverpool
University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014
University of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Data and Information Security Policy
St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
HUMAN RESOURCES SERVICES SERVICE LEVEL AGREEMENT
HUMAN RESOURCES SERVICES SERVICE LEVEL AGREEMENT (Schools) 1 April 2008-31 March 2011 HUMAN RESOURCES SERVICES TO SCHOOLS 1. INTRODUCTION CONTENTS 1.1 Status of Agreement 3 1.2 Standard Conditions 3 1.3
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.
Information Governance Strategy and Policy Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.0 Status: Final Revision and Signoff Sheet Change Record Date Author Version Comments
INFORMATION GOVERNANCE POLICY & FRAMEWORK
INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger
Information Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
HSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
Purchasing Card CARDHOLDER MANUAL
Purchasing Card CARDHOLDER MANUAL Finance Office Procurement Division Revised November 2015 G:\FINANCE\Procurement\PurchCards - RBS MasterCard - July 2014 Revised\July 2014 Versions\Purchasing Cards -
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
IT06 - Information Technology (IT) Hardware and Software Policy
IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Information Governance Framework
Information Governance Framework March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aim 2 3 Purpose, Values and Principles 2 4 Scope 3 5 Roles and Responsibilities 3 6 Review 5 Appendix 1 - Information
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers
IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version
Information Governance Policy
Policy Policy Number / Version: v2.0 Ratified by: Audit Committee Date ratified: 25 th February 2015 Review date: 24 th February 2016 Name of originator/author: Name of responsible committee/individual:
Aberdeen City Council IT Asset Management
Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
SPACE MANAGEMENT POLICY
SPACE MANAGEMENT POLICY Originated by Assistant Director, Management Services: October 2010 Impact Assessment: 11 November 2010 Recommended by Estates Committee: 1 November 2010 Approved by Council: 22
How To Inspect A Blood Bank
Site visit inspection report on compliance with HTA minimum standards Belfast Cord Blood Bank HTA licensing number 11077 Licensed for the procurement, processing, testing, storage, distribution and import/export
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Information Governance Policy_v2.0_060913_LP Page 1 of 14 Information Reader Box Directorate Purpose Document Purpose Document Name Author Corporate Governance Guidance Policy
Information Security Policy
Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is
IT asset disposal for organisations
ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk
BAND: 5. 37½ hours per week 1. JOB SUMMARY
POST TITLE: Software Developer BAND: 5 HOURS: ACCOUNTABLE TO: LOCATION: 37½ hours per week Head of Informatics Programme Mamhilad 1. JOB SUMMARY Reporting to Software Development Manager, the post holder
Data Security Breach Incident Management Policy
Data Security Breach Incident Management Policy Contents 1. Background... 1 2. Aim... 1 3. Definition... 2 4. Scope... 2 5. Responsibilities... 2 6. Data Classification... 2 7. Data Security Breach Reporting...
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
New Jersey City University Information Technology Equipment Policies & Procedures Page 1 of 5
Page 1 of 5 TABLE OF CONTENTS Page No. INTRODUCTION... 3 PURPOSE... 3 SCOPE... 3 POLICY... 3 INFORMATION TECHNOLOGY EQUIPMENT... 3 INVENTORY... 4 EQUIPMENT RECEIVED BY ITS DEPARTMENT... 4 EQUIPMENT RECEIVED
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Information Governance Policy
Information Governance Policy Version 1.1 Responsible Person Information Governance Manager Lead Director Head of Corporate Services Consultation Route Information Governance Steering Group Approval Route
Policy: D9 Data Quality Policy
Policy: D9 Data Quality Policy Version: D9/02 Ratified by: Trust Management Team Date ratified: 16 th October 2013 Title of Author: Head of Knowledge Management Title of responsible Director Director of
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council
Working Together Aiming High!
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
Polish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
To carry out administrative duties that support the process requirements of the local department in which the individual operates on a daily basis.
Role Title: Directorate: Location: Reports to: Administrator National Construction College Generic role - All sites Relevant Team Leader CITB is committed to Safeguarding and promoting the welfare of learners
Roles & Responsibilities for NHAIS (Exeter) System Key Users
Document filename: NHAIS Key User Roles and Responsibilities.docx Directorate / Programme HSCIC Project SSD Document Reference DOC-00126 Project Manager Sean Walsh Status Approved Owner Norman Raphael
Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information
Royal Borough of Kensington and Chelsea Data Quality Framework ACE: A Framework for better quality data and performance information March 2010 CONTENTS FOREWORD 2 A CORPORATE FRAMEWORK FOR DATA QUALITY
NHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
SECURITY POLICY REMOTE WORKING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices
CCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
JOB DESCRIPTION. I.C.T Application Systems & Workflow Manager
JOB DESCRIPTION POST: LOCATION: Service Level Manager Belfast City Hospital GRADE: Band 6 REPORTS TO: RESPONSIBLE TO: I.C.T Application Systems & Workflow Manager I.C.T Service Delivery Manager JOB SUMMARY/MAIN
Mobile Devices Security Policy
Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Network Security & Connection Policy
Network Security & Connection Policy Effective from 17 February 2015 Version Number: 2.0 Author: Network Manager, IT Services Document Control Information Status and reason for development Revised to reflect
RCT HOMES HOUSING ASSOCIATION JOB DESCRIPTION
RCT HOMES HOUSING ASSOCIATION JOB DESCRIPTION TITLE: REPORTING TO: RESPONSIBLE FOR: Financial Accountant Group Accountant Assistant Accountant 1. Overall Objectives 1.1. To provide the Financial Accounting
Management of Assets Policy
CREST Management of Assets Policy Version No: Reason for Update Date of Update Updated By 1 Policy introduced April 2012 Finance Office 2 Review incorporates IT Security Internal Audit review February
DATA PROTECTION CORPORATE POLICY
DATA PROTECTION CORPORATE POLICY Information Management V1.1 03 July 2012 Not protectively marked This policy must be complied with fully by all Members, Officers Agents and Contractors of Plymouth City
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
JOB DESCRIPTION SYSTEMS DEVELOPMENT OFFICER - Grade 6
JOB DESCRIPTION SYSTEMS DEVELOPMENT OFFICER - Grade 6 Title: Contract type: Systems Development Officer Fixed Term 12 Months Grade: Grade 6 Location: Reporting to: Carmarthen or Lampeter Campus Information
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
Health and safety policy
1. General statement of intent The Company recognises and accepts its responsibilities as an employer to ensure, so far as is reasonably practicable, the health, safety and welfare of its employees and
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY
INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:
Business Continuity Policy and Business Continuity Management System
Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain
Section 700 Fixed Assets
Section 700 Fixed Assets Section 701 Definition Fixed Assets Section 702 Responsibility for Fixed Assets Section 703 Inventory of Fixed Assets Section 705 Inventory Shortage Procedures Section 706 Inventory
JOB DESCRIPTION. Server infrastructure specialist. Capacity and Configuration Manager
JOB DESCRIPTION POST: LOCATION: Server infrastructure specialist Belfast City Hospital GRADE: Band 6 REPORTS TO: RESPONSIBLE TO: Capacity and Configuration Manager Co-Director for I.C.T JOB SUMMARY/MAIN
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
Management of Assets Procedure
Management of Assets Procedure Contents 1 Introduction... 3 2 Fixed Assets Register... 3 3 Inventory Registers... 3 4 Capital Asset Purchase... 7 5 Asset Physical Verification... 7 6 Asset Disposal...
MP Plumbing & Heating Ltd Quality Policy Manual THE QUALITY POLICY STATEMENT OF:
THE QUALITY POLICY STATEMENT OF: MP Plumbing & Heating Ltd Unit 8,The Metro Centre, Bridge Road, Orpington BR5 2BE Telephone: 01689 822188 Fax: 01689 897 733 E-Mail: [email protected] Web page:
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
