HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES

Size: px
Start display at page:

Download "HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES"

Transcription

1 HIGH LEVEL COMPLIANCE REVIEW ELECTRONIC DATA STORAGE DEVICES Standards for Victoria Police Law Enforcement Data Security (Standard 22) November 2008 Commissioner for Law Enforcement Data Security

2 Acknowledgement This report was prepared for the Commissioner by Ros Carter, Principal Policy Advisor, Office of the Commissioner for Law Enforcement Data Security, in consultation with relevant areas and employees of Victoria Police. The cooperation of those members of Victoria Police who provided input to the review is gratefully acknowledged. Published by: The Commissioner for Law Enforcement Data Security PO Box 281 World Trade Centre Melbourne Victoria 8005 November 2008 State of Victoria, 2008

3 Table of Contents Executive Summary 5 1 Introduction Background Purpose and Scope CLEDS Electronic Data Storage Devices Standard Approach Definitions and Abbreviations Compliance Assessment Rating 10 2 Electronic Data Storage Devices Legislation, Policy and Process on disposal of data from electronic data storage devices Roles and Responsibilities 12 3 Review Findings/Observations Documentation of Disposal Requirements The Victoria Police Manual (VPM) The Records Disposal Guide The Document Security Best Practice Guideline Enterprise Information Security Policy, Location Visits and Key Stakeholder Compliance Interviews Victoria Police Computer Hard Drives USB Flash Drives CDs and DVDs Video and Audio Tapes Multi Function Devices Approved Third Party Agreements Coordination of Effort Awareness of policy and procedures 22 4 Conclusions and Recommendations Conclusions Recommendations 24 5 Management Response to Findings and Recommendations 26

4 APPENDIX A Persons Interviewed and Documents Reviewed 27 APPENDIX B Public Records Act 1973 (Section 12) Public Record Office Standard (PROS) 97/003: Destruction of Public Records, APPENDIX C Response to Report by Chief Commissioner of Police 32

5 Electronic Data Storage Devices Executive Summary Under the Commissioner for Law Enforcement Data Security Act 2005, the Commissioner is required to undertake monitoring activities, including audits, to monitor compliance by Victoria Police with standards and protocols established under the Act. A high level compliance review of the Electronic Data Storage Devices law enforcement data security standard (Standard 22) has been undertaken. Standard 22 aims to reduce the risk of law enforcement data stored on electronic data storage devices being accessible to unauthorised persons when it is no longer required. This is to be achieved by either removing the data from the device, or if effective removal cannot be ensured, by destroying the device. Victoria Police has established or is planning to develop a number of processes that demonstrate that they are working towards achieving full compliance with this Standard. These include processes such as: ensuring the sanitisation of Victoria Police personal computer (PC) hard drives prior to the return of the PCs to the lessor for reuse; and the guidelines and processes developed to ensure the effective disposal of VATE statements when they are no longer required. Victoria Police is planning the extension of the media sanitisation processes to enable sanitisation of the hard drives of Multi Function Devices and the development of a Corporate Information and Records Management Strategy. Victoria Police has also recently developed a revised standard Agreement for negotiation with Approved Third Party organisations (ATPs) which incorporates clear reference to the requirements of all the CLEDS Standards and protocols, including the disposal of data from electronic data storage devices. This will ensure that Victoria Police fully complies with this Standard as it relates to ATPs, as opposed to the 41% compliance rating found during this high-level review. There are a number of improvements to be made before Victoria Police can be judged to be fully compliant with Standard 22. These are discussed below. While there is information relating to the disposal of law enforcement data from electronic data storage devices available across Victoria Police, there is no single, consistent and up to date documentation. The lack of integrated documentation necessitates responsible staff at individual locations finding and pulling these instructions together into a single document for the use of their local staff. The approach to ensuring the encryption of data held on USB flash drives and processes developed to monitor compliance with this requirement is varied and uncoordinated across Victoria Police. Business Information Technology Services (BITS) lists an approved USB device in their catalogue which comes with encryption software. The use of this flash drive is not mandatory. In situations where electronic devices containing law enforcement data are removed for destruction by a registered disposal company, the Public Records Act 1973 requirement to obtain a Certificate of Destruction does not always occur. This seems in part to be due to the associated cost and in part due to a lack of awareness of the requirement. 5

6 High Level Compliance Review There is also a lack of general awareness of the requirements of the CLEDS Standard 22 among Victoria Police employees in many Departments and areas. Reduced awareness of the requirements will result in poor compliance. There is a need for a more focussed and active approach to ensuring all Victoria Police employees are well aware of their responsibilities regarding information disposal from electronic data storage devices. The Victoria Police projects underway in the Business Management Department and BITS and work being undertaken by the Agency Security Advisor, are examples of new policy and guidelines that individually promise to provide up-to-date and accurate information. However, care should be taken to ensure these developments do not further disperse information and instructions about data security, including disposal and destruction. The opportunity exists to provide consistent and consolidated information to Victoria Police members, through the use of a more cooperative and force-wide approach to the development of these documents. Victoria Police should work towards achieving such a goal. As a result of the review of policy and procedures and observations based on discussions with Victoria Police staff, an overall compliance rating of Partially Compliant with CLEDS Standard 22 is considered appropriate at this time. Recommendations The following recommendations are made to assist Victoria Police in addressing matters raised in this high level review Victoria Police employees should be able to obtain information and guidance from a single document on the disposal of law enforcement data from electronic data storage devices. To achieve this Victoria Police should strengthen working partnerships and linkages between relevant Victoria Police Departments, such as BITS and the Records Services Branch. The Quick Reference Guide on Security Awareness currently being developed by the Victoria Police Agency Security Advisor should provide clear instructions relating to the disposal of data when it is not longer required, as part of a broader policy and suite of documents on information security awareness. That Victoria Police develops and implements a force-wide mandatory policy for the use of encrypted USB flash drives and instructions relating to the allocation of the drives, monitoring their use, and the need for sanitisation of the flash drives when they are returned for allocation to another user. Regions or Departments should ensure that encryption software is installed on all flash drives. 4. That VPM Instruction Records Management and Disposal be updated to include a reference and link to the Records Disposal Guide That a process be developed, as part of the Corporate Information and Records Management Strategy, to enable the monitoring of compliance with the requirement for Departments to submit an Application to Destroy Records form when disposing of data from electronic data storage devices. Victoria Police should communicate the policies and procedures regarding the disposal of law enforcement data to all employees. 6

7 Electronic Data Storage Devices 7. All Victoria Police departments and stations should allocate the role of disposal coordinator to a staff member, who becomes responsible for performing spot checks to ensure that law enforcement data, including from electronic media, is disposed of in accordance with policy. 8. Certificates of Destruction should be requested from data disposal companies in all instances where destruction has not been observed or supervised by Victoria Police employees. Checking that this has occurred should be specifically allocated to an appropriate employee. 9. Appropriate reference to the CLEDS electronic data storage devices standard should be included in all Agreements with Approved Third Parties that are authorised to access Victoria Police law enforcement data. David Watts Commissioner for Law Enforcement Data Security November

8 High Level Compliance Review 1 Introduction 1.1 Background The Standards for Law Enforcement Data Security were established in February and August 2007 by the Commissioner for Law Enforcement Data Security (CLEDS). The Standards and associated protocols are binding on Victoria Police. Under the Commissioner for Law Enforcement Data Security Act 2005, the Commissioner is required to undertake monitoring activities, including audits, to monitor compliance by Victoria Police with standards and protocols established under the Act. The Commissioner has established an annual program of high level compliance reviews as well as detailed risk based audits. The objective of a high level review is to identify whether documented policies and monitoring frameworks have been implemented by Victoria Police to meet the Standards and Protocols. Electronic Data Storage Devices is one of fifteen categories of standards and protocols issued by CLEDS. 1.2 Purpose and Scope The scope of this compliance review is confined to examining the existence and operation of Victoria Police Electronic Data Storage Devices policy and processes in compliance with the requirements of the CLEDS Standard CLEDS Electronic Data Storage Devices Standard CLEDS Standard 22 on electronic data storage devices is: 1.4 Approach Victoria Police must ensure the effective removal of law enforcement data from electronic data storage devices when the data is no longer required. If effective removal cannot be ensured, the storage device must be destroyed. Victoria Police must ensure that Agreements with Approved Third Parties establish requirements for effective removal of data or destruction of electronic data storage devices that have been used to store law enforcement data. The high level compliance review involved discussions with key stakeholders, analysis of policy and procedures for compliance with the requirements of the CLEDS Electronic Data Storage Devices Standard, and verification of compliance monitoring. Agreements with Approved Third Parties for authorised access to Victoria Police law enforcement data were also reviewed for compliance with Standard 22 on policy and procedures relevant to this Standard. 8

9 Electronic Data Storage Devices 1.5 Definitions and Abbreviations The following definitions and abbreviations are used throughout this report. Business Information Technology Services (BITS) Commissioner for Law Enforcement Data Security (CLEDS) Business Management Department (BMD) Corporate Management Review Division (CMRD) Law Enforcement Data (LED): Is any information obtained, received or held by Victoria Police: a. b. c. d. for the purpose of one or more of its, or any other law enforcement agency s, law enforcement functions or activities; or for the enforcement of laws relating to the confiscation of the proceeds of crime; or in connection with the conduct of proceedings commenced, or about to be commenced, in any court or tribunal; or for the purposes of its community policing functions. Such information includes text, images, audio and video held on computing devices or in hard copy format or other storage media, including but not limited to, data relating to individuals or aggregated data, written reports and correspondence, memoranda, police diaries, official notebooks, running sheets and other data repositories. Electronic Data Storage Devices: Electronic data storage devices hold law enforcement data in digital or analogue form. Examples of devices that may hold law enforcement data in digital format are hard drives, USB flash drives, floppy disks, CDs and DVDs. Examples of analogue devices that may hold law enforcement data are magnetic tape devices such as audio and video cassettes. Disposal: Disposal is defined in the Standards for Victoria police law enforcement data security as the destruction of information, followed by moving the destroyed information off premises, typically to a waste disposal facility such as a recycling plant, tip, or garden 1. Public Record: Public Record as defined in the Victoria Police Manual (VPM) is any record made or received by employees, during the course of their normal business, regardless of format, as defined in the Public Records Act Official Information: Information developed, received or collected by or on behalf of Victoria Police is official information Victoria Police Manual Document Security. 1 Standards for Victoria Police law enforcement data security, July 2007, p

10 High Level Compliance Review Standard: Mandatory general principles for initiating, implementing, maintaining, and/or improving the security of law enforcement data for Victoria Police to ensure adequate information security management. 1.6 Compliance Assessment Rating The assessment of law enforcement data security compliance, in terms of electronic data storage devices policy and processes, will be rated as one of the following: Compliant Partially Compliant Non Compliant Existing security controls meet the requirements and intent of the standards and protocols Existing security controls partially or inconsistently meet the requirements and intent of the standards and protocols Existing security controls are consistently inadequate in meeting the requirements and intent of the standards and protocols. Recommendations will be made where less than full compliance is identified. 10

11 Electronic Data Storage Devices 2 Electronic Data Storage Devices 2.1 Legislation, Policy and Process on disposal of data from electronic data storage devices The overarching legislation relating to the management of Victoria Police data, including disposal, is the Public Records Act 1973 and the accompanying Public Records Act 1973 (Section 12) Public Record Office Standard (PROS) 97/003 Destruction of Public Records (Feb 1998). The Public Records Act 1973 (Section 12) Public Record Office Standard (PROS) 97/003 Destruction of Public Records (Feb 1998), establishes the required standards relating to the disposal of public records and official information as it relates to paper based records as well as those held on electronic devices. A summary of these standards is provided at Appendix B. The major Victoria Police policy documents describing the requirements and procedures for the disposal of Victoria Police law enforcement data are the Victoria Police Manual and the Enterprise Information Security Policy (EISP) version 1.1. Both of these documents refer in turn to relevant sections of the Defence Signals Directorate Australian Government Information and Communications Technology Security Manual (ACSI 33) and the Australian Government Protective Security Manual, (PSM) Other Victoria Police policy and procedural documents have been developed that aim to provide greater detail or instructions related to specific areas of interest include: The Document Security Best Practice Guidelines Business Information and Technology Services, 2007 Information Security Unit, BITS Records Disposal Guide, Business Records Branch, Business Management Department Procedures for Requesting Destruction of Records, Records Services Branch, Business Management Department Retention Periods for Records, Records Services Branch, Business Management Department General Retention and Disposal Authority for Records of Victoria Police Public Records Office Victoria (PROV) with Records Services Branch Technology Refresh 2007 Destroy SE disk sanitisation Instructions for IBM (BITS 2007) Technology Refresh 2007 Destroy SE disk sanitisation Instructions for VicPol Staff (BITS 2007). 11

12 High Level Compliance Review 2.2 Roles and Responsibilities Business Information and Technology Services (BITS) has the lead responsibility within Victoria Police for ensuring the effective disposal of law enforcement data from electronic data storage devices. The BITS Information Technology Infrastructure Security Unit has a major role in the development of technical architecture and standards in relation to the disposal of law enforcement data from electronic data storage devices. The BITS Information Security Unit has a key role in the development and implementation of information security awareness training. They provide advice to the Victoria Police Education Department in the case of training of Sworn members and develop information security awareness training programs, and resources such as information security awareness posters and leaflets that are posted on the BITS intranet. The Business Management Department s Records Services Branch also plays a major role in the management, storage and disposal of Victoria Police records and official documents. While other areas of Victoria Police were included in this high level compliance review, a major focus was directed to these two areas. 12

13 Electronic Data Storage Devices 3 Review Findings/Observations The examination and review of Victoria Police policy and processes regarding the effective removal of law enforcement data from electronic data storage devices when the data is no longer required has disclosed the following: 3.1 Documentation of Disposal Requirements Requirements and processes for the disposal of law enforcement data (from all media) including from electronic data storage devices as set in the Public Records Act 1973 and the Public Records Act 1973 (Section 12) Public Record Office Standard (PROS) 97/003 Destruction of Public Records (Feb 1998), are documented in varying levels of detail and completeness in a number of Victoria Police policy and procedural documents. While some Victoria Police departments may document those requirements relevant to their particular area or data storage modality, there is a need for a single consistent document that covers, in detail, all the requirements for the disposal of law enforcement data, including those relevant to data held on electronic data storage devices The Victoria Police Manual (VPM) The Victoria Police Manual (VPM) is the first point of reference for Victoria Police members regarding the requirements surrounding the conduct of their duties. VPM Instruction Records Management and Disposal states that the responsibility for ensuring that a regular program of records disposal is in place lies with each workplace manager. The Instruction briefly reiterates the standards set in the Public Records Act 1973 (Section 12) Public Record Office Standard (PROS) 97/003 Destruction of Public Records (Feb 1998) and provides references and links to several related documents. It does not provide a sufficient level of detail regarding these requirements, nor does it refer to or provide a link to the Records Disposal Guide developed by the Records Services Branch, which contains more detailed and practical guidance for the disposal of law enforcement data. This latter document is not mentioned at all in the VPM. Other relevant Instructions in the VPM include: Instruction Tape recorded interviews, which briefly outlines how tapes such as Tape Recording in Indictable Matters (TRIM) tapes, are to be disposed of according to whether they are Master tapes, Second Original tapes or Copies of tapes. The method of destruction for each of these tapes is described as according to local instruction. VPM Video and audio-taped evidence (VATE), which states that under Regulation 12, Evidence (Recorded Evidence) Regulations the original recording and all copies made in or in connection with a legal proceeding are to be destroyed or erased after a certain period. It also describes circumstances in which VATE statements may be kept for longer periods or indefinitely, for example where charges have not been laid and where briefs are of historical significance. The Business Records Section Records Disposal Unit (RDU) is named as having responsibility for the destruction of VATE statements after a completed Destruction/Retention of VATE Statement form has been forwarded from the relevant Sexual Offences and Child Abuse Unit (SOCAU) Manager. Master copies of VATE tapes are required to be forwarded to the RDU for storage within 10 days of the recording being conducted. If the statements are held on CD or DVD the Master should be stored at the SOCA unit. 13

14 High Level Compliance Review The Victoria Police Video and Audio-taped Evidence (VATE) Procedural Guidelines updated by SOCAU in 2006, provide in greater detail the process regarding VATE recordings including that all VATE recordings are to be destroyed within 6 months after the conclusion of the proceeding or at the expiry of any appeal period as per the Evidence (Recorded Evidence) regulations Section 13. Situations where the tapes may need to be kept for longer periods are described as in the VPM. These Guidelines reiterate that all VATE statements are to be destroyed by the Records Disposal Unit. Working copies of all VATE recordings are to be forwarded to the RDU with a Destruction/ Retention of VATE Statement form completed by the Officer in Charge of the SOCA Unit, which nominates the desired action in relation to the tape. A notation of the requested action is to be entered on to the computerised VATE register and relevant Case Entry. Master copies of CDs or DVDs containing VATE interviews must be secured in a locked storage cabinet in the SOCA Unit, until such time that they are no longer required. The VATE Register is to be updated as the tapes or CD/DVDs are processed and released to the contracted disposal company for destruction. This process was observed by the reviewer at the Laverton Storage and Disposal Facility The Records Disposal Guide The Records Disposal Guide (Business Records Section, Record Services Branch, 2004) states that each Victoria Police member is accountable for the retention and management of records of continuing value to ensure the business, accountability and cultural needs of Victoria Police are met. The document provides quite detailed information regarding records disposal including that: records should be disposed of as soon as they are no longer required for business purposes; Business Records Services is responsible for the Force s Records Disposal Program which comprises a range of activities including: appraisal of records; development of disposal authorities; documentation of the appraised process and the disposal program; implementation of the disposal decision; there needs to be written authorisation from the Public Records Office Victoria (PROV), as required under the Public Records Act 1973 to dispose of public records; disposal authorities set out the appropriate action for disposal of various types of records; and records disposal should be undertaken on a regular basis (eg monthly/annually) rather than ad hoc. The steps involved in using and applying the Records Retention and Disposal Authorities are described in some detail, with a reminder that Business Records or the Records Disposal Unit should always be consulted to authorise the destruction of records, through the submission of a Request for Records Destruction form. 14

15 Electronic Data Storage Devices The Guide further advises Victoria Police employees that if they require any advice on the disposal process they should contact the Manager Business Records or Supervisor Records Services Division and Archives. Specific instruction on the destruction of electronic records includes that electronic records are subject to the same disposal processes as paper records, and that: staff should take special precautions to ensure that electronic storage media containing confidential material or information that may infringe upon personal privacy is electronically wiped clean or physically destroyed; deleting records in some programs does not actually remove the information, and computer hard disk drives should be reformatted before the computers are disposed of, and other magnetic media can also be reformatted; records stored on magnetic media can be bulk erased by subjecting them to a strong magnetic field. The media can then be reused. Records held on optical media and particularly sensitive records held on magnetic media, can be destroyed by cutting, crushing, or other physical means of destruction. Other relevant documents developed by the Business Records Branch include: Procedures for Requesting Destruction of Records; and Retention Periods for Records. It should be noted that the only electronic data from other areas of Victoria Police for which Business Records Services currently has disposal responsibility, are VATE tapes forwarded to them from SOCA Units across the Force. This is conducted via the Records Management Storage and Disposal facility located at Laverton. Other areas are required to arrange and manage their own disposal and destruction of law enforcement data, while adhering to the requirements of the Public Records Act, 1973 and seeking advice from the RDU as required. The RDU does not therefore have a role in ensuring that other areas are complying with the requirements for data disposal from electronic storage devices. While the guides developed by the Business Records Branch would together appear to provide Victoria Police Departments and employees with quite detailed instructions about the disposal of information, a number of gaps and weaknesses have been identified not only by this review but through a CLEDS review of an information security breach which occurred in late 2007 and a Victoria Attorney General s Office (VAGO) records management audit conducted in 2007/08. These issues are discussed in Section 3.2 below. Records Services Department staff also submitted that the role they play in authorising disposal via receipt of Requests for Disposal from Victoria Police areas, appears to work well in relation to hard-copy documents but not for electronic documents or data The Document Security Best Practice Guideline While the VPM does not refer to the Records Disposal Guide, it does make reference and provide an electronic link to the Victoria Police Document Security Best Practice Guideline The document contains procedures primarily based on those in the Commonwealth Government s Protective Security Manual (PSM), with supplementary information from the Defence Signals Directorate s Australian Government Information and Communications Technology Security Manual (ACSI 33). 15

16 High Level Compliance Review The Document Security Best Practice Guide is a non-mandatory statement of best practice which aims to assist workplaces in the development of their local instructions and/or provide all Victoria Police employees with a set of recommended procedures. The scope of the document includes documents in all formats hard-copy; electronic; audio-visual and any other recording and storage formats used now or in the future. It is not intended to cover National Security classified information. While this document provides detailed and useful instructions regarding most aspects of document security the section on data disposal is brief and disappointing. It outlines a number of principles that reflect those already discussed above. Brief instructions are provided regarding the destruction of CD and DVD disks (shred, or scratch with scissors or break into pieces if a shredder is not available) and for the destruction of floppy disks (shred or cut into strips). The Security Procedures Tables at Part 4 of the document, which provide examples and details of information security requirements by document classifications, describe the full details of media destruction procedures as being out of scope and refers the reader to the Defence Signals Directorate, Information Security Group, Australian Government Information and Communications Technology Security Manual (ACSI 33) Enterprise Information Security Policy, 2004 The VPM describes the Enterprise Information Security Policy as the authoritative source of information security requirements in relation to electronic information systems and the use of electronic information (206-2 References). The document is described as one component of an effective information security strategy which also includes a range of Policies, Standards, Guidelines, Procedures, System Information Security Policies, System Security Plans and Security Training Plans. (EISP, p. 2-3). The instructions in the EISP relating to the disposal of data from electronic data storage devices, while more detailed than those provided in the VPM, are still quite high level in that they identify the need for sanitisation and disposal of various media and hardware items, but generally refer the reader to either the Commonwealth Protective Security Manual and/or relevant sections of ACSI 33 for instructions of the required sanitisation or disposal process, depending on the type and security classification of the data. At Section 18.6 the EISP lists a range of responsibilities of the System Sponsor for IT Infrastructure for the full range of IT storage media used across the Victoria Police technology infrastructure, including that the System Sponsor must: provide an effective sanitisation service; and/or document specific sanitisation procedures; and/or specify which storage media must not be reused; provide an effective disposal/destruction service from IT storage media in accordance with the provisions of ACSI 33, Part 3, Chapter 4 Security of Hardware (section 18.6). ensure that documented guidelines and procedures (Victoria Police Guidelines for the Sanitisation and Disposal of Equipment and Media) and any requisite software, are all available so that, where needed, VP personnel can sanitise and/or dispose of, VP computer hardware and/or storage media (including the hard disk drive of a desktop or laptop computer). These guidelines must reflect those published in ACSI33 and the PSM (21.7). 16

17 Electronic Data Storage Devices The EISP further requires that: all Victoria Police IT equipment must be declassified and/or disposed of in accordance with the Guidelines for the Sanitisation and Disposal of Equipment and Media.(21.18); and failed storage devices, that cannot be sanitised, must be retained by Victoria Police for controlled destruction in accordance with the Guidelines for the Sanitisation and Disposal of Equipment and Media (21.19). Discussions with the Manager, Information Technology Infrastructure Security in BITS revealed that while they are aware of these requirements in the EISP the required Guidelines for the Sanitisation and Disposal of Equipment and Media have not been developed. In the Victoria Police Action Plans for the Implementation of the CLEDS Standards for law enforcement data security, BITS has listed a number of controls they currently have in place as evidence of their intention to comply, including: a Defence Services Directorate (DSD) approved sanitisation tool Destroy SE (used for the TechRefresh project, described in below); a DSD approved degausser; CD/DVD shredders; and the destruction of LEAP mainframe tapes/disks in accordance with PSM and ACSI 33 requirements. They also note that guidelines for the sanitisation of MultiFunction Devices (MFDs) are to be developed by October These guidelines need to be extended to include sanitisation and disposal of all equipment and media, incorporating those already developed for the TechRefresh project. 3.2 Location Visits and Key Stakeholder Compliance Interviews The above description of policy and procedural documentation governing the disposal of law enforcement data from any media indicates a generally dispersed and uncoordinated approach across Victoria Police. This observation is supported by other findings and reported processes and gaps during interviews and visits with a small number of Victoria Police Units and Stations. While some areas make successful efforts to dispose of law enforcement data from electronic data storage devices this would for the most part appear to be due to the efforts of individual areas in pulling together the relevant standards and procedural instructions from various sources to develop and implement their own processes. Discussions with staff in the BITS IT Infrastructure Security Unit and the Records Services Division, the two areas of Victoria Police with a lead role in this area, confirmed this observation with staff in both areas stating that they do not as a general rule work together in the development of their separate protocols and procedures relating to disposal of law enforcement data or information security generally. BITS IT Infrastructure Security staff also stressed that while they are able to provide advice on request on issues of information security, they do not have a compliance role. They understand that this role lies with individual Victoria Police areas. They also stated that the currently unstaffed Information Security Unit in BITS is likely to have a major role in this area. 17

18 High Level Compliance Review The following is a discussion of the findings of the review based on each of the electronic data storage device types included in this review: Victoria Police Computer Hard Drives The sanitisation of Victoria Police personal computer hard drives, prior to the return of the PCs to the lessor for reuse, is a good example of a successful force-wide activity where law enforcement data is removed from electronic data storage devices when it is no longer required. A DSD-approved three pass sanitisation product (Destroy SE) is used for this process, which is undertaken by IBM employees under the supervision of authorised Victoria Police employees, specially selected and trained for purpose. The successful sanitisation of each PC hard drive is certified by both the IBM employee and the Victoria Police authorised staff member, by the completion and signing of a Check Sheet for Hard Drive Sanitisation Destroy SE. The certification sheets are retained by the Victoria Police area where the PCs were in use. It is noted that at one area visited by the reviewer, the Officer in Charge was not able to locate these certificates and believed that they were held by BITS. Detailed written instructions have been developed describing the process and responsibilities for IBM contractor staff and for Victoria Police authorised staff for the sanitisation of IT hardware prior to returning it to the lessor. These are provided to IBM and to the Victoria Police employees as part of their training USB Flash Drives The findings regarding the use of USB flash drives and their sanitisation when returned from the user demonstrates a much less coordinated approach. While Business Information Technology Services lists USB flash drives for purchase in their IT Catalogue, which have an encryption program installed, the procurement and use of these particular flash drives is not mandated, nor does BITS have a policy requiring Victoria Police to only use flash drives that have an encryption program on them. Regarding the disposal of information from USB flash drives, BITS indicated at interview that if flash drives with an encryption program were used, there would be no need to sanitise them, as the data would be unavailable to would-be or new users. The procedures and requirements for the use of USB flash drives vary across Victoria Police. The Crime Department has very strict controls on their use. Crime Department Instruction 21 (CDI 21) Security of Information on Portable Storage Devices, published on the Crime Department Intranet, includes instruction for the allocation, use, return and sanitisation of USB flash drives. Only BITS supplied SanDisk Cruzer Micro USB sticks which come with encryption software, are allowed to be used. The Crime Department IT Coordinator has responsibility for all processes surrounding the allocation and use of the flash drives, including the maintenance of a register of who has the devices and ensuring the sanitisation/removal of data from the drive should a member or employee leave the Crime Department. The Specialist Support Department also supplies the BITS-approved flash drives to staff. While staff are discouraged from using their own personal flash drives there is no compliance checking to ensure that this does not occur and no protocol governing the removal of data from these flash drives. In one of the Victoria Polices regions all employees were recently provided with a USB flash drive as part of a health and well-being promotion program, with a link on the flash drive to the Region s health and well-being website. While the devices were supplied with a small card 18

19 Electronic Data Storage Devices providing information about the need and respect for information confidentiality, they were not provided with encryption software. Encryption software is readily available for purchase and it is recommended that this region ensures that the flash drives are encryption-enabled. It was noted during discussions with Departments during this high level review that standard policy and procedures relating to the use of USB flash drives needs to be developed, implemented and enforced at an enterprise force-wide level. This was reinforced late in the process of conducting this review when an employee of a large Victoria Police Department that had not been included in the location visits, contacted the reviewer to find out where the policies and guidelines for the secure use of USB flash drives could be found. The issue of encryption will be examined in greater detail in an upcoming CLEDS high level audit of Standards 23 and 24 Cryptographic Controls CDs and DVDs Victoria Police Departments and Police Stations appear to be generally aware of the need to securely dispose of CDs and DVDs containing law enforcement data when they were no longer required. Again, the implementation of procedures governing disposal, and compliance checking is not coordinated across Victoria Police and was therefore varied. Disposal was generally undertaken by placing the CDs or DVDs in secure bins provided and collected by contractors. Some areas provided the bins only once a year, others provided them on an ongoing basis. Some areas, including Crime Department, the Specialist Support Department and BITS, provided cross-cutting shredding machines suitable for the destruction of this type of media. Some provided detailed information to staff about the use of the bins, including rules governing their placement and removal and/or basic instructions for the local destruction of CDs/DVDs by methods such as scratching or cutting into strips, where shredders were not available. It was found that Certificates of Destruction were in most instances not requested from the contractors hired to remove and destroy the media, as required. One area where a number of bins were available on an ongoing basis indicated that this was because of the cost of provision of the Certificates ($25 per bin per certificate), or an estimated cost of $9,000 per year. Others simply appeared not to know or understand that the certificates were required. Given that there has been an information security breach in the last twelve months where law enforcement data, albeit in paper-based documents, ended up in a public location following removal by a contractor, it is vital that Certificates of Destruction are obtained for all removals and that a force-wide process for checking compliance with this requirement is established. Victoria Police needs to investigate the most cost-effective procedure for meeting this requirement. It should be noted that as a result of this information security incident the Records Services Branch Procedures for Requesting Destruction of Records document has been revised to provide clearer details and specifically to include the requirement for a Certificate of Destruction to be obtained from the external contractor/destruction company if the destruction of the data is not directly supervised by Victoria Police staff. 19

20 High Level Compliance Review Video and Audio Tapes Another example of the relatively successful disposal of law enforcement data from electronic data storage devices is that of the disposal of Video and Audio-taped Evidence (VATE) tapes when the information held on them is no longer required. The process for storage and disposal of VATE tapes is briefly documented in the VPM as described above and in more detail in the Victoria Police Video and Audio-taped Evidence (VATE) Procedural Guidelines updated by SOCAU in The storage and disposal of the tapes is overseen by the Records Disposal Branch who receives the tapes from SOCA Units across Victoria Police. The tapes are forwarded to the Victoria Police Storage and Disposal Facility at Laverton, where they are processed according to whether they are master, master copies or working copies and stored or removed by a disposal company for destruction. Destruction and disposal is conducted offsite via shredding to the required tape width and then via deep burial. A computerised VATE register is maintained in all SOCA Units, which is used to record details of the interview and to monitor the movement and location of the VATE statement. Staff at the Laverton Storage and Disposal Facility also record receipt of the tape and details of its storage, destruction and disposal on a computerised register. The reviewer noted the Register of Disposal at the Laverton facility. There are issues surrounding the physical security of the Laverton Storage and Disposal Facility (refer CLEDS Review of Physical Security) and a problem with destroying the tapes within the required timeline due to a backlog of tapes requiring processing. However, the actual process of destruction is conducted within the prescribed standards, except that Certificates of Destruction are not requested from the contractors undertaking the destruction and disposal. It should be noted that since the conduct of the review of physical security Victoria Police has developed plans to renovate the Laverton site to ensure appropriate physical security measures are in place. As noted in above, the requirement to obtain Certificates of Destruction from disposal contractors has also been clearly specified in the Records Services Branch Procedures for Requesting Destruction of Records. Other tapes held on Victoria Police premises such as TRIM tapes are destroyed locally by cutting or with a hammer, or are placed in secure bins as for CDs and DVDs for removal and destruction Multi Function Devices The reviewer was informed that new multi-function devices (MFDs), devices that are able to conduct multiple functions such as printing, photocopying and scanning, have hard disk drives that are also required to be sanitised at end of lease. While the MFD manufacturers may have their own proprietary processes for removing data from the hard disk drives of their machines, BITS staff believe that it is possible that these processes may not meet the data security requirements of ACSI 33 and Defence Signals Directorate that underpin BITS current PC hard disk drive sanitisation procedures. To coincide with the end of the first lease, the BITS IT Infrastructure Security Unit has included the development of MFD sanitisation procedures by October 2008 as an action item in their Implementation Plan response to the CLEDS Standards for Victoria Police Law Enforcement Data Security. 20

21 Electronic Data Storage Devices 3.3 Approved Third Party Agreements An examination of formal Agreements with Approved Third Parties for reference to policy and process regarding this Standard revealed seven Agreements out of 17 ATPs (41%) are compliant with Standard 22. These include reference to the requirement to dispose of law enforcement data when it was no longer required and refer to the relevant State and/or Commonwealth legislation. The remaining organisations either: have agreements that are not compliant with Standard 22; or are non compliant because there is no Agreement in place. While the proportion of Agreements with ATPs that are compliant with Standard 22 is currently low, it is noted that a revised standard Agreement has been developed for negotiation with Approved Third Party organisations which incorporates clear reference to the requirements of all the CLEDS Standards and protocols, including the disposal of data from electronic data storage devices. 3.4 Other Issues Coordination of Effort It would seem from the above that processes for the disposal of law enforcement data from electronic data storage devices works best where there is a coordinated force-wide approach taken to the particular disposal modality and process. This requires there being a lead area that takes responsibility for the development of policies and processes in conjunction with other relevant areas of Victoria Police. This responsibility should also include a compliance role to ensure the correct processes have been properly followed. In discussions with the BITS IT Infrastructure Security Unit, it was clearly stated that this area of BITS has an advisory rather than a compliance role in relation to information security. It was suggested that the currently unstaffed BITS Information Security Unit would have a major role in this area. The Unit has been without staff for almost a year. In discussions with staff from the Business Management Department (BMD) Business Records Section it was noted that appropriate interaction and cooperation with BITS was lacking. BMD was aware that that there needed to be interaction between BRS and BITS regarding requirements for information disposal and information security generally but such interaction did not occur. The VAGO records management audit (see section above) identified the need for the development of an organisation-wide strategy for records management. While the details of the strategy were not fully developed or available at the time of this review, Business Records staff have indicated that the development would include the participation of relevant staff from BITS. A draft Strategy is expected to be completed by 31 October

22 High Level Compliance Review Awareness of policy and procedures Further issues of concern to the reviewer were the extent to which information about relevant policy and required procedures for electronic data storage device contents disposal is accessible for Victoria Police employees and whether education and training efforts were sufficient to ensure employees are given the best possible opportunity to be familiar with the required standards and procedures. Lack of easy access to clear policy direction was evident from the observation that the policies and instructions relating to data disposal are contained in varying degrees of detail in a number of standards, policy and procedural documents. Also, documents containing significant information such as the Records Disposal Guide, are not referred to in the VPM. The lack of central leadership and coordination places the onus on local stations or areas of Victoria Police to locate and bring these documents together and develop local procedural documents. This was done well in some areas and not at all in others. This approach is inherently inefficient and results in duplication of effort without quality assurance. The information security awareness posters and brochures posted on the BITS intranet and the online and DVD-based information security awareness training developed by BITS includes information about data disposal. The recent CLEDS review of Education and Training on law enforcement data security in Victoria Police found however that the rate of access to this information is low among Victoria Police employees. The reviewer is aware that the Victoria Police Agency Security Advisor is currently preparing a Quick Reference Guide on Security Awareness, which may be of assistance. 22

23 Electronic Data Storage Devices 4 Conclusions and Recommendations 4.1 Conclusions Victoria Police has established or is planning to develop a number of processes that demonstrate that they are working towards achieving full compliance with this Standard. These include processes such as: ensuring the sanitisation of Victoria Police personal computer (PC) hard drives prior to the return of the PCs to the lessor for reuse; and the guidelines and processes developed to ensure the effective disposal of VATE statements when they are no longer required. Victoria Police is planning the extension of the media sanitisation processes to enable sanitisation of the hard drives of Multi Function Devices and the development of a Corporate Information and Records Management Strategy. Victoria Police has also recently developed a revised standard Agreement for negotiation with Approved Third Party organisations (ATPs) which incorporates clear reference to the requirements of all the CLEDS Standards and protocols, including the disposal of data from electronic data storage devices. This will ensure that Victoria Police fully complies with this Standard as it relates to ATPs, as opposed to the 41% compliance rating found during this high-level review. There are a number of improvements to be made before Victoria Police can be judged to be fully compliant with Standard 22. These are discussed below. While there is information relating to the disposal of law enforcement data from electronic data storage devices available across Victoria Police, there is no single, consistent and up to date documentation. The lack of integrated documentation necessitates responsible staff at individual locations finding and pulling these instructions together into a single document for the use of their local staff. The approach to ensuring the encryption of data held on USB flash drives and processes developed to monitor compliance with this requirement is varied and uncoordinated across Victoria Police. Business Information Technology Services (BITS) lists an approved USB device in their catalogue which comes with encryption software. The use of this flash drive is not mandatory. In situations where electronic devices containing law enforcement data are removed for destruction by a registered disposal company, the Public Records Act 1973 requirement to obtain a Certificate of Destruction does not always occur. This seems in part to be due to the associated cost and in part due to a lack of awareness of the requirement. There is also a lack of general awareness of the requirements of the CLEDS Standard 22 among Victoria Police employees in many Departments and areas. Reduced awareness of the requirements will result in poor compliance. There is a need for a more focussed and active approach to ensuring all Victoria Police employees are well aware of their responsibilities regarding information disposal from electronic data storage devices. 23

HIGH LEVEL COMPLIANCE REVIEW SECURITY CLASSIFIED LAW ENFORCEMENT DATA

HIGH LEVEL COMPLIANCE REVIEW SECURITY CLASSIFIED LAW ENFORCEMENT DATA HIGH LEVEL COMPLIANCE REVIEW SECURITY CLASSIFIED LAW ENFORCEMENT DATA Standards for Victoria Police Law Enforcement Data Security (Standards 27, 28, 29 & 30) November 2008 Commissioner for Law Enforcement

More information

Review of Education and Training on Law Enforcement Data Security in Victoria Police. March 2008 Commissioner for Law Enforcement Data Security

Review of Education and Training on Law Enforcement Data Security in Victoria Police. March 2008 Commissioner for Law Enforcement Data Security Review of Education and Training on Law Enforcement Data Security in Victoria Police March 2008 Commissioner for Law Enforcement Data Security Acknowledgement This report was prepared for the Commissioner

More information

HIGH LEVEL COMPLIANCE REVIEW PHYSICAL SECURITY. Standards 14 19 of the Standards for Victoria Police Law Enforcement Data Security.

HIGH LEVEL COMPLIANCE REVIEW PHYSICAL SECURITY. Standards 14 19 of the Standards for Victoria Police Law Enforcement Data Security. HIGH LEVEL COMPLIANCE REVIEW PHYSICAL SECURITY Standards 14 19 of the Standards for Victoria Police Law Enforcement Data Security June 2008 Acknowledgement This report was prepared for the Commissioner

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

Independent Auditors Report to the Commissioner for Law Enforcement Data Security -

Independent Auditors Report to the Commissioner for Law Enforcement Data Security - Commissioner for Law Enforcement Data Security Audit of Victoria Police Compliance with CLEDS standards on Access Control and Release June 2008 Reference: Version: FY07/08 Final Date of review: April -

More information

Records Management plan

Records Management plan Records Management plan Prepared for 31 October 2013 Audit Scotland is a statutory body set up in April 2000 under the Finance and Accountability (Scotland) Act 2000. We help the Auditor General for Scotland

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

Records Management - Department of Health

Records Management - Department of Health Policy Directive Records Management - Department of Health Document Number PD2009_057 Publication date 24-Sep-2009 Functional Sub group Corporate Administration - Records Ministry of Health, NSW 73 Miller

More information

Records Management Plan. April 2015

Records Management Plan. April 2015 Records Management Plan April 2015 Prepared in accordance with the Public Records (Scotland) Act 2011 and submitted to the Keeper of the Records of Scotland for their agreement on 28 April 2015 (Revised

More information

NHS Information Governance:

NHS Information Governance: NHS Information Governance: Information Risk Management Guidance: Maintenance and Secure Disposal of Digital Printers, Copiers and Multi Function Devices Department of Health Informatics Directorate July

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

How To Manage Records And Information Management In Alberta

How To Manage Records And Information Management In Alberta 8. RECORDS AND INFORMATION MANAGEMENT Overview This chapter is intended to help public bodies understand how good records and information management practices assist in the effective administration of

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Safe Haven Policy. Equality & Diversity Statement:

Safe Haven Policy. Equality & Diversity Statement: Title: Safe Haven Policy Reference No: 010/IT Owner: Deputy Chief Officer Author Information Governance Lead First Issued On: November 2012 Latest Issue Date: March 2015 Operational Date: March 2015 Review

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Guidance on Personal Data Erasure and Anonymisation 1

Guidance on Personal Data Erasure and Anonymisation 1 Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review

More information

Secure Mobile Shredding and. Solutions

Secure Mobile Shredding and. Solutions Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled

More information

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information: Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1 Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.

The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files. Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

West Chester University Records Management Policy

West Chester University Records Management Policy 1. Introduction West Chester University is committed to effective records management to preserve its history, meet legal standards, optimize the use of space, minimize the cost of record retention, and

More information

Information Management Advice 50 Developing a Records Management policy

Information Management Advice 50 Developing a Records Management policy Information Management Advice 50 Developing a Records Management policy Introduction This advice explains how to develop and implement a Records Management policy. Policy is central to the development

More information

Privacy and Cloud Computing for Australian Government Agencies

Privacy and Cloud Computing for Australian Government Agencies Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy

More information

Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection

Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection Crime Statistics Data Security Standards Office of the Commissioner for Privacy and Data Protection 2015 Document details Security Classification Dissemination Limiting Marker Dissemination Instructions

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers: ITEM NO: 4 Report To: AUDIT PANEL Date: 23 March 2010 Reporting Officers: Subject: Report Summary: Recommendations: Links to Community Strategy: Policy Implications: Financial Implications: (Authorised

More information

The Manitowoc Company, Inc.

The Manitowoc Company, Inc. The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational

More information

This policy outlines different requirements for the use of PSDs based on the classification of information.

This policy outlines different requirements for the use of PSDs based on the classification of information. POLICY OFFICE OF THE INFORMATION COMMISSIONER Use of portable storage devices 1. Purpose A Portable Storage Device (PSD) is a mobile device capable of storing and transferring digital information. Examples

More information

CITY UNIVERSITY OF HONG KONG. Information Classification and

CITY UNIVERSITY OF HONG KONG. Information Classification and CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification

More information

Records Management Policy

Records Management Policy Records Management Policy Document Number SOP2006-073 File No. 07/7 Date issued 1 September 2006 Author Branch Records and Mail Services Unit Branch contact 9320.7722 Division Finance & Data Services Summary

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

Information Management Policy CCG Policy Reference: IG 2 v4.1

Information Management Policy CCG Policy Reference: IG 2 v4.1 Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control

More information

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY DOC. T99-061 Passed by the BoT 8/4/99 UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY The President of the University shall adopt guidelines to require that each campus

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

Data Security Policy

Data Security Policy Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:

More information

Security Awareness and Training

Security Awareness and Training T h e A u d i t o r - G e n e r a l Audit Report No.25 2009 10 Performance Audit A u s t r a l i a n N a t i o n a l A u d i t O f f i c e Commonwealth of Australia 2010 ISSN 1036 7632 ISBN 0 642 81115

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Information retention and disposal guide. Date: 31 October 2014 Version: 2.0

Information retention and disposal guide. Date: 31 October 2014 Version: 2.0 Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case

More information

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder

More information

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV

More information

Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000

Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under section 46 of the Freedom of Information Act 2000 Lord Chancellor s Code of Practice on the management of records issued under

More information

Policy Document RECORDS MANAGEMENT POLICY

Policy Document RECORDS MANAGEMENT POLICY The District Council Of Elliston Policy Document RECORDS MANAGEMENT POLICY Date Adopted: 16 th December 2005 Review Date: Ongoing, as necessary Minute Number: 300. 2005 E:\WPData\Jodie\My Documents\policies

More information

Harbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2008

Harbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2008 Document version: 2.8 Issued to: Harbinger Escrow Services Issued by: Harbinger Group Pty Limited Delivered on: 18 March 2008 Harbinger Group Pty Limited, Commercial in Confidence Table of Contents 1 Introduction...

More information

COUNCIL POLICY R180 RECORDS MANAGEMENT

COUNCIL POLICY R180 RECORDS MANAGEMENT 1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.

More information

University of Limerick Data Protection Compliance Regulations June 2015

University of Limerick Data Protection Compliance Regulations June 2015 University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick

More information

IT Data Security Policy

IT Data Security Policy IT Data Security Policy Contents 1. Purpose...2 2. Scope...2 3. Policy...2 Access to the University computer network... 3 Security of computer network... 3 Data backup... 3 Secure destruction of data...

More information

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1.

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June 2011. Secure Research Database Analyst. Change History. 1 Version 1. Data Security Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2011 Owner Secure Research Database Analyst Change History

More information

Records and Information Management. General Manager Corporate Services

Records and Information Management. General Manager Corporate Services Title: Records and Information Management Policy No: 057 Adopted By: Chief Officers Group Next Review Date: 08/06/2014 Responsibility: General Manager Corporate Services Document Number: 2120044 Version

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

MONROE COUNTY WATER AUTHORITY IDENTITY THEFT PREVENTION POLICY REVISED MARCH 2014

MONROE COUNTY WATER AUTHORITY IDENTITY THEFT PREVENTION POLICY REVISED MARCH 2014 MONROE COUNTY WATER AUTHORITY IDENTITY THEFT PREVENTION POLICY REVISED MARCH 2014 Section 41.90 of Title 12 of the Code of Federal Regulations (the Regulations ) requires every utility that offers or maintains

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19 Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility

More information

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website

Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,

More information

Approved By: Agency Name Management

Approved By: Agency Name Management Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

Data Protection for the Guidance Counsellor. Issues To Plan For

Data Protection for the Guidance Counsellor. Issues To Plan For Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

4.01. Archives of Ontario and Information Storage and Retrieval Services. Chapter 4 Section. Background

4.01. Archives of Ontario and Information Storage and Retrieval Services. Chapter 4 Section. Background Chapter 4 Section 4.01 Ministry of Government Services Archives of Ontario and Information Storage and Retrieval Services Follow-up on VFM Section 3.01, 2007 Annual Report Background The Archives of Ontario

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY

IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY IFRS FOUNDATION DOCUMENT RETENTION AND DESTRUCTION POLICY Purpose The purpose of this policy is to provide the IFRS Foundation with a framework to govern management decisions on whether particular documents

More information

Territory Records (Records Disposal Schedule Disaster Recovery (Human Services) Records) Approval 2005 (No 1)

Territory Records (Records Disposal Schedule Disaster Recovery (Human Services) Records) Approval 2005 (No 1) Australian Capital Territory Territory Records (Records Disposal Schedule Disaster Recovery (Human Services) Records) Approval 2005 (No 1) Notifiable instrument NI2005 157 made under the Territory Records

More information

BIG LOTTERY FUND Document archive and retention policy

BIG LOTTERY FUND Document archive and retention policy BIG LOTTERY FUND Document archive and retention policy December 2010 Sonia Howe Head of Information Governance For further information regarding retention schedules please contact Page 1 of 18 Version

More information

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.

More information

September 28 2011. Tsawwassen First Nation Policy for Records and Information Management

September 28 2011. Tsawwassen First Nation Policy for Records and Information Management Tsawwassen First Nation Policy for Records and Information Management September 28 2011 Tsawwassen First Nation Policy for Records and Information Management Table of Contents 1. RECORDS AND INFORMATION

More information

Policies and Procedures. Policy on the Use of Portable Storage Devices

Policies and Procedures. Policy on the Use of Portable Storage Devices Policies and Procedures Policy on the Use of Date Approved by Trust Board Version Issue Date Review Date Lead Person One May 2008 Dec 2012 Head of ICT Two Dec 2012 Dec 2014 Head of ICT Procedure /Policy

More information

Research Data Management Procedures

Research Data Management Procedures Research Data Management Procedures pro-123 To be read in conjunction with: Research Data Management Policy Version: 2.00 Last amendment: Oct 2014 Next Review: Oct 2016 Approved By: Academic Board Date:

More information

Service Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information)

Service Instruction 0759: Destruction of Information Assets (Including Protectively Marked Information) APPENDIX E Service Instruction 0759 Destruction of Information Assets (Including Protectively Marked Information) Document Control Description and Purpose This instruction is intended to provide guidance

More information

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic

More information

Public Records (Scotland) Act 2011. Healthcare Improvement Scotland and Scottish Health Council Assessment Report

Public Records (Scotland) Act 2011. Healthcare Improvement Scotland and Scottish Health Council Assessment Report Public Records (Scotland) Act 2011 Healthcare Improvement Scotland and Scottish Health Council Assessment Report The Keeper of the Records of Scotland 30 October 2015 Contents 1. Public Records (Scotland)

More information

Records Management in the Victorian Public Sector

Records Management in the Victorian Public Sector V I C T O R I A Victorian Auditor-General Records Management in the Victorian Public Sector Ordered to be printed VICTORIAN GOVERNMENT PRINTER March 2008 PP No 86, Session 2006-08 ISBN 1 921060 59 X The

More information

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents West Midlands Police and Crime Commissioner Records Management Policy 1 Contents 1 CONTENTS...2 2 INTRODUCTION...3 2.1 SCOPE...3 2.2 OVERVIEW & PURPOSE...3 2.3 ROLES AND RESPONSIBILITIES...5 COMMISSIONED

More information

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.

This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should

More information

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy Page 1 of 10 Contents 1 Preamble...3 2 Purpose...3 3 Scope...3 4 Roles and responsibilities...3

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

Policies, Procedures & Guidelines

Policies, Procedures & Guidelines Policies, Procedures & Guidelines Management Guidance On the Storage and Disposal of Employee Personnel Files Issue Number: 1 Originated by: Human Resource Department Ratified by: SMT & JSPC Agreed by:

More information

Remote Access and Mobile Working Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.1. Approval. Review By June 2012

Remote Access and Mobile Working Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.1. Approval. Review By June 2012 Remote Access and Mobile Working Policy Document Status Security Classification Version 1.1 Level 4 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Information Security Policy

Information Security Policy Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...

More information