Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2

Size: px
Start display at page:

Download "Information security and paper-based data storage and disposal. INFORMATION SECURITY POLICY Version 2.2"

Transcription

1 Information security and paper-based data storage and disposal NOT PROTECTIVELY MARKED INFORMATION SECURITY POLICY Version 2.2 Title Subject Version Date Author Protective Marking Classification INFORMATION SECURITY POLICY Version 2.0 Information Security /07/2011 Aysha Mukhtar Not Protectively Marked Description Initial draft created. INFORMATION SECURITY POLICY Version 2.1 Information Security /07/2011 Aysha Mukhtar Not Protectively Marked Document amended to include comments of IGG INFORMATION SECURITY POLICY Version 2.2 Information Security /10/2011 Tim Rodgers Not Protectively Marked Final version for CMT approval Meta Data: Page 1 10/10/2011

2 Figure.1 Information Governance Policy Framework Legislation, Regulations, BSI Standards Information Governance Policy Framework High Level Policies Records Management Policy Information Security Policy Data Protection Policy Corporate Information Risk policy Sub Policies and Procedures Records Management Procedure Internet, Intranet And Policy ICT Technical Policies And Procedures Security Incident Management Procedure Information Handling Procedure Guidelines and LBTH Classification Scheme LBTH Retention Schedule Retention Guidelines Encryption Server Hardening Privileged User Toolkits Protective Marking Scheme (Currently being developed) Acceptable Usage Policy for GCSX Subject Access Request Guidelines Information Sharing Protocols Data Disposal Guidelines (Currently being developed) Access Management Patch Management Information Systems Third Party Access Agreement Information Governance Impact Assessment Corporate Scanning Guidelines and Toolkits Virus Control IAO Guidance Standard Operating Procedures Licensing Policy Software Development Application security IT Investigations Procedure Page 2 10/10/2011

3 1. The Information Governance Policy Framework The Information Governance Policy Framework (fig.1 above) is based on the Industry Standard ISO 27001, which is the international recommended code of practice for Information Security Management. The framework consists of High level policies under which there are sub policies and procedures. The Information Security Policy is one of the high level policies that sit along side the Records Management Policy, the Data Protection Policy and the Corporate Information Risk Policy. The Information Security Policy has the following sub policies beneath it: Information Handling Policy Internet, Intranet and Policy Information Security Incident Management Procedure ICT Technical policies and procedures All Council employees and those who work for or on behalf of the Council must also read and adhere to the above sub policies. Page 3 10/10/2011

4 2. About this policy Introduction and Scope This policy covers the security of all London Borough of Tower Hamlets held information, whether on paper, film, fiche or held electronically. This Policy applies to all Council members and staff, including those employed on temporary contracts and those contracted to work on the Council s behalf (also referred in this policy as third parties). This policy is in compliance with the Data Protection Act 1998 and The Computer Misuse Act 1990 which the Council is bound by, and therefore are under a legal obligation to apply security measures to protect personal information it holds against unauthorised access and use. There are no exceptions to the need to handle information appropriately and securely. Everyone who is employed by or works on behalf of the London Borough of Tower Hamlets is required to maintain the security of information, and the provisions of this policy are binding on you. Failure to comply with this policy may lead to breaches of the Data Protection Act 1998, which may result in heavy fines and enforcement action taken against the Council by the Information Commissioner s Office 1. Any breach of Information Security (e.g. theft, loss, malicious damage to ICT equipment or systems or paper documents, compromise of security etc.) must be reported as soon as possible. (See section 9 of this policy). The Council may take action against any user who is found to have acted in breach of this Policy. Where the user is an employee, the breach may be investigated under the Council s Disciplinary Procedure which could result in the employee s dismissal. In any other case, the Council will consider and take action as appropriate. The Council may have regard to the Computer Misuse Act in any such investigation. (See section 4 of this policy). The Council is committed to the implementation and operation of an Information Security Management System (ISMS) that is aligned with industry best practice and the International Standard ISO The Policy is based on the ISO27001 standard The Information security policy will be reviewed updated and changed from time to time as needs and circumstances dictate. 1 The Information Commissioner s Office (ICO) is the Government body overlooking compliance of the Data Protection Act 1998, the Freedom of Information Act 2000 and the Environmental Information Regulations Act The ICO has enforcement powers which he can use against organisations that breach the above Legislation. Page 4 10/10/2011

5 2.1Objectives This policy aims to: Ensure that the Council s information (be it paper, electronic or in any other format), communication assets, computers and systems are protected against internal and external threats To minimise the damage that could result from unauthorised access to information To ensure that all IT users are aware of their obligations, and of the risks of not complying with the requirements of the Policy and, To demonstrate that the Council has met its obligations under relevant law. 2.2 Ownership and Maintenance of this Policy The Policy is owned by the Senior Information Risk Owner (SIRO) 2, and managed on his behalf by the Corporate Information Governance Group (IGG). IGG will review this Policy and the supporting documentation and policies at least once a year and update them as required. 3 The need for security 3.1 Principles Information used by the Council must be adequately protected to ensure business continuity and to avoid breaches of the law and heavy fines from the ICO 3, and to support the Council s statutory, regulatory and contractual obligations. Information is held and communicated by the Council in many forms, including written or printed on paper, stored on computers and websites and sent by post or electronically. The three key aspects of information security are: Confidentiality taking appropriate measures to ensure that information is accessible only to those entitled to see it Integrity maintaining the accuracy and completeness of council information, and ensuring that all changes or modifications affecting it are authorised, controlled and validated, and Availability ensuring that information is available to authorised users when and where required. 3.2 Responsibilities Chief Executive: Ultimately responsible for ensuring the application of effective information security measures 2 SIRO is CMT level representation for all information security issues and risks. Responsible for managing the Council s information risks, including maintaining and reviewing an information risk register 3 ICO- Information Commissioners Office is the government body that overlooks the Data Protection Act 1998 who has enforcement powers and the power to fine organisations up to 500,000 for serious information security breaches and incidents. Page 5 10/10/2011

6 - Senior Information Risk Owner: CMT level representation for all information security issues and risks. Responsible for managing the Council s information risks, including maintaining and reviewing an information risk register. The SIRO will be specifically trained in the requirements of this role. - Information Governance Group: the cross-council group which deals with all information governance matters is responsible for: formulating security policies, procedures and guidance - The Information Security Manager: is responsible for the technical investigation and management of all information security incidents and overall management of IT security controls. - The Information Governance Manager: is the nominated Data Protection Officer for the Council and is responsible for the overall governance of all aspects of information handling including raising awareness and providing training to Council staff and monitoring compliance. The information Governance Manager is also responsible for leading on paper base information security incidents. - All Managers: Managers, as custodians of information within their specific areas of business, have a responsibility to protect that information. All Managers are directly responsible for implementing the Information Security Policy within their business areas, and for adherence by their staff. Management, in conjunction with Human Resources under the Council s Induction scheme, are responsible for ensuring new staff and contractors are aware of this policy and request a User ID for ICT systems. In particular all managers shall inform ICT of any changes to their staff, including additions, moves and leavers, so as to ensure that privileges are managed appropriately. - All Staff, Contractors and Authorised Third Parties: All staff and authorised users of LBTH ICT and paper based systems are responsible for abiding by the Information Security policy and, in doing so; actively support the provision of information security throughout the organisation. 3.3 Training All Council employees, permanent and temporary, who use the council ICT facilities or handle information paper or electronic form, should attend the Information Security training provided by the Information Governance Team. The Information Security Training is compulsory for all staff that has a GCSx 4 account. See section 4. Human Resources, for more information. 4 Acceptable Usage 4 GCSx Government Secure Network that enables local authorities and other central Government departments to communicate and share information securely. It has stringent security controls Page 6 10/10/2011

7 4.1 General requirements for authorised LBTH ICT systems users The following is a listing of general usage requirements that exist for all authorised users of LBTH ICT systems including those employed on temporary contracts and third parties 5 : Please refer to the Information Handling Procedure V.1.1 for more details on how Council Information should be handled. <link to the policy> 4.2 General Requirements The following is a listing of general usage requirements that exist for all authorised users of LBTH ICT systems: a) Each authorised user of LBTH ICT systems is provided with unique user IDs and passwords for the various systems that are in place b) Accessing other users PC without the owner s permission and using it maliciously is strictly prohibited and would be seen as an offence under section 3 of Computer Misuse Act c) The sharing of passwords for individual accounts is strictly forbidden 6 d) Attempting to break or avoid the security controls of LBTH equipment or any other third party computer system is strictly forbidden e) Accessing network traffic not intended for yourself or doing anything that would adversely affect the ability of others to access ICT services is strictly prohibited f) Intentionally accessing or transmitting information about or software designed for breaching security controls, creating computer viruses or any other activity that compromises the confidentiality, integrity or availability of ICT systems or third party computer systems is strictly prohibited 7 g) Knowingly doing anything that is illegal under English or European Law and any other relevant country is strictly prohibited h) Carrying out activities to support any private business without permission is strictly prohibited i) No information can be copied or transferred from LBTH computer environments including desktops or laptops without the permission of the owner of said information. j) Storing work related documents on the U:drive is strictly prohibited. All work related documents must be saved on the M:drive. k) Staff must not take part in online or computer based discussions on matters that are politically controversial (unless such discussions are specific to their role), must not participate in discussions relating to matters that are the 5 Those contracted to work on the Council s behalf: 6 Where there is a requirement for delegated access to an account or files, a process of delegation is to be utilised. Further information is available in Section 8.8 below. 7 The Information Security Manager is exempted from this statement where preventative or investigative research is required, though only for the purposes of strengthening the security provisions. Page 7 10/10/2011

8 responsibility of another officer within the Council and must not provide information or advice known to be contrary to the Council s policies or interests l) Misrepresentation of one's digital identity to gain an advantage of any nature is strictly prohibited m) Playing games, other than those authorised and supplied with legitimate software that can be played during non-work hours or those used in LBTH training courses, is strictly forbidden n) The storage of personal non-business related data, such as music, pictures or video, on ICT equipment, be it on a PC, a laptop or on networked storage, is not permitted o) The use of any unauthorised encryption software is strictly prohibited. Records may be kept of ICT usage making it possible to discover and track usage that does not comply with these requirements, which can be inspected by systems administrators for the purpose of monitoring system performance and efficiency, and by management in the event of any suspected malpractice. Further information on monitoring of policy compliance is available in the Internet, Intranet and Policy, available on the Intranet. 4.3 Internet, Intranet and An Internet, Intranet and Policy is available on the Intranet which describes, in detail, the acceptable usage of corporately provided Internet, Intranet and access. Compliance with this Policy is required as part of the overall Information Security Policy. x, 4.4 Desktop and Laptop PCs Desktop PCs, Laptop PCs and other network resources, such as printers and scanners are provided for staff to access and make use of information that they need to do their job. Using the Council's IT equipment and software for anything other than work or for personal usage as defined within the Internet, Intranet and policy risks facilities being withdrawn, disciplinary action and/or prosecution under law. 4.5 Other Mobile Devices Council issued Mobile phones, Blackberry s and Personal Digital Assistants (PDAs) capable of accessing the Council network are covered by this Policy. Personal equipment used in the course of working for the Council are also covered. Page 8 10/10/2011

9 5 Human Resources 5.1 Awareness and training of Information Security Staff Intranet, and Manager s Briefings will be the major points of contact for receiving updates to ICT policies and procedures. Staff must take the time to read new materials as they become available. Security awareness will be created at the enrolment stage and reference to the Information Security Policy will be included in employee contracts. A Data Protection Policy covers the handling of personal data and should be read in conjunction with this document. All LBTH staff who use the council ICT facilities or handle LBTH information and documents in paper form should attend the Information Security training provided by the Information Governance Team. More information on the training is available on the Intranet on the Information Governance page. Additionally there is a Corporate Learning and Development course on Information Governance which includes a specific module on Information Security. Please note, the Information Security Training is compulsory for all staff that have a GCSx 8 account. 5.2 Confidentiality agreements All members of staff will have signed a contract of employment including a clause regarding information that they receive in the course of employment that requires them to ensure the confidentiality of LBTH information during and after their employment. All employees handling critical information must be subject to a formal pre-employment screening, which must include satisfactory professional references. Council information is to be kept confidential during and after employment with Tower Hamlets. Where agency and contract staff and other third party users are concerned, a confidentiality agreement is required before they are granted access to LBTH ICT facilities. Agency contracts and supplier contracts may exist which contain clauses relating to confidentiality, which satisfy this requirement. Where such clauses do not exist, the Information Security Officer should be contacted so that an appropriate agreement can be created (24-hour turnaround). 8 GCSx Government Secure Network that enables local authorities and other central Government departments to communicate and share information securely. It has stringent security controls Page 9 10/10/2011

10 Staff that need to use GCSx accounts must go through a Baseline Personnel Security Check (security vetting) which is a requirement under the Government Code of Connection. More information about the Baseline Personnel Security Check can be found on the following link: Reckless handling of personal data may be regarded as gross misconduct and where such handling is alleged, employees may be investigated under the Council s Disciplinary Procedure, an outcome of which could be dismissal. In any other case, the Council will consider and take action as appropriate. 6 Physical and Environmental Security 6.1 Secure Areas Physical security protection for LBTH is based on defined perimeters and achieved through barriers within the organisation to prevent, detect, and minimize the effects of unauthorized access. Critical installations are protected at least by lock and key and are to be kept secure at all times. All LBTH buildings in the Borough are designated as secure areas and entry to each is controlled by general access procedures: To gain entry, visitors must enter via a public entrance and report to reception. Admittance is under the control of the reception staff. Visitors are not admitted beyond the reception area until the member of staff being visited has been contacted and a member of staff is then requested to collect the visitor from the reception area. Prior to admission, visitors are given a visitors pass and required to sign the visitor s book. The pass is to be affixed to their person and must be visible at all times. They are then placed under the responsibility of the member of staff being visited, for the duration of their stay. All staff and other visitors are issued with a badge for identification. All badge holders must wear the badge at all times while in LBTH buildings. Entry to specifically identified key areas, such as the computer room, is by separate swipe card, which shall be granted by senior ICT Management. Only those staff whose jobs require them to enter these areas are issued with access to these areas. Page 10 10/10/2011

11 All contractors entering the Computer Room must sign the log book for the Computer Room. Video surveillance cameras are located at computer room entrance and main building entrances and exit. The CCTV is monitored by trained personnel. The video surveillance recording must be retained for a minimum of 4 weeks, for possible future playback. Access Violation Reports from the Access Control Software for sensitive areas such as computer room be securely maintained and reviewed by the respective Administration Department on regular basis. Staffs are instructed to challenge people who are visitors or otherwise unknown to them and are not displaying the appropriate identification or acting in an appropriate manner. 6.2 Equipment Security Council ICT Equipment including mobile devices such laptops and PDA s and IRON KEY (Council encrypted USB stick) must be protected from security and environmental threats to a suitable level. Such threats include (but are not limited to) theft, sabotage etc. Corporate ICT systems shall be sited in an appropriate environment, including temperature, humidity and power supply control. Corporate ICT systems must be provided with appropriate supply of power, in line with manufacturer s specification, and that supply shall be protected by an Uninterruptible Power Supply (UPS). Equipment taken off site must only be with the approval of the appropriate manager. Staff who have obtained authorisation to take equipment off site must ensure that such equipment is given a high level of protection. Laptops must be protected by suitable access and physical protection (such as locks on laptop bags) and must never be left unattended and must be kept with you at all times whilst in transit. When taking laptops off site, employees must not: leave laptops in cars, because of high risk of car theft; Take laptops to Pubs, Bars, restaurants etc. take laptops to social events or sports venues outside of their work and; Take laptops to any other such place where the laptop is placed at risk of being stolen or damaged. Disposal of ICT equipment (both devices and media such as backup tapes, CDs) is subject to legislation and may also be subject to various licensing agreements. Equipment should only be disposed under the direct supervision of ICT. It is essential that, prior to disposal, the data on the equipment is either removed to a secure location or permanently deleted. Page 11 10/10/2011

12 Where other devices have been used, again any Council data should be removed or deleted. 6.3 Clear screen and clear desk In order to reduce the likelihood of security breaches resulting from information being left unattended, staff must ensure that their PC terminals are locked or logged out at all times when they leave their terminal for any reason. Staff shall also ensure that all information (business. personal or sensitive information) is kept secure at all times and Paper documents must be filed and locked away and not left in plain view in their workspaces when they are to be away from their desk for over an hour. The Council operates a clear desk policy and as such workstations need to be cleared at the end of each day. The Council s clear desk procedure can be found at the following link: workforce_development/health wellbeing/flexible_working/clear_desk.aspx 6.4 Removal of information Information must only be taken offsite after completion of a proper risk assessment. Examples of such situations include positions requiring work offsite, such as social work, Remote Access and Home Working arrangements. All information taken off-site must be encrypted. See section 5.5 Encryption below. 6.5 Encryption The Council has encrypted all LBTH laptops in order to protect the information held on them. The Council also provides encrypted USB sticks called the IRON KEY for those who need to use a USB stick. All information in transmitted, taken off-site, in transit and stored off the council network must be encrypted. Although the encryption help keep the information on the devices secure, minimum information as possible should be held on the devices. Use secure (GCSx or CJSM) where possible when ing documents containing personal or confidential data to Public Authorities (i.e. Central Government departments, other local Authorities, Police, NHS). When ing externally outside of the Council to non public authority organisations, employees must ensure the documents containing personal or confidential data is encrypted using WinZip (encrypted to 256- bit AES standard). Always send the password for the encrypted document separately and keep the password safe. Page 12 10/10/2011

13 Information sent via GCSx does not need to be encrypted as GCSx is a secure network 7 Communications and Operations Management 7.1 Use of software Precautions are required to prevent and detect the introduction of malicious software, such as viruses and spyware. All managers and staff should be alert to the dangers of malicious software. Measures have been introduced to the Council s ICT infrastructure to assist in the prevention and detection of malicious software Malicious software controls To minimise the threat of virus and other malicious software outbreaks within the Council s ICT environment, a number of practices have been introduced. Virus checking of all computer media used is to be conducted. All PCs are provided with virus checking software and this is to be used to scan all floppy disks and memory keys prior to usage. All data sent via , including both messages and attachments, is scanned by antivirus software, however, users should still be aware of the potential dangers of receiving attachments through and must only open attachments they are expecting and are from trusted sources. Users should endeavour to ensure that antivirus applications are operating at all times. Users of portable equipment must ensure that their devices are regularly connected to the LBTH network to ensure that virus protection measures are kept up-to-date. In addition: - Staff must not disable virus scanning software on laptops - Staff must scan all floppy, CD, USB devices and other types of mobile storage devices prior to connection to the LBTH equipment or the network Software License controls The Council requires that all software used within the organisation is appropriately licensed and authorised and that no unlicensed software is used. The use of such software is prohibited. Software that is installed must be for business purposes associated with the Council. It is the linemanager's responsibility to ensure that only licensed software is used on machines within their control and that suitable documentation is retained. The use of unlicensed software will result in disciplinary proceedings and possibly criminal access. The use of unlicensed software is not only illegal; it is potentially damaging to the ICT operations of the Council. Users may not purchase or install any hardware or software on Council equipment without the express authorisation of ICT, as supported by an Page 13 10/10/2011

14 approved business case. The ICT Service Desk is the initial point of contact for all software acquisitions. Any incidents relating to viruses, malicious or unlicensed software should be reported to the Service desk on x Use of hardware Users shall not install, relocate or modify hardware allocated to them without the express permission of ICT Users shall not connect any hardware devices to LBTH computer equipment connected to the LBTH network without the express permission of ICT Users shall use computer hardware allocated to them in a responsible manner and in compliance with this policy The responsibility for the protection of ICT portable computers and the information stored in them shall reside with the person to whom the equipment has been loaned or allocated to No privately owned computer equipment, including equipment used by contractors or third party suppliers, may connect directly to the LBTH network. Such devices may however be connected over the internet using the appropriate remote access software (VPN), provided that the user has formally requested such access in accordance with the procedures for remote access, available on the Intranet. Only approved PDAs with approved software may be connected to the LBTH network. 7.3 Storage of Data The Council works to ensure the protection of all electronic information through the provision of a data backup facility. This facility is only effective for information that is stored on a network drive which is the, M:drive. Information saved locally, on PCs or laptops, is not secured and can be lost in the event of disk or system failure or if documents are deleted or modified. Additionally if the PC hard drive or laptop gets stolen the information can be easily be compromised. To ensure that all of the Council s information is protected, all work related information must only be saved on the M:drive especially business critical information and information containing clients and customers personal and sensitive data. Under NO circumstances should work related, and clients and customers personal information be saved on the U:drive. This is strictly prohibited. The IRON KEY (encrypted USB stick) and laptops should only be used to transport data and should NOT be used as a storage device. Any information saved on these devices should be temporary and should be saved on to the M: drive and deleted off the IRON KEY or laptop as soon as the staff is back in the Office. Page 14 10/10/2011

15 7.4 Remote access and Home Working Remote access to the LBTH network and subsequent ICT systems is controlled using VPN Secure ID technology which is an additional authorisation process and additional hardware. This process is defined in the ICT enrolments section on the Intranet. Please refer to the Access to systems page on the Intranet on the ICT pages. x Staff working from home on a regular basis should use VPN Secure ID technology to access the LBTH network. Staff should refer to the Council s Home Working Policy when considering working home and also the Information Handling Procedure V1.1 for guidance on secure home working. The Council s Home Working Policy can be found on the HR page on the Intranet: workforce_development/health wellbeing/flexible_working/homeworking.aspx The Information Handling Procedure V1.1 can be found on the Information Governance page on the Intranet: complaints/info rmation_governance/information_gov_policies.aspx 7.5 Use of removable media The use of personal USB sticks, compact or digital video discs or other digital storage to transfer personal data by council employees and agencies working on behalf of the Council is strictly prohibited. Council staff should use the Council provided encrypted USB sticks (Iron Key) for safe transportation of council data. The loss of personal data on a USB stick, or through unsecure channels will be regarded as a disciplinary offence USB Devices potentially carry viruses. Therefore great care should be taken when connecting USB devices to the network, and their contents should be scanned with anti-virus software when inserted. The council reserves to right to inspect USB devices on demand. 7.6 Internet and All Council staff must read and adhere to the Councils Internet, Intranet and . Page 15 10/10/2011

16 Council staff must never discuss or post Council information on the Social Networking sites and chat rooms (unless specifically authorised by your manager to do so). Council staff who need to send protectively marked 9 RESTRICTED data (personal data or sensitive information) to other local or central government departments should use GCSx 10 secure , Under no circumstances RESTRICTED data should be sent to an account outside of the council network unless they are using GCSx or CJSM secure . Please contact ICT Service desk x 4444 for setting up GCSx or CJSM 11 secure . Ensure that all personal data that do not fall under RESTRICTED classification is encrypted before ing it outside of the Councils network and secure facility. (See section 5.5 Encryption). Where regular access to personal data is required outside of the office, managers should consider investing in VPN (Secure ID technology) to allow staff to work from home on a virtual desktop. Please see above section Remote access. 8 Access Control Authorised users are provided with access to LBTH ICT systems based on a strict business need. Access is based on the need-to-know and least privilege principles where officers are only privy to information that is in direct support of the conduct of their responsibilities. 8.1 Enrolment Access to LBTH ICT systems is controlled using the ICT Systems Enrolment Form, available in the ICT section of the Intranet. ems.aspx All users of ICT resources must be individually enrolled. Individual user accounts must not be shared with the exception of delegation. 9 The Protective Marking Scheme is a Government Information Classification scheme and a data handling system. The protective marking scheme has been developed to ensure that information is handled in a manner that is appropriate to its value in terms of the severity of impact or damage that is likely to result from its compromise. 10 GCSx Government Connect Secure Extranet network that enables local authorities and other Government agencies communicate and share information securely. It has stringent security controls. 11 CJSM- Criminal Justice Secure is intended to provide criminal justice organisations and practitioners to sensitive and confidential securely. Page 16 10/10/2011

17 When applications for enrolment are successfully completed, a login ID and password is provided. Passwords must remain confidential at all times. Approval for enrolments must be given by the system owner or line manager under delegation. 8.2 Password use When staff are creating or updating passwords, the following guidelines must be used. Passwords should: Be at least 7 characters in length Contain a mix of alphabetical (e.g. a, b, c, etc), numerical (e.g. 1, 2, 3, etc) and special characters (e.g.. etc) Contain a mix of upper and lower case characters Not be anything that could be easily guessed, such as a pet s name or birth date Be easy to remember Not be written down Not be divulged to any other person Must contain at least one capital letter Password should be changed every 60 days Failure to correctly enter a password more than three times in a row may result in a lock being placed upon the account, disabling access. The ICT service desk should be contacted on x4444 to apply to have the lock removed. Users will be required to suitably identify themselves before this can be processed. 8.3 Privileged Accounts The use of all Operating System or Database System Administrator accounts must be approved by the Service Head, ICT The use of all application-specific administrator and other privileged accounts shall be approved by ICT systems administrators once approved by the System Owner. 8.4 Access to Information Users are authorised to access LBTH information, only whilst in the employment of LBTH or as an authorised volunteer, work experience student or person having a contractual relationship with LBTH. No information can be copied or transferred from LBTH computer environments (including desktops or laptops) or paper files without the permission of the owner of said information. Page 17 10/10/2011

18 8.5 Access Administration Every system shall have a System Owner who will have overall responsibility for granting access rights to users of their particular applications. Each authorised user will be granted access to those information resources needed to perform that officer's duties. If an application function has an official delegation, then only staff with that delegation will be able to access that function. 8.6 Access Monitoring Where the capability exists, the use of LBTH ICT systems will be monitored using audit trails that log security-related events. The following time stamped events will be recorded as a minimum: Details of all logon attempts, whether successful or not; Details of attempts to access protected resources, whether successful or not; All activities relating to the use of special system privileges; All modifications to security information (user IDs and passwords); and All modifications to system control parameters. All transactional activity Such logs will be reviewed, when necessary, to identify any misuse of access privileges or attempts to do so. Security investigations will be subsequently carried out as required. 8.7 Access Removal and Modification When the employment of a staff member is to end, the appropriate system and application administrators must be notified to ensure that the user accounts are disabled and/or removed in a timely fashion. The leaving staff member s line-manager must report this to ICT using the form on the ICT pages on the Intranet. The ICT Service Desk will then raise this with the appropriate administrator to ensure that the account is disabled. When a contract is to be terminated or the need for an authorised third party supplier to access LBTH ICT resources ends, the manager responsible for that person or persons is to contact the ICT Service Desk to inform them of the change. The ICT Service Desk will then raise this with the appropriate administrator to ensure that the account is disabled. Page 18 10/10/2011

19 Any requirements for change to access rights, such as a member of staff changing their role within the organisation and therefore needing different access, must be raised with the Service Desk for action by the appropriate administrator. It is the responsibility of the former line-manager to ensure that any privileged access is removed should it no longer be required and the responsibility of the new line-manager to request any additional access. 8.8 Delegation of Access At times, it may be necessary to delegate access to certain systems or portions of systems to users that would not generally be assigned such access. This may be due to periods of absence (such as access to an officer s files or during sickness or recreational leave) or perhaps to fulfil operational requirements (such as Personal Assistant requiring access to their superior s mail and calendar). Accounts must not be shared to suit this requirement. Instead, delegation of access must be used. If the delegation is required during a period of leave, steps should be taken to ensure that this is completed prior to the officer going on leave. The delegated access should also be removed as soon as it is no longer required. Assistance with Delegation of Access can be obtained through the Service Desk (x4444). 8.9 Third Party Access The security of the Council s ICT facilities and information assets must be maintained when accessed by third parties (e.g. subcontractors, supplier s partnership organisations, software suppliers etc.). Where there is a business need for third party access, a risk assessment must be carried out to determine the security implications and control requirements. Controls must be agreed and defined in any contract with the third party. The Information Systems Third Party Access Agreement form should be completed by the departments requiring third party access. The form can be found at: complaints/info rmation_governance/information_gov_policies.aspx On occasions third parties (e.g. external suppliers) may wish to connect their laptops / equipment to the Council s network. In these instances ICT service desk should be contacted on x4444 to authorise the connection. Page 19 10/10/2011

20 9 Systems Acquisition, Development and Maintenance Application owners need to define security requirements with the help of information security officer. This will consist of the following sections: Controlled Environment Change Management Source Code Management Version Control Testing Retention Requirements Reverse Engineering Security Requirements in Software development and acquisition There should be documentation of system specifications and current settings. There should also be documented data input controls (in accordance with BS27001ISO 27001). 10 Information Security Incident Management A security incident is one that can be defined as having resulted in: The disclosure of confidential information to an unauthorised individual, The integrity of the data or the system being put at risk, The availability of the data or the system being put at risk, Non-compliance with ICT policies, Unexpected behaviour of ICT systems, An adverse impact on the Council, for example: Embarrassment to LBTH Threat to personal safety or privacy Legal obligation or penalty Financial loss Disruption of activities Incidents, perceived weaknesses or suspected or actual security breach must be reported the Information Security Manager on x 4951 or the ICT Service Desk on x All paper based security incidents must be reported to the Information Governance Manager on x Page 20 10/10/2011

21 Incidents that are found to be of significance (Red or Purple 12 ) will be investigated by the Security Incident Response Team (SIRT 13 ) in a confidential manner and dealt with accordingly and the Senior Information Risk Owner (SIRO) will be engaged. The information Commissioners Office will be notified where there are serious breaches of the Data Protection Act Any disciplinary actions resulting from this investigation will be managed in accordance with the Council s Disciplinary Procedure. Details of the incidents will be referred to the relevant Line Manager and the appropriate Directorate Human Resources Manager. Where the incident involves the Line Manager or the investigating officer, appropriate alternate personnel shall be informed. Regular reports of Information Security Incidents will be provided to the Information Governance Group. For more information please refer to the Security Incident Management Procedure available on the Intranet on the ICT policies page. Or contact the Information Governance Manager on x Business Continuity 11.1 Disaster Recovery Planning An ICT Disaster Recovery Plan has been developed to provide a structured and tested set of procedures and necessary resources for the temporary and potentially long-term recovery of critical ICT infrastructure and services following the occurrence of an event (which may be the result of, for example, natural disasters, accidents, equipment failures, and deliberate actions ) that interrupts normal operations. This process shall identify the critical business processes and integrate the information security management requirements of business continuity with other continuity requirements relating to such aspects as operations, staffing, materials, transport and facilities. Proper backup and recovery procedures shall also be in place to ensure quick and accurate restoration. 12 Red incidents are medium severity, Purple incidents are the highest level of severity- Refer to the Security Incident Management Procedure. 13 SIRT is a virtual team chaired by the Information Governance Manager who will co-ordinate the non-technical aspects of the response Page 21 10/10/2011

22 For further information on the systems and data repositories protected by the ICT Disaster Recovery Plan, please contact the Business Support Manager ICT. 12 Compliance The design, operation, use, and management of information systems must abide by relevant statutory, regulatory, and contractual requirements. The following legislation and standards are relevant, however this is not a comprehensive list and other appropriate existing or future legislation and standards may need to be considered. Computer Misuse Act 1990 Data Protection Act 1998 Human Rights Act 1998 Freedom of Information Act 2000 Environmental Information Regulation 2004 Electronic Communications Act 2000 Copyright, Designs and Patents Act 1988 ISO Information Security Management Standard PCI DSS- Payment Card Industry Data Security Standard GCSx Code of Connection- Government Connect Secure Extranet Appendix 1 shows how the above legislation and standards applies to this policy Audit and Review The information security policy is currently being reviewed annually by the information security officer and the Information Governance Manager; any changes will be submitted to the Information Governance Group for final approval. 13 Details of how to work with the new policy Employees will need to follow the Information Security Policy and the sub polices that sit beneath it at all times. 14 Highlight the consequences of failing to meet the policy Failing to meet the Information Security policy requirements present a threat to confidentiality of the Councils information and to the availability of the tools for employees to complete their jobs. As such, non-compliance Page 22 10/10/2011

23 with this policy will be viewed seriously and will result in disciplinary action, in accordance with the LBTH Disciplinary Procedure, which may result in warning (verbal or written), counselling sessions and potentially dismissal, depending on the severity of the misuse. The following sanctions have been developed so as to deal with cases of misuse of this policy: Withdrawing access to ICT equipment, software and services Legal action, which could result in the award of damages, fines and/or possible imprisonment for breaches of legislation such as the Data Protection Act, the Computer Misuse Act or for breaches of any law 14.1 Success of the Policy - fewer audit actions Success will be measured by: - fewer information security incidents that lead to loss of data - number of referrrals to Information Governance/Information Security for advice on project or operational matters. 15 Policy owner, version number and date of next review This policy is owned by the Information Governance Group. If you have any questions regarding this policy please contact: o The Information Governance Manger Tim Rodgers on ext 4354 or o The Information Security Manager Alan Downey on ext The version of this policy is 2.1 and is next due for review in July 2012 Page 23 10/10/2011

24 1. Legislation Appendix 1- Legislation and Standards 1.1. The Computer Misuse Act 1990 The Act is relevant to electronic records in that it creates three offences of unlawfully gaining access to computer programmes. The offences are: unauthorised access to computer material; unauthorised access with intent to commit or cause commission of further offences; and Unauthorised modification of computer material. Access is defined in the Act as: altering or erasing the computer program or data; copying or moving the program or data; using the program or data; or Outputting the program or data from the computer in which it is held (whether by having it displayed or in any other manner). Unlawful access is committed if the individual intentionally gains access; knowing he is not entitled to do so; and aware he does not have consent to gain access. The 'further offence' applies if unauthorised access is carried out with intent to commit or cause an offence. The 'modification' offence applies if an individual does any act causing unlawful modification of computer material and does so in the knowledge that such modification is unlawful, and with the intent to: impair the operation of any computer; prevent or hinder access to any program or data held in any computer; or Impair the operation of any such program or the reliability of any such data. It is important that all staff members are aware of and comply with the Councils Information Security policy and Information Handling procedure. Page 24 10/10/2011

25 1.2. Data Protection Act The Data Protection Act gives individuals rights to access their own personal data (whether held in paper or electronic format) held by organisations. This is called a subject access request. Organisations must respond to subject access requests within 40 days. The Act also requires data to be accurate, gathered for a specified purpose, retained for no longer than necessary, and protected against unauthorised access, loss or destruction. To comply with all these requirements, it is essential that information is managed efficiently, and there are clear procedures for its collection, storage, security, retention, and destruction. The Information Commissioner may take enforcement action against organisations that breach the act and loose personal data. This includes stopping the organisation from processing the personal data and imposing fines up to 500,000. It is therefore essential that the Council uses coherent, clearly defined procedures 1.3. Freedom of Information Act The Freedom of Information Act gives people a general right of access to the information held by public authorities. The Person making a request has the right to be told whether information exists and to receive that information (subject to certain exemptions) within 20 working days. Under section 77 of the Act it is a criminal offence to alter, conceal or destroy any record held by a public authority to prevent disclosure of information. It is therefore essential that the Council uses coherent, clearly defined procedures to control its information Environmental Information Regulations Environmental Information Regulations 2004 like the FOI Act 2000 gives people a general right of access to environmental information held by public authorities and a response must be provided within 20 working days. Like the FOI Act, efficient record-keeping is essential in order to locate relevant information promptly and respond within the statutory time limits Human Rights Act Article 8 Schedule 1, Article 8, section 2 of the Human Rights Act 1998, Right to respect for private and family life States: There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the Page 25 10/10/2011

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

How To Ensure Network Security

How To Ensure Network Security NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:

More information

Highland Council Information Security Policy

Highland Council Information Security Policy Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Corporate Information Security Management Policy

Corporate Information Security Management Policy Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Human Resources Policy documents. Data Protection Policy

Human Resources Policy documents. Data Protection Policy Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Network Security Policy

Network Security Policy Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Data Protection and Information Security Policy and Procedure

Data Protection and Information Security Policy and Procedure Data Protection and Information Security Policy and Procedure Document Detail Category: Data Protection Authorised By: Full Governing Body Author: School Business Manager Version: 1 Status: Approved May

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review:

Burton Hospitals NHS Foundation Trust. On: 16 January 2014. Review Date: December 2015. Corporate / Directorate. Department Responsible for Review: POLICY DOCUMENT Burton Hospitals NHS Foundation Trust INFORMATION SECURITY POLICY Approved by: Executive Management Team On: 16 January 2014 Review Date: December 2015 Corporate / Directorate Clinical

More information

LSE PCI-DSS Cardholder Data Environments Information Security Policy

LSE PCI-DSS Cardholder Data Environments Information Security Policy LSE PCI-DSS Cardholder Data Environments Information Security Policy Written By: Jethro Perkins, Information Security Manager Reviewed By: Ali Lindsley, PCI-DSS Project Manager Endorsed By: PCI DSS project

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Corporate Affairs Overview and Scrutiny Committee

Corporate Affairs Overview and Scrutiny Committee Agenda item: 4 Committee: Corporate Affairs Overview and Scrutiny Committee Date of meeting: 29 January 2009 Subject: Lead Officer: Portfolio Holder: Link to Council Priorities: Exempt information: Delegated

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

Information Management Policy

Information Management Policy Information Management Policy Document Control Title Organisation Description Author(s) Information Management Policy London Legacy Development Corporation The Information Management Policy describes how

More information

Data Security and Extranet

Data Security and Extranet Data Security and Extranet Derek Crabtree Schools ICT Support Manager derek.crabtree@merton.gov.uk Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Mike Casey Director of IT

Mike Casey Director of IT Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September

More information

ABERDARE COMMUNITY SCHOOL

ABERDARE COMMUNITY SCHOOL ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been

More information

IT ACCESS CONTROL POLICY

IT ACCESS CONTROL POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Enterprise Information Security Procedures

Enterprise Information Security Procedures GHL Network Services Ltd Enterprise Information Security Procedures Prepared By Nigel Gardner Date 16/11/09 1 Contents 1. Openwork s Information Security Policy...3 2. Enterprise Information Security Procedures...3

More information

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has

More information

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

Acceptable Use of Information Systems Standard. Guidance for all staff

Acceptable Use of Information Systems Standard. Guidance for all staff Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

INFORMATION SECURITY MANAGEMENT POLICY

INFORMATION SECURITY MANAGEMENT POLICY INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly.

2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly. 1 Purpose The purpose of this document is to set out the College's policy and provide guidance relating to the responsible use of the College's ICT resources and systems. 2 General 2.1 Belfast Metropolitan

More information

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 OBJECTIVE This Security Plan (the Plan ) is intended to create effective administrative, technical and physical safeguards for the protection

More information

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session Everyone in the workplace has a legal duty to protect the privacy of information about individuals AEP/BELB/LJ/2010 Awareness Session During 2007 alone, 36,989,300 people in the UK have had their private

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

Remote Access and Network Security Statement For Apple

Remote Access and Network Security Statement For Apple Remote Access and Mobile Working Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Remote Access and

More information

TELEFÓNICA UK LTD. Introduction to Security Policy

TELEFÓNICA UK LTD. Introduction to Security Policy TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7 CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Information Security Incident Management Policy and Procedure

Information Security Incident Management Policy and Procedure Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure

More information

Merthyr Tydfil County Borough Council. Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the

More information