PROJECT INITIATION DOCUMENT
|
|
|
- August Rice
- 10 years ago
- Views:
Transcription
1 PROJECT INITIATION DOCUMENT Project name Seamless Flow: Management and Security Release Date: February Author: Owner: Client: Project Manager Senior Responsible Owner (SRO) The National Archives (TNA) Web Pages
2 security_pid.doc Date: Feb Document History Document Location This document is only valid on the day it was printed. The source of the document will be found in the Control section of the Project File. Revision History Revision date 27 Jan 28 Jan 07 Feb 09 Feb 10 Feb 15 Feb 18 Feb 02 Mar 16 Mar Date of next revision: Revision Summary of Changes Changes version marked 0.1 Initial draft No 0.2 Small modifications and additions No 0.3 Updated following comments by project team and Programme Manager. No 0.4 Updated to include record authenticity No definitions. 0.5 Updated to clarify project scope and include No new team members 0.6 Updated to include ideas by IT Project No Manager 0.7 Small tweaks following comments on 0.6 No 0.8 Split out previous stage 1 as a sub-project No 0.9 Added in details of accreditation programme in IT Department No Approvals This document requires the following approvals. Signed approval forms are filed in the project files. Name Signature Title Date of Issue Senior Responsible Owner (SRO) Programme Manager Director of Government and Technology Version Distribution This document has been distributed to: Name Title Date of Issue Version Web Pages 1
3 security_pid.doc Date: Feb Project team Seamless Flow Project Managers Seamless Flow Project Managers Senior Responsible Owner January February February March Purpose To define the Management and Security project within the Seamless Flow programme, to form the basis for its management and the assessment of overall success. Contents This publication contains the following topics: Topic See Page Background 2 Project definition 3 Project organisation structure 7 Communication Plan 7 Project Quality Plan 8 Project tolerances 9 Project controls 9 Background The transfer, storage, preservation and presentation of electronic records over time raises a number of security and management issues. These include record handling principles, security classifications, access controls, record integrity, digital redaction and record authenticity. The Seamless Flow (SF) programme has created several sub-projects to design and build processes and systems to handle electronic records at different stages of their lifecycle. The Management and Security project has been formed to provide policy and guidance on the application of best-practice record handling principles and appropriate security controls consistently across the records lifecycle from selection onwards. Web Pages 2
4 security_pid.doc Date: Feb Project Definition Project objectives The Management and Security (M&S) Project is intended to build public and institutional trust in the presumption of authenticity of the digital record holdings of the National Archives. It will provide advice and guidance conforming to agreed international standards to the Seamless Flow programme and its sub-projects to help ensure that digital records are managed appropriately across their lifecycle from selection onwards in a manner consistent with their security classification. Defined method of approach The M&S project is divided into 3 stages and one sub-project The 3 stages of the main project will provide assistance and guidance to the Seamless Flow programme on handling digital records at current security levels. The sub-project will look at the impact of taking records at Classified or Secret levels, and is defined in the document Protectively Marked Records Project Brief. Stage 1 Feb Stage 1 will work with the other Seamless Flow projects to define immediate and practical black box record authenticity statements for each project, to enable them to move forward in planning with confidence. Authenticity requirements will vary by the nature of the work of each project and will only concern themselves with a short authenticity statement for each project, outlining the conditions necessary to support the presumption of record authenticity, in terms of any records input, processed or output by that project. Stage 2 Feb June Stage 2 will provide policy and any consequent implementation guidance to the Seamless Flow programme and its sub-projects in the areas of management and security over the records lifecycle from selection onwards, in order that they can plan appropriately. In some cases security or management requirements might dictate the use of particular architectural solutions (e.g. the use of an air-gapped system). It will focus on handling records at current levels of security classification, but will attempt to produce deliverables that are generally applicable, where possible: Unclassified Restricted Web Pages 3
5 security_pid.doc Date: Feb Stage 3 June to end of Seamless Flow Programme Stage 3 will: Provide ongoing guidance to the other projects during the Seamless Flow programme Regularly review progress to ensure that changes in the programme, projects and operating environments are fed back into management and security policy and requirements. Project scope The M&S project will be responsible for management and security issues associated with the records and the processes of seamless flow. This project will include the following activities: Reviewing options for accepting higher levels of record security classification (Confidential and Secret) Ensuring records are de-classified as necessary Provision of good assurance as to the authenticity of a digital record Ensuring that information security policies and controls are sufficiently specified to meet the needs of long term electronic records handling at The National Archives (TNA) Ensuring that records management policies and controls are sufficiently specified to meet the needs of long term electronic records handling at TNA Ensuring that technical architectures and systems are accredited to government information security standards Provision of technical and architectural constraints to other projects in the Seamless Flow that follow from information security or records management principles Ensuring provision of suitable access control system for users of applications Provide guidance on Information legislation and its impact on records handling Web Pages 4
6 security_pid.doc Date: Feb Project deliverables Reports Impact assessment of handling higher levels of security classification Policies Statements in support of the presumption of record authenticity for each stage of a record s archival lifecycle from selection onwards Electronic records handling policy a high level statement of general electronic records handling principles Security policy a high level statement of the security requirements for electronic records in the Seamless Flow programme Access control policy a high level statement of access control policy for digital records Analyses Access control model, taking account of access by TNA staff, systems, other government departments (OGDs), and public access Disaster recovery and business continuity requirements Technical requirements Architectural and technical requirements, derived from the analyses Accreditation of systems and networks to government information security standards Specific guidance Digital redaction guidance Implementation guidance where needed for specific controls recommended by the threat analysis Other guidance may be produced on a case-by-case basis if specific areas of the Seamless Flow programme require specific input from the M&S project Exclusions Assuring and enforcing compliance with M&S policy and technical constraints by other projects in TNA is not the function of the M&S project, although help and guidance will be made available. Compliance must be seen in the overall context of TNA wide audit of systems, policies and procedures. Constraints Stages 1 and 2 of the project will focus on handling current levels of record security classification (not above Restricted), due to the immediate planning dependencies of other projects. Web Pages 5
7 security_pid.doc Date: Feb Interfaces The project involves specifying high level policies and architectural constraints across the Seamless Flow programme. The Programme interfaces with a large range of current internal and external programmes, work packages and services. It will build upon these existing initiatives to create a seamless flow process. These are: Internal programmes/work packages Selection and appraisal Records Management Department (RMD) Identification of exemptions and redaction if required - RMD Access Regulation System (SAR) - RMD Transfer of records to TNA - RMD/Digital Preservation (DPD) Loading records into preservation system - DPD Redaction of exempt pieces SAR, DPD Technology watch (PRONOM file format database) - DPD Metadata (e-gif) - RMD Resource discovery and Cataloguing and editorial (Catalogue/PROCAT, Web Site Search, Metadata, CMS, Digital Asset Management System) RMD, Online Content & Partnership Development Department (OCPD) Preservation and migration (PRONOM) DPD Infrastructure Enhancement programme Information Communication & Technology Department (ICTD) High Availability programme (24 x 7 project) Digital Archive/Online Catalogue (PROCAT) interfacing Digital Archive large accessions project TRIM/e-Accessioning Digital Archive Presentation System (DAP) Record Copying Workflow Public Services Development Programme Consumer focus programme Business continuity plan Government Programmes and Initiatives Freedom of Information and Legislation Government Secure Intranet - GSI Central Government Infrastructure, e-gif and e-gms Government security bodies, including CESG, CSIA, NISCC External Programmes/Services National Digital Archive of Datasets (NDAD) Internet Archive/JISC, Wellcome, National Libraries project Reference models OAIS, Research Library Group (RLG) Trusted Digital Repositories Government security suppliers (e.g. Energis, the supplier of GSI) Assumptions Resource, both in terms of staff time, and, if necessary, budget for outside assistance, will be available to carry out the program of work. Web Pages 6
8 security_pid.doc Date: Feb Project organisation structure This project/work stream is undertaken by a small team and will not have a formal project board but will report directly to the Programme Board via the Programme Manager. Communication Plan Audience Information Owner Frequency Method Programme Project Manager Every two Board months Programme Manager Team members Other Seamless Flow Projects Progress against time, quality and budget; risks and issues Progress, impacts, issues and risks Presentation; highlight report, risk and issues logs, plan Project Manager Weekly Meeting; highlight reports, issues and risk logs for projects and integration Progress Project Manager Weekly until stage 4, then as required Security and management constraints and guidance Project Manager End of stage 2, Stage 3 milestones and end, then as required Meeting and Meeting and Web Pages 7
9 security_pid.doc Date: Feb Project Quality Plan Customer Quality Requirements Acceptance Criteria Quality Responsibilities The project quality plan defines the quality techniques and standards to be applied to the work and the various responsibilities for achieving the required quality levels. Records selected for preservation at TNA are reliable Good assurance of presumption of authenticity for digital records from selection onwards Other Seamless Flow projects receive the management and security advice that they need to proceed The project manager is responsible for ensuring the quality of the products produced. Ensuring the quality of implementation of advice produced by this project by other projects or groups within TNA is the responsibility of the programme or TNA as appropriate. Standards The project will conform to appropriate Government and internal TNA standards to cover: project management (PRINCE2) system design Unified Modelling Language (UML) system development (TNA software development standards) data interchange and management (egif, egms) information security (ISO 17799) archival standards (BS5454) It will also take input from emerging standards and reference models in the field of digital archiving, such as the Trusted Digital Repositories (RLG) and the Open Archives Information System (OAIS) Digital Archiving model. Quality Control and Audit Procedures Configuration Management Plan The programme and projects will be subject to the following controls: TNA to be audited by auditors appointed under RLG scheme Process to include rigorous integrity tests for electronic records All products will undergo peer review and formal sign off The programme will be subject to the Gateway Review process TNA internal audit will review the programme at appropriate stages Configuration management will be managed through use of the Electronic Records Document Management System (ERDMS) Objective. Web Pages 8
10 security_pid.doc Date: Feb Change Management Process A formal process for managing change will be identified so that interaction between projects can be monitored appropriately. All changes will be raised as Request for Change (RFCs), reviewed by the originating project team and board where this exists. This will then be passed to the Programme Manager to assess for cross project impact and to take to the Programme Board for acceptance as necessary. Project tolerances Timescales are to be sufficient to meet requirements of interacting projects. Currently there are no direct capital costs associated with the project. Tolerance for delivery of products is 2 weeks. Project controls Project will be managed using the PRINCE2 methodology This project will not have a formal project board. It is deemed a work stream and will report directly to the Programme Board. The project manager will hold weekly Checkpoint meetings with the team during Stage 3 and as appropriate for other stages. A formal highlight report on progress will be produced for the Programme manager each month. The project manager will attend weekly meetings with the Programme Manager to report on progress to date, targets for next period, status of issues and risks. Web Pages 9
The Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS
PRIORITY RECOMMENDATIONS R1 BIS to elevate the profile of information risk in support of KIM strategy aims for the protection, management and exploitation of information. This would be supported by: Establishing
PROJECT INITIATION DOCUMENT (PID)
the national archives PROJECT INITIATION DOCUMENT (PID) Project name Our Future Catalogue - Phase 1 Release Release 1.0 Date: 17-July-2009 Authors: Owner: Client: Oliver Morley The National Archives Document
Ex Libris Rosetta: A Digital Preservation System Product Description
Ex Libris Rosetta: A Digital Preservation System Product Description CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result
Interagency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
GCloud Application Development Service Definition. Application Development
GCloud Service Definition GCloud Service Definition Contents 1.... 3 1.1. Overview... 3 1.2. Information Assurance... 6 1.3. Backup / Restore / Disaster Recovery... 6 1.4. On-boarding and Off-boarding
Information and records management. Purpose. Scope. Policy
Information and records management NZQA Quality Management System Policy Purpose The purpose of this policy is to establish a framework for the management of corporate information and records within NZQA.
Response to Invitation to Tender: requirements and feasibility study on preservation of e-prints
Response to Invitation to Tender: requirements and feasibility study on preservation of e-prints A proposal to the JISC from the Arts and Humanities Data Service and the University of Nottingham, Project
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Records Management Policy Version 4.0 Page 1 of 11 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: File Location: Approval
National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation
National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation National Statistics Code of Practice Protocol on Data Management, Documentation and Preservation London:
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER
LORD CHANCELLOR S CODE OF PRACTICE ON THE MANAGEMENT OF RECORDS UNDER SECTION 46 OF THE FREEDOM OF INFORMATION ACT 2000 NOVEMBER 2002 Presented to Parliament by the Lord Chancellor Pursuant to section
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Service Management Policy
Service Management Policy XIT-POL-006 Policy - PUBLIC- Author Jan Pavel Version 1.4 Status Reviewed by Approved by Responsible Final Tomas Kucera Tomas Kucera Pavel JANÁK Valid from 9.6.2010 Scope Whole
Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription
Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription Deliverable: Work Package Document WP3.7 D.3.7.2. FINAL
IPL Service Definition - Master Data Management for Cloud Related Services
IPL Proposal April 2014 IPL Service Definition - Master Data Management for Cloud Related Services Project: Date: 10 April 2014 Issue Number: Customer: Crown Commercial Service Page 1 of 11 IPL Information
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010
Public Record Office Victoria PROS 10/10 Strategic Management Guideline 5 Records Management Strategy Version Number: 1.0 Issue Date: 19/07/2010 Expiry Date: 19/07/2015 State of Victoria 2010 Version 1.0
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
OFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
sdsys THAGORAS SCISYS UK LTD The National Archives Customer Relationship Management System and Integrated Email Marketing Solution RESPONSE TO TENDER
sdsys THAGORAS SCISYS UK LTD The National Archives Customer Relationship Management System and Integrated Email Marketing Solution RESPONSE TO TENDER The National Archives Redacted under! IFOI exemption
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT
FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 CODE OF PRACTICE ON RECORDS MANAGEMENT November 2003 Laid before the Scottish Parliament on 10th November 2003 pursuant to section 61(6) of the Freedom of Information
Retained Fire Fighters Union. Introduction to PRINCE2 Project Management
Retained Fire Fighters Union Introduction to PRINCE2 Project Management PRINCE2 PRINCE stands for: PRojects IN Controlled Environments and is a structured method which can be applied to any size or type
Maturity Model. March 2006. Version 1.0. P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce
Maturity Model March 2006 Version 1.0 P2MM Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value Added product which is outside the scope of the HMSO
RECORDS MANAGEMENT POLICY
Reference number RM001 Approved by Information Management and Technology Board Date approved 23 rd November 2012 Version 1.1 Last revised July 2013 Review date May 2015 Category Records Management Owner
This document is no longer current. Please go to the following URL for more information:
This document is no longer current. Please go to the following URL for more information: http://www.nationalarchives.gov.uk/electronicrecords/default.htm e-government Policy Framework for Electronic Records
SCHEDULE 8 Generalist Project Services Framework 2015
SCHEDULE 8 Generalist Project Services Framework 2015 Nominal Insurer And Schedule 8 (Project Services Framework) Page: 1 of 6 Schedule 8 Generalist Project Services Framework Contents Overview... 3 1.
Information Management Policy
Title Information Management Policy Document ID Director Mark Reynolds Status FINAL Owner Neil McCrirrick Version 1.0 Author Deborah Raven Version Date 26 January 2011 Information Management Policy Crown
Scope The data management framework must support industry best practice processes and provide as a minimum the following functional capability:
Data Management Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for data management across Redland City Council (RCC). This document will provide direction and
Prince 2 Health Check
Prince 2 Health Check Start-up Was there a Project Mandate? Was the Project Board designed/appointed before initiation was authorised? Was a Project Brief produced? Is the Project Brief to PRINCE standards?
Embedding Digital Continuity in Information Management
Embedding Digital Continuity in Information Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Information Management Strategy. July 2012
Information Management Strategy July 2012 Contents Executive summary 6 Introduction 9 Corporate context 10 Objective one: An appropriate IM structure 11 Objective two: An effective policy framework 13
1. Background and business case
1. Background and business case This section explains the context and why the project is being undertaken. It provides the justification for investing the time and resources in the project. 1.1 Reasons
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
REPORT OF: DIRECTOR OF DEMOCRATIC AND LEGAL SERVICES 13/358 WARDS AFFECTED: ALL
REPORT TO CABINET TO BE HELD ON 15 OCTOBER 2013 A ITEM Key Decision YES or NO Forward Plan Ref No Corporate Priority All Cabinet Portfolio Holder Cllr Jane Kenyon REPORT OF: DIRECTOR OF DEMOCRATIC AND
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
MODEL ACTION PLAN FOR DEVELOPING RECORDS MANAGEMENT ARRANGEMENTS COMPLIANT WITH THE CODE OF PRACTICE ON RECORDS MANAGEMENT
MODEL ACTION PLAN FOR DEVELOPING RECORDS MANAGEMENT ARRANGEMENTS COMPLIANT WITH THE CODE OF PRACTICE ON RECORDS MANAGEMENT UNDER SECTION 61 OF THE FREEDOM OF INFORMATION (SCOTLAND) ACT 2002 November 2003
Guidance for managing your records effectively (1)
LINCOLNSHIRE COUNTY COUNCIL Information Governance Guidance for managing your records effectively (1) Document reference: IG.002 Operational date: June 2011 Policy prepared by: Christopher Johnson Policy
Records Management Policy
Records Management Policy Responsible Officer Chief Operating Officer Approved by Vice-Chancellor Approved and commenced April, 2014 Review by April, 2017 Relevant Legislation, Ordinance, Rule and/or Governance
Records Management Policy
Records Management Policy Document Number SOP2006-073 File No. 07/7 Date issued 1 September 2006 Author Branch Records and Mail Services Unit Branch contact 9320.7722 Division Finance & Data Services Summary
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Polish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
Corporate Records Management Policy
Corporate Records Management Policy Introduction Part 1 Records Management Policy Statement. February 2011 Part 2 Records Management Strategy. February 2011 Norfolk County Council Information Management
Growth Through Excellence
Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...
Complying with the Records Management Code: Evaluation Workbook and Methodology
Complying with the Records Management Code: Evaluation Workbook and Methodology Page 1 of 110 Crown copyright 2006 First edition published February 2006 Author: Richard Blake The National Archives Ruskin
The challenges of becoming a Trusted Digital Repository
The challenges of becoming a Trusted Digital Repository Annemieke de Jong is Preservation Officer at the Netherlands Institute for Sound and Vision (NISV) in Hilversum. She is responsible for setting out
Public Records (Scotland) Act 2011. Healthcare Improvement Scotland and Scottish Health Council Assessment Report
Public Records (Scotland) Act 2011 Healthcare Improvement Scotland and Scottish Health Council Assessment Report The Keeper of the Records of Scotland 30 October 2015 Contents 1. Public Records (Scotland)
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
Digital Preservation Strategy, 2012-2015
Digital Preservation Strategy, 2012-2015 Preface This digital preservation strategy sets out what the National Library of Wales (NLW) intends to do to preserve digital materials over the next three years.
Business Continuity Management
Business Continuity Management Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)
(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002) 1. Approval and Authorisation Completion of the following signature blocks signifies
Standard. Information Security - Information Classification. Jethro Perkins. Information Security Manager. Page 1 of 12
Standard Information Security - Information Classification Jethro Perkins Information Security Manager Page 1 of 12 Document control Distribution list Name Title Department Nick Deyes Director of Information
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
EPSRC Research Data Management Compliance Report
EPSRC Research Data Management Compliance Report Contents Introduction... 2 Approval Process... 2 Review Schedule... 2 Acknowledgement... 2 EPSRC Expectations... 3 1. Awareness of EPSRC principles and
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services
Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
Implementing an Electronic Document and Records Management System. Checklist for Australian Government Agencies
Implementing an Electronic Document and Records Management System Checklist for Australian Government Agencies Acknowledgments The checklist for implementing an electronic document and records management
G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification
G-Cloud Service Description Atos: Cloud Professional Services: Requirements Specification Atos, the Atos logo, Atos Consulting, Atos Worldline, Atos Sphere, Atos Cloud, Atos Healthcare (in the UK) and
Clinical Risk Management: Agile Development Implementation Guidance
Document filename: Directorate / Programme Document Reference NPFIT-FNT-TO-TOCLNSA-1306.02 CRM Agile Development Implementation Guidance v1.0 Solution Design Standards and Assurance Project Clinical Risk
Enterprise Content Management and Alfresco
ECM and Alfresco 1 Enterprise Content Management and Alfresco Compiled by Russ Danner Architect, Christian Science Publishing Society [email protected] Copyright 2006 Licensed under the Mozilla Public License
Information Governance Strategy
Information Governance Strategy ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Introduction Agencies have systems which hold business information, such as
Earth Science Academic Archive
Earth Science Academic Archive The Principles of Good Data Management The National Geoscience Data Centre British Geological Survey, Keyworth, Nottingham, NG12 5GG Contents Purpose of this guide 1 What
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
How To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
Records Management plan
Records Management plan Prepared for 31 October 2013 Audit Scotland is a statutory body set up in April 2000 under the Finance and Accountability (Scotland) Act 2000. We help the Auditor General for Scotland
Project Management Toolkit Version: 1.0 Last Updated: 23rd November- Formally agreed by the Transformation Programme Sub- Committee
Management Toolkit Version: 1.0 Last Updated: 23rd November- Formally agreed by the Transformation Programme Sub- Committee Page 1 2 Contents 1. Introduction... 3 1.1 Definition of a... 3 1.2 Why have
Digital preservation policy
Digital preservation policy City of London Culture, Heritage and Libraries Department London Metropolitan Archives Contents Digital preservation policy... 1 Contents... 2 Vision statement... 3 Policy...
Information Management Policy CCG Policy Reference: IG 2 v4.1
Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control
Table of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2
Table of Contents Chapter Subject Page No. 1. Introduction 1 2. Objective 1 3. E-mail Use Compliance 1 4. Definitions 2 5. Roles and Responsibilities 2 6. Creation and Use of E-mails 3 7. Managing E-mails
Argyll and Bute Council. Information Management Strategy 2014-2018
Argyll and Bute Council Information Management Strategy 2014-2018 Version 1.3 November 2014 $Hcxs4vps.Docx INDEX 1. INTRODUCTION... 3 1.1 Purpose of the Document... 3 2. INFORMATION MANAGEMENT OVERVIEW...
P-01 Certification Procedure for QMS, EMS, EnMS & OHSAS. Procedure. Application, Audit and Certification
Procedure Application, Audit and Certification Document No. P-01 Version 9.00 Date of Issue Nov 02, 2015 Reviewed & Approved by Name Designation Signature Date Kaushal Goyal Managing Director Nov 02, 2015
Enforcement Operations. Module Db. Technical Solution
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
Management of Official Records in a Business System
GPO Box 2343 ADELAIDE SA 5001 Tel (08) 8204 8773 Fax (08) 8204 8777 DX:467 [email protected] www.archives.sa.gov.au Management of Official Records in a Business System October 2011 Version
Implementing an Electronic Document and Records Management System. Key Considerations
Implementing an Electronic Document and Records Management System Key Considerations Commonwealth of Australia 2011 This work is copyright. Apart from any use as permitted under the Copyright Act 1968,
Records Management: NHS Code of Practice. Part 1
Records Management: NHS Code of Practice Part 1 DH INFORMATION READER BOX Policy HR/Workforce Management Planning Clinical Document Purpose Estates Performance IM & T Finance Partnership Working Best Practice
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance
Best Practices for Long-Term Retention & Preservation Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted
Information Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
An Approach to Records Management Audit
An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:
