STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
|
|
|
- Austen Leonard
- 10 years ago
- Views:
Transcription
1 STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining the circumstances when authorized STFC staff may be granted access to Information Communication Technology (ICT) systems and services for the purposes of monitoring and interception available at: This document should be read in conjunction with the STFC Acceptable Use Policy for ICT systems and services (AUP) available at: This document and its contents were formally endorsed by STFC on 27 June 2012 by the Operations Board following review by the IM&T Strategy and Oversight Committee, IT Operations Board and the Information Security Group. It is effective from 27 June 2012 and supersedes earlier versions. Please check the above web site for any changes or updates. 1. Purpose This policy is designed to: help all individuals (e.g. employees, visitors, contractors, Facilities users, Tenants organisations etc.) understand the circumstances in which it is permissible for STFC to grant authorized access to ICT systems and services for the purposes of monitoring and interception; help maintain the security, integrity and performance of STFC ICT systems and services; help maintain the privacy of communications and data set to and from individuals; help ensure that STFC and individuals users demonstrate effective and appropriate compliance with English law. The policy, any additional supporting standards, process descriptions, guidance, instructions, frequently asked questions (FAQ) etc. are all are published within the STFC Information Security Policy Framework accessible to STFC staff via in.focus. Particularly relevant documentation is highlighted in Annex A. NOT PROTECTIVELY MARKED Page 1
2 2. Scope This Policy applies to all individuals (e.g. employees, visitors, contractors, Facilities users, etc.) and Tenant organisations that make use of STFC ICT systems, services and facilities. It applies to all user accounts, files, communications and/or other data stored on ICT equipment, including any peripheral devices or hardware, used by individuals that make use of STFC ICT systems and services. This Policy applies to all ICT systems and facilities provided either directly or indirectly by the STFC whether accessed from an STFC site or remotely. It also applies to all third party systems which transfer communication and/or other data across STFC provided infrastructures as described in the STFC Network Transit Policy (link to policy in in.focus web site). For the absence of doubt, this policy applies to private and other third party ICT equipment used on STFC networks. 3. Privacy and academic freedom STFC respects the privacy and academic freedom of staff, Tenants and Facilities users. However, STFC may carry out lawful monitoring of ICT systems. Staff, Tenants, Facilities users and any other authorised users should be aware that STFC may access , telephone and any other electronic communications, whether stored or in transit. This is in order to comply with the English law and applicable regulations and to ensure appropriate use of STFC ICT systems and services. All access and monitoring will comply with UK legislation including, but not limited to, the Regulation of Investigatory Powers Act 2000 (RIPA), the Human Rights Act 1998 (HRA) and the Data Protection Act 1998 (DPA). 4. STFC s powers to access communications Authorised STFC staff STFC will put in place processes to identify, train and authorise appropriately trained members of STFC staff so that they implement this policy. Such individuals are known as authorised STFC staff within the context of this policy and will be trained in data protection compliance. Where contractors or other third parties are acting on behalf of STFC, they will be required to demonstrate that they have received the same level of training that would be expected of authorised STFC staff. Until such assurances have been verified and they receive written authorisation, contractors or other third parties should not implement this policy. Once appropriately authorised, within the context of this policy, contractors or other third parties are part of authorised STFC staff. NOT PROTECTIVELY MARKED Page 2
3 Powers of access Authorised STFC staff may access accounts, files and communications, including electronic mail files, stored on any ICT systems, services or facilities owned, managed or maintained (except where the STFC act solely as a service provider for another body) by STFC and may examine the content and relevant traffic data. STFC may access accounts, files and communications for the following reasons: To detect or prevent crime e.g. detecting unauthorised use of systems, protecting against viruses and hackers, fraud investigation etc.; As part of occasional training and quality control exercises e.g. how incoming calls are handled; To assist in maintaining the security, performance, integrity and availability of the ICT systems, services and facilities; To provide evidence e.g. of a commercial transaction, to establish regulatory compliance, audit, debt recovery, dispute resolution; To fix problems reported to the IT Service Desks or which become apparent during routine system administration; To ensure the operational effectiveness of the service. (For example, STFC may take measures to protect the ICT systems from viruses and other threats such as hacking or denial of service attacks.); To establish the existence of facts relevant to the business of the STFC. (For example, where a case of suspected plagiarism is being investigated and there is sufficient evidence to warrant authorised STFC staff examining relevant communications and/or files without the individuals consent. Another example may be checking accounts when staff are absent on holiday or on sick leave to access relevant communications.); To ascertain compliance with regulatory or self-regulatory practices or procedures relevant to STFC business (e.g. to ascertain whether STFC is abiding by its own policies.); To monitor whether or not communications are relevant to the business of STFC. (For example, to check an account to ensure that it is not being misused for personal or private purposes but not to look at the contents of the s unless this is required to confirm the use of the account.); To monitor (but not log) communications to a confidential, free, telephone counselling or support service run by STFC, provided that users are able to remain anonymous if they so choose. This is to enable help-line workers to receive appropriate supervision and support. STFC will publish monitoring statements bringing these reasons to the attention of users. (See Annex B for the Monitoring statement used in the STFC AUP.) NOT PROTECTIVELY MARKED Page 3
4 5. The powers of Law Enforcement Authorities to access communications A number of non-stfc bodies/persons may be allowed access to user communications in certain circumstances. Where STFC is compelled to provide access to communications by virtue of a Court Order or other competent authority, STFC will disclose information to these non-stfc bodies/persons when required as allowed under the Data Protection Act For example, under the Regulation of Investigatory Powers Act 2000 a warrant may be obtained by a number of law enforcement bodies regarding; issues of national security; the prevention and detection of serious crime; safeguarding the economic well-being of the UK. In such circumstances, STFC will provide reasonable assistance with the execution of a lawful warrant. The term authorised persons in this policy refers to authorised STFC staff and relevant Law Enforcement Authorities. 6. Policy on access to communications by others Individuals who are neither authorised STFC staff (see section 4) or working for Law Enforcement Authorities (see section 5) must not access the accounts, files, and communications of any other individual and must only use STFC s facilities in compliance with the STFC Acceptable Use Policy (available at 7. Policy on access to communications by individuals Individuals are allowed access to their own accounts, files and communications in compliance with the STFC Acceptable Use Policy (available at 8. Policy on access to communications by authorised persons Staff Absence / Departure Where a member of staff is absent from work and access is required to that member of staff's account, files or communications for a specific reason (for example to access correspondence in order to complete an item of work), STFC will follow the procedure set out below: If appropriate, the member of staff will be contacted by their line manger and consent sought in writing for access to specific communications and/or files. If given, this consent will passed to authorised STFC staff to facilitate the access. Where consent is not or cannot be given and there is no alternative way to get the required information, permission to access the member (or ex-member) of staff's accounts, files or communications will be sought in writing from authorised STFC staff. Authorisation will only be given for access to specific NOT PROTECTIVELY MARKED Page 4
5 information and not for general access to the accounts, files or communications in question. The person authorised to access the accounts, files or communications is responsible for ensuring that only the specific information authorised is accessed and that other information is not read or disclosed. After the necessary information has been retrieved, any relevant password to the absent member of staff's account(s) will be reset and the new password will be communicated only to that member of staff. See Annex A Staff Absence Process to request access to STFC account, files or communications for more information. Suspected Illegal Behaviour Where circumstances brought to the attention of the STFC Senior Information Risk Owner (SIRO) or the STFC Information Technology Security Officer (ITSO) constitute grounds for reasonable suspicion that an individual is using STFC's ICT Facilities for the commission or attempted commission of a criminal offence, the SIRO or ITSO will contact the police for advice. Based on that advice, the account(s) and any associated hardware or peripheral devices of the individual may be frozen pending further investigation by STFC or the police. See Annex A STFC ICT Investigation Process for more information. Suspect Breach of Terms of Contract of Employment or STFC Regulations Where there are reasonable grounds to suspect that a member of staff is using STFC's ICT systems, services or facilities in breach of the terms of their contract of employment or is in breach of STFC regulations, an internal investigation may commence to establish the facts supporting or refuting the potential allegation. All ICT investigations will follow the STFC ICT Investigation process and be carried out by appropriately authorised STFC staff. Based on the outcome of this initial investigation, appropriate disciplinary process may begin. Where appropriate, the member of staff will be contacted to give consent for access to appropriate accounts, files or communications and information relevant to the investigation. Where it is not appropriate, not possible to inform the member of staff, they are not available to give consent or consent is refused or access is required under section 4, authorisation will be requested from the SIRO and ITSO as described in the STFC ICT Investigation process. All access and monitoring will comply with UK legislation including the Regulation of Investigatory Powers Act 2000, the Human Rights Act 1998 and the Data Protection Act See Annex A STFC ICT Investigation Process for more information. NOT PROTECTIVELY MARKED Page 5
6 9. General Guidance Any authorised access to the accounts, files or communications of an individual will be with as little intrusion and disruption to the communications of third parties that are unconnected to the authorised access as possible. Where possible, access will be granted without the need to share, divulge or reset passwords on user accounts. Any information collected under this Policy will be treated in confidence and will only be examined by those persons who are so authorised. Any information collected under this Policy will only be retained for as long a period as deemed necessary for the specific purpose and in line with STFC's Records Retention Policy. Any information collected under this Policy will be stored securely and will be labelled accordingly depending on the sensitivity of the material in question. Unless any information collected or accessed under this Policy warrants further investigation or ongoing review, the collected information or access to it will be destroyed or revoked after 28 days. Any person collecting or accessing information under this Policy will ensure that they have continued authorisation to implement this policy. Individual authorisations will expire at least annually and on departure from STFC. Where possible, authorised STFC staff collecting or accessing information under this Policy will respect the privacy of files and messages which are marked as 'personal' or 'private' provided it does not impede or frustrate any ICT investigation. This Policy should be read in conjunction with STFC's Communication Policy and with any other relevant sections of STFC's Rules and Regulations as applicable to Facilities users and relevant terms of STFC's conditions of employment (CEMs) as applicable to members of staff. Notes 1) Written authorisation can be given via . NOT PROTECTIVELY MARKED Page 6
7 Annex A Additional Supporting Documentation STFC Acceptable Use Policy STFC Network Transit Policy Staff Absence - Process to request access to STFC accounts, files or communications STFC ICT Investigation Process Requesting Authorisation to access communication (Process) Granting Authorisation to access communication (Process) Annex B Monitoring statement used in the STFC AUP STFC Acceptable Use Policy Monitoring statement The STFC employs monitoring techniques on its ICT systems and services, including and Internet access, to enable usage trends to be identified and to ensure that these facilities are not being misused. Monitoring is limited, as far as practicable, to the recording and analysis of network traffic data. To this end, the STFC keeps logs of calls made on communications equipment such as telephones and fax machine; of s sent by address; and of internet sites visited by computer system address. In some cases, this means that the identity of the individuals involved in the communication is readily available. These logs are not routinely monitored on a continuous basis but spot-checks are carried out from time to time to help ensure compliance with this policy. Further authorised investigations may be necessary where there is reasonable suspicion of misuse of facilities. Since the STFC owns and is liable for data held on its communications equipment and systems, it reserves the right, as part of such investigations, to inspect the contents of any e- mails or any other form of communications that are sent or received and of Internet sites accessed, for compliance with this policy. This will only be done where the volume of traffic or the amount of material being downloaded is excessive, or there are grounds to suspect that use is for unacceptable or forbidden activities. Exceptionally, where there is a defined and valid reason for doing so, the inspection of contents may include items marked private or personal. Individuals and voic accounts may also be accessed by management when they are absent from work to ensure official business matters can be effectively dealt with. Monitoring/investigations of individuals use of the STFC communications systems may also happen in the following circumstances: To detect or prevent crime e.g. detecting unauthorised use of systems, protecting against viruses and hackers, fraud investigation etc. As part of occasional training and quality control exercises e.g. how incoming calls are handled. To assist in maintaining the security, performance, integrity and availability of the ICT systems, services and facilities. NOT PROTECTIVELY MARKED Page 7
8 To provide evidence e.g. of a commercial transaction, to establish regulatory compliance, audit, debt recovery, dispute resolution. Where monitoring is used, only STFC staff trained in data protection compliance will investigate the recorded data. Confidentiality will be ensured for all investigations involving personal data, except to the extent that wider disclosure is required to follow up breaches, to comply with court orders or to facilitate criminal investigation. Logged data will not normally be retained for more than one year unless required by regulatory compliance. In addition, members of the STFC Information Security Group (ISG), IT Security Team and Network Security Group will conduct random audits on the security of the Council s ICT systems. These audits include examination of a small, randomly selected set of desktop and server systems. The audit checks that these systems have correctly licensed software, do not contain inappropriate material and have not been used to access or view inappropriate material that may violate the STFC AUP. Where monitoring reveals instances of suspected misuse of the STFC ICT systems (e.g. where pornography or other inappropriate material is found, or where substantial timewasting or other unacceptable/forbidden use is found), they will be investigated through the disciplinary procedures and may lead to summary dismissal. Personal files, documents and s To help safeguard their privacy it is suggested that individuals mark any personal s they send with the word Personal or Private in the subject line and to ask those they correspond with to similarly mark any personal s being sent. Personal files, documents and s can be stored in STFC ICT systems provided they are in a folder clearly marked as Personal or Private. Note that STFC s corporate electronic document or record management facilities (ERMS) do not include a facility for personal data so should not be used for this. Where possible, staff monitoring or inspecting the STFC IT and communications systems will respect s and folders which are marked Personal or Private. -End - STFC, June 2012 NOT PROTECTIVELY MARKED Page 8
INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes
INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Information Management and Security Policy
Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012
Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
SOUTH DAKOTA BOARD OF REGENTS. Policy Manual
SOUTH DAKOTA BOARD OF REGENTS Policy Manual SUBJECT: Acceptable Use of Information Technology Systems NUMBER: 7:1 1. Purpose The Board acquires, maintains and operates information technology systems to
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Information Technology and Communications Policy
Information Technology and Communications Policy No: FIN-IT-POL-001 Version: 03 Issue Date: 10.06.13 Review Date: 10.06.16 Author: Robert Cooper Monitor Changes Approved by: Board of Governors Version
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Electronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Ulster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title IT Monitoring Policy 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information Services
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
Corporate Information Security Management Policy
Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
The Bishop s Stortford High School Internet Use and Data Security Policy
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.
Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
PS 172 Protective Monitoring Policy
PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
Email Services Policy
Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY
INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:
Acceptable Use of Information and Communication Systems Policy
Use of Information and Communication Systems Policy Purpose of this document This document describes what is acceptable and what is unacceptable use of the company s systems. It has been prepared to help
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 EUROPEAN COMMUNITIES (ELECTRONIC COMMUNICATIONS NETWORKS AND SERVICES) (PRIVACY AND ELECTRONIC COMMUNICATIONS) REGULATIONS 2011 (Prn. A11/1165) 2 [336] S.I.
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Assistant Director of Facilities
Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Parliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
Monitoring Employee Communications: Data Protection and Privacy Issues
Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE
1. DISCLAIMER NOTICE UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE The information provided by UGANDA REVENUE AUTHORITY (URA) on the web portal relating to products and services (or
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Information Security and Governance Policy
Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
AP 417 Information and Communication Services
AP 417 Information and Communication Services Background Access and use of information and communication services (ICS) are an integral component of the learning and working environment. The ability for
