NETWORK SECURITY POLICY
|
|
|
- Gwenda Strickland
- 10 years ago
- Views:
Transcription
1 NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14
2 Review and Amendment Log / Control Sheet Responsible Officer: Lead: Author: Chief Officer Pat Patrice Karen Van-Hes, IG Specialist, YHCS Date Approved: December 2014 Committee: Governance and Corporate Affairs Committee Version: 0.2 Review Date: August 2016 Version History Version no. Date Author Description Circulation August IG Specialist, Initial Draft 2014 YHCS 0.2 December 2014 IG Specialist, YHCS Approved Page 2 of 14
3 Contents Paragraph Page 1 Introduction 4 2 Aims 4 3 Scope 4 4 Accountability 5 5 Definition of Terms 7 6 Key Principles and Procedures 7 7 Training 12 8 Implementation and Dissemination 12 9 Monitoring Compliance and Effectiveness of the Policy and Framework Associated documents References Equality Impact Assessment 14 Page 3 of 14
4 Network Security Policy 1. INTRODUCTION 1.1 This Network Security Policy sets out the NHS North Kirklees CCG s overall approach to the maintenance of the integrity, confidentiality and availability of its information technology infrastructure and sets out the responsibilities for ensuring compliance with this guidance. 1.2 The policy forms part of the overall CCG approach to Information Governance and should be read in conjunction with the organisation s other Information Governance and security policies and procedures. 2. AIMS 2.1 The aim of this policy is to ensure that all staff understand their obligations with regard to the network infrastructure and the acceptable use of information technology equipment and systems which they come into contact with in the course of their work. It also provides assurance to the Governing Body that such systems are maintained and used legally, securely, efficiently and effectively. 2.2 The CCG will establish, implement and maintain procedures linked to this policy to ensure compliance with the requirements of Data Protection Act 1998, Records Management Guidance, Information Security Guidance and other related legislation and guidance, contractual responsibilities and to support the assurance standards of the Information Governance Toolkit. These standards are: Information Governance Management Confidentiality and Data Protection Assurance Information Security Assurance Clinical Information Assurance 2.3 This policy will ensure the networks used by the CCG: Are available when and where required Are secure at all times Retain their integrity Are protected from unauthorised or accidental modification Are designed and maintained to preserve confidentiality Protect information assets 3 SCOPE 3.1 This policy must be followed by all staff who work for or on behalf of the CCG including those on temporary or honorary contracts, secondments, volunteers, pool staff, Board members, students and Yorkshire and Humber Commissioning Support (YHCS) staff working for and behalf of the CCG. The policy is applicable to all areas of the organisation and Page 4 of 14
5 adherence should be included in all contracts for outsourced or shared services. There are no exclusions. 3.2 This policy applies to: All networks to which the organisation has access for: The storage, sharing and transmission of non-clinical data and images The storage, sharing and transmission of clinical data and images Printing or scanning non-clinical or clinical data and images The provision of Internet systems for receiving, sending and storing nonclinical or clinical data and images The provision of remote access to internal systems via secure access routes 3.2 Information Security within an independent contractor s premises is the responsibility of the owner/partners. However, the CCG is committed to supporting independent contractors in their management of information risk and will provide advice, share best practice and provide assistance when appropriate. 4. ACCOUNTABILITY 4.1 Governing Body The Governing Body is accountable for ensuring that the necessary support and resources are available for the effective implementation of this Policy. 4.2 Governance and Corporate Affairs Committee The Governance and Corporate Affairs Committee is responsible for the review and approval of this policy, related work plans and procedures and will receive regular updates on compliance and any related issues or risks. 4.4 Accountable Officer The Chief Officer is the Accountable Officer of the CCG and has overall accountability and responsibility for Information Governance and Security and is required to provide assurance, through the Annual Governance Statement that all risks to the CCG, including those relating to confidentiality and data protection, are effectively managed and mitigated. 4.5 Senior Information Risk Owner The Chief Officer is the Senior Information Risk Owner (SIRO) and has organisational responsibility for all aspects of risks associated with Information Governance and Security, including those relating to confidentiality and data protection. Page 5 of 14
6 4.6 Caldicott Guardian The Caldicott Guardian for the CCG is Dr Deborah Turner. The Caldicott Guardian plays a key role in ensuring that the CCG satisfies the highest practical standards for handling patient identifiable information. 4.7 Information Governance Lead The senior level Information Governance (IG) lead for the CCG is the Governance and Corporate Affairs Senior Manager. The IG Lead is responsible for ensuring effective management, accountability, compliance and assurance for all aspects of Information Governance and Security and for liaising with the Information Technology Helpdesk and the Information Governance Team from Yorkshire and Humber Commissioning Support (YHCS) who provide agreed support to the CCG. 4.8 Information Asset Owners and Administrators Information Asset Owners (IAO) are directly accountable to the SIRO and must provide assurance that information risk is being managed effectively in respect of the information assets that they are responsible for and that any new or changes introduced to their business processes and systems undergo a privacy impact assessment. An Information Asset Administrator (IAA) will have delegated responsibility for the operational use of an Asset. 4.9 Heads of Service Heads of Service are responsible for ensuring that they and their staff are familiar with this policy and its associated guidance. They must ensure that any breaches of the policy are reported, investigated and acted upon. Line Managers must ensure that the IT Help Desk is promptly notified when new accounts are required or staff leave the organisation Employees Network Security compliance is an obligation for all staff. Staff should note that there is a Non-Disclosure of Confidentiality Information clause in their contract and that they are expected to participate in induction training, annual refresher training and awareness raising sessions carried out to inform/update staff on information governance and security issues. Any breach of confidentiality, inappropriate use of health, business or staff records or abuse of computer system is a disciplinary offence, which could result in dismissal or termination of your employment contract, and must be reported to the SIRO and (in the case of health or social care records) the Caldicott Guardian. All employees are personally responsible for compliance with the law in relation to computer use and misuse, Data Protection and Confidentiality. Page 6 of 14
7 The organisation will ensure that all users of the network are provided with the necessary security guidance, awareness and where appropriate training to discharge their security responsibilities. Users must ensure that they protect the network from unauthorised access. They must log off the network when finished working. The organisation operates a clear screen policy that means that users must ensure that any equipment logged on to the network must be protected if they leave it unattended, even for a short time. Workstations must be locked if a workstation is left unattended for a short time. All users have a responsibility to safeguard hardware, software and information in their care and prevent the introduction of malicious software to the organisation s systems Yorkshire and Humber Commissioning Support (YHCS) The CCG contracts with YHCS for the supply of Information Technology Systems and Networks and support. 5. DEFINITION OF TERMS The words used in this policy are used in their ordinary sense and technical terms have been avoided. 5.1 The network is a collection of communication equipment such as servers, computers, printers, switches, hubs and routers, which have been connected together. The network is created to share data, software, and peripherals such as printers, photocopiers, Internet connections, connections, CDROM and tape drives, hard disks and other data storage equipment. 6. KEY PRINCIPLES AND PROCEDURES 6.1 Risk Management The Information Technology provider (YHCS) will carry out security risk assessments in relation to all the business processes covered by this policy as part of business continuity and disaster recovery planning. These risk assessments will cover all aspects of the network that are used to support business processes. The risk assessment will identify the appropriate security countermeasures necessary to protect against possible breaches in confidentiality, integrity and availability Risk assessments will be conducted to ensure the networks conforms to ISO27001 Page 7 of 14
8 Risk assessments will be conducted to determine the ITSEC Assurance levels required for security barriers that protect the network 6.2 Physical & Environmental Security Network computer equipment will be housed in a controlled and secure environment. Critical or sensitive network equipment will be housed in an environment that is monitored for temperature, humidity and power supply quality Critical or sensitive network equipment will be housed in secure areas, protected by a secure perimeter, with appropriate security barriers and entry controls The Head of Information Technology (IT) is responsible for ensuring that door lock codes are changed periodically, following a compromise of the code, if s/he suspects the code has been compromised, or when required to do so by the Chief Information Officer Critical or sensitive network equipment will be protected from power supply failures by the use of UPS devices Critical or sensitive network equipment will be protected by intruder alarms and fire suppression systems Smoking, eating and drinking is forbidden in areas housing critical or sensitive network equipment. All visitors to secure network areas must be authorised by the Head of IT or the relevant Network Support Manager for that patch. All visitors to secure network areas must be made aware of network security requirements All visitors to secure network areas must be logged in and out. The log will contain name, organisation, purpose of visit, date, and time in and out The Head of IT or Network Support Manager will ensure that all relevant staff are made aware of procedures for visitors and that visitors are escorted, when necessary Entry to secure areas housing critical or sensitive network equipment will be restricted to those whose job requires it. The Head of IT will maintain and periodically review a list of those with unsupervised access 6.3 Access Control to the Network Access to the network will be via a secure log-on procedure, designed to minimise the opportunity for unauthorised access. Remote access to the network has to be technically implemented but will be rolled out with a remote access policy and home working/mobile working procedures as deemed appropriate There is a formal, documented user registration and de-registration procedure for access to the network. Forms for new user, changes and leavers are available on the Intranet Line managers and the Network Support Manager/Head of IT must approve user access Page 8 of 14
9 Access rights to the network will be allocated on the requirements of the user's job, rather than on a status basis Security privileges (i.e. 'super user' or network administrator rights) to the network will be allocated on the requirements of the user's job, rather than on a status basis Access will not be granted until the Network Support Manager, IT Helpdesk, or Head of IT registers a user All users to the network will have their own individual user identification and password Users are responsible for ensuring their password is kept secret User access rights will be immediately removed or reviewed for those users who have left the organisation or changed jobs 6.4 Third Party Access Control to the Network Third party access to the network will be based on a formal contract that includes a standard clause which satisfies all necessary NHS confidentiality and security conditions. A completion of A New User Form must also be completed and all third party access to the network must be logged. 6.5 External Network Connections All connections to external networks and systems must have documented and approved system security policies and procedures All connections to external networks and systems must conform to the NHS-wide Network Security Policy, Code of Connection and supporting guidance All external connections must be approved by the Information Security manager 6.6 Maintenance Contracts The Network Support Manager/Head of IT will ensure that maintenance contracts are maintained and periodically reviewed for all network equipment. All contract details will constitute part of the Asset register. 6.7 Data Exchanges Data exchanges must be recorded as part of the data mapping requirements placed on CCGs. Exchanges must be approved in line with all procedures introduced since the Health and Social Care Act 2012 and approved encryption or anonymisation must be used for person-identifiable or business sensitive information. Page 9 of 14
10 6.8 Fault Logging The Head of IT and Helpdesk Manager are responsible for ensuring that a log of all faults on the network is maintained and reviewed. A written procedure to report faults and review countermeasures will be produced. 6.9 Network Operating Procedures Documented operating procedures should be prepared for the operation of the network, to ensure its correct, secure operation. Changes to operating procedures must be authorised by the Head of Information Technology Data Backup and Restoration The Network Support Manager and his/her team are responsible for ensuring that backup copies of network configuration data are taken regularly Documented procedures for the backup process and storage of backup tapes will be produced and communicated to all relevant staff All backup tapes will be stored securely and a copy will be stored offsite Documented procedures for the safe and secure disposal of backup media will be produced and communicated to all relevant staff Users are responsible for ensuring that they back up their own data to the network server 6.11 Malicious Software Measures are in place to detect and protect the network from viruses and other malicious software viruses, spyware, Trojan horses, worms etc Unauthorised software Required use of any non-standard software on CCG or YHCS equipment must be notified to the Head of IT before installation. All software used on NHS equipment must have a valid licence agreement - it is the responsibility of the owner or Responsible User of non-standard software to ensure that this is the case Software is no longer centrally funded from a National Programme. Any new additional Pcs added to the network must have a licence for Page 10 of 14
11 the appropriate software i.e. Operating System, SQL Client, Exchange Client, Anti-Virus, Ms Office etc Secure Disposal or Re-use of Equipment Where equipment is being disposed of, IT Department staff will ensure that all data on the equipment (e.g. on hard disks or tapes) is securely overwritten. Where this is not possible IT Department staff will physically destroy the disk or tape 6.14 Changes to the Network Any proposed changes to the network will be reviewed and approved by the Head of IT and passed where appropriate to the Chief Information Officer. The Network Support Managers are responsible for updating all relevant design documentation, security operating procedures and network operating procedures The Head of IT or the Chief Information Officer may require checks on, or an assessment of the actual implementation based on the proposed changes The Head of IT is responsible for ensuring that selected hardware or software meets agreed security standards As part of acceptance testing of all new network systems, the Head of IT will attempt to cause a security failure and document other criteria against which tests will be undertaken prior to formal acceptance Testing facilities will be used for all new network systems. Development and operational facilities will be separated 6.15 Security Monitoring The Head of IT will ensure that the network is monitored for potential security breaches. All monitoring will comply with current legislation and will be agreed with the CCG Reporting Security Incidents & Weaknesses All potential security breaches must be reported in accordance with the requirements of the CCG and YHCS Incident Reporting Policies and the SIRO must be informed about serious incidents Investigations will be undertaken by the appropriate Information Technology Officers or someone nominated by them Incidents will be reviewed in line with the CCG and YHCS Incident Reporting Policies Page 11 of 14
12 A major incident would constitute a loss of function of a clinical system or breach of confidential information for one or more individuals or a breach of information which is likely to lead to harm to an individual 7. TRAINING 7.1 Training Information Governance and security will be a part of induction training and is mandatory for all staff. The CCG will identify the information governance training needs of key staff groups taking into account role, responsibility and accountability levels and will review this regularly through the PDR processes. The Information Technology provider organisation will ensure that all its staff have received appropriate training and have the relevant qualifications. 8. IMPLEMENTATION AND DISSEMINATION Following ratification by the Governance and Corporate Affairs Committee this policy will be disseminated to staff via the CCG s intranet and communication through inhouse staff briefings. This Policy will be reviewed every year or in line with changes to relevant legislation or national guidance. 9. MONITORING COMPLIANCE AND EFFECTIVENESS OF THE POLICY An assessment of compliance with requirements, within the Information Governance Toolkit (IGT), will be undertaken each year. This includes Information and Network Security, Confidentiality and Data Protection. Incidents are reported and all serious information governance issues must be reported by the SIRO at Governing Body level and in Annual Reports. 10 ASSOCIATED DOCUMENTS (Policies, protocols and procedures) The CCG will produce appropriate procedures and guidance in conjunction with its IT Provider (YHCS) relating to network and information security as required by related policies. This will include an Information Governance handbook which will be updated annually and which will be given to all staff. This policy should be read in conjunction with; Confidentiality and Data Protection Policy Records Management Policy Freedom of Information and EIR Policy Page 12 of 14
13 Information Governance Strategy Information Governance Policy and Framework Information Security Policy Risk Management Policy Incident Reporting Policy Business Continuity Policy Anti-Fraud and Bribery Policy Disciplinary Policy and Procedure Whistleblowing Policy And their associated procedures (including but not limited to) Access to Records Procedure Information Sharing Protocol Freedom of Information Procedures E mail and Internet Policies and Procedures Privacy Impact processes Remote access and home working procedures Safe Haven Procedure Any system specific procedures 11 REFERENCES Legislation & Guidance NHS Act 2006 Data Protection Act 1998 Human Rights Act 1998 Computer Misuse Act 1990 Caldicott Guidance as updated 2013 Common Law Duty of Confidentiality Access to Health Records Act 1990 (where not superseded by the Data Protection Act 1998) Health and Social Care Act 2012 Crime and Disorder Act 1998 The Children Act 1989 and 2004Copyright, Designs and Patents Act 1988 (as amended by the Copyright (Computer Programs) Regulations 1992 Electronic Communications Act 2000 Regulation of Investigatory Powers Act 2000 (& Lawful Business Practice Regulations 2000) Public Interest Disclosure Act 1998 Audit & Internal Control Act 1987 Prevention of Terrorism (Temporary Provisions) Act 1989 & Terrorism Act 2000 Road Traffic Act 1988 Regulations under Health & Safety at Work Act 1974 Public Records Act 1958 Freedom of Information Act 2000 Environmental Information Regulations 2004 Page 13 of 14
14 Protection of Freedoms Act 2012 Coroners and Justice Act 2009 Enterprise and Regulatory Reform Act 2013 Bribery Act 2010 Equality Act 2010 NHS Information Security Management Code of Practice 2007 ISO/IEC 27001:2005 Specification for an Information Security Management system ISO/IEC27002:2005 Code of Practice for Information Security Management Health and Social Care Information Centre Guidance Professional Codes of Conduct and Guidance Information Commissioner s Guidance Documents This is not an exhaustive list and further guidance can be obtained from your organisation s Caldicott Guardian, Senior Information Risk Owner (SIRO) or the YHCS Information Governance Support Team. 12 EQUALITY IMPACT ASSESSMENT In applying this policy, the organisation will have due regard for the need to eliminate unlawful discrimination, promote equality of opportunity, and provide for good relations between people of diverse groups, in particular on the grounds of the following characteristics protected by the Equality Act (2010); age, disability, gender, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, and sexual orientation, in addition to offending background, trade union membership, or any other personal characteristic. A single Equality Impact Assessment is used for all policies and procedures. This document has been assessed to ensure consideration has been given to the actual or potential impacts on staff, certain communities or population groups. Page 14 of 14
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Mike Casey Director of IT
Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK
INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Information Governance Strategic
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Network Security Policy
Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Policy approved by: Audit and Governance Committee Date: 4 th December 2014 Next Review Date: December 2016 Version: 1 Information Security Policy Page 1 of 17 Review and Amendment
How To Ensure Information Security In Nhs.Org.Uk
Proforma: Information Policy Security & Corporate Policy Procedures Status: Approved Next Review Date: April 2017 Page 1 of 17 Issue Date: June 2014 Prepared by: Information Governance Senior Manager Status:
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Information Governance Policy_v2.0_060913_LP Page 1 of 14 Information Reader Box Directorate Purpose Document Purpose Document Name Author Corporate Governance Guidance Policy
Information Governance Policy (incorporating IM&T Security)
(incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
INFORMATION GOVERNANCE POLICY & FRAMEWORK
INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework
Putting Barnsley People First Barnsley Clinical Commissioning Group Information Governance Policy and Management Framework Version: 1.1 Approved By: Governing Body Date Approved: 16 January 2014 Name of
Information security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
Information Governance Policy
Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading
Information Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Information Governance Strategy
Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version
Information Governance Policy
Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.
Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
INFORMATION GOVERNANCE STRATEGY
INFORMATION GOVERNANCE STRATEGY Page 1 of 10 Strategy Owner Valerie Penn, Head of Governance Strategy Author Caroline Law, Information Governance Project Manager Directorate Corporate Governance Ratifying
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
Information Management Policy CCG Policy Reference: IG 2 v4.1
Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control
Information Governance Strategy. Version No 2.0
Plymouth Community Healthcare CIC Information Governance Strategy Version No 2.0 Notice to staff using a paper copy of this guidance. The policies and procedures page of PCH Intranet holds the most recent
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
INFORMATION RISK MANAGEMENT POLICY
INFORMATION RISK MANAGEMENT POLICY DOCUMENT CONTROL: Version: 1 Ratified by: Steering Group / Risk Management Sub Group Date ratified: 21 November 2012 Name of originator/author: Manager Name of responsible
Information & ICT Security Policy Framework
Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January
Information Governance Policy
Information Governance Policy Version: Revised: Consultation: Ratified by: 1.0 Information Governance Committee Governance Committee Date ratified: 19 March 2008 Name of originator/author: David McGrath
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Information Governance Policy. 2 RESPONSIBLE PERSON: Steve Beeho, Head of Integrated Governance. All CCG-employed staff.
Information Governance Policy 1 SUMMARY This policy is intended to ensure that staff are fully aware of their Information Governance (IG) responsibilities, so that they can effectively manage and best
Information Governance Strategy
Information Governance Strategy To whom this document applies: All Trust staff, including agency and contractors Procedural Documents Approval Committee Issue Date: January 2010 Version 1 Document reference:
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Name of Policy Author: Name of Review/Development Body: Ratification Body: Ruth Drewett Information Governance Steering Group Committee Trust Board : April 2015 Review date:
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
NHS Waltham Forest Clinical Commissioning Group Information Governance Policy
NHS Waltham Forest Clinical Commissioning Group Information Governance Policy Author: Zeb Alam & David Pearce Version 3.0 Amendments to Version 2.1 Updates made in line with National Guidance and Legislation
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
CCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
Rules for the use of the IT facilities. Effective August 2015 Present
Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.
Information Governance Policy
Policy Policy Number / Version: v2.0 Ratified by: Audit Committee Date ratified: 25 th February 2015 Review date: 24 th February 2016 Name of originator/author: Name of responsible committee/individual:
Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.
Document No: IG10d Version: 1.1 Name of Procedure: Third Party Due Diligence Assessment Author: Release Date: Review Date: Lauren Hamill, Information Governance Officer Version Control Version Release
JOB DESCRIPTION. Information Governance Manager
JOB DESCRIPTION POST TITLE: Information Governance Manager DIRECTORATE: ACCOUNTABLE TO: BAND: LOCATION: CSS Head of Information Governance 8a CSS Job Purpose The Information Governance Manager will ensure
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
NHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Version Number Date Issued Review Date V1 25/01/2013 25/01/2013 25/01/2014. NHS North of Tyne Information Governance Manager Consultation
Northumberland, Newcastle North and East, Newcastle West, Gateshead, South Tyneside, Sunderland, North Durham, Durham Dales, Easington and Sedgefield, Darlington, Hartlepool and Stockton on Tees and South
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
INFORMATION GOVERNANCE POLICY
ENFIELD CLINICAL COMMISSIONING GROUP INFORMATION GOVERNANCE POLICY PLEASE DESTROY ALL PREVIOUS VERSIONS OF THIS DOCUMENT Enfield CCG Information Governance Policy Information Governance Policy (Policy
Information Governance Policy
Information Governance Policy REFERENCE NUMBER IG 101 / 0v3 May 2012 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive 4.9.12 REVIEW DUE DATE May 2015 West Lancashire CCG is committed to ensuring
Information Security and Governance Policy
Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Information Governance Plan
Information Governance Plan 2013 2015 1. Overview 1.1 Information is a vital asset, both in terms of the clinical management of individual patients and the efficient organisation of services and resources.
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
USE OF PERSONAL MOBILE DEVICES POLICY
Policies and Procedures USE OF PERSONAL MOBILE DEVICES POLICY Date Approved by Information Strategy Group Version Issue Date Review Date Executive Lead Information Asset Owner Author 15.04.2014 1.0 01/08/2014
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Information Governance Management Framework
Information Governance Management Framework Document Status: Approved Version: v 1.3 DOCUMENT CHANGE HISTORY Version Date Comments (i.e. viewed, or reviewed, amended, approved by person or committee v1.0
Informatics Policy. Information Governance. Network Account and Password Management Policy
Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information
Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25
Information Security Policy Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25 Document Information Trust Policy Number : ULH-IM&T-ISP01 Version : 3.1 Status : Approved Issued by : Information Governance
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
Information Governance Framework and Strategy. November 2014
November 2014 Authorship : Committee Approved : Chris Wallace Information Governance Manager CCG Senior Management Team and Joint Trade Union Partnership Forum Approved Date : November 2014 Review Date
Information Security Management. Audit Check List
Information Security Management BS 7799.2:2002 Audit Check List for SANS Author: Val Thiagarajan B.E., M.Comp, CCSE, MCSE, SPS (FW), IT Security Consultant. Approved by: Algis Kibirkstis Owner: SANS Extracts
NHS Business Services Authority Information Governance Policy
NHS Business Services Authority Information Governance Policy NHS Business Services Authority Corporate Secretariat NHSBSAIGM002 Issue Sheet Document reference NHSBSAIGM002 Document location F:\CEO\IGM\Info
Policy Document Control Page
Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
NHS Newcastle Gateshead Clinical Commissioning Group. Information Governance Strategy 2015/16
NHS Newcastle Gateshead Clinical Commissioning Group Information Governance Strategy 2015/16 Document Status Equality Impact Assessment Document Ratified/Approved By Approved No impact NHS Quality, Safety
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Document History Document Reference: Document Purpose: Date Approved: Approving Committee: To set out the technical capabilities of the chosen security solution Airwatch
