Information Systems (IS) Visiting Worker Information Security Policy

Size: px
Start display at page:

Download "Information Systems (IS) Visiting Worker Information Security Policy"

Transcription

1 Information Systems (IS) Visiting Worker Information Security Policy

2 INFORMATION SYSTEMS (IS) VISITING WORKER INFORMATION SECURITY POLICY Reference: AFBI POL 02/09 Date: 25 March 2009 Version: 1.0 Author: Biometrics & Information Systems Branch Page 1 of 7

3 1 INTRODUCTION POLICY OBJECTIVE SCOPE OF THIS POLICY VISITING WORKER INFORMATION SECURITY POLICY Policy Status Visiting Worker Information Pack (VWIP) Supporting Security Procedures VALIDITY OF THIS POLICY CURRENT POST HOLDERS - DECEMBER Further Information... 5 APPENDIX A: Visiting Worker Information Pack (VWIP)... 6 Page 2 of 7

4 1 INTRODUCTION The Agri-Food & Biosciences Institute (AFBI)'s declared intent to be innovative and entrepreneurial means that it is constantly seeking to expand its work programmes and forge new partnerships with other scientific institutes and research bodies. This results in the need for flexibility in offering visitor work or study positions to non-afbi staff and providing these individuals with a range of AFBI IT network services commensurate with legitimate business need. Visiting workers coming to work or study in AFBI fall into two categories: 1. those with a UK address for a minimum of 3 years within the last 5 years, for whom it is possible to seek Baseline Standard security clearance through AccessNI; 2. those for whom Baseline Standard security clearance cannot be obtained, mostly because they haven't been in the UK for a minimum of 3 years within the last 5 years and the requisite AccessNI disclosure service only provides details of offences committed in the UK. In the latter case, it is the responsibility of the employer or hosting organisation to consider and evaluate the risks involved. Many countries allow their citizens to obtain certificates of good conduct or extracts from their criminal records; these could be provided to employers or hosting organisations. However, the level of information disclosed in this way varies from country to country and it is difficult to confirm that it is genuine or complete. Such certificates should be treated with caution and should form part of a portfolio of supporting documentation that collectively seeks to establish that the individual is who they claim to be, that they are of good character and that they have the right to work in the UK. This document defines the Visiting Worker Information Security Policy (VWISP) for the Agri-Food & Biosciences Institute (AFBI) network. This policy establishes the supplementary security responsibilities for information security in respect of authorised users who do not have Baseline Standard security clearance. The establishment of, and adherence to, a VWISP is an essential component for ensuring the security of AFBI s business in respect of authorised visiting (non- AFBI) workers who for legitimate practical reasons do not have Baseline Standard security clearance. This VWISP applies to all business functions within the defined scope and covers all information systems which support those business functions. It has been developed in line with the provisions of HMG incorporating BS ISO/IEC This policy is not protectively marked on the grounds that it contains no protectively marked information or any facts which could compromise information systems security. Information processed, stored and transmitted by AFBI Information Systems has been assigned a protective marking of RESTRICTED. The network itself therefore attracts a protective marking of RESTRICTED. Specific policy requirements are given in detail later in this document. 2 POLICY OBJECTIVE The objective of this policy is to ensure adequate security of AFBI s information systems, all of which adhere to AFBI s overriding business objectives, particularly: To preserve Confidentiality by protecting assets against unauthorised disclosure To preserve Integrity by protecting assets from unauthorised or accidental modification To retain Availability by ensuring that assets are available as/when required The fundamental issue is that of managing risk to the organisation's IT assets whilst seeking to facilitate legitimate business need. The need to be mindful of equality, equal opportunity and human rights legislation has allowed some flexibility providing adequate safeguards are in place. 3 SCOPE OF THIS POLICY This policy is owned by AFBI and applies to all authorised visiting (non-afbi) workers whose duties require access to AFBI IT network services and who, for legitimate practical reasons, do not have Baseline Standard security clearance. Page 3 of 7

5 This policy aims to achieve a comprehensive and consistent approach to the granting of access to AFBI IT network services to visiting workers who have the necessary authority based on risk assessments and other information as contained in the visiting worker information pack (Appendix A). An authorised user of AFBI Information Systems is defined as any AFBI staff member or contracted other who has approval to access AFBI IT network services to input, store or process information. All authorised users shall have Baseline Standard security clearance as defined in the HMG Manual of Protective Security (MPS), or shall be compliant with the AFBI Visiting Worker Information Security Policy (this document). 4 VISITING WORKER INFORMATION SECURITY POLICY The overall AFBI Information Security Policy statement is: AFBI s information systems will be available when needed, will be accessed only by legitimate users and will contain complete and accurate information. The information systems will also be able to withstand, or recover from, threats to their confidentiality, integrity and availability. To satisfy this overall policy statement, AFBI will implement security measures, commensurate with the value of AFBI s assets, to protect its information systems with priority given to those systems which are considered to be critical to the business. The following statements constitute the agreed protocol in respect of authorised visiting (non- AFBI) workers whose duties require access to AFBI IT network services and who, for legitimate practical reasons, do not have Baseline Standard security clearance. 4.1 Policy Status This policy is subservient to the AFBI Information Security Policy. 4.2 Visiting Worker Information Pack (VWIP) The VWIP shall be completed at Branch level for each visiting worker. The completed VWIP shall be approved at Divisional level and submitted to the Security Manager where possible at least four weeks in advance of the intended start date. The term AFBI Host Manager is used extensively in this document and is taken to mean a senior line manager within the Branch which is hosting the visiting worker. Here "senior" refers to Senior Scientific Officer/Deputy Principal or above. The AFBI Host Manager shall take lead responsibility for completion and maintenance of the VWIP. The Security Manager shall, upon receipt of a completed and approved VWIP, make suitable arrangements for the granting of access to AFBI IT resources and network services in respect of the visiting worker. This shall include instructions for completion of the user account request form and confirmation of automatic system monitoring of the specific user account and any reasonable additional restrictions that, in the opinion of the Security Manager, should apply based on information contained in the completed VWIP. The Security Manager shall confirm these arrangements, in writing, to the AFBI Host Manager. Responsibility for ensuring that the visiting worker abides with any restrictions applied to them remains with the AFBI Host Manager. All staff will be made aware of the contents and implications of the VWIP. 4.3 Supporting Security Procedures AFBI Human Resources shall seek, in advance, a letter on headed paper direct from the sponsoring institution/university giving full details on the visiting worker and the work that is to be undertaken. AFBI Human Resources shall seek, in advance, a copy of the page of the passport containing a photograph of the visiting worker. AFBI Human Resources shall check the passport and other documentation pertinent to the visiting worker (e.g. work permit, insurance, qualifications, visa, police report) on arrival. AFBI Human Resources shall issue the visiting worker with an appropriate work pass on arrival. AFBI Human Resources shall retain copies of any supporting security documentation and confirm these as seen in the VWIP. Page 4 of 7

6 The AFBI Host Manager shall immediately inform the Security Manager, in writing, when IT access in respect of the visiting worker is no longer required. Upon receipt of this notification, the Security Manager shall arrange for the withdrawal of access to AFBI network services in respect of the visiting worker. The Security Manager shall confirm these arrangements, in writing, to the AFBI Host Manager. 4.4 Sanctions All users must be informed that irresponsible or improper actions which breach this policy, any other AFBI policies, frameworks or security operating procedures (SYOPS), may result in disciplinary action. The Security Manager shall, at any time and pending further investigation, invoke procedures to immediately suspend IT access services in respect of the visiting worker, where it is reasonably suspected that a security breach may have occurred. Where a user is found to have broken the law then the matter will be reported to, and dealt with by, the appropriate authorities. 5 VALIDITY OF THIS POLICY This policy is reviewed annually by the AFBI Accreditor acting under the authority of the Senior Information Risk Owner (SIRO). Associated information security standards are subject to an ongoing development and review programme. 6 CURRENT POST HOLDERS - DECEMBER 2008 Senior Information Risk Owner (SIRO) Senior Responsible Owner (SRO) Accreditor Security Manager George McIlroy, AFBI CEO David Armstrong, AFBI Head of ICT David Kilpatrick, AFBI Head of Biometrics & Information Systems John Ward, AFBI Business Systems IT Manager 7 FURTHER INFORMATION For further advice please contact the AFBI IT Security Manager, John Ward, on Page 5 of 7

7 APPENDIX A: VISITING WORKER INFORMATION PACK (VWIP) To be completed and submitted in accordance with the current AFBI Visiting Worker Information Security Policy, where possible at least four weeks in advance, when requesting access to AFBI IT network services. AFBI Host Manager shall VWIP with Parts 1 & 2 completed to AFBI HR (Roisin Meehan) and shall follow up with signed paper copy of relevant page. 1. ADVANCE NOTIFICATION (to be completed by AFBI Host Manager) VISITING WORKER Name (in capitals): Nationality: Intended Start Date: Projected End Date: AFBI Host Division: AFBI Site at which based: Brief details about: a. the visiting worker (incl. sponsoring institution/university, previous employment/study, qualifications) b. the work to be undertaken (incl. location, purpose, competences/proficiencies needed) c. AFBI IT network services required (e.g. internet, , applications) d. reporting lines, level of supervision, pattern of work 2. DECLARATION (be completed by Visiting Worker in advance of visit) I agree to adhere to this policy (including any reasonable additional restrictions that, in the opinion of the Security Manager, should apply based on information contained in the completed VWIP) and understand the consequences of violating the policy (see Sanctions 4.4). Signature: Date: (name in capitals) (signature) (date) AFBI HOST MANAGER AFBI HEAD OF BRANCH AFBI HEAD OF DIVISION Page 6 of 7

8 APPENDIX A: VISITING WORKER INFORMATION PACK (VWIP) AFBI HR shall VWIP with Parts 1, 2 & 3 completed to AFBI Security Manager (John Ward). 3. SUPPORTING SECURITY DOCUMENTATION (to be conformed as seen by AFBI Human Resources) Document (name in capitals) (signature) (date) Letter on headed paper direct from sponsoring institution/university, in advance Copy of passport page containing photograph, in advance Passport, on arrival Certificate of good conduct or similar obtained from country s representative in UK Other relevant documentation (e.g. work permit, insurance, qualifications, visa, police report) specify below: AFBI Security Manager shall VWIP with Parts 1, 2, 3 & 4 completed to AFBI Host Manager. 4. IT ARRANGEMENTS (to be completed by AFBI Security Manager) (name in capitals) (signature) (date) Account Issued Account Terminated Confirmation of IT resources and network services made available to the user, including terms of usage AFBI Host Manager shall VWIP with Parts 1, 2, 3, 4 & 5 completed to AFBI HR (Roisin Meehan) and shall follow up with signed paper copy of page with Part 5. AFBI HR shall then arrange for Parts 3 & 4 of the VWIP to be fully signed and shall retain the original complete document. 5. DECLARATION (be completed by Visiting Worker on provision of access to AFBI IT network services) I agree to adhere to the IT arrangements detailed above and understand the consequences of violating them (see Sanctions 4.4). Signature: Date: THIS DOCUMENT BECOMES RESTRICTED ONCE COMPLETED Page 7 of 7

Human Resources Policy No. HR46

Human Resources Policy No. HR46 Human Resources Policy No. HR46 Maintaining Personal Files and ESR Records Additionally refer to HR04 Verification of Professional Registration HR33 Recruitment and Selection HR34 Policy for Carrying Out

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date

More information

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Information Governance Framework. June 2015

Information Governance Framework. June 2015 Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review

More information

Policies, Procedures & Guidelines

Policies, Procedures & Guidelines Policies, Procedures & Guidelines Management Guidance On the Storage and Disposal of Employee Personnel Files Issue Number: 1 Originated by: Human Resource Department Ratified by: SMT & JSPC Agreed by:

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

Nursing Agencies. Minimum Standards

Nursing Agencies. Minimum Standards Nursing Agencies Minimum Standards 1 Contents Page Introduction 3 Values underpinning the standards 6 SECTION 1 - MINIMUM STANDARDS Management of the nursing agency 1. Management and control of operations

More information

Network Security Policy

Network Security Policy Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant

More information

Corporate Information Security Management Policy

Corporate Information Security Management Policy Corporate Information Security Management Policy Signed: Chief Executive. 1. Definition of Information Security 1.1. Information security means safeguarding information from unauthorised access or modification

More information

NHS Commissioning Board: Information governance policy

NHS Commissioning Board: Information governance policy NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION

More information

Mike Casey Director of IT

Mike Casey Director of IT Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date

More information

Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25

Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25 Information Security Policy Policy Number: ULH-IM&T-ISP01 Version 3.0 Page 1 of 25 Document Information Trust Policy Number : ULH-IM&T-ISP01 Version : 3.1 Status : Approved Issued by : Information Governance

More information

Information Governance Policy

Information Governance Policy Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

Somerset County Council - Data Protection Policy - Final

Somerset County Council - Data Protection Policy - Final Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council

More information

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

NETWORK SECURITY POLICY

NETWORK SECURITY POLICY NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics

More information

Information Security Policy

Information Security Policy Office of the Prime Minister document CIMU P 0016:2003 Version: 2.0 Effective date: 01 Oct 2003 Information 1. statement i) General The Public Service of the Government of Malta (Public Service) shall

More information

Information Security Policy London Borough of Barnet

Information Security Policy London Borough of Barnet Information Security Policy London Borough of Barnet DATA PROTECTION 11 Document Control POLICY NAME Document Description Information Security Policy Policy which sets out the council s approach to information

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

Data Protection Breach Management Policy

Data Protection Breach Management Policy Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

More information

JOB DESCRIPTION. Information Governance Manager

JOB DESCRIPTION. Information Governance Manager JOB DESCRIPTION POST TITLE: Information Governance Manager DIRECTORATE: ACCOUNTABLE TO: BAND: LOCATION: CSS Head of Information Governance 8a CSS Job Purpose The Information Governance Manager will ensure

More information

Note: Non JCQ awarding bodies have their own reporting forms and these would be used where appropriate.

Note: Non JCQ awarding bodies have their own reporting forms and these would be used where appropriate. MALPRACTICE IN ASSESSMENT POLICY 1. Policy Statement 1.1 Carshalton College is committed to ensuring that issues of malpractice in internal and external examinations and assessments are addressed. For

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Code of Conduct for registered migration agents

Code of Conduct for registered migration agents Code of Conduct for registered migration agents Current from 1 JULY 2012 SCHEDULE 2: CODE OF CONDUCT (regulation 8) Migration Act 1958, subsection 314(1) THIS CODE OF CONDUCT SHOULD BE DISPLAYED PROMINENTLY

More information

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was

More information

Information Management and Security Policy

Information Management and Security Policy Unclassified Policy BG-Policy-03 Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies

More information

Waterfront Auckland s Credit Card Policy

Waterfront Auckland s Credit Card Policy Waterfront Auckland s Credit Card Policy CONTENTS 1. Policy Statement 2. Background 3. Purpose and Scope 4. Principles and Strategic Alignment 5. Policy Definitions 6. Policy 6.1 Issue of Waterfront Auckland

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

ATMD Bird & Bird. Singapore Personal Data Protection Policy

ATMD Bird & Bird. Singapore Personal Data Protection Policy ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:

More information

IT ACCESS CONTROL POLICY

IT ACCESS CONTROL POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective.

We then give an overall assurance rating (as described below) indicating the extent to which controls are in place and are effective. Good Practice Audit outcomes analysis Police Forces April 2013 to April 2014 This report is based on the final audit reports the ICO completed in the Criminal Justice sector, specifically of Police forces,

More information

DataCentre Access Policies & Procedures

DataCentre Access Policies & Procedures DataCentre Access Policies & Procedures Contents Purpose... 3 Overview... 3 DataCentre Access... 3 DataCentre Access Levels... 4 Periodic Review & Termination of Access... 5 DataCentre Access Log... 5

More information

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Information Governance Policy Issue Date: June 2014 Document Number: POL_1008 Prepared by: Information Governance Senior Manager Insert heading depending on Insert line heading

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

Part 1 About your Self-Assessment Appendix Read Guidance notes, Part 1

Part 1 About your Self-Assessment Appendix Read Guidance notes, Part 1 POINTS BASED SYSTEM FORM (VAF9 MAR 2009) PERSONAL DETAILS This form is for use outside the UK only. This form is provided free of charge. READ THIS FIRST This form must be completed in blue or black ink.

More information

Corporate Information Security Policy

Corporate Information Security Policy Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures Open Awards Malpractice and Maladministration Policy and Procedures Page 1 of 14 Open Awards Malpractice and Maladministration Policy and Procedures Policy Statement Open Awards is committed to ensuring

More information

Briefing Note. Obtaining a Sponsorship Licence

Briefing Note. Obtaining a Sponsorship Licence Briefing Note Obtaining a Sponsorship Licence September 2008 Becoming a Sponsor under the Points Based System The UK s immigration rules have been radically overhauled by the Home Office. Out have gone

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1 Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees

More information

Disciplinary and Dismissals Policy

Disciplinary and Dismissals Policy Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary

More information

Data Breach Management Policy and Procedures for Education and Training Boards

Data Breach Management Policy and Procedures for Education and Training Boards Data Breach Management Policy and Procedures for Education and Training Boards POLICY on DATA BREACHES in SCHOOLS/COLLEGES and OTHER EDUCATION and ADMINISTRATIVE CENTRES UNDER the REMIT of TIPPERARY EDUCATION

More information

Dublin City University

Dublin City University Dublin City University Data Protection Policy Data Protection Policy Contents Purpose... 1 Scope... 1 Data Protection Principles... 1 Disclosure of Personal Data... 2 Summary of Responsibilities... 3 Rights

More information

Merthyr Tydfil County Borough Council. Information Security Policy

Merthyr Tydfil County Borough Council. Information Security Policy Merthyr Tydfil County Borough Council Information Security Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of

More information

Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection

Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection Crime Statistics Data Security Standards Office of the Commissioner for Privacy and Data Protection 2015 Document details Security Classification Dissemination Limiting Marker Dissemination Instructions

More information

INFORMATION SECURITY MANAGEMENT POLICY

INFORMATION SECURITY MANAGEMENT POLICY INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June

More information

SAFEGUARDING CHILDREN POLICY

SAFEGUARDING CHILDREN POLICY SAFEGUARDING CHILDREN POLICY Studio Film School implements a Safeguarding Children policy in order to fulfil our responsibility to ensure that all children are safe and protected from avoidable harm. We

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOG SECURIT POLIC Document Author Written By: Deputy Director of IM&T / Interim Head of ICT Authorised Signature Authorised By: Chief Executive Date: February 2015 Date: 17 March 2015

More information

Business Ethics Policy

Business Ethics Policy Business Ethics Policy Page 1 of 12 Preface and document control This document is intended to provide information in respect of G4S Group Head Office policy, procedure, standards or guidance and will be

More information

Date Amendments/Actions Next Compulsory Review Date

Date Amendments/Actions Next Compulsory Review Date CTC KINGSHURST ACADEMY STAFF DISCIPLINARY POLICY AND PROCEDURE POLICY REFERENCE: POL017S Policy History Policy Ref & Version Date Amendments/Actions Next Compulsory Review Date POL017S V1.0 1 st September

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

How To Use A Corporate Credit Card

How To Use A Corporate Credit Card Corporate Credit Card Policy June 2012 1. PURPOSE The purpose of this policy is to provide authority for the use of corporate credit cards. 2. SCOPE This Policy applies to all Council Officials as defined

More information

Information Security Programme

Information Security Programme Information Security Programme Information Security Policy This document is issued in the strictest business confidence. It should be read in conjunction with a number of other supporting and complementary

More information

Staff DBS Checks and Employing Exoffenders:

Staff DBS Checks and Employing Exoffenders: Staff DBS Checks and Employing Exoffenders: Guide to Policy and Procedures for Managers of Applicants 1 INDEX 1. Introduction 2. Recruiting ex-offenders 3. Disclosure and barring service (DBS) checks procedural

More information

BAILIWICK OF GUERNSEY DATA PROTECTION

BAILIWICK OF GUERNSEY DATA PROTECTION BAILIWICK OF GUERNSEY DATA PROTECTION CODE OF PRACTICE: CRIMINAL RECORDS CHECK PREFACE Section 56 of the Data Protection (Bailiwick of Guernsey) Law, 2001 ( the DP Law ), as amended by Ordinance in 2010

More information

Data Protection Policy

Data Protection Policy Internal Ref: NELC 16.60 Review date December 2016 Version No. V04 Data Protection Policy 1 Data Protection Statement Data Protection Policy 1.1 North East Lincolnshire Council recognises that in order

More information

DIRECT AIRSIDE TRANSIT (VAF6 DEC

DIRECT AIRSIDE TRANSIT (VAF6 DEC DIRECT AIRSIDE TRANSIT (VAF6 DEC 2008) This form is for use outside the UK only. This form is provided free of charge. READ THIS FIRST This form must be completed in English. You may use blue or black

More information

NHS Business Services Authority Information Security Policy

NHS Business Services Authority Information Security Policy NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA

More information

SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY

SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY Our setting will work with children, parents and the community to ensure the rights and safety of children and to give them the very best start in life.

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

HERTSMERE BOROUGH COUNCIL

HERTSMERE BOROUGH COUNCIL HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act

More information

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Scottish Rowing Data Protection Policy

Scottish Rowing Data Protection Policy Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19 Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility

More information

Fleet and Driver Risk Management Policy

Fleet and Driver Risk Management Policy Fleet and Driver Risk Management Policy Document Control Document Ref: Date Created: Version: 1 Date Modified: 6 th August 2010 Revision due Author: M Billinge-Jones Owning Service Equality Impact Assessment:

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY The information and guidelines within this Policy are important and apply to all members, Fellows and staff of the College 1. INTRODUCTION Like all educational establishments, the

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Information Governance Officer 01427 676652 Steve.anderson@west-lindsey.gov.uk

Information Governance Officer 01427 676652 Steve.anderson@west-lindsey.gov.uk B CPR.32 15/16 Corporate Policy and Resources Committee Date: 10 November 2015 Subject: Bring Your Own Device Policy Report by: Director of Resources Contact Officer: Purpose / Summary: Steve Anderson

More information

HEALTHCARE ASSISTANT BAND 2

HEALTHCARE ASSISTANT BAND 2 HEALTHCARE ASSISTANT BAND 2 INTRODUCTION Thank you for your interest in applying for the waiting list for Temporary Band 2 Healthcare Assistants within the Western Trust. This short information sheet is

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

Leigh C.E. Junior School. Policy Employees/Agents. Social Media

Leigh C.E. Junior School. Policy Employees/Agents. Social Media Leigh C.E. Junior School Policy Employees/Agents Social Media Social Media Policy School: Leigh C.E. Junior School Date of Policy: November 2012 Next review date: November 2013 Social Media Policy Employees/Agents

More information

Disciplinary Procedure

Disciplinary Procedure Disciplinary Procedure Human Resources 1 Introduction The University is committed to supporting its staff in carrying out their responsibilities within an environment which encourages productive, safe

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise

More information

MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST 2011. Version 2.0

MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST 2011. Version 2.0 MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST 2011 Version 2.0 Western Health and Social Care Trust Page 0 of 6 Management of User Accounts Policy Policy Title MANAGEMENT OF USER ACCOUNTS AND

More information

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document. Report to: Cabinet Date: 14 th October 2004. Report: of Head of Corporate Personnel Services Report Title: USE of INTERNET POLICY Summary of Report. The use of the Internet is growing rapidly. Over the

More information

Lancashire County Council Information Governance Framework

Lancashire County Council Information Governance Framework Appendix 'A' Lancashire County Council Information Governance Framework Introduction Information Governance provides a framework for bringing together all of the requirements, standards and best practice

More information

Protective Security Governance Policy. Outlines ANAO protective security arrangements

Protective Security Governance Policy. Outlines ANAO protective security arrangements Protective Security Governance Policy Outlines ANAO protective security arrangements Version 2.0 Effective JULY 2012 Document management Document identification Document ID Document title Release authority

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

NATIONAL RECORDS OF SCOTLAND preserving the past; recording the present; informing the future. 2011 Census

NATIONAL RECORDS OF SCOTLAND preserving the past; recording the present; informing the future. 2011 Census NATIONAL RECORDS OF SCOTLAND preserving the past; recording the present; informing the future 2011 Census Information Assurance Policy Statement By the UK Census Offices June 2011 NATIONAL RECORDS OF SCOTLAND

More information

Data Protection Policy

Data Protection Policy Data Protection Policy This policy applies to the national office of Special Olympics GB; athletes, volunteers, and paid staff its clubs and regions; all Special Olympics GB donors, sponsors, and supporters;

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.

Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved. Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION

More information