Security Services Policy and Procedures

Size: px
Start display at page:

Download "Security Services Policy and Procedures"

Transcription

1 and Procedures January 2011

2 Contents Heading Page Policy Policy Statement: 3 Procedures Aims and objectives: 3 Responsibilities: 4 Introduction: 6 Security Service management remit: 6 Overall aims of the policy: 6 Implementation of the policy: 7 Managing security in the university: 8 Responsibilities for heads of departments and faculties: 10 Information for students and others with access to buildings: 10 Security management initiatives: 11 Protecting property assets: 11 Professional and ethical framework: 12 Specific areas of action: 12 Personal security: 13 Right of search: 14 Drugs and illegal substances: 14 The ten principles for risk analysis: 14 Property marking and security of equipment: 15 Monitoring and review: 16 Appendix A: Action Plan 17

3 Policy Statement The University will endeavour to ensure, as far as is reasonably practicable, the personal safety and security of all students, staff and visitors at all University campuses and University controlled buildings. The Facilities Management Directorate is responsible for the effective operation and enforcement of the Security Policy and Procedures. Students, staff and visitors to the campus must also take responsibility for their security and personal safety. In particular, students, staff, visitors and contractors should assist the Security Service to ensure the success of the Policy. Whilst minor breaches of the Policy may be dealt with informally, serious or repeated breaches will invoke disciplinary action. Policy Aims The University will: Provide and promote, as far as reasonably possible, a safe and secure environment for all users Make reasonable efforts to protect its property Encourage all users to promote a secure environment through their own conduct Provide an agreed level of response against criminal activity affecting the University Attempt to monitor authorised access and prevent unauthorised access to university property Security Section Aims The University Security Services will: Establish a realistic level of risk on campus Outline procedures to deal with reports of crime, threats and damage Identify trends and react quickly to remove or reduce risk Raise security awareness in the University community without engendering fear Key Objectives a) Ensuring the safety and security of staff, students and visitors b) Protecting the property and assets of the university c) The prevention, investigation and detection of crime d) Reducing the incidence of reported crime e) The apprehension and prosecution of offenders by the police. University of Reading January 2011 Page 3 of 17

4 Procedures Organisation and Responsibilities: Governing Body The Governing Body has overall responsibility for the security of the University. Vice Chancellor The Vice Chancellor is responsible on behalf of the Governing Body for ensuring that the responsibilities of the University are fulfilled. Senior Managers (Heads of Schools, Heads of Directorate and other university department heads) Senior Managers are responsible for security matters in the areas for which they are accountable. This includes: Ensuring they are familiar with the contents of the Security Policy Maintaining an asset register (as per the University s financial regulations) Undertaking security risk assessments for their area of responsibility Ensure all members of staff or students within their area of responsibility understand and exercise their security responsibilities. It is recognised that senior managers may wish to delegate responsibility for the routine involved in these tasks to a nominated individual in their area, but the overall responsibility for security matters will remain with them. Staff Every member of staff has a responsibility to: Work with due regard to the security of themselves and others, including other staff, students and members of the public Ensure that the security of any University property they may use has been considered and that appropriate measures are in place to prevent its loss or damage. Ensure that the area in which they work is properly secure at the end of the working day. Report any suspicious activity to the security department Comply with the University s security policy Students Every student has a responsibility to: Use University premises, including residences where appropriate, with due regard to the security of themselves and others, including other staff, students and members of the public Report any suspicious activity to the security department Comply with the University s security policy University of Reading January 2011 Page 4 of 17

5 Visitors (including commercial guests) Visitors, whilst on University premises, using its facilities or taking part in activities must comply with the University s security policy. Special Responsibilities: Director of Estates and Facilities Management The Director has overall responsibility for Development and implementation of the University security policy Ensuring the integration of the security policy with other University policies and procedures Head of Campus Services The Head of Campus Services has responsibility for: Development, implementation and monitoring of security related policies and procedures Security Services Manager The Security Services Manager has responsibility for: Day to day management of security Control of keys and access cards Control of CCTV usage and associated data protection requirements. The supervision of security officers Senior Security Team Leader The Senior Security Team Leader, in cooperation with the Security Services Manager, has responsibility for: The control of the day-to day delivery of an efficient and effective security service to the University of Reading, the supervision of security officers matters relating to the administration of the service the provision of security hardware including keys, access control, CCTV and intruder and fire alarm installations. Security Operatives The security operatives have responsibility for the security duties as outlined in the relevant assignment instructions. These include: University of Reading January 2011 Page 5 of 17

6 Monitoring of CCTV cameras External patrols of all sites Locking and unlocking of buildings Monitoring of car parks Monitoring of alarms Introduction The university s Security Services Manager, in conjunction with their team, proposes to maintain the present low crime rate, and where possible reduce this crime rate within the University of Reading by introducing a fully integrated strategy with the aim of ensuring a secure and safe environment for all who study, work, undertake research or visit any of its premises. This strategy comprises a twofold initiative. a. Security is provided 24 hours per day, 365 days per year and all students, staff and visitors are asked to participate by reporting crime or disruptive behaviour immediately, in person or by telephone (extension 7799, or 6300 in an emergency), and to follow the guidelines laid down regarding access to buildings and the protection of equipment, whether it is university owned or personal property. b. The security team works closely with Thames Valley Police. Together we can give comprehensive protection to our people, property and assets, providing we receive prompt and accurate information and the directions listed in this document are followed at all times. 1. Security services management remit 1.1 The Security Services Manager will determine policy, operational guidance and the standards necessary to achieve the objective of providing a secure environment for the university. The security team will work to raise standards and professionalism within the service being delivered. Security within departments and faculties will remain the responsibility of the individual departments and faculty but specific advice will be provided by the Security Services Manager. 1.2 The security team approach will be inclusive and place great value on involving stakeholders, both from within and outside the university, in the development of security management within the university. 1.3 The approach is comprehensive, in that it will include the setting of standards and implementation of policy as well as supporting staff performing security-related work. 1.4 The Security Services Manager and the security team are therefore charged with tackling security-related issues throughout the entire university. 2. Overall aims of the policy 2.1 The delivery of an integrated strategy in all areas of the university to provide a secure environment for those who use, study or work in the university, ensuring the provision of the highest possible standard of education. University of Reading January 2011 Page 6 of 17

7 2.2 Adopting the areas of specific action (see section 14) to ensure that a clearly defined security strategy is delivered. 2.3 Through its approach and the application of the business process, the security team aims to address these issues; encouraging good practice and experience to increase the university s capacity to tackle specific security management problems. 2.4 Where there are specific problems, the security team will seek to identify their nature and scale; the essential first step to providing a solution. In respect of incidents of crime, we have established an effective incident reporting system to provide accurate quantitative information and collate data about trends in crime. 2.5 As problems are identified and risks assessed, appropriate solutions will be developed. This process will allow progress to be measured and evaluated to ensure that solutions have the intended impact. 3. Implementation of the policy 3.1 The security team will apply a clear business process model in respect of university security management. The key elements are: Identifying problems by analysis of trends and risks. Working within a clear strategic framework to establish a common language of aims, objectives and methodologies. Creating a strong, flexible working structure to focus collective and professional expertise on the issues to be addressed. Using the structure to take a range of actions in respect of each specific area where security needs to be strengthened. Continually reviewing policies and procedures to learn from operational experience to minimise risks and prevent future security related incidents. 3.2 The various elements of the process and the range of actions, both generic and specific, link together and support each other; a comprehensive approach integrating both policy and operational work to provide a seamless service. University of Reading January 2011 Page 7 of 17

8 3.3 This is shown diagrammatically as follows: Managing security in the university Identify the problem Assess the risk Comprehensive risk assessment(s) Risk assessment processes repeated regularly to provide assurance on meeting targets A framework of AIMS and OBJECTIVES with which ACTION can be prioritised and taken Clear statements that can be used to motivate, communicate and help develop a real pro-security culture Create an effective STRUCTURE to implement the STRATEGY Security team that can co-ordinate all policy and direct operations Training strategy delivering all required skills for Security Services staff Take action in all key areas Within the strategic plan apply particular TACTICS to counter the problem University of Reading January 2011 Page 8 of 17

9 GENERIC ACTION PRIORITY ACTION Creating a pro-security culture Deterrence of security breaches /incidents Prevention of security breaches /incidents Detection/reporting of incidents Investigation of incidents Sanctions following incidents Redress following investigation Quality Assurance/support To include the protection of the following: Student, staff and visitors University property and assets Faculties and departments Specialist units (LRC) Areas of special interest DELIVERING IMPROVEMENTS PROTECTING THE UNIVERSITY University of Reading January 2011 Page 9 of 17

10 4. Responsibilities for Heads of School, Directorates and other University organisations 4.1 All Schools, Directorates and other university organisations have responsibility for internal security and, to ensure co-ordination with the security team. 4.2 Staff should be made aware of the security strategy, paying particular attention to those issues relevant to the activity of their department or faculty. 4.3 Staff and students should be aware of, and exercise their security responsibilities, including where appropriate the displaying of university campus identification cards and have due regard for university property, in particular the security of IT equipment. Valuables should not be left in unsecured rooms. 4.4 Liaison with the security team on any security matters. 4.5 Arranging for a security risk analysis to be undertaken in the department or faculty areas, in liaison with the security team, to remove or reduce security risks. 4.6 Controlling access to their department or faculty areas by management of the issue of keys and authorising staff/students to have out of hours access only as necessary. 4.7 Ensuring that staff and students return to their department or faculty their university campus identification card and any issued keys on their last day of work or attendance. 4.8 Notifying the security team of any new security risk, such as the purchase of expensive equipment, for provision of advice on any additional security or protection and permit informed investigation into any crime or incident. 4.9 Where security systems have been installed, such as door control, it is the responsibility of the person granted access that they do not admit unauthorised persons. If unauthorised persons gain access the security control room should be informed immediately 5. Information for students and others with access to buildings 5.1 Security awareness advice and information will be given to students during Freshers Week and during various campaigns/initiatives run throughout the year. 5.2 Where security systems have been installed, such as door control, it is the responsibility of the person granted access that they do not admit unauthorised persons. If unauthorised persons gain access the security control room should be informed immediately. 5.3 Students should ensure valuables are not on public view through windows and that rooms are locked when unoccupied. 5.4 The security team may remove unattended valuables, such as laptops, to lost property for safekeeping. Students should check with lost property in person or by telephone, if such an item goes missing. This way it can be returned promptly or, in the case of theft, dealt with by the police. 5.5 Students should be aware that their work is valuable and they should protect their documents on the computer with passwords. University of Reading January 2011 Page 10 of 17

11 6. Security management initiatives 6.1 The security team will develop both pro-active and reactive initiatives in relation to university security management. 6.2 All Schools, Directorates and other university organisations should inform the security team of all security related matters and work with the Security Services Manager on issues relating to their specific area. 6.3 Develop a positive security environment amongst staff, students and visitors to encourage a culture where the responsibility for security is accepted by all and the actions of a minority who breach security is not tolerated. 6.4 Deter those who may be minded to breach security by using publicity to raise awareness of initiatives being used to thwart their intended actions. 6.5 Prevent security incidents or breaches from occurring, wherever possible, or minimise the risk of them occurring by learning from operational experience, using technology wisely and sharing best practice. 6.6 Detecting reported security incidents or breaches in a simple consistent manner across the university so that trends and risks can be analysed. This will allow the collation of data to inform the development of preventative measures or the revision of policies and procedures. 6.7 Investigate security incidents or breaches in a fair, objective and professional manner. This practice will ensure that those responsible for such incidents are held to account for their actions and that the causes of such incidents or breaches are fed into prevention work to minimise reoccurrence. 6.8 Apply a wide range of sanctions against those responsible for security incidents and breaches, involving a combination of procedural, disciplinary, civil and criminal action as appropriate. 6.9 Seek redress through the criminal and civil justice systems against those whose actions lead to loss of university resources as a result of security incidents or breaches. 7. Protecting property and assets 7.1 Everyone who works, studies, uses or provides services to the university has a collective responsibility to ensure that property and assets are secure. 7.2 Property is defined as the physical buildings in which university staff and students live, work and study, where students are taught and from where the business of the university is delivered. Assets, irrespective of their value, are materials and equipment used to deliver university services. In respect of staff and students it can also mean the personal possessions they retain whilst working in, studying in, using or providing services to the university. 7.3 Protecting property involves buildings from where the university services are delivered. Damage to or theft from them impacts on the delivery of those services and deprives the university of resources. Poorly designed buildings or extended sites with numerous exits and public rights of way makes the securing of property difficult and creates the potential for those who have no official business to gain unchallenged access. University of Reading January 2011 Page 11 of 17

12 7.4 University assets are the tools that allow the staff and students to fulfil their roles. Whilst assets are often regarded as items over a certain value recorded on the university asset register, all items owned by or donated to the university should be considered as assets and properly secured, irrespective of whether they are low value stationery items, catering supplies, furniture, IT equipment or consumable goods. 8. Professional and ethical framework 8.1 All staff involved in security work should maintain the highest standards of professionalism. 8.2 Security management work should be undertaken with an open mind, particularly in relation to assessment of incidents, evidence or information. Consideration should be given to all interpretations that may be placed on such incidents, evidence or information. 8.3 A polite and courteous approach should be adopted with the absence of any form of preconception or discrimination in accordance with current equal opportunity or valuing diversity policy. 8.4 All staff working in university security-related positions have a duty to maintain the highest level of expertise and ensure that this is applied thoroughly and comprehensively. 8.5 Work relating to university security must be understood in the context of overall improvement of the university and overall strategic aims, including the continual development of a pro-active culture and effective joint working with other agencies. 8.6 All staff working in university security related positions are to hold an enhanced CRB check. 9. Specific areas of action 9.1 The remit of the security team is very broad and will translate into specific action in many different areas. In order to ensure that real progress is made, there is a need to focus initial effort and priorities on key areas of security management within the university. 9.2 It is essential to the security team operations that the control room continues to be maintained to the required standards. 9.3 Good security management of buildings emanates from the design stage of refurbishment or new build. Security by design is cost effective; working in partnership with outside agencies such as Police Crime Reduction Officers and Crime Prevention Design Advisers during the design stage can reduce the need for measures to be introduced at a later date. Initial consultation also leads to potential design faults being eliminated prior to construction. University of Reading January 2011 Page 12 of 17

13 9.4 It is the responsibility of all staff and students within the university to report all activity of a criminal nature, whether suspected or real. Incident reporting is crucial to the identification of criminal activity as it permits investigation and recommendations to be made to prevent recurrence. Comprehensive reporting of incidents provides an accurate picture of the level of crime throughout the university and thus ensures that adequate resources are provided to combat crime. 9.5 It is very difficult to achieve the fine balance required in the university environment between access to buildings for the people who require it and to deny access to potential criminals attracted to buildings by the valuable contents. Departments and faculties should develop and promote an access policy tailored to their specific needs and share this with the security team. Such policies should contain current out-of-hours procedures for each department and faculty as well as plans for shut down periods and a list of relevant people to contact in cases of emergency. 9.6 Key and sensitive areas of buildings covered by access control should be used effectively in order to reduce unauthorised personnel gaining access. 9.7 A universal system with regard to signing in of visitors to departments and faculties should be adopted by the university to prevent giving the opportunist criminal the ability to gain access to these areas. 9.8 Risks may vary depending on the time of day, level of building use or if any alterations to buildings are in progress. A risk analysis should be carried out annually or more frequently if there are physical changes to the building. Once a risk analysis is prepared, it should be evaluated in consultation with the Security Services Manager to decide if the risks are acceptable, the level of protection required and the order of priorities. 10. Personal security Whilst it is the responsibility of the security department to help ensure a safe and secure working environment, it is the responsibility of all staff, students and visitors on university premises to take all reasonable measures to ensure their own personal security. When moving around the university, staff, students and visitors should note the following advice: Endeavour to be familiar with your surroundings and aware of other people. Try to avoid poorly lit or isolated areas. Report any deficiencies in pathways or lighting to FMD Helpdesk on extension Report any suspicious behaviour to the security control room on ext If working late, inform the security control room giving details of your name and location and expected finish time. University of Reading January 2011 Page 13 of 17

14 11. The right of search 11.1 In exceptional circumstances and when a criminal offence is suspected, any personnel on university property, may be liable to a search of their offices, personal possessions, vehicles or accommodation. Such searches will be carried out by trained security operatives, after permission has been given by the owner/occupier. If permission is denied, depending on circumstances, the police may be contacted University staff and security officers have the authority to carry out searches of a person under the Violent Crime Reduction Act 2006 part 2 Weapons Section 85b. This legislation provides for members of staff of an institution within the further and higher education sector who has reasonable grounds for suspecting that a student at the institution may have with him/her or in his/her possession: a. An article to which section 139 of the Criminal Justice Act 1988 applies (knives/blades) or b. An offensive weapon under the Prevention of Crime Act 1953 The term 'offensive weapon' is defined as: "Any article made or adapted for use to cause injury to the person, or intended by the person having it with him for such use The legislation does stipulate that it must be on the institutions premises and that a person may only carry out the search if: a. He/She is the principal of the institution or b. He/She has been authorised by the principal to carry out the search. 12. Drugs and illegal substances 12.1 Any drugs which are categorised as class A, B or C under the Misuse of Drugs Act 1971 are not permitted on any university property. The only exceptions to this would be drugs that are authorised to be used in official research or teaching or related activity. The following are criminal offences: Unlawful possession of a controlled substance. Possession of a controlled substance with intent to supply. Supplying or offering to supply a controlled substance (even when no charge is made for the substance). Allowing premises you occupy or manage to be used unlawfully for the purpose of producing or supplying a controlled substance. 13. The ten principles for risk analysis 13.1 A risk analysis, must be reasonable, realistic and risk commensurate. Where funding is limited and risks are considered low, often a simple solution can be just as effective as a more complex one. For example, a window lock can be a cheap and effective investment to prevent burglary instead of the expense of installing an intruder alarm Removal of the target, (valuable item); ensuring that it is not on public view. For example, expensive computing equipment should be housed on an upper floor rather than the ground floor or away from external windows. Expensive or critical IT equipment should be housed off site at purpose-built IT premises. University of Reading January 2011 Page 14 of 17

15 13.3 Make the target resistant to attack. Areas that have alarm protection or are covered by CCTV systems deter criminal activity and the criminal will look for a softer target Restrict access to a room, area, floor or building by using access control; the university electronic card system, digital lock or traditional key Ensure that anything an offender may find useful to assist in their crime, such as keys, tools or ladders, are locked away and not easily accessible Consider the value of the loss if something was stolen; property marking of expensive articles, either with post code, department or name is advisable Three methods of surveillance should be considered: natural, where the area is visible to other occupants or passers-by; formal by using technology and/or people to monitor the area and deter offenders and formulating a procedure to deal with suspicious persons; informal, encouraging employees to be vigilant Incorporating a range of security measures at the design and planning stage of a building or refurbishment to reduce the risk of crime. Perimeter controls or surveillance methods should be considered Local procedures, as well as university policy, should be utilised; efficient evening locking up procedures for offices and IT rooms, key issue and control, exit procedures for staff leaving the employment of the university (hand in identity cards, parking permits, uniform, keys and change access codes) Any measure that hinders an offender should be implemented. The longer it takes to commit an offence the more vulnerable the perpetrator becomes, which increases the chance of their being apprehended. Discouragement, detection by CCTV or Smart Water, should be publicised by warning signs. 14. Property marking and security of equipment 14.1The University has a number of high risk areas 14.2 These areas have been risk assessed and a high level of security has been provided including internal and external CCTV and management system to control access etc Regular updated risk assessments are carried out to these locations. In the future if any further high risks areas are created they will be subject to full risk assessment with the user and relevant university staff and measures put in place to ensure the security of the location/equipment Individual computers or laptops located in communal areas should be enclosed with a steel enclosure, or similar security entrapment device, or secured when unattended. A vacated area or room should be locked and AV equipment should be secured, dependent on the functionality of the equipment. A security risk assessment should be conducted by the security team (in conjunction with the university insurers) at any time with the resultant report or recommendations to improve security made to the head of department or faculty. Computers should be password protected, encrypted as necessary and/or switched off when not in use to prevent unauthorised access to information Consideration should be given to using a security marking system (Smart Water for example). University of Reading January 2011 Page 15 of 17

16 14.6 Keys are the responsibility of heads of departments and faculties, to be kept secure and their issue and return recorded. Applications for keys should be made in writing and issued subject to satisfactory fulfilment of criteria ensuring need, use and availability. Loss of keys must be reported to the head of department or faculty who must inform the Security Services Manager. Persons leaving the university or transferring to another department must return their key(s) to their head of department or faculty. Keys must not be passed directly to a replacement employee All lost and found property must be recorded centrally through Palmer reception, not via an individual department, to provide an audit trail to facilitate the location of lost property. 15. Monitoring and review 15.1 The security strategy will be reviewed every 24 months, or sooner, if required by the Security Services Manager Key performance indicators will be established which will measure the effectiveness of the security service provided and the security strategy: The number of all reported incidents on a monthly and annual basis to identify the nature of the incident and any trends. The number of all crime related incidents on a monthly and annual basis to identify areas that require attention and to take action to reduce the incidence of crime in the university. The number of complaints received per month relating to university premises and from the wider Reading community to identify and address any trends and to reduce the number of external complaints received. The number and nature of incidents where support is given to university customers, to identify trends and recommend appropriate actions. The number and nature of incidents attended in the wider Reading community to identify any hot spots that are developing and then taking appropriate actions to address these issues. University of Reading January 2011 Page 16 of 17

17 Appendix A : Action Plan No. Action Responsible Date 1 This security policy is applied throughout the university 2 The Security Services Manager to attend early project meetings to review security issues and liaise with outside agencies. 3 Security marking system to be considered to identify, and thus protect, valuable assets. 4 Continue to provide on-line incident reporting facilities and software for all staff and students. 5 Schools, Directorates and other university organisations carry out security risk assessments with the assistance of the Security Services Manager using the ten principles for risk analysis 6 All Schools, Directorates and other university organisations to introduce procedures for the effective management of key issue and storage. 7 All Schools, Directorates and other university organisations to introduce procedures to manage visitors to their area. All Security Services Manager Schools, Directorates and other university organisations Security Services Manager Schools, Directorates and other university organisations Schools, Directorates and other university organisations Schools, Directorates and other university organisations ongoing ongoing October 2011 ongoing ongoing October 2011 October 2011 University of Reading January 2011 Page 17 of 17

A Professional Approach to Managing Security in the NHS

A Professional Approach to Managing Security in the NHS A Professional Approach to Managing Security in the NHS Contents Chapter Page Foreword 3 Preface 4 1. Introduction 5 2. The Security Management remit 7 3. The Security Management business process 8 4.

More information

Physical Security Policy Template

Physical Security Policy Template Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your

More information

UK SBS Physical Security Policy

UK SBS Physical Security Policy UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following

More information

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff

More information

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV

More information

Physical Security Policy

Physical Security Policy London School of Economics & Political Science Physical Security Policy Final Draft: 06/11/12 Approved by Estates Strategy Committee: 22/05/13 Next Review Date: 22/05/14 London School of Economics Physical

More information

Car Security Begins at Home

Car Security Begins at Home Please print out and complete this form to reduce the risk of car theft happening to you. In Australia, seven in 10 late model vehicles are stolen by the thief gaining access to the vehicles keys or transponder.

More information

HEALTH AND SAFETY POLICY AND PROCEDURES

HEALTH AND SAFETY POLICY AND PROCEDURES HEALTH AND SAFETY POLICY AND PROCEDURES 1 Introduction 1. The Health and Safety at Work etc. Act 1974 places a legal duty on the University to prepare and revise as often as may be appropriate, a written

More information

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent

More information

TRUST SECURITY MANAGEMENT POLICY

TRUST SECURITY MANAGEMENT POLICY TRUST SECURITY MANAGEMENT POLICY EXECUTIVE SUMMARY The Board recognises that security management is an integral part of good, effective and efficient risk management practise and to be effective should

More information

SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY

SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY UNIT DESCRIPTOR This unit covers the competencies required to create and maintain a safe and secure hotel property both inside the property and the surrounding

More information

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.

More information

Information Security Incident Management Policy September 2013

Information Security Incident Management Policy September 2013 Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective

More information

Corporate. Security Management Policy. Document Control Summary. Contents

Corporate. Security Management Policy. Document Control Summary. Contents Corporate Security Management Policy Document Control Summary Status: Version: Author/Title: Owner/Title: Approved by: Ratified: Related Trust Strategy and/or Strategic Aims Implementation Date: Review

More information

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Policy on Public and School Bus Closed Circuit Television Systems (CCTV) DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Other Review Dates: 15 July 2010, 20 October 2011

Other Review Dates: 15 July 2010, 20 October 2011 POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October

More information

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012 UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one

More information

The Banking and Financial Institutions (Physical Security Measures) Regulations, 2014

The Banking and Financial Institutions (Physical Security Measures) Regulations, 2014 GOVERNMENT NOTICE NO 291 published on 22/08/2014 THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2014 ARRANGEMENT OF REGULATIONS Regulation Title PART I PRELIMINARY 1.

More information

College Policies and Procedures. Code of Student Conduct for South Essex College students in University of Essex Residential Accommodation

College Policies and Procedures. Code of Student Conduct for South Essex College students in University of Essex Residential Accommodation College Policies and Procedures Code of Student Conduct for South Essex College students in University of Essex Residential Accommodation Wendy Barnes Assistant Principal Student Support August 2014 1

More information

CCTV Cameras Policy. Policy Guidelines

CCTV Cameras Policy. Policy Guidelines CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

Information Governance Strategy & Policy

Information Governance Strategy & Policy Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information

More information

EMERGENCY MANAGEMENT IN SCHOOLS

EMERGENCY MANAGEMENT IN SCHOOLS EMERGENCY MANAGEMENT IN SCHOOLS Michelle Roberts and Mark Stephens Emergency and Security Management Branch Department of Education and Training Victoria Paper presented at the The Role of Schools in Crime

More information

Anti-Social Behaviour Strategy

Anti-Social Behaviour Strategy Comhairle Contae an Chláir CLARE COUNTY COUNCIL Housing, Social and Cultural Services Directorate Anti-Social Behaviour Strategy December 2010 Adopted by Clare County Council C:\Documents and Settings\MHannon\Desktop\Anti-social

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

Mobile Devices Security Policy

Mobile Devices Security Policy Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU

More information

Glasgow Kelvin College. Disciplinary Policy and Procedure

Glasgow Kelvin College. Disciplinary Policy and Procedure Appendix 1 Glasgow Kelvin College Disciplinary Policy and Procedure Document Control Information Status: Responsibility for Document and its implementation Responsibility for document review: Current version

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK

INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK INFORMATION REQUIRED FOR EMPLOYEE HANDBOOK Registered Company Name Company Trading Name Address Email Address Contact number We have enclosed a standard employee handbook. You should read through the details

More information

OAKPARK SECURITY SYSTEMS LIMITED. Health & Safety Policy. Requests or suggestions for amendment to this procedure

OAKPARK SECURITY SYSTEMS LIMITED. Health & Safety Policy. Requests or suggestions for amendment to this procedure OAKPARK SECURITY SYSTEMS LIMITED Requests or suggestions for amendment to this procedure should be submitted to the owner of the process PROCESS OWNER: MANAGEMENT TEAM Current version: PREVIOUS VERSION

More information

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures.

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures. SECURITY SURVEY AND RISK ASSESSMENT A security survey gives a rounded picture of the risks that your school faces and the security measures in existence. Without this information it is difficult to assess:-

More information

Method Statement Reception Services

Method Statement Reception Services CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 19 th March 2007 Project Co Final Version Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...

More information

Introduction to the NHS Information Governance Requirements

Introduction to the NHS Information Governance Requirements Introduction to the NHS Information Governance Requirements 2 Version April 2014 Information Governance ensures necessary safeguards for, and appropriate use of, patient and personal information. The widely

More information

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3

More information

Information Security Policy

Information Security Policy Document reference: Version 3.0 Date issued: April 2015 Contact: Matthew Jubb Information Security Policy Revision History Version Summary of changes Date V1.0 First version finalised. February 2006 V1.1

More information

SPACE MANAGEMENT POLICY

SPACE MANAGEMENT POLICY SPACE MANAGEMENT POLICY Originated by Assistant Director, Management Services: October 2010 Impact Assessment: 11 November 2010 Recommended by Estates Committee: 1 November 2010 Approved by Council: 22

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

University of Essex Automatic Number Plate Recognition (ANPR) Policy

University of Essex Automatic Number Plate Recognition (ANPR) Policy & Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies

More information

CCTV CODE OF PRACTICE

CCTV CODE OF PRACTICE CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,

More information

CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board

CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD Data Breach Management Policy Adopted by Cavan and Monaghan Education Training Board on 11 September 2013 Policy Safeguarding personally identifiable information

More information

MICHIGAN JEWISH INSTITUTE Policy and Procedure Manual

MICHIGAN JEWISH INSTITUTE Policy and Procedure Manual Effective Date: June 2003 Page No. 1 of 12 GENERAL PURPOSE: This policy is intended to provide a process and procedure that will increase awareness of campus safety and security issues and to communicate

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Incident Response Policy Reference Number Title CSD-012 Information Security Incident Response Policy Version Number 1.2 Document Status Document Classification

More information

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers

More information

CHILDREN AND YOUNG PEOPLE SERVICE ALCOHOL, DRUG OR OTHER SUBSTANCE MISUSE OR ABUSE POLICY

CHILDREN AND YOUNG PEOPLE SERVICE ALCOHOL, DRUG OR OTHER SUBSTANCE MISUSE OR ABUSE POLICY CHILDREN AND YOUNG PEOPLE SERVICE ALCOHOL, DRUG OR OTHER SUBSTANCE MISUSE OR ABUSE POLICY KirkleesEdnet/Management/HumanResources APRIL 2008 Prepared by: Human Resources Strategy Unit Revised: November

More information

PostNL Group Policy. on Fraud Prevention. PostNL Group Policy. on Fraud Prevention Page 1 of 15

PostNL Group Policy. on Fraud Prevention. PostNL Group Policy. on Fraud Prevention Page 1 of 15 on Fraud Prevention on Fraud Prevention Page 1 of 15 Contents 1 Objective of this group policy 3 2 Scope 4 3 Definitions 5 4 Policy provisions and responsibilities 7 4.1 Fraud Prevention controls 7 4.2

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

Health and Safety Management Standards

Health and Safety Management Standards Health and Safety Management Standards Health and Safety Curtin University APR 2012 PAGE LEFT INTENTIONALLY BLANK Page 2 of 15 CONTENTS 1. Introduction... 4 1.1 Hierarchy of Health and Safety Documents...

More information

Banking and Financial Institutions (Physical Security Measures) THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008

Banking and Financial Institutions (Physical Security Measures) THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008 THE BANKING AND FINANCIAL INSTITUTIONS (PHYSICAL SECURITY MEASURES) REGULATIONS, 2008 ARRANGEMENT OF REGULATIONS Regulation Title PART I PRELIMINARY PROVISIONS 1. Short title 2. Application 3. Interpretation

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT This Code of Ethics and Business Conduct ( Code ) has been approved by the Amalgamated Holdings Limited ( AHL ) Board of Directors for use within the AHL controlled

More information

Code of Practice EST 01 Decommissioning arrangements prior to site hand over Oct 2004

Code of Practice EST 01 Decommissioning arrangements prior to site hand over Oct 2004 Estates Division Imperial College London Room 503 Sherfield Building South Kensington Campus London SW7 2AZ, UK Tel: +44 (0)20 7594 9832 Fax: +44 (0)20 7594 9050 r.mayne@imperial.ac.uk www.imperial.ac.uk

More information

THE QUEEN S COLLEGE OXFORD

THE QUEEN S COLLEGE OXFORD THE QUEEN S COLLEGE OXFORD THIS ACCOMMODATION LICENCE AGREEMENT together with the College s Information Booklet and College Regulations create legally binding obligations between the College and the Student.

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

NSW POLICE FORCE. Home Safe

NSW POLICE FORCE. Home Safe NSW POLICE FORCE Home Safe IS YOUR HOME SECURE? This brochure is intended to provide your household with the latest information regarding home security and break-in prevention. You will learn how to evaluate

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position

More information

Sample Workplace Alcohol and Drugs Policy

Sample Workplace Alcohol and Drugs Policy Sample Workplace Alcohol and Drugs Policy 1. Introduction This company is committed to providing a safe, healthy and productive working environment for all employees, contractors, customers and visitors

More information

ROYAL HOLLOWAY University of London. DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff)

ROYAL HOLLOWAY University of London. DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff) APPROVED BY COUNCIL September 2002 ROYAL HOLLOWAY University of London DISCIPLINARY POLICY AND PROCEDURE (for all staff other than academic teaching staff) Disciplinary Policy and Procedure September 2002

More information

Corporate Health and Safety Policy

Corporate Health and Safety Policy Corporate Health and Safety Policy November 2013 Ref: HSP/V01/13 EALING COUNCIL Table of Contents PART 1: POLICY STATEMENT... 3 PART 2: ORGANISATION... 4 2.1 THE COUNCIL:... 4 2.2 ALLOCATION OF RESPONSIBILITY...

More information

SECURITY POLICY REMOTE WORKING

SECURITY POLICY REMOTE WORKING ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1 Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees

More information

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire

More information

No employee, student, contractor or visitor shall in connection with any workrelated

No employee, student, contractor or visitor shall in connection with any workrelated Alcohol and Drugs Misuse Policy Introduction The University is committed to promoting the well being of all its employees, students, contractors and visitors whilst ensuring that a professional, effective

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

CEOP Relationship Management Strategy

CEOP Relationship Management Strategy Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Rules for the use of the IT facilities. Effective August 2015 Present

Rules for the use of the IT facilities. Effective August 2015 Present Rules for the use of the IT facilities Effective August 2015 Present INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules ) 1. Introduction 2. Interpretation 3.

More information

DRUG AND ALCOHOL ABUSE POLICY

DRUG AND ALCOHOL ABUSE POLICY DRUG AND ALCOHOL ABUSE POLICY St Mary Magdalene Academy is a Christian community of learning. We aim to nurture young people to become high achievers and to discover their vocation in the global society.

More information

University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10

University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10 UNIVERSITY OF LONDON CCTV POLICY Academic Buildings, Libraries and Residences Page 1 of 10 Contents The CCTV system... 3 Responsible officers... 3 Data Protection Act 1998... 3 The system... 3 Purpose

More information

Health and Safety at Work Policy

Health and Safety at Work Policy Health and Safety at Work Policy Introduction Management of health and safety issues is an integral part of our business and is given the highest priority. Compliance with Health and Safety legislation

More information

Campus Security and Safety Report Madison Center September, 2015

Campus Security and Safety Report Madison Center September, 2015 Campus Security and Safety Report Madison Center September, 2015 This information is being provided to all students and employees as part of Upper Iowa University's - Madison Center commitment to safety

More information

Mike Casey Director of IT

Mike Casey Director of IT Network Security Developed in response to: Contributes to HCC Core Standard number: Type: Policy Register No: 09037 Status: Public IG Toolkit, Best Practice C7c Consulted With Post/Committee/Group Date

More information

CONDUCT AND ETHICS 4. CONDUCT AND ETHICS. 4.1 Renishaw s Alcohol and Drug Policy. 4.2 Dealings in Company Shares. 4.3 Conflict of Interests

CONDUCT AND ETHICS 4. CONDUCT AND ETHICS. 4.1 Renishaw s Alcohol and Drug Policy. 4.2 Dealings in Company Shares. 4.3 Conflict of Interests chapter _v5 15/10/200 12:21 pm Page 3 CONDUCT AND ETHICS. CONDUCT AND ETHICS.1 Renishaw s Alcohol and Drug Policy.2 Dealings in Company Shares.3 Conflict of Interests. Unauthorised Gambling and Lotteries.5

More information

NOT PROTECTIVELY MARKED

NOT PROTECTIVELY MARKED Force Template NOT PROTECTIVELY MARKED Title Policing Cannabis Possession CCMT Sponsor ACC Local Policing Department/Area Local Policing Section/Sector Drugs Co-ordination 1.0 Rationale 1.1 The purpose

More information

Information Systems Acceptable Use Policy for Learners

Information Systems Acceptable Use Policy for Learners Information Systems Acceptable Use Policy for Learners 1. Introduction 1.1. Morley College is committed to providing learners with easy access to computing and photocopying facilities. However it needs

More information

Data and Information Security Policy

Data and Information Security Policy St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration

More information

Video surveillance policy (PUBLIC)

Video surveillance policy (PUBLIC) 29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related

More information

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same

POLICY TEMPLATE. Date initially approved: November 5, 2013 Date of last revision: same POLICY TEMPLATE Video Surveillance Category: Approval: Responsibility: Date: Operations PVP VP Finance and Administration Date initially approved: November 5, 2013 Date of last revision: same Definitions:

More information

The Manitowoc Company, Inc.

The Manitowoc Company, Inc. The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Security Policy and Procedures

Security Policy and Procedures The British Section SHAPE International School Aims Security Policy and Procedures The aim of this policy is to ensure that the school can operate on a day-to-day basis in an environment that is safe and

More information

Ulster University Standard Cover Sheet

Ulster University Standard Cover Sheet Ulster University Standard Cover Sheet Document Title IT Monitoring Policy 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information Services

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

The Management of Asbestos containing Materials

The Management of Asbestos containing Materials The Management of Asbestos containing Materials Status Owner Approval by University Court Draft Head of Estates and Building 1 Purpose... 1 2 Scope... 3 3 Principles... 4 4 Procedure... 5 5 Accountabilities...

More information

1.4 The banking entities that provide customer service will keep controls of access to the premises.

1.4 The banking entities that provide customer service will keep controls of access to the premises. RULE No. 01-2007 1 (dated November 21, 2007) "Whereby Minimum Security Standards are stipulated for the Banking Entities" THE BOARD OF DIRECTORS using its legal authority, and WHEREAS: Pursuant to Numeral

More information

Delivery Plan 2014 15

Delivery Plan 2014 15 Delivery Plan 2014 15 Foreword Recorded crime levels have fallen considerably over the last five years but we have also seen changes to the patterns of crime. The delivery plan demonstrates our commitment

More information

Incident reporting procedure

Incident reporting procedure Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance

More information

Remote Working - Remote and Mobile Computing Policy. Purpose 3. Strategic Aims 3. Introduction 3. Scope 5. Responsibilities 5.

Remote Working - Remote and Mobile Computing Policy. Purpose 3. Strategic Aims 3. Introduction 3. Scope 5. Responsibilities 5. Brigade Order Human Resources Brigade Order 3 Part 5 Section Title Remote Working - Remote and Mobile Computing Policy Contents No. Purpose 3 Strategic Aims 3 Introduction 3 Scope 5 Responsibilities 5

More information

Employee Alcohol and Substance Abuse Policy. Effective from January 2014

Employee Alcohol and Substance Abuse Policy. Effective from January 2014 Employee Alcohol and Substance Abuse Policy Effective from January 2014 Contents 1.0 Introduction... 4 2.0 Aims... 4 3.0 Legal issues in relation to employment... 4 3.1 Health and Safety at Work Act 1974...

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19 Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility

More information

Disciplinary and Performance Management Policy & Procedure October 2010

Disciplinary and Performance Management Policy & Procedure October 2010 Disciplinary and Performance Management Policy & Procedure October 2010 Policy control Reference Disciplinary & Performance Management Policy & Procedure Date approved 18 October 2010 Approving Bodies

More information