Grasmere Primary School Asset Management Policy
|
|
|
- Daniel Newman
- 10 years ago
- Views:
Transcription
1 Grasmere Primary School Asset Management Policy
2 1. INTRODUCTION: The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the custody and physical control of all other assets including machinery, furniture, equipment, stock and other assets such as cash (HLT Financial Procedures Manuals for Schools 7.1, April 2014 version). 1.2 The Asset Register Grasmere Primary School maintains an Asset Register of items held by the school that the Governing Body deems to be valuable and/or subject to an insurance claim. Moveable assets valued at or more must be recorded. Note that all Information Technology (IT) equipment must be recorded, regardless of their value The Asset Register should include the following information: Date of acquisition of asset Description of asset, including colour, a unique identification mark such as serial number and security marking, where appropriate For ICT/electrical equipment, a record of the model or other unique reference/security number Cost of the asset purchased Source of funding Location of the asset Details of the disposal of any assets, whether scrapped, sold or donated Details of the revaluation of an asset Items used by the school but owned by others (eg leased items) supported by a note of ownership Where possible, the Asset Register should be held within the school s financial system, rather than as a hardcopy document A copy of the Asset Register must be kept in a safe, fireproof place, and be available for inspection Acquisitions and disposals should be recorded on the register at the time of acquisition or disposal and reported to the Governing Body The Governing Body must ensure that the asset register is kept-up-to-date and is reviewed at least once a year. The review must include the physical check of the assets and must be performed by someone other than the person maintaining the register. The asset register should be certified and dated on completion of the review The upkeep of the asset register can be particularly important for insurance reasons, as policies will often limit the insurance of equipment etc to those items present on the school asset register Register should be reconciled annually with the School s Insurance Services records. Where the school participates in the Council s insurance programme, the register submitted to the Council should contain all audio/visual/ict items.
3 1.3 Loaning Assets An asset can be loaned to staff of the school, and Grasmere must keep a log of such loans. Where a loan of asset could be deemed a benefit in kind and therefore have tax implications for the individual, the relevant paperwork must be completed. 1.4 Disposing of Assets The Governing Body of Grasmere may dispose of assets through sale, donation or scrapping Assets that have been disposed of must be removed from the Asset Register, and the insurer notified For every disposal, the Governing Body or the person who is maintaining the Asset Register must: - Record the reasons for the disposal - Be able to demonstrate that the assets are either obsolete or surplus to requirements Headteacher must appoint a single person (ICT technician) to be responsible for disposing of assets, and inform them in writing that they are ultimately accountable for doing so. The responsible person s name must be clearly identified in the school s disposal file Any disposal of a capital asset must be made in accordance with the school s policy on purchasing and disposal and, where the disposal involves land and/or buildings funded by the LA, the school must obtain formal advice and approval from the Hackney Learning Trust Grasmere Primary School must ensure that they adhere to the latest WEEE (Waste Electrical and Electronic Equipment) Legislation, which sets out the requirements for disposing of electrical/electronic equipment, (see The legislation states that such assets cannot just be thrown away, must be disposed of properly, either by: - Donation to a charity (for refurbishment and re-use) eg Tools for Schools - Disposal by a specialist organisation, who will take such items away and recycle them Before disposing of computer equipment school must ensure compliance with Data Protection Act 1984 by erasing all personal data from the hard disk. Note that merely deleting files may not physically remove the data, which could be restored using specialist products. School must also ensure that any software products for which licences are maintained in-house are removed from the equipment prior to disposal.
4 1.4.8 Any member of staff who determines that an asset is surplus to requirement, or who is involved in the disposal, should never attempt to purchase it or take it for personal gain. There should be a clear separation of duties and the Headteacher must approve all disposals Official receipts must be issued for income received for disposed assets. Monies must be received and properly accounted for by someone who has not been involved in the disposal The income received from the sale of any asset must be treated as income in the school s budget, unless it relates to the sale of certain assets (such as land and buildings owned by the LA) or to income from a Public/Private Partnership (PPP) or Private Finance Initiative (PFI), which are subject to a specific agreement. 1.5 Obsolete Assets Assets are deemed obsolete if they have no resale value Grasmere School may donate surplus, obsolete assets to the voluntary sector or scrap them. 1.6 Surplus Assets Where the possible sale value for an item or group of items exceeds a predetermined threshold value, the school should seek to dispose of them by quotation, competitive tender or public auction, unless approved by the Governing Body to do otherwise The threshold value should be set by the Governing Body 1.7 Retention of Disposal Documentation All documentation relating to the disposal of the asset must be retained for a period of six years after the disposal The following types of document should be retained: - The Governing Body or Headteacher s written record declaring the asset surplus, and instructions to the person appointed as responsible for the disposal - The advertisement - The offers made - The receipt 1.8 Security General The Governing Body is responsible for the security of the school s assets It is responsibility of all Budget Holders to ensure that a yearly stock check is carried out during the summer term. Any missing items must be reported to the Governing Body.
5 1.8.3 Appropriate arrangements must be in place for the security of all assets. Security measures could include the following: - Secure equipment and other assets by means of physical and other security devices (eg locked in cupboards) - Authority to access these secured assets should be clearly documented - All items in the asset register should be permanently and visibly marked as the school s property - Maintain a record of any model or other unique reference/security number in the asset register - Clearly mark any portable equipment that is vulnerable to theft with the name of the school Items which are easily portable and saleable (videos, televisions, computers, cameras, etc) must be security marked and kept securely locked away when not in use, particularly overnight. Keep a separate record (in the Asset Register) of any model or other number unique to your machines Items of school property should not be removed from the school premises without the appropriate delegated authority Should property be removed from the school premises, the school should: - Establish the position related to insurance before the assets are taken off site - Be aware that assets on loan for extended periods or to a single member of staff on a regular basis may be deemed a benefit-in-kind, which may be subject to taxation - Keep a record of all assets removed from the school premises - Update the record when the assets are returned 1.9 Computer Security and Protection School computer systems hold sensitive financial and personal data. School must, therefore, take appropriate action to ensure that equipment and data is kept secure School should have a written ICT Security Policy, which should encompass the guidelines for protecting hardware and software, set out below Protecting Hardware The main dangers to hardware are: - Loss through theft - Damage (accidental or otherwise) To minimise the danger of loss or damage, the machines should be: - Labelled with a unique asset number - Entered onto the school s asset register with their serial numbers - Correctly positioned (ie towers not laid on their sides)
6 If possible, the machines should also be: - Not visible from outside the building or to the public generally - Kept in a locked room when not in use, particularly overnight - Where possible, secured to furniture - Labelled, marked with indelible pen or have the name of the school soldered onto the case To minimise damage and the chances of the machines being damaged all users should: - Refrain from eating or drinking whilst working on the machines - Never move or attempt to clean a machine without first obtaining the IT coordinator s advice - Ensure any loose cabling into the machine is not in danger of being stood on or tripped over by staff - Know who to contact in the event of a breakdown of the machine Laptops and other easily portable equipment are particularly vulnerable to theft and damage. They should be kept in a locked cupboard when not in use and carefully protected when taken outside the office File servers must be kept in secure rooms, with access limited only to authorised individuals Protecting Software The main danger to software are: - Unauthorised access to data - Accidental loss of data by the user or because of machine failure - Corruption of data by computer viruses To minimise the danger of unauthorised access, users should ensure that: - The system is returned to the password screen when leaving the office - The machine is switched off when not in use Only authorised staff should have access to computer hardware and software for the school management Passwords should be used to stop unauthorised access to information Procedures should also exist for a new password to be issued to new staff, and withdrawn when staff leave Passwords should be: - At least six characters long and preferably contain a number - Changed regularly (every 90 days) and as soon as a user leaves
7 - Not shared between users - Not written down - Not obvious (such as the user s telephone number) School should have a recovery plan in the event of loss of accounting or financial data. The plan should outline the need for and frequency of electronic back-up, secure storage back-ups (if possible, off-site), and manual procedures to provide support for key processes where normal system usage is not possible The following precautions should be taken to minimise any loss of data caused by machine failure or user error. (When PCs are networked and data is stored to a server, these functions should be carried out by the System Administrator) - Give all users proper written instructions on how to use the system - Back up all data regularly (ie files created by the user such as word processor documents or spreadsheet files). It is recommended that data be backed up after 8 hours work on the machine - If possible, keep at least three generations of back-up (ie the previous three back-ups). Back-up cycles should be taken daily, weekly and monthly - Maintain a back-up of all operating software (such as Windows NT) - Store the system disks/cds for the applications (such as Microsoft Office) securely - Store all back-ups away from the vicinity of the machines in a fireproof, locked cabinet or safe-preferably off-site - Ensure that there is adequate hardware maintenance cover for critical equipment To minimise the danger of data corruption by viruses and an-antivirus solution must be implemented for all networked PCs and servers. There is a continuing threat from previously undetected viruses, so staff should take the following precautions: - Never load software without the school s IT co-ordinator s approval, including software from the internet. - Never load any disks/cds sent unexpectedly through the post (for example, demonstration or customer research software) - Strictly control the transfer of software and data from one machine to another - Never make unauthorised copies of any software - Ensure virus-checking software is installed on all computers, and regularly updated 1.12 Unauthorised Use of Software and Data Protection The 7 th Data Protection Principle of the 1998 Act requires personal data to be surrounded by proper security. Take care at all times to ensure that staff does not render themselves liable to prosecution under the Data Protection Act Take particular care to protect data accessed or processed by 3 rd parties. Any contract held with organisations or contractors authorised to process Council data should specify the security standards required. Advice on how to comply
8 with the Act is available from Hackney Learning Trust s IT team under service level agreement arrangements Unauthorised copying of software is illegal under copyright Internet Usage Web filtering should be installed to automatically block any inappropriate websites from being accessed Computer Printouts Employees must not release information or computer data, particularly that of a personal or sensitive nature, to unauthorised persons Take care to prevent inadvertent disclosure of information, eg by ensuring that paper is suitably filed and disposed of securely Confidential waste must be shredded Further Advice Staff in Hackney Learning Trust s IT Division can provide advice under service level agreement arrangements, if required. Hackney Learning Trust IT Help desk can be contacted via or telephone.
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Asset Replacement Strategy and Procedure Draft
Asset Replacement Strategy and Procedure Draft 1 Introduction Academies are required to establish systems of control to ensure that assets and resources used by the academy are recorded and adequately
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Working Together Aiming High!
Poplar Street Primary School ICT Security and Acceptable Use Policy E-Safety policy 2013/14 Working Together Aiming High! 1 Contents 1. Introduction... 3 2. Policy Objectives... 3 3. Application... 3 4.
FINANCIAL PROCEDURES FOR SCHOOL. Reviewed by the Governing Body 2012
FINANCIAL PROCEDURES FOR SCHOOL Reviewed by the Governing Body 2012 If you require advice on financial matters which you feel are not addressed by this document please contact your Schools Finance Support
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.
Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage
Asset Management Policy
Asset Management Policy Issue Date: August 2011 Author: Head of Finance Approval Body: Senior Leadership Team CONTENTS Page 1. Policy Statement 3 2. Scope 3 3. Definitions 3 4. Accountabilities and Responsibilities
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
ICT Disaster Recovery Plan
7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
How To Manage A University Computer System
PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management
Policies and Procedures. Policy on the Use of Portable Storage Devices
Policies and Procedures Policy on the Use of Date Approved by Trust Board Version Issue Date Review Date Lead Person One May 2008 Dec 2012 Head of ICT Two Dec 2012 Dec 2014 Head of ICT Procedure /Policy
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Countering and reducing ICT security risks 1. Physical and environmental risks
Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of
Mobile Devices Security Policy
Mobile Devices Security Policy 1.0 Policy Administration (for completion by Author) Document Title Mobile Devices Security Policy Document Category Policy ref. Status Policy Unique ref no. Issued by GSU
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction
NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING
INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 2.2 Approved by : Information Governance
Data Security Policy
Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:
IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...
IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This
SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0
SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY
Information Security Policy
Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
Information Technology Acceptable Usage Policy
Information Technology Acceptable Usage Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly
Laptop Provision Loreto College, Ballarat
Laptop Provision Loreto College, Ballarat Overview Loreto College is committed to providing all students with relevant, rigorous and engaging learning opportunities and understands that students learn
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
Salary: 45,000-50,000
JOB DESCRIPTION: Responsible to: Purpose of the Post: Business Support Manager Principal Business Support Manager Holds a key post of responsibility within the UTC. Reporting directly to the Principal,
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
Document Management Plan Preparation Guidelines
Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council
Xx Primary School. Finance Policy
Xx Primary School Finance Policy 1. AIMS 1.1 This document has been adopted by the Governing Body, as the basis for the administration and management of finances. The aim of the policy is to create a framework
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
IT Trading UK Ltd Computer & IT Equipment Disposal Specialists
IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: [email protected]
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Management of Assets Procedure
Management of Assets Procedure Contents 1 Introduction... 3 2 Fixed Assets Register... 3 3 Inventory Registers... 3 4 Capital Asset Purchase... 7 5 Asset Physical Verification... 7 6 Asset Disposal...
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Fixed Asset Policy & Procedures. Content
Content 1. Purpose... 3 2. Definitions... 3 3. Responsibility... 3 4. Tagging and Identifying Inventoriable Assets... 4 5. Additions to Fixed Assets... 4 6. Transfer of Assets... 5 7. Disposition of Assets...
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
NETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
Ixion Group Policy & Procedure. Remote Working
Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises
Secure Mobile Shredding and. Solutions
Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject
Kenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY
CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
Portable Devices and Removable Media Acceptable Use Policy v1.0
Portable Devices and Removable Media Acceptable Use Policy v1.0 Organisation Title Creator Oxford Brookes University Portable Devices and Removable Media Acceptable Use Policy Information Security Working
Management of Assets Policy
CREST Management of Assets Policy Version No: Reason for Update Date of Update Updated By 1 Policy introduced April 2012 Finance Office 2 Review incorporates IT Security Internal Audit review February
INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY Rev Date Purpose of Issue/ Description of Change Equality Impact Assessment Completed 1. June 2011 Initial Issue 2. 29 th March 2012 Second Version 3. 15 th April 2013 Third
ONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
SECURITY POLICY REMOTE WORKING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY REMOTE WORKING Introduction This policy defines the security rules and responsibilities that apply when doing Council work outside of Council offices
Overview. Responsibility
Overview Property management is an important function at the University. Prudent inventory practices help protect the University s multi-million dollar investment in equipment, provide documentation needed
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Version: 0.2 Committee Approved by: Audit Committee Date Approved: 15 th January 2014 Author: Responsible Directorate Information Governance & Security Officer, The Health Informatics
Equipment Management Guidelines
Equipment Management Guidelines The following guidelines were developed by the CSU Financial Officers Association to assist campuses in implementing Executive Order 649, Safeguarding State Property. Revised
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
Fixed Asset and Depreciation Policy
1 Fixed Asset and Depreciation Policy Park School November 2013 2 3 FIXED ASSET & DEPRECIATION POLICY CONTENTS 1. Introduction 2. Fixed Asset Register 3. Depreciation Appendix A Appendix B Asset Disposal
SCHEDULE 18. Premises. This Schedule 18 sets out certain terms relating to the Service Provider s Premises.
Business Operations- Schedule 18 (Premises) SCHEDULE 18 Premises This Schedule 18 sets out certain terms relating to the Service Provider s Premises. 1. Service Provider's Premises The following provisions
Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)
Security Awareness A Supplier Guide/Employee Training Pack May 2011 (updated November 2011) Contents/Chapters 1. How do I identify a DWP asset 2. Delivering on behalf of DWP - Accessing DWP assets 3. How
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
Approved and commenced March 2015 Review by March, 2017 CONTENTS
Related Policy Responsible Officer Approved by Approved and commenced March 2015 Review by March, 2017 Responsible Organisational Unit CONTENTS Cashiering and Revenue Collection Procedure Invoicing & Receivables
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
