UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
|
|
|
- Randolf Gardner
- 10 years ago
- Views:
Transcription
1 UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one change) by HR Approved by the Director of Estates 4 September Purpose and objectives This policy forms part of University College London s commitment to the safeguarding of personal data. Its objective is to help staff and students understand their rights and obligations with respect to the use of closed circuit television (CCTV) systems in UCL. 2. Introduction UCL processes the personal data of living individuals such as its staff, students, contractors, research subjects and customers, including images captured by CCTV systems. This processing is regulated by the Data Protection Act 1998 (DPA) and the Information Commissioner s CCTV code of practice. The UK s regulator for the DPA is the Information Commissioner s Office. It is the duty of data controllers such as UCL to comply with the data protection principles with respect to personal data. This policy describes how UCL will discharge its duties in order to ensure the continuing compliance of its CCTV systems with the DPA in general and the data protection principles and the CCTV code in particular. 3. Scope This policy is a supporting policy of the UCL Information Security Policy. Its scope is as defined in section 1.4 of that Policy: The policy applies to all staff and students of UCL and all other computer, network or information users authorized by the College or any department thereof. It relates to their use of any UCL-owned facilities (and those leased by or rented or on loan to UCL), centrally managed or otherwise; to all private systems (whether owned, leased, rented or on loan) when connected to the UCL network; to all UCL-owned or licensed data and programs (wherever stored); and to all data and programs provided to UCL by sponsors or external agencies (wherever stored). The policy also relates to paper files and records created for the purposes of UCL business. 4. Definitions Personal Data 1 Personal data means data which relate to a living individual who can be identified 1 DPA section 1
2 (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual Processing 2 Obtaining, recording or holding personal data. This includes organisation, adaptation or alteration; retrieval, consultation or use; disclosure; and alignment, combination, blocking, erasure or destruction. Data Controller As the organisation which determines the purposes of the processing, UCL is the Data Controller for the personal data that it manages. Data Protection Officer The UCL member of staff with lead responsibility for UCL s compliance with the DPA. Data Subject 3 A living individual who is the subject of personal data Data Processor 4 Any third party (other than UCL staff and students) who processes personal data on behalf of and on the instructions of the Data Controller. 5. Roles and responsibilities Head of Facilities Services The Head of Security & Facilities Services is responsible for the approval and running of CCTV systems on all UCL premises. Security Manager To provide, procure and review a fully staffed security service to the entire UCL Campus and provide protection of the staff, students, visitors, assets and other property through the provision of a safe and secure working environment. To manage the day to day running of the Security Control room and the Control room Manager and to ensure all policies and procedures are kept up to date and implemented. The provision of the service includes developing and reviewing the strategy for the procurement and operation of staffed services, financial and physical resource planning and control and, full day to day operation of all physical security activities on a 24/7/365 basis. Control Room Manager The Control Room Manager is responsible for the assessment and definition of operational requirements before the installation of any CCTV cameras takes place. This should include a statement of the problem, a risk assessment and determination 2 DPA section 1 3 DPA section 1
3 of success criteria, as well as the identification of system requirements and a consideration of operational issues. Management issues should be considered in consultation with relevant colleagues. After installation, the Control Room Manager is also responsible for validation of the cameras, ensuring successful testing of field of view, quality of live and recorded images, storage capabilities of the system and the operation of all alarms and motion detection features. Duty Controllers Are responsible for the daily operation of the system which includes but is not limited to reviewing footage and providing evidence, ensuring access to the control room is controlled and all access is documented in the relevant logs. Reporting all faults to the control room manager, ensuring all views are correct and relate to the specific purpose of the camera, performing daily checks to ensure the system is working as per its intended use. To monitor live images throughout the site for the purpose of security, health and safety and management of the Security staff. Data Protection Officer The Data Protection Officer (DPO) ([email protected]) has primary responsibility for UCL s compliance with the DPA. This comprises: maintaining UCL s notification with the Information Commissioner s Office ensuring completion of the Annual Survey of Personal Data Holdings handling subject access requests and requests from third parties for personal data promoting and maintaining awareness of the DPA and regulations, including training investigating losses and unauthorised disclosures of personal data. The DPO is UCL s main contact for the Information Commissioner s Office. Heads of Department / Division Heads of Department / Division are responsible for ensuring their staff understand the role of the data protection principles in their day-to-day work, through induction, training and performance monitoring, and for monitoring compliance within their own areas of responsibility. They should also ensure Data Protection Coordinators are designated for their departments or divisions, and provided with appropriate training and support. Data Protection Coordinators Coordinators are required to: advise staff and students in their departments on the implementation of and compliance with this policy and any associated guidance / codes of practice ensure appropriate technical and organisational measures are taken within their departments to ensure against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data support UCL s notification with the Information Commissioner s Office by maintaining the register of holdings of personal data, including CCTV, and the purposes of processing
4 keep the Data Protection Officer informed of changes in the collection, use, and security of personal data within their department report any loss of personal data to the Head of Department / Division and the Data Protection Officer. Data Processors Data processors have a contractual responsibility to act only on UCL s instructions and to ensure that their processing of personal data provided by UCL is carried out in compliance with this policy and in accordance with the eight data protection principles. There should be a written agreement with data processors which adequately addresses these responsibilities. Staff and students All staff and students are responsible for: raising any concerns in respect of the processing of personal data with the Data Protection Officer promptly passing on to the Data Protection Officer all subject access requests and requests from third parties for personal data reporting losses or unauthorised disclosures of personal data to the Data Protection Coordinator. 6. Purposes of processing UCL seeks to ensure, as far as is reasonably practicable, the security and safety of all students, staff, visitors and contractors, whilst within or situated on its premises. CCTV cameras and recording devices are deployed in order to: assist in the reduction, prevention and detection of crime assist with the identification, apprehension and prosecution of offenders monitor the security of buildings identify vehicle movement problems around the estate assist with safety and security management provide evidence which may be used by the police or others to prosecute offenders enhance public safety support protection of property. The Information Commissioner s CCTV Code of Practice 4 also allows for employers to use images in circumstances which they cannot be reasonably expected to ignore, including criminal activity, gross misconduct or where behaviour is likely to put others at risk. (Gross misconduct is defined in the UCL Disciplinary Policy and Procedure. 5 )[ 7. Use of images Personal data (i.e. images of individuals obtained by UCL s CCTV systems) may only be used in connection with the stated purposes. Surveillance must be proportionate to the problem. Cameras provide fields of view encompassing approaches to building entrances, building property lines and internal 4 nal_2301.pdf 5
5 communal and secure areas. They will be situated so that they only capture images relevant to the purpose for which the system has been established, and to ensure they do not capture areas not intended to be the subject of surveillance. Where appropriate, recording will take place only at times when a problem usually occurs. With the exception of wide angle or long distance shots, third party domestic or commercial premises are not included in any camera s field of view. Where applicable Pan Tilt & Zoom cameras will be programmed with a normally parked position and third party views will be masked within the camera s field of view. Sound recording is not permitted. Where a system is used which permits sound recording, this function must be disabled. Wireless cameras are not used. Images of staff and students used in disciplinary proceedings will be made available to the subjects of investigations or their representatives to provide them with an opportunity to respond. 7.1 Covert Monitoring Covert monitoring may be used as part of a specific time-limited investigation where informing data subjects that monitoring is taking place would prejudice that investigation. The decision to use covert monitoring may only be taken with written authorisation from one of the following (or authorised delegate) as appropriate: the Director of Human Resources (where monitoring relates to matters in respect of staff); the Registrar (where monitoring relates to matters in respect of students); the Director of Estates and Facilities (where monitoring relates to matters in respect of premises). In addition to the above authority, written authorisation must be obtained from the Head of Facilities Services and the UCL Data Protection Officer. Covert monitoring shall only be used for the prevention and detection of criminal activity or equivalent malpractice. 7.2 Expectation of Heightened Privacy In places where there is a reasonable expectation of heightened privacy, such as lavatories or changing rooms, surveillance (as distinct from covert monitoring) will only take place in the most exceptional circumstances where there is a suspicion of serious crime; there must also be an intention to involve the police. This will be decided by the Head of Facilities Services, in consultation with the Data Protection Officer and in accordance with part 8 of this policy. 7.3 Continuous Monitoring of Staff and Contractors Continuous monitoring of staff and contractors will be used in exceptional circumstances, where failure to follow instructions would endanger personal safety. The decision to use continuous monitoring will only be taken by the Director of Human Resources in consultation with the Data Protection Officer. 8. Signage Signs must be placed so that people are aware they are entering an area which is covered by CCTV cameras. Signs must:
6 be clearly visible and legible be of a size appropriate to the circumstances Signs must contain the following information: the name of the Data Controller (i.e. UCL) the purpose(s) of the scheme a contact telephone number for enquiries. Signs must contain the following wording: Images are being recorded for the purposes of detection and prevention of crime and safety and security management. There is no requirement for signage in instances of covert monitoring as defined in paragraph 7 (1) above. 9. Operating standards 9.1 Control Rooms Details of the administrative procedures which apply to all Security Control Rooms must be set out in the procedure manual, which should include technical instructions on the use of the equipment and a schedule of maintenance. Control Rooms will be staffed in accordance with the procedure manual. Equipment associated with the system will only be operated by authorised staff. The Control Room Manager will ensure that all staff are fully briefed and trained in respect of the functions, operational, administrative and legal, arising from the use of CCTV. All staff working in a Control Room will be made aware of the sensitivity of handling CCTV images and recordings. A copy of this Policy and the procedure manual will be held in the Security Control Room at all times for staff to consult. They must be familiar with the contents of both documents, which will be updated from time to time, and must comply with both as far as is reasonably practicable at all times. Images are monitored and recorded centrally in the Security Control Room or locally on the site where they operate. The equipment has the capability to record on all cameras simultaneously throughout every 24 hour period. Operators may be required to justify their interest in or recording of, any particular individual, groups of individuals or property at any time by the Control Room Manager or Head of Security & Facilities Services Recorded images may only be viewed by authorised persons at designated locations. The Control Room Manager is responsible for the evaluation and approval of suitable locations and must maintain a record of all locations and authorised persons. 9.2 Access to Control Rooms Viewing areas must be secure against unauthorised access. Monitors showing recorded images must be positioned so that images cannot be viewed by an unauthorised person. Access is limited to Duty Controllers, authorised members of
7 senior management, police officers and any other person with statutory powers of entry. Staff, students or visitors may be granted access to a Control Room on a case-bycase basis by the Head of Security & Facilities Services, Security Control Room Manager or Senior Operations Manager who must sign the authorisation within the relevant visitors log book. Access will only be provided in order to help with the identification of individuals. Before allowing access to a Control Room, staff will satisfy themselves as to the identity of any visitor and that the visitor has appropriate authorisation from the Control Room Manager or Security Manager. All visitors will be required to complete and sign the visitors log, which shall include details of their name, their department or organisation, the person who granted authorisation and the times of entry to and exit from the Room. A similar log will be kept of the staff on duty in a Control Room. Arrangements may be made for police or other third parties to be present in the Security Control Room at certain times. Under extreme circumstances the Police may make a request to assume direction of the system to which this Policy applies. Only requests made on the written authority of a police officer not below the rank of Superintendent will be considered. Any such request will only be accommodated on the personal written authority of the Head of Security & Facilities Services, or designated deputy of equal standing. In the event of a request being granted, the Control Room will continue to be staffed, and equipment operated by, only those personnel who are authorised to do so. 9.3 Quality of recorded images Images produced by the recording equipment must be as clear as possible in order that they are effective for the purpose for which they are intended. Recorded pictures and prints as well as live screens should produce clear pictures. The effects of compression on image quality must be checked. To maintain the evidential integrity of images and support effective retrieval, metadata to be recorded with the images should include the date, time, and camera location and number. These must be regularly checked and maintained. The activity of taking copies should not interfere with the operation of the system. 9.4 Maintenance Cameras must be properly maintained and serviced to ensure that clear images are recorded a log of all maintenance activities will be kept. A daily check should be made of camera functions (including PTZ function), alignment, and image quality. In addition, an annual check should be made of camera housings and cabling in accordance with the maintenance schedule as specified by the Control Room Manager. 9.5 Production of copies When single images and short video clips are to be exported from the main CCTV recording system, they must be copied to "write-once" media (e.g. finalised CDROM or DVDROM) which carries an indelible serial number, so that a complete audit trail is maintained. A secure register of copies made must be kept. Any temporary copies made during the export process must be destroyed as soon as it is clear that the export has been successful.
8 Personnel carrying out copying must be authorised and trained. Training must include awareness of how systems can make unobvious temporary copies, such as in browser caches. 9.6 Retention periods CCTV images must not be retained for more than 18 days. There are two exceptions to this rule: 1. Where images have been approved for disclosure to a third party, they may be held until they can be collected. 2. When necessary in order to establish patterns of behaviour over a longer period, images will be retained pending any action being taken. To ensure compatibility with the 5 th data protection principle, such cases must be documented. A written case must be made by the Security Manager or Control Room Manager and reviewed frequently. Exported images must be stored securely when not in use. The media must be destroyed when the images are no longer required, with a log kept of that destruction. 10. Access to images Data subjects have a right of access to their personal data, including CCTV images of themselves. Subject access requests must be made in writing, including Form 6 ( or otherwise and sent to the Data Protection Officer. Data subjects must prove their identity. Copy images, if held, will be provided promptly and in any event within 40 days. UCL does not charge a fee for subject access requests. Where disclosure of images would lead to an unfair intrusion into the privacy of third parties, or unwarranted harm or distress, images of those third parties will be redacted. In certain circumstances the DPA provides for disclosure of personal data, without the consent of the data subject, to certain organisations. Requests for such disclosures from third parties, such as the police, UK Border Agency, local authorities or sponsors, should be made in writing and handled by the Data Protection Officer.
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
CCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
CCTV PROCEDURES To support Information Security Policy Framework
CCTV PROCEDURES To support Information Security Policy Framework Section HERIOT-WATT UNIVERSITY PROCEDURES FOR OPERATION OF CCTV ON UNIVERSITY PREMISES TO SUPPORT INFORMATION SECURITY POLICY FRAMEWORK
University of London CCTV Policy UNIVERSITY OF LONDON CCTV POLICY. Academic Buildings, Libraries and Residences. Page 1 of 10
UNIVERSITY OF LONDON CCTV POLICY Academic Buildings, Libraries and Residences Page 1 of 10 Contents The CCTV system... 3 Responsible officers... 3 Data Protection Act 1998... 3 The system... 3 Purpose
Policy on Public and School Bus Closed Circuit Television Systems (CCTV)
DEPARTMENT OF TRANSPORT Policy on Public and School Bus Closed Circuit Television Systems (CCTV) Responsibility of: Public Transport Division TRIM File: DDPI2010/3680 Effective Date: July 2010 Version
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
University of Essex Automatic Number Plate Recognition (ANPR) Policy
& Standards for ANPR Operation at The University of Essex (Colchester Campus) Index 1. Introduction 1.1 System Description 1.2 Purpose of the System 1.3 Operating Principles 1.4 To Whom this Document Applies
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
Video surveillance policy (PUBLIC)
29 July 2015 EMA/133708/2015 Administration Division POLICY/0046 POLICY/0046 Effective Date: 01/01/2015 Review Date: 01/01/2018 Supersedes: Version 1 1. Introduction and purpose For the safety and security
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
Data protection policy
Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data
Parliamentary Security Camera Policy
Parliamentary Security Camera Policy Introduction 1) Security cameras are employed in various parts of the Palace of Westminster and its surrounding estate. They are a vital part of the security system
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL
POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent
Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk
Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
Data Protection Policy
Internal Ref: NELC 16.60 Review date December 2016 Version No. V04 Data Protection Policy 1 Data Protection Statement Data Protection Policy 1.1 North East Lincolnshire Council recognises that in order
Data Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
Surveillance Camera Code of Practice. June 2013
Surveillance Camera Code of Practice June 2013 Surveillance Camera Code of Practice Presented to Parliament Pursuant to Section 30 (1) (a) of the Protection of Freedoms Act 2012 June 2013 London: The Stationery
European Investment Bank Group. Video-surveillance policy
Group TABLE OF CONTENTS 1. Purpose and scope of the video-surveillance policy... 2 2. Respect for privacy, data protection and compliance with the relevant rules... 2 2.1. Compliance status... 2 2.2.
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
Information Governance Framework. June 2015
Information Governance Framework June 2015 Information Security Framework Janice McNay June 2015 1 Company Thirteen Group Lead Manager Janice McNay Date of Final Draft and Version Number June 2015 Review
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
Policy for Management of CCTV on Waste Operation Vehicles
Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for
How To Protect Your Personal Information At A College
Data Protection Policy Policy Details Produced by Assistant Principal Information Systems Date produced Approved by Senior Leadership Team (SLT) Date approved July 2011 Linked Policies and Freedom of Information
CORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement
University of St Andrews Out of Hours Protocol Appendices: A- CCTV Code of Practice B- Service Level Statement 1. Context The University security service provides night and weekend cover throughout the
Self assessment tool. Using this tool
Self assessment tool How well does your organisation comply with the 12 guiding principles of the surveillance camera code of practice? Complete this easy to use self assessment tool to find out if you
Data Protection. Policy and Application July 2009
Data Protection Policy and Application July 2009 Produced for staff of the House of Commons Service by the Department of Resources Information Rights and Information Security (IRIS) Service Data Policy:
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
Data Protection Act. Conducting privacy impact assessments code of practice
Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3
Data Protection Act a more detailed guide
Data Protection Act a more detailed guide What does the Act do? The Data Protection Act 1998 places considerable duties on organisations which process personal data; increases the rights of access by data
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
How To Use A Surveillance Camera Safely
Data protection In the picture: A data protection code of practice for surveillance cameras and personal information Contents Introduction... 3 About this code... 4 What this code covers... 6 Deciding
Policy and Procedure for approving, monitoring and reviewing personal data processing agreements
Policy and Procedure for approving, monitoring and reviewing personal data processing agreements 1 Personal data processing by external suppliers, contractors, agents and partners Policy and Procedure
Physical Security Policy
London School of Economics & Political Science Physical Security Policy Final Draft: 06/11/12 Approved by Estates Strategy Committee: 22/05/13 Next Review Date: 22/05/14 London School of Economics Physical
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
DATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
CCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL
CCTV User Group GUIDE FOR SMALL USERS PRIVATE and COMMERCIAL 1 CONTENTS Section Number Description Page number 1. Introduction 3 2. Human Rights Act and its implications for you 3 3. Data Protection and
Video surveillance at EFSA Implementing rules and technical specifications
Video surveillance at EFSA Implementing rules and technical specifications PUBLIC version 1 Introduction EFSA operates a video surveillance system (hereafter VSS) for the safety and security of its buildings,
OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;
OBJECTS AND REASONS This Bill would provide for (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; (b) the protection of the privacy of individuals in relation
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
How To Understand The Data Protection Act
DATA PROTECTION ACT 2002 The Basics Purpose of the Act Balance the rights of an individual with an organisation s legitimate need to process personal data Promote openness and transparency Establish and
PS 172 Protective Monitoring Policy
PS 172 Protective Monitoring Policy January 2014 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010;
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
DATA PROTECTION POLICY
DATA PROTECTION POLICY Rev No. 0 New Document 1 2 3 4 5 6 7 Revision Status Details of Amendments Name Date Update of College DPA statement New Reference to Appendix 4 Staff Guidelines ESF document retention
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY. WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA OVERVIEW The objects of this Bill are to ensure that employers
UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY
UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY 1. Purpose 1.1 The Data Protection Act 1998 ( the Act ) has two principal purposes: i) to regulate the use by those (known as data controllers) who obtain,
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
Corporate Policy and Procedure
Page Page 1 of 9 TAB: SECTION: SUBJECT: ROADS AND TRAFFIC TRAFFIC OPERATIONS CLOSED CIRCUIT TELEVISION (CCTV) TRAFFIC MONITORING SYSTEMS POLICY STATEMENT POLICY PURPOSE The City of Mississauga may install
Appendix 11 - Swiss Data Protection Act
GLEIF- LOU Restricted Appendix 11 - Swiss Data Protection Act GLEIF Revision Version: 1.0 2015-09-23 Master Copy page 2 of 11 Applicable Provisions of the Swiss Data Protection Act (DPA) including the
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
University of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
Council Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
Data Protection Procedures
Data Protection Procedures PROCEDURE OVERVIEW: This Procedure outlines Down District Council s ( the Council ) commitment to the Data Protection Act 1998 ( the Act ) and provides a framework for the Council
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
Photography and filming in schools Code of Practice
Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data
Human Resources and Data Protection
Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council
Data Protection Policy
Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and
Data Protection Policy
Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's
What NHS staff need to know
St George s Healthcare NHS NHS Trust Surrey Health Informatics Service Sussex Health Informatics Service Records Management Explained What NHS staff need to know A guide to Records Management Contents
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
Data Protection Consent Clause and Policy Background
Data Protection Consent Clause and Policy Background The Singapore Personal Data Protection Act - 2012 (PDPA) establishes a data protection law that comprises various rules governing the collection, use,
Managing Closed Circuit Television (CCTV) Records
Queensland State Archives Managing Closed Circuit Television (CCTV) Records Guideline for Queensland Public Authorities October 2010 Document details Security Classification PUBLIC Date of review of security
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
How To Know What You Can And Can'T Do At The University Of England Students Union
HOW WE USE YOUR INFORMATION This privacy notice tells you what to expect when University of Essex Students Union (referred to as the SU herein) collects personal information. It applies to information
Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
How To Protect Your Privacy In The Workplace
Review of the Workplace Surveillance Act 2005 (NSW) Submission to the NSW Attorney- General s Department January 2011 e m a i l: m a i l @ p r i v a c y. o r g. a u w e bsite : w w w. p r i v a c y. o
maintenance of CCTV surveillance systems code of practice
maintenance of CCTV surveillance systems code of practice Issue 3 January 2015 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected]
ROYAL AUSTRALASIAN COLLEGE OF SURGEONS
1. SCOPE This policy details the College s privacy policy and related information handling practices and gives guidelines for access to any personal information retained by the College. This includes personal
MODESTO CITY SCHOOLS Administrative Regulation
MODESTO CITY SCHOOLS Administrative Regulation AR 3515 The intent of the camera surveillance systems deployed by Modesto City Schools is to protect the safety and security of students, employees and authorized
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
