University of Sunderland Business Assurance Information Security Policy



Similar documents
INFORMATION TECHNOLOGY SECURITY STANDARDS

ISO27001 Controls and Objectives

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

ISO Controls and Objectives

Caedmon College Whitby

How To Protect Decd Information From Harm

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Governance Policy (incorporating IM&T Security)

How To Ensure Information Security In Nhs.Org.Uk

Information Security Policies. Version 6.1

INFORMATION SECURITY PROCEDURES

Information security policy

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

Information Security Policy

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

University of Sunderland Business Assurance. Over-arching Information Governance Policy. Document Classification: Public

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

NHS Business Services Authority Information Security Policy

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

University of Aberdeen Information Security Policy

ULH-IM&T-ISP06. Information Governance Board

TELEFÓNICA UK LTD. Introduction to Security Policy

Network Security Policy

University of Liverpool

Information Security Program

Rotherham CCG Network Security Policy V2.0

How To Protect School Data From Harm

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

How To Ensure Network Security

Mike Casey Director of IT

Newcastle University Information Security Procedures Version 3

Service Children s Education

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Information Governance Strategy & Policy

Supplier Security Assessment Questionnaire

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security: Business Assurance Guidelines

Information security controls. Briefing for clients on Experian information security controls

Information Management and Security Policy

Corporate Information Security Policy

Walton Centre. Document History Date Version Author Changes 01/10/ A Cobain L Wyatt. Monitoring & Audit

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Operational Risk Publication Date: May Operational Risk... 3

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

NSW Government Digital Information Security Policy

FINAL May Guideline on Security Systems for Safeguarding Customer Information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

Highland Council Information Security Policy

Network Security Policy

Merthyr Tydfil County Borough Council. Information Security Policy

INFORMATION SECURITY MANAGEMENT POLICY

ISO COMPLIANCE WITH OBSERVEIT

Third Party Security Requirements Policy

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

GUIDANCE NOTE OUTSOURCING OF FUNCTIONS BY ENTITIES LICENSED UNDER THE PROTECTION OF INVESTORS (BAILIWICK OF GUERNSEY) LAW, 1987

Outsourcing and third party access

Information & ICT Security Policy Framework

Information Security Policy

Information Security Management System (ISMS) Policy

Information Security and Governance Policy

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

(NOTE: ALL BS7799 REFERENCES IN THIS DOCUMENT ARE FROM BS7799-2:1999 and SHOULD BE AMENDED TO REFLECT BS7799-2:2002)

Information Security Programme

NORTH HAMPSHIRE CLINICAL COMMISSIONING GROUP BUSINESS CONTINUITY MANAGEMENT POLICY AND PLAN (COR/017/V1.00)

ISMS Implementation Guide

Ohio Supercomputer Center

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

UF Risk IT Assessment Guidelines

Rules for the use of the IT facilities. Effective August 2015 Present

NETWORK SECURITY POLICY

NHS Commissioning Board: Information governance policy

IS INFORMATION SECURITY POLICY

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Business Continuity Policy and Business Continuity Management System

Policy Document. IT Infrastructure Security Policy

Financial Services Guidance Note Outsourcing

Information Security Management System Policy

Crime Statistics Data Security Standards. Office of the Commissioner for Privacy and Data Protection

Lancashire County Council Information Governance Framework

Information Security Program CHARTER

Guideline for Roles & Responsibilities in Information Asset Management

Information Security Management System Information Security Policy

Information Governance Framework

Information Security Policy Best Practice Document

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Ealing Council Corporate Information and Data Security Policy

VMware vcloud Air HIPAA Matrix

INFORMATION GOVERNANCE POLICY

Data Security Incident Response Plan. [Insert Organization Name]

Transcription:

University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant Director, Business Assurance Date Policy Written May 2013 Date Policy Last Updated Date to Information Governance Group 13 th June 2013 Date to Executive 26 th July 2013 Date for next Review May 2014 Comments B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 1

Information Security Policy Contents 1. INTRODUCTION... 3 2. PURPOSE AND SCOPE... 3 3. DEFINITIONS... 3 3.1. System Level Security Policies (SLSPs)... 3 3.2. Information Security Management System (ISMS)... 3 3.3. Information Asset... 4 3.4. Information Security Incident... 4 4. DUTIES AND RESPONSIBILITIES... 4 5. POLICY DETAILS... 5 5.1. Governance and Assurance... 5 5.2. Information Technology... 7 6. RELATED POLICIES... 10 B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 2

Information Security Policy 1. INTRODUCTION Information Security is concerned with all information, in electronic and paper format and spoken. The main purpose of implementing good information security is to allow the effective and efficient use of information, whilst safeguarding the organisation s data from unauthorised access or modification, to ensure its availability, confidentiality and integrity. This high-level information security policy is a key component of the University s overall information governance framework and should be considered alongside more detailed information governance documentation including, system level security policies, security guidance and protocols or procedures. 2. PURPOSE AND SCOPE The aim of this policy is to advise staff and contractors of their obligations with regards to confidentiality and where to seek further guidance and assistance. This policy applies to all University staff, independent contractors and students. It applies to all information, information systems, networks, locations and applications. The objectives of the Information Security Policy are to preserve: Confidentiality - Access to data shall be confined to those with appropriate authority. Integrity Information shall be complete and accurate. All systems, assets and networks shall operate correctly, according to specification. Availability - Information shall be available and delivered to the right person, at the time when it is needed. 3. DEFINITIONS 3.1. System Level Security Policies (SLSPs) Documentation specific to a system, covering security and management procedures in place throughout for data collection, data handling, data storage, data analysis and data destruction. 3.2. Information Security Management System (ISMS) The governing principle behind an ISMS is that an organisation should design, implement and maintain a coherent set of policies, processes and systems to manage risks to its information assets, thus ensuring acceptable levels of information security risk. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 3

3.3. Information Asset Information held which is of value to an organisation. This includes (but not exclusively) statutory, financial and commercial information.. Further guidance will be available in the University s Information Risk Management policy and associated guidance documents. 3.4. Information Security Incident An information security incident is defined as an attempted or successful unauthorized access, use, disclosure, modification or destruction of information; interference with information technology operation; or violation of explicit or implied acceptable usage policy. This could involve a breach of the Data Protection Act 1998 where the incident concerns personal data. 4. DUTIES AND RESPONSIBILITIES Overall responsibility for this policy lies with the Assistant Director of Business Assurance, who performs the role of the University s Senior Information Risk Owner (SIRO) The SIRO is responsible for: Ensuring that an overall culture exists that values and protects information within the organisation Owning the organisation s overall information risk policy and risk assessment process, testing its outcome and ensuring that it is used Owning the organisation s information incident management framework The Assurance Manager (Business Assurance - Information Governance), responsible to the Assistant Director for Business Assurance, is responsible for drawing up information governance and information security policy, process and guidance for good information security practice and ensuring compliance with this policy. The IT Security Manager (ITS), reporting to the Assistant Director of SLS:IT, is responsible for developing IT Security Policy, standards and guidelines. He/she is also responsible for ensuring that effective IT Security systems, controls and training programs are operationally implemented, fit for purpose and available across the University. The Legal Support & Data Protection Officer is responsible for developing policy, process and guidance relating to Data Protection and can provide advice on collecting, using and protecting personal information. The University Deans of Faculty and Directors of Support Services have responsibility for ensuring compliance with the University s Information Governance policies and ensuring any issues of non-compliance are addressed. They have responsibility for ensuring that an appropriate member of staff, in each Faculty and Service, takes on the role of Information Champion. The Information Governance Group is responsible for recommending policy direction on records management to the Executive and monitoring that agreed policies are followed. Information Champions are accountable to their Dean of Faculty/Director of Service and have a responsibility to monitor information security compliance and awareness and be the B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 4

primary point of contact and source of information and support within the Faculty/Service. The Information Champions Group will report to the Information Governance Group. Individual employees, students and 3 rd party contractors have responsibility for ensuring that they comply with this policy and any related policies and guidance. Staff should attend training and awareness sessions provided by the University. Employees also have a duty to report any incidents or near misses in relation to information security. 5. POLICY DETAILS 5.1. Governance and Assurance Information Security Awareness\ Training Information security awareness training shall be included in the staff induction process. An ongoing awareness programme shall be established and maintained in order to ensure that staff awareness is refreshed and updated as necessary. Contracts of Employment Information security expectations of staff shall be included within appropriate job definitions. Third party services All contracts regarding outsourced IT systems and handling of data will include: information security requirements, including confidentiality, integrity and availability, a description of the agreed security level, requirements for reporting security incidents from third parties, a description of how the University may ensure that third parties are fulfilling their contracts, a description of the University s right to audit third parties. an agreement by the third party to be subject to an annual Supplier Information Security Assessment (SISA) Security Control of Assets Each information asset shall have a named Information Asset Owner who shall be responsible for the information security of that asset. The level of protection offered to the asset will be appropriate to the classification of the information held and the potential risk to the asset. The University s Information Risk Management policy should be consulted for further information. In order to minimise loss of, or damage to, all assets, equipment, including IT, shall be physically protected from threats and environmental hazards. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 5

Physical Access Controls Only authorised personnel who have a justified and approved business need shall be given access to restricted areas containing information systems or stored data, including both physical records and electronic records. Information Risk Management A formal information risk management approach will be implemented by University of Sunderland. For each information asset, information security risks will be identified and quantified in terms of the perceived value of the information asset, severity of impact and the likelihood of occurrence. The Information Risk Management policy should be consulted for further information. Information Security Incidents and weaknesses All information security events and suspected weaknesses are to be reported to in line with the Incident Response Plan.. All information security events shall be investigated to establish their cause and impacts with a view to avoiding similar events. Where a follow-up action against a person or organisation after an information security incident involves legal action (either civil or criminal), evidence shall be collected, retained, and presented to conform to the rules of the relevant jurisdiction. Classification of Information. Information will be classified based on the perceived value of the information and an estimate of the damage that its disclosure could have, either in terms of the financial cost or the potential damage to the organisation s reputation. The appropriate classifications are detailed in the Information Classification policy. Intellectual Property Rights Appropriate procedures shall be implemented to ensure compliance with legislative, regulatory, and contractual requirements on the use of material in respect of which there may be intellectual property rights and on the use of proprietary software products. Business Continuity and Disaster Recovery Plans Information owners shall ensure that business impact assessment, business continuity and disaster recovery plans are produced for all mission critical information, applications, systems and networks. ITS shall ensure that systems recovery plans are aligned with the business impact assessment to ensure that systems are recovered in order of priority. Exchange of information Data sharing agreements, procedures and controls will be established for enabling appropriate exchange of information, whilst maintaining compliance with relevant legislations, such as the Data Protection Act 1998. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 6

Technical measures, such as encryption, should be proportionate to the classification of the information being processed. Further details on information classification are available in the Information Classification policy. Third party suppliers must comply with these procedures. Reporting The Assurance Manager and IT Security Manager shall keep the Information Governance Group informed of the information security status of the organisation by means of regular reports and presentations. 5.2. Information Technology Computer Access Control / Authorisation Access to IT facilities shall be restricted to authorised users who have business need to use the facilities,. Users who require access must sign the IT Computer System Fair Use Policy before access is granted Access to information systems should be authorized by immediate superiors in accordance with the system owner directives. This includes access rights, including accompanying privileges. Authorizations should only be granted on a "need to know" basis, and regulated according to role Roles and responsibilities with accompanying access rights should be described based on the following classifications. Internal (several roles) External (several roles) Student Public Others. Access to restricted areas such as Computer Rooms and Data Cabinets must be restricted to authorised IT and Contractor staff only. The development and maintenance of processes and procedures to record and monitor access is the responsibility of the IT Security Manager. IT equipment classified as high risk or value must be protected against environmental threats (fires, flooding, temperature variations, etc.). Classification of equipment should be based on risk assessments. Application Access Control Access to data, system utilities and program source libraries shall be controlled and restricted to those authorised users who have a legitimate business need e.g. systems or database administrators. Authorisation to use an application shall depend on the availability of a licence from the supplier and appropriate business need. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 7

Access rights will be amended following either a termination or change of employment. Protection from Malicious Code The organisation shall use software countermeasures and management procedures, under the direction of the IT Security Manager, to protect itself against the threat of malicious software and other system based vulnerabilities. All staff shall be expected to co-operate fully with this policy and associated guidance and procedural documents. Users shall not install software on the organisation s property without permission from the IT Security Manager. Users breaching this requirement may be subject to disciplinary action. User Media Removable media of all types that contain software or data from external sources, or that have been used on external equipment, require the approval of IT Security Manager before they may be used on University of Sunderland s systems. Such media must also be fully virus checked before being used on the organisation s equipment. Users breaching this requirement may be subject to disciplinary action. The Removable Media Policy should be consulted for further information. Mobile equipment and remote working ITS provide systems to enable staff to work remotely in a secure manner. Remote access to the University's network may only take place through security solutions approved by the IT Security Manager. A policy on encryption controls will be developed with procedures to provide appropriate levels of protection to information whilst ensuring compliance with statutory, regulatory and contractual requirements. Information classified as confidential or strictly confidential information and personal data shall only be taken for use away from the University in an encrypted form unless their confidentiality and security can otherwise be assured. The confidentiality and security of information being transferred on portable media must be protected by use of approved corporate encryption techniques as defined by IT Security Standards. Corporately provided Mobile units must be protected using adequate security measures. The use of Personal Mobile units for business use must be authorised by the IT Security Manager in all cases and must comply with the IT Security technical requirements before connection to the University s infrastructure is permitted. Monitoring System Access and Use Access and use of IT systems will be logged and monitored in order to detect unauthorized information processing activities. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 8

ITS will register substantial disruptions and irregularities of system operations, along with potential causes of the errors. ITS will log security incidents for all essential systems, involving the IT Security and Assurance Manager and invoking the University s Incident Response Plan as appropriate. The University reserves the right record and monitor all IT activity within the computer systems and reserves the right to carry out security investigations where it suspects that there has been a breach of policy. The Regulation of Investigatory Powers Act (2000) permits monitoring and recording of employees electronic communications (including telephone communications) for the following reasons: Establishing the existence of facts Investigating or detecting unauthorised use of the system Preventing or detecting crime Ascertaining or demonstrating standards which are achieved or ought to be achieved by persons using the system (quality control and training) In the interests of national security Ascertaining compliance with regulatory or self-regulatory practices or procedures Ensuring the effective operation of the system. Any monitoring will be undertaken in accordance with the above act and the Human Rights Act 1998. Information Systems Acquisition, Development and Maintenance The University shall ensure that all new information systems, applications and networks comply with technical and non technical security requirements and include a security plan which must be approved by IT Security and Business Assurance before they commence operation. System Level Security Policies (SLSPs) will be developed by Information Asset Owners for systems under the organisation s control. Specific responsibilities will be assigned and obligations communicated directly to those who use the system. Changes to information systems, applications or networks shall be reviewed and approved by the relevant Project and Change Management Board where appropriate, following consultation with the IT and Business Assurance team as appropriate. Backup and Data Storage The IT Department is responsible for carrying out regular backups and restores of data held in the corporate data stores in accordance with the Data Classification Matrix on Appendix A. The use of local storage should be technically prohibited by the IT Department where possible and users should be discouraged from using local storage to manage their data requirements. Localyl stored data will fall outside of the IT Department remit of backup. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 9

More Information can be found in the Backup And Data Storage Policy Network Administration The IT Department has the overall responsibility for the University s internal Network. The IT department is responsible for ensuring that network access is granted in accordance with access policy. Users should only have access to the services they are authorized for. The access to privileged accounts and sensitive areas should be restricted. Users should be prevented from accessing unauthorized information. There should be an automated inventory of all equipment connected to the wired and wireless network with measures implemented to ensure only approved and authorised equipment is permitted to connect. Mobile units should be protected using adequate security measures. The use of Personal Mobile units for business use must be authorised by the IT Security Manager in all cases and must comply with the IT Security technical requirements before connection to the University s infrastructure is permitted. Remote access to the University's computer equipment and services is only permitted if the security policy has been read and understood and the IT regulations signed. More information can be found in the Network Access Policy Metrics and Reporting The IT Security Manager is responsible for ensuring that security metrics from all security based systems are recorded and reported at regular intervals to ITS and the Information Governance Group in order to provide confidence that security is under constant management and within acceptable tolerances. Systems and services that fall out of tolerances will be reported and remediated against under the supervision of the IT Security Manager. 6. RELATED POLICIES This policy should be read in conjunction with the policies listed in Appendix A of the Overarching Information Governance Policy. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 10