Policy: Remote Working and Mobile Devices Policy



Similar documents
Policy for the Analysis and Improvement Following Incidents, Complaints and Claims

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

Remote Working and Portable Devices Policy

Network Security Policy

MANAGEMENT OF PERSONAL FILES POLICY

Policy: Accessing Legal Advice

Ixion Group Policy & Procedure. Remote Working

The Newcastle upon Tyne Hospitals NHS Foundation Trust. Employment Policies and Procedures

Information Governance Policy

Information Governance Policy

Safe Haven Policy. Equality & Diversity Statement:

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

USE OF PERSONAL MOBILE DEVICES POLICY

Information Security Policy

Data Encryption Policy

Standard Operating Procedure. Secure Use of Memory Sticks

MOBILE COMPUTING & REMOTE WORKING POLICY AND PROCEDURE. Documentation Control. Consultation undertaken Information Governance Committee

NHS Commissioning Board: Information governance policy

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

INFORMATION SECURITY POLICY

University for the Creative Arts. Mobile Working and Remote Access Policy

Interpreting and Translation Policy

Information Management Policy CCG Policy Reference: IG 2 v4.1

How To Ensure Network Security

Bring Your Own Device (BYOD) Policy

POLICY DOCUMENT. Policy on Mobile / Portable Computing Devices and Data Security. Release: Final Date Created: 3 March 2009

Acceptable Use Guidelines

Policies and Procedures. Policy on the Use of Portable Storage Devices

Peninsula Community Health. Mobile IT Security Policy

Information Security Policy for Associates and Contractors

Information Security Policy London Borough of Barnet

ABERDARE COMMUNITY SCHOOL

INFORMATION GOVERNANCE POLICY

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

IS INFORMATION SECURITY POLICY

Newcastle University Information Security Procedures Version 3

NHS FORTH VALLEY Information Governance Remote Working Guidance

Data Encryption Policy

The Newcastle upon Tyne Hospitals NHS Foundation Trust. Balliol Off-Site Storage Facility Procedure for usage

Information Governance Policy

Social Media Policy. Author (name and designation) Heather Edwards, Head of Communications

Supporting staff involved in a stressful or traumatic incident, complaint or claim.

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

Burton Hospitals NHS Foundation Trust. On: 16 January Review Date: December Corporate / Directorate. Department Responsible for Review:

REMOTE WORKING POLICY

Data and Information Security Policy

Mobile and Remote Working Policy

INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY

The Newcastle upon Tyne Hospitals NHS Foundation Trust. Occupational Health Records Management and Retention Operational Policy

CORPORATE POLICY & PROCEDURE NO. 7 INFORMATION GOVERNANCE POLICY. December 2014

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February Title: Information Security Policy

Information Governance Policy

INFORMATION GOVERNANCE STRATEGY

Remote Working and Portable Devices Policy

Information Governance Strategy 2015/16

Mobile Devices Security Policy

INFORMATION SECURITY POLICY

The policy applies to all members of staff employed within the Trust who are involved in any aspect of alert dissemination, action, and /or review.

The Newcastle upon Tyne Hospitals NHS Foundation Trust. Employment Policies and Procedures

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Cellular/Smart Phone Use Procedure

Records Management Policy

INFORMATION GOVERNANCE POLICY

SERVER, DESKTOP AND PORTABLE SECURITY. September Version 3.0

Policy Information Management

Information Incident Management. and Reporting Policy

CONTRACTS REVIEW FOR INFORMATION GOVERNANCE COMPLIANCE PROCEDURE

Remote Access Policy

NETWORK SECURITY POLICY

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Portable Devices and Removable Media Acceptable Use Policy v1.0

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

Bring Your Own Device Policy

Summary Electronic Information Security Policy

This policy outlines different requirements for the use of PSDs based on the classification of information.

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

NHS Waltham Forest Clinical Commissioning Group Information Governance Policy

The Newcastle upon Tyne Hospitals NHS Foundation Trust. Software Asset Management Policy

Information Security Policy. Version 2.0

Personal Identifiable Data Security Policy

Human Resources Policy documents. Data Protection Policy

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Protection of Computer Data and Software

Information Governance Policy. 2 RESPONSIBLE PERSON: Steve Beeho, Head of Integrated Governance. All CCG-employed staff.

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy

Information Governance Policy (incorporating IM&T Security)

PS177 Remote Working Policy

The Central Alert System - A Guide to Managing Safety Not Being Scanned

The Newcastle upon Tyne Hospitals NHS Foundation Trust. Taxi Transport Policy

Intellectual Property Management Policy

How To Protect Decd Information From Harm

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

DOCUMENT CONTROL PAGE

School of Anthropology and Museum Ethnography & School of Interdisciplinary Area Studies Information Security Policy

Version: 2.0. Effective From: 28/11/2014

Secure Transfer of Information Guidance for staff

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

Subject Access Request Policy

Transcription:

Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014 Consultation period February March 2014 Date of ratification April 2014 Ratified by EDG Date for review April 2017 Target audience SHSC staff Policy version and advice on availability and storage Version 1.7 Available to all staff via SHSC intranet Master copy held by Information Manager SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 1

Contents: Section Page 1 Introduction 3 2 Definitions 3 3 Purpose of this policy 3 4 Duties 3 5 Scope of this policy 3 6 Policy 4 6.1 Direct Connection to the Trust Network 6.2 Remote Connection to the Trust Network 6.3 Connection to non-nhs Networks 6.4 Information held on Trust mobile devices 6.5 Information held on Personal mobile devices 6.6 Storage Devices Security 6.7 The security of mobile devices and information 6.8 Use of portable media by external visitors to the Trust 6.9 Assessment of Risk when taking confidential information offsite 7 Dissemination, storage and archiving 6 8 Training and other resource implications for this policy 6 9 Audit, monitoring and review 7 10 Implementation plan 7 11 Links to other policies, standards and legislation 7 12 Contact details 7 13 References 7 14 Policy development and consultation process 7 Appendix A Equality impact assessment form Appendix B Human rights act assessment checklist 1. Introduction Current working practice within Health and Social Care is such that individuals may not have a static work base or may need to occasionally work away from their normal base. In the course of their work such individuals may need to access the Trust network or to take Trust information away from their base. At the same time, developments in technology are such that it is now possible to process information on various types of portable/mobile electronic devices. While these changes to working practices and developments in technology bring many benefits they also introduce risks to the organisation, individual staff members and the security of Trust information. Information is no longer retained in the work base where it can be automatically backed up but is moving about the city, region or country on a variety of devices. The convenience of these devices - their small size and capacity to hold large SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 2

amounts of information - presents their greatest risk. They can easily be lost, mislaid or stolen. It is important that information, whether stored on mobile devices or accessed or worked on remotely, is protected by proper security. This policy is also concerned with the removal of hard-copies of confidential information from Trust premises where necessary so that it is transported, stored and used securely and returned to Trust premises in a timely manner. 2. Definitions Remote working: Working on Trust information or accessing the Trust network in a place that is not your normal work base. Mobile Processing Devices: These include portable computers (such as laptops, tablet computers and notebooks), smartphones (such as Blackberries and i-phones), personal digital assistants (PDAs), digital cameras, mobile phones, digital recorders and any other mobile devices which store or process information. 3. Purpose of this Policy The purpose of this policy is to protect Trust information that is processed remotely or is stored on mobile devices. 4. Duties All staff who engage in remote working or who use mobile processing devices are required to adhere to this policy. 5. Scope of this Policy This policy covers: Remote working, that is, working on Trust information or accessing the Trust network in a place that is not your normal work base The use of mobile processing devices, which includes portable computers such as laptops, tablet computers and notebooks, smart phones such as Blackberries and i- phones, personal digital assistants (PDAs), digital cameras, mobile phones, digital recorders and any other mobile devices which process information. In particular, the policy covers: Connection to the Trust network remotely and with mobile devices The processing of Trust information away from Trust premises The processing of Trust information on mobile devices The secure transfer of information The security of mobile devices and information The use of home computers and personal mobile devices 6. Policy 6.1 Direct Connection to the Trust Network 6.1.1 All electronic processing devices connecting directly to the Trust network (that is, connected to a network point or via a wi-fi connection on NHS premises) must be protected by up to date anti-virus and firewall software. Where the device does not update automatically, it is the responsibility of the user to ensure that the anti-virus software is up to date and the firewall is switched on 6.1.2 Personal devices (that is, devices that are not provided by your employer for use in your work) such as home personal computers, laptops, netbooks, media players (such as i-pods) and personal digital assistants, must not be connected directly to the Trust SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 3

network unless authorised by the IT Department in line with Trust Bring Your Own Devices (BYOD) arrangements. The BYOD electronic application form is available via the SHSC intranet. 6.2 Remote Connection to the Trust Network 6.2.1 Connection to the Trust network remotely (that is, via web services or remote services) requires authorisation by the IT Department and will be subject to authentication procedures specified by them. A request for remote access can be made by completing the electronic Request for Remote Access form which is available via the Trust intranet. 6.3 Connection to non-nhs Networks 6.3.1 Trust equipment must not be connected to the internet via a commercial internet service provider without prior authorisation by the IT Department because of the risk to the security of the information held on them and the risk of introducing viruses onto the Trust network. 6.4 Information held on Trust mobile devices 6.4.1 Confidential Trust information may only be stored on Trust mobile devices with the permission of the relevant Director or Head of Department and the Trust Director of IM&T or Caldicott Guardian. 6.4.2 Where confidential information is approved for storage on a mobile device, only the minimum amount of personal information necessary for the specific business purpose must be used. 6.4.3 Information must not be stored permanently on mobile devices. If it is necessary to work away from the Trust, information should be transferred back to the Trust server and deleted from the mobile device as soon as possible. 6.4.4 Unauthorised software must not be installed onto Trust mobile devices. 6.4.5 Information must be virus checked before transferring onto Trust computers. This will be done automatically for non-confidential information that is sent via email. (Confidential information may only be sent outside the Trust if it is encrypted using an approved method in line with the SHSC e-mail policy). 6.4.6 Confidential information may only be saved to USB sticks where those devices are encrypted to nationally required standards. Any such devices for use within the Trust must be purchased via the IT department who will register them for use on the Trust network. Should it be necessary to use USB devices with equivalent levels of security from partner organisations these must be registered with and approved by the SHSC Information Department. Any other USB storage devices will be restricted to read-only operation on Trust equipment. 6.4.7 CD/DVD drives on Trust PCs will be prevented from writing to disc unless specifically approved by the SHSC IT department. 6.5 Information held on Personal mobile devices 6.5.1 Trust information must not be stored on non-trust equipment, for example, home personal computers, laptops and PDAs unless this has been approved as part of the SHSC BYOD arrangements. 6.6 Storage Devices Security SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 4

6.6.1 Information stored on any mobile devices must be protected by adequate security including regular back up procedures and up to date anti-virus software. It is the responsibility of the individual to virus-check portable storage devices such as memory sticks. Backup copies of confidential information held on mobile devices should be made to a secure Trust server if this is not possible, the user must make sure that any backup information is kept secure. 6.6.2 Any confidential data to be stored on a PC or other removable device in a non-secure area or on a portable device such as a laptop, PDA or mobile phone must be encrypted using an encryption solution authorised by the IT department which meets national requirements. 6.6.3 When using encrypted devices, users are responsible for managing their own passwords or phrases. These should be kept securely but users should be aware that if they are forgotten, the IT Department will not be able to retrieve them and it will not be possible to decrypt. Passwords must not be kept with the device (such as on Post- It notes or labels attached to the device) or written down in an easily accessible place. Passwords should not be shared and you should change your password if you suspect that it has become known to another person. 6.6.4 The installation and configuration of laptop and mobile device security functionality, including access control, encryption and tamper-resistance must be undertaken by appropriately trained IT Department staff. Access controls will be in line with national guidance and subject to encryption solutions which conform to national requirements. 6.6.5 Users will be instructed in the use of encryption software when it is installed on their mobile device or a new device is issued to them. Advice on encryption can be sought from the IT Help Desk. 6.7 The security of mobile devices and information 6.7.1 Mobile devices and confidential information, whether hard-copy or electronic, must be protected by adequate security, for example, they must be: Kept out of sight, for example, in the locked boot of the car, when transported t left unattended, for example, not left in the car boot overnight Locked away when not being used Kept secure and guarded from theft, unauthorised access and adverse environmental events particularly when taken home Encrypted (in the case of electronic devices) 6.7.2 Trust equipment must be returned to the IT Department for a health check at regular intervals as specified by the IT Department, or at their specific request. 6.7.3 Data stored on NHS laptops or other mobile devices must be securely erased by the IT Department before the laptop is reassigned for another purpose or disposed of when redundant. Failure to securely erase data may result in that data being available to a subsequent user of the laptop/mobile device. 6.8 Use of portable media by external visitors to the Trust External visitors, for example, lecturers, contractors, company representatives, patients or their representatives etc. must not connect any device, including USB sticks and laptops, or insert any media into any equipment belonging to the Trust without authorisation from a member of Trust staff. Any such device must be virus-scanned by up to date anti-virus software provided by the Trust before any files contained within SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 5

the device may be opened. Should a virus be discovered the device must be disconnected immediately and the IT Help Desk informed. 6.9 Assessment of Risk when taking confidential information off-site Confidential information must not be taken off Trust premises unless it is absolutely necessary for the performance of Trust business and it must be returned to secure Trust premises as soon as it is practical to do so. Where it is necessary to take confidential information off Trust premises then the responsible manager must undertake an assessment of the risks involved and take appropriate action to minimise those risks. The relevant Information Asset Owner must be informed of and approve the removal of confidential information from Trust premises. For routine processes where confidential information is taken off Trust premises the risk assessment must be documented and notified to the Trust Information Manager. Where possible, the information should be in electronic form and stored on a device encrypted to national standards as described elsewhere in this policy. If information is in the form of hard-copy documents special care must be taken to ensure these are not left unattended in surroundings which are not secure from unauthorised access for instance they must not be left on view in a public place or in an unlocked vehicle or left in any place where they could be accessed by other people such as members of the family within the home. If any confidential information is lost or subject to unauthorised access whilst away from Trust premises this must be reported as soon as possible using the Trust s incident reporting procedures. 6.10 Use of Social Media Social media sites such as Facebook and Twitter are routinely blocked from access by Trust equipment but staff will be able to access these communication channels via their own equipment. Care must be taken not to reveal confidential information via these routes and staff must not behave unprofessionally or in ways which would bring the Trust into disrepute when using them. The Trust has a separate Social Media Policy - Acceptable Use for Staff which provides guidance on the use of social media, available via the SHSC intranet. 7. Dissemination, storage and archiving This policy will be made available to all staff via the SHSC intranet. The suite of IG policies of which this policy is part replaces the previous Sheffield Care Trust Information Systems Security and Confidentiality Policy. Changes to this policy will be made by the SHSC Information Manager at the request of or approved by the Information Governance Steering Group (IGSG). 8. Training and other resource implications Departmental managers are responsible for ensuring that their staff are aware of and comply with this policy where they undertake remote working or use mobile devices. All users must complete the appropriate national online e-learning Information governance training module before remote access can be granted. SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 6

9. Audit, monitoring and review Compliance with this policy will be judged by the appropriate working group as part of the annual Information Governance Toolkit assessment for the Trust. Instances of non-compliance will be identified by the Trust s incident reporting procedures. The policy will be reviewed regularly. Review of the policy is the responsibility of the Information Governance Steering Group. 10. Implementation plan Once approved, this policy and other Information Governance policies will be made available via the Policies section of the Trust intranet. New starters will be informed of relevant policies by their departmental managers. 11. Links to other policies This policy forms part of an overall suite of information governance policies and should be read in conjunction with the Information Security Policy in particular. 12. Contact details Questions on the operation of this policy should be put to the Director of IM&T in the first instance. Requests for changes to the policy should be directed to the Information Manager. Both are based at Fulwood House. 13. References This policy is a requirement of the Information Governance Toolkit Details of the toolkit can be found at https://nww.igt.hscic.gov.uk/ 14. Policy development and consultation process This policy was originally developed by the city-wide Information Governance Group (SCT and PCTs). It was tabled at the SCT Information Governance Committee. It was sent, along with other IG policies to JCF in June 2007 (in light of the heavy workload due to the Foundation Trust application, the policies were considered outside the meeting by staff side). Following consultation with staff side, the policies were agreed by the Information Governance Committee in September 2007. The policies were re-formatted in line with revised Trust requirements. This policy was augmented in light of national guidance on information security, data flows and encryption in March 2008. The policies in new format were approved by the Information Governance Committee on 10 March 2008. The policies were approved by the Performance Information Group on 18 March 2008. This policy was revised and submitted to the Information Governance Steering Group in October 2010 Further amendments made following submission to the Information Governance Steering Group, then submitted to the Performance Information Group. SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 7

This policy was revised and minor amendments made in February 2013. This policy was revised and minor amendments made in February 2014. SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 8

Appendix A Equality Impact Assessment Form To be completed and attached to any procedural document when submitted to the appropriate committee for consideration and approval. 1. Does the policy/guidance affect one group less or more favourably than another on the basis of: Yes/ Comments Race Ethnic origins (including gypsies and travellers) Nationality Gender Culture Religion or belief Sexual orientation including lesbian, gay and bisexual people Age Disability - learning disabilities, physical disability, sensory impairment and mental health problems 2. Is there any evidence that some groups are affected differently? 3. If you have identified potential discrimination, are any exceptions valid, legal and/or justifiable? 4. Is the impact of the policy/guidance likely to be negative? N/A 5. If so can the impact be avoided? N/A 6. What alternatives are there to achieving the policy/guidance without the impact? 7. Can we reduce the impact by taking different action? N/A N/A If you have identified a potential discriminatory impact of this procedural document, please refer it to Liz Johnson (Head of Patient Experience Inclusion) together with any suggestions as to the action required to avoid/reduce this impact. For advice in respect of answering the above questions, please contact Liz Johnson (Head of Patient Experience Inclusion and Diversity) SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 9

Appendix B Human Rights Act assessment checklist 1 1.1 What is the policy/decision title? Insert here 1.2 What is the objective of the policy/decision? 1.3 Who will be affected by the policy/decision? 2.1 Will the policy/decision engage anyone s Convention rights? 2.2 3.1 Will the policy/decision result in the restriction of a right? Is the right an absolute right? NO NO Flowchart exit There is no need to continue with this checklist. However o Be alert to any possibility that your policy may discriminate against anyone in the exercise of a Convention right o o Legal advice may still be necessary if in any doubt, contact your lawyer Things may change, and you may need to reassess the situation 3.2 NO 4 The right is a qualified right Is the right a limited right? 3.3 Will the right be limited only to the extent set out in the relevant Article of the Convention? NO 1) Is there a legal basis for the restriction? AND 2) Does the restriction have a legitimate aim? AND 3) Is the restriction necessary in a democratic society? AND 4) Are you sure you are not using a sledgehammer to crack a nut? NO Policy/decision is likely to be human rights compliant Policy/decision is not likely to be human rights compliant BUT Get legal advice Regardless of the answers to these questions, once human rights are being interfered with in a restrictive manner you should obtain legal advice. And you should always seek legal advice if your policy is likely to discriminate against anyone in the exercise of a convention right SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 10

What is the policy/decision title? Remote Working and Mobile Devices Policy What is the objective of the policy/decision? To protect Trust information that is processed remotely or is stored on mobile devices. Who will be affected by the policy/decision? All staff who engage in remote working or who use mobile processing devices Will the policy/decision engage anyone s Convention rights?. There is no need to continue with this checklist. SHSC Remote Working and Mobile Devices Policy v1_7 DRAFT Page 11