Information Management and Security Policy



Similar documents
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

USE OF INFORMATION TECHNOLOGY FACILITIES

Acceptable Use Policy

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

University of Sunderland Business Assurance Information Security Policy

CODE OF BUSINESS CONDUCT AND ETHICS

INFORMATION SECURITY MANAGEMENT POLICY

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

SOUTH DAKOTA BOARD OF REGENTS. Policy Manual

Niagara County Community College

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

How To Behave At A School

Conditions of Use. Communications and IT Facilities

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Internet Use Policy and Code of Conduct

Online Communication Services - TAFE NSW Code of Expected User Behaviour

St. Peter s C.E. Primary School Farnworth , Internet Security and Facsimile Policy

GROUP POLICY MANUAL CODE OF CONDUCT AND ETHICS POLICY

Virginia Commonwealth University Police Department

Delaware State University Policy

CODE OF ETHICS AND BUSINESS CONDUCT

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there

University of Liverpool

SOCIAL MEDIA POLICY. Introduction

HUMAN RESOURCES POLICIES & PROCEDURES

System and Network Security Policy Internet User Guidelines and Policy. North Coast Council West Canal Road Valley View, Ohio 44125

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

CODE OF BUSINESS CONDUCT AND ETHICS

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Administrative Procedure 3720 Computer and Network Use

Corporate Information Security Policy

INFORMATION SECURITY POLICY

EA-ISP-001 Information Security Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE Social Media Policy

Department of Homeland Security Management Directives System MD Number: Issue Date: 03/01/2003 DHS USAGE

Information and Compliance Management Information Management Policy

PHILIPPINE LONG DISTANCE TELEPHONE COMPANY CODE OF BUSINESS CONDUCT AND ETHICS

Service Schedule for Business Lite powered by Microsoft Office 365

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Corporate Information Security Management Policy

Information Security Policies. Version 6.1

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )

code of Business Conduct and ethics

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Tasmanian Government Information Security Framework

Corporate Code of Conduct

Sanchez Energy Corporation. Code of Business Conduct and Ethics

Guidance on the Use of Social Networking

INFORMATION TECHNOLOGY SECURITY STANDARDS

Information Security

ICT Student Usage Policy

Trinity Online Application - Terms and Conditions of Use

Covered California. Terms and Conditions of Use

For personal use only

ICT POLICY AND PROCEDURE

Ryanair Holdings PLC Code of Business Conduct & Ethics 2012

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

STANDARDS OF CONDUCT. 1.0 Purpose. 2.0 Scope. 3.0 Principles

DISCIPLINARY PROCEDURE

GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES

Internet, Social Networking and Telephone Policy

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

Wellesley College Written Information Security Program

NHS Business Services Authority Information Security Policy

Riverside Community College District Policy No General Institution

Title: Data Security Policy Code: Date: rev Approved: WPL INTRODUCTION

With the increasing popularity of social media you need a Social Media Policy to protect your company.

POLICIES AND REGULATIONS Policy #78

UNITED STATES COMMODITY FUNDS LLC CODE OF BUSINESS CONDUCT AND ETHICS

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

any Service that involves gambling, betting, adult, sex or over 18 services or information;

Information Technology and Communications Policy

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

Transcription:

Unclassified Policy BG-Policy-03

Contents 1.0 BG Group Policy 3 2.0 Policy rationale 3 3.0 Applicability 3 4.0 Policy implementation 4 Document and version control Version Author Issue date Revision detail 1.0 A. McCallum October 6 th 2010 Initial release 1.1 A. McCallum January 1 st 2012 Reference to Data Protection Standard changed to Privacy Protection Standard. Page 2 of 5

Policy owner: EVP & MD BG Advance Policy managed by: Chief Information Officer 1.0 BG Group Policy We manage the Group s records and information within a secure environment which is designed to safeguard the confidentiality and integrity of proprietary, personal and commercially sensitive information and protect it against loss or misuse. We will maintain all forms of information, records and other data in accordance with applicable legal, tax, regulatory and auditing requirements. 2.0 Policy rationale Information (both physical and computer-based) is a key asset which supports delivery of our business goals and helps maintain our competitive advantage. Its efficient management, use and retention within a securely designed environment enables us to comply with applicable legal, tax, regulatory and auditing requirements, assures the information s integrity, and protects it against loss or misuse. Misuse or unauthorised disclosure of proprietary, personal and commercially sensitive information can have severe consequences for BG Group and its employees. All personnel have a duty to prevent the loss, misuse or unauthorised disclosure of the Group s records and information. This Policy specifically supports the following Business Principles: We comply with legal, regulatory and licence requirements We do not tolerate corruption in any form, whether direct or indirect 3.0 Applicability Every employee, director or officer of every wholly owned BG Group company and in every joint venture company under BG Group control must follow this Policy. Contract personnel working for BG Group companies must also follow this Policy. Contractors and consultants are required to act consistently with this Policy when working for BG Group companies as our agent, on our behalf or in our name on any business activity including when delivering outsourced services. We apply this Policy in all joint operations where BG Group is the operator. When participating in joint venture companies not under BG Group control we encourage the adoption of a similar policy requirement. Breach of a BG Group Policy may result in disciplinary action, up to and including dismissal. Contracted personnel who fail to comply with this Policy may have their contract terminated, not renewed, or be subject to other Page 3 of 5

appropriate action. BG Group reserves the right to amend or update this Policy as required from time to time. 4.0 Policy implementation In order to protect and manage information BG Group will: operate a security classification system that defines the required security level for key information and documents; retain, store, preserve and manage physical and computer-based information for appropriate periods based on business need and applicable legal, tax, regulatory and auditing requirements so that it is available as required; maintain a secure IT operating environment that is designed to safeguard the confidentiality and integrity of proprietary and commercially sensitive information and supports business continuity; protect and manage personal information in accordance with applicable data privacy laws and regulations; protect confidential information provided to us by third parties when required to do so in the course of doing business; provide direction, training and supervision so that all personnel understand their obligations relating to the security of information and the proper use of IT systems; permit limited personal use of IT systems by personnel, provided that such use does not interfere with their duties or BG Group activities or operations; and reserve the right to monitor the usage of information and IT systems and equipment. When working for BG Group companies, personnel must: use information obtained from BG Group solely for legitimate business purposes; create, use, store and retain BG Group records, information and other data in accordance with the Information Management Standard; take appropriate steps in line with the relevant security classification system to protect BG Group and confidential third-party information in their possession against misuse or unauthorised disclosure as set out in the Information Management Standard; use the IT systems and equipment provided by BG Group for legitimate business purposes and according to authorised access rights; observe security protocols relating to the use of IT systems and equipment, not share passwords, nor allow unauthorised access to IT systems as set out in the Information Security Standard; respect personal information by taking appropriate care to protect the privacy of personal information relating to individuals as set out in the Privacy Protection Standard; respect third-party copyright and therefore not copy, download, store, install or transmit copyrighted materials that are not licensed to BG Group; Page 4 of 5

not create, copy, download, distribute or endorse any statements, images, information or sounds on BG Group IT systems or equipment that are, or could be deemed to be, abusive, obscene, defamatory or discriminatory, could cause offence or might otherwise bring BG Group into disrepute; promptly report to their line manager any: o loss or suspected loss of any proprietary, personal or commercially sensitive information and/or equipment containing such information; or o damage, disruption or attempted unauthorised access to any BG Group IT systems, information, document stores or libraries; not connect equipment or load software onto BG Group IT systems, networks or equipment without prior approval by Global IT; respect the permitted limited personal use of IT systems and equipment by keeping such use to a minimum and ensuring that it does not interfere with their duties or BG Group activities or operations as set out in the Acceptable Use Standard; and not destroy, remove, conceal, tamper with or otherwise alter any BG Group information, records or other data whenever they are aware, or have reason to suspect, that litigation or a criminal or regulatory investigation is, or may be, underway, threatened or pending. Page 5 of 5