TELEFÓNICA UK LTD. Introduction to Security Policy



Similar documents
ISO Controls and Objectives

ISO27001 Controls and Objectives

INFORMATION TECHNOLOGY SECURITY STANDARDS

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

University of Sunderland Business Assurance Information Security Policy

INFORMATION SECURITY PROCEDURES

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Third Party Security Requirements Policy

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

28400 POLICY IT SECURITY MANAGEMENT

Information Security Policies. Version 6.1

Cyber and Data Security. Proposal form

NSW Government Digital Information Security Policy

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

How To Protect Decd Information From Harm

Newcastle University Information Security Procedures Version 3

Hengtian Information Security White Paper

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Service Children s Education

Electronic business conditions of use

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

University of Liverpool

INFORMATION SECURITY MANAGEMENT POLICY

Cloud Computing and Records Management

University of Aberdeen Information Security Policy

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

INFORMATION SECURITY POLICY

Page 1 of 15. VISC Third Party Guideline

ISO 27002:2013 Version Change Summary

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Operational Risk Publication Date: May Operational Risk... 3

Information security controls. Briefing for clients on Experian information security controls

Information Security Policy

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

How To Protect School Data From Harm

Practical Overview on responsibilities of Data Protection Officers. Security measures

Rotherham CCG Network Security Policy V2.0

TERMS AND CONDITIONS FOR THE USE OF SINGAPORE POWER SUPPLIER RELATIONSHIP MANAGEMENT SYSTEM (SPSRM)

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

Information Security Policy

RS Official Gazette, No 23/2013 and 113/2013

Information Security Programme

Clause 1. Definitions and Interpretation

Network Security Policy

Information Governance Policy (incorporating IM&T Security)

Intel Enhanced Data Security Assessment Form

NSW Government Digital Information Security Policy

HIPAA Compliance Evaluation Report

Policy Document. Communications and Operation Management Policy

Information Security: Business Assurance Guidelines

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

Office 365 Data Processing Agreement with Model Clauses

Standard conditions of purchase

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9. Supplier Security Standard v2.9

Mike Casey Director of IT

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation

Caedmon College Whitby

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Access Control Policy

IT ACCESS CONTROL POLICY

07/2013. Specific Terms and Conditions Mobile Device Management

Data Management Policies. Sage ERP Online

Information security policy

Information Security Management. Audit Check List

SUPPLIER SECURITY STANDARD

Information Security

ULH-IM&T-ISP06. Information Governance Board

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

Data Protection Breach Management Policy

Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS Risk Assessment 357-7

Privacy and Cloud Computing for Australian Government Agencies

IT OUTSOURCING SECURITY

Corporate Information Security Policy

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Information & ICT Security Policy Framework

Information Resources Security Guidelines

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

Service Schedule for CLOUD SERVICES

Cloud Computing Governance & Security. Security Risks in the Cloud

Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Transcription:

TELEFÓNICA UK LTD Introduction to Security Policy Page 1 of 7

CHANGE HISTORY Version No Date Details Authors/Editor 7.0 1/11/14 Annual review including change control added. Julian Jeffery 8.0 1/11/15 Hyper-link removed. Julian Jeffery Page 2 of 7

TELEFÓNICA UK SECURITY POLICY 1. Overriding Principles Telefonica UK (subsequently referred to as TEF UK) attaches particular importance to the security of its own, its employees and its customers data. It is therefore vital that existing and potential new suppliers to TEF UK have appropriate security controls to ensure the confidentiality, integrity and appropriate availability of such data is not compromised and these controls are in maintained in accordance with TEF UK s security policies. The reference standard for TEF UK s security policies is ISO27001 and the Supplier shall comply with the principles of that standard at all times. 2. Introduction The TEF UK s security policies form two parts: 1. this short form summary of the key principles of the policy which lists the baseline security requirements which should be incorporated into systems required to protect our customer or other related business data; and 2. the full TEF UK security policy set which is managed by the TEF UK Fraud & Security team on behalf of the Telefónica Europe Group of companies. Each Supplier must comply with both these policies, together which are known for the purpose of this Agreement as the TEF UK Security Policy. It is the Supplier s obligation to request the most recent copy of the TEF UK Security Policy from our Fraud & Security Department by contacting TEF UK. If the Supplier is not already a party to an NDA with TEF UK that would cover this situation, we may ask the Supplier to enter into such an NDA with us specifically in respect of this TEF UK Security Policy. Failure to request a copy of our Security Policy will not absolve Supplier of its obligation to comply with it. Any variations to Supplier s compliance with the TEF UK Security Policy must be recorded in writing and must be signed by both parties. The Supplier s management (Board level directors or equivalent) will: Demonstrate that information protection is a critical business issue. Assume ultimate responsibility for information security. Be directly involved in creating a security culture across their business. Ensure the company s security objectives and policy is available to all employees. Allocate sufficient resources to information security. Ensure personnel policies and contracts and contractor non-disclosure agreements reflect the requirements of the security policy. 3. Security Controls The remainder of this document lists various high level security controls and objectives, which we require their suppliers to comply with at all times. Any following reference to data will be to our customer, business and other sensitive data or information. Page 3 of 7

Policy & Standards Supplier must have their own defined security policy, which must be supported by documented security requirements and procedures and which mirrors in all material respects the TEF UK Security Policy. The Supplier must be able to demonstrate a regime which complies with the principles of ISO 27001, the best practice in information security. Where the Supplier is to process our Customer data, they must be independently certified to ISO 27001 with a scope that covers the processing of this data. Where the supplier is required to design and build software solutions, applications, systems or networks for TEF UK, they must be able to demonstrate that they follow industry standards such as the Centre for Internet Security benchmarks or OWASP. 3.1. Access 3.1.1 General provisions Access to the data must only be available to people who are authorised. Before any data is made available to any 3rd party supplier or non-tef UK business partner Supplier must arrange for a non-disclosure or confidentiality agreement to be agreed and signed between TEF UK and such 3 rd party supplier or non-tef business partner. The risks to data must be identified by Supplier and appropriate controls implemented within Supplier systems before access to data. These controls will include physical, technical, process and people protection arrangements to provide layers of defence to prevent the unauthorised disclosure, modification, deletion or other misuse of data. Data access must use unique user accounts with appropriate identification and authentication controls. Protection of portable media used to store data must be in accordance with access control principles and must include appropriate labelling and encryption. Background verification checks on all existing employees, candidates for employment, contractors, subcontractors, agency workers, third party users (and any like persons) should be carried out in accordance with relevant laws, regulations and ethics, and proportional to business requirements, the classification of the information to be accessed, and the perceived risks. 3.1.2 Grant of Access A. If necessary for the purposes of the provision of Services under this Agreement, we may grant individual employees of Supplier access to its IT and/or mobile telephony networks (the Network ) whether remotely, or on-site (in either case a Grant of Access ). If a Grant of Access is granted, the following conditions shall apply to its use. TEF UK may: withdraw the Grant of Access at any time without giving a reason; monitor any or all use of the Grant of Access; stipulate from time to time conditions on use which may cover, without limitation, security checking (see below) and restrictions on use; Supplier shall use the Grant of Access strictly for the purposes of the Agreement; and In respect of any malicious, illegal or unauthorised use of the Grant of Access by its employees or agents, Supplier shall be fully responsible at law. B. Prior to permitting any person to use the Grant of Access, Supplier shall (and shall confirm such compliance in writing to TEF UK): procure that such person is bound by appropriately strict terms as to confidentiality; Where appropriate, ensure that such person has an appropriate and valid Government security clearance. Page 4 of 7

C. If relevant, Supplier undertakes to abide by, and ensure that its agents and staff abide by the provisions of the Official Secrets Acts 1911 to 1989 during the continuance of the Agreement and indefinitely after its expiry or termination. D. The provisions relating to the Grant of Access are material to the Agreement and breach will allow TEF UK to terminate the Agreement. E. If, in the course of using the Grant of Access, and whether by act or omission Supplier (and/or any of its staff or agents) causes any damage to the Network, including, but not limited to (i) physical damage to equipment and/or (ii) the introduction of any virus, or any other damage to systems, code or software or firmware and/or (iii) the interruption of Network service, then Supplier shall indemnify TEF UK and hold it harmless in respect of all losses (including losses of revenue), costs, claims, expenses, liabilities or duties whether civil or criminal. The indemnity provided under this clause shall not be subject to any exclusion or limit on liability set out elsewhere in this Agreement. 3.2. Accountability All accesses to data must be accountable to an identified person or machine process. Processes must exist to authorise, modify and remove access to data. All such changes must be recorded. All equipment used to process data shall be maintained using a reputable company in accordance with required security controls. Where there is a need to dispose of media which contains data or other hard copies of data it must be disposed of securely and safely with the destruction certificates issued as required.. 3.3. Employee Screening A thorough background check must be conducted on such persons working on the TEF UK contract, including right to work, employment references, relevant qualifications and ensure that such person has no unspent criminal convictions which would question their honestly, integrity and suitability to be employed on this contract. 3.4. Specific requirements for employee screening can be found at the link titled Pre-employment Screening Requirements. Access to key TEF UK systems, processes, data and buildings must be recorded in an audit log, which can only be viewed by a limited number of authorised people and maintained for an agreed period. 3.5. Business Continuity Adequate business continuity planning should be put in place to protect the key services that you are providing to us under the Agreement. Business continuity plans should provide appropriate protection for the defined availability as set out in the service level agreement (if applicable). The validity of a business continuity plan should be regularly rehearsed to ensure that it remains suitable, fit for purpose and current in the then current technical and physical environment. 3.6. Validation & Integrity Data input must be verified to ensure that its validity and integrity is correct. A formal change management process must exist to ensure that changes to information processing facilities and systems are controlled. Acceptance criteria for new information systems, upgrades, and new versions must be established with TEF UK and suitable tests of the system(s) carried out during development and prior to acceptance. It is Supplier s responsibility to arrange this. Page 5 of 7

An appropriate system security patch management regime, with regular updates, must be implemented to ensure ongoing system integrity when new security vulnerabilities are discovered. 3.7. Malicious Software Detection, prevention and recovery controls to protect against malicious code (e.g. viruses) and appropriate user awareness procedures must be implemented and maintained. 3.8. Duty & Responsibilities All people dealing with TEF UK data or information should ensure that they are familiar with the TERF UK Security Policy and comply. Security roles and responsibilities of employees, contractors and third party users should be defined and documented in accordance with the organisation s information security policy. A documented security escalation process must exist and be maintained. Users of information systems and services are required to note and report, through the escalation process, any observed or suspected security weaknesses in systems or services. 3.9. Legal Responsibilities All software used by the Supplier to discharge its obligations under the Agreement must be validly owned or licensed by Supplier; it is Supplier s responsibility to maintain this. The provisions of the Data Protection Act 1998, PCI Data Security Standard, Sarbanes-Oxley Act of 2002 and other relevant legislation, regulation and contractual obligations must be fully complied with. All relevant statutory and regulatory requirements and the Supplier s approach to meet these requirements must be explicitly defined, documented, and kept up to date for each information system and the organisation. As part of their contractual obligations, employees, contractors and third party users should agree and sign the terms and conditions of their employment contract, which should state their and the organisation s responsibilities for information security. A prescribed warning screen shall be displayed immediately after a user successfully completes the logon sequence. The system administrator shall set up procedures to provide written authorisation to users stating their access privileges. 3.10. Network Interconnection Networks must be adequately managed and controlled, in order to be protected from threats and to maintain security for the systems and applications using the network, including information in transit. Any system used to process data must not be connected to other non-trusted networks without adequate security protection mechanisms (e.g. use of encryption). This requirement includes communication links that are used for remote diagnostic purposes, etc. 3.11. System/Data Segregation Duties and areas of responsibility must be segregated to reduce opportunities for unauthorised or unintentional modification or misuse of TEF UK s assets. Data should be available on a 'need to know' basis. It must not be possible for users or customers (whether external or internal) to gain access to data that is not relevant to them. Development, test and operational facilities must be separated to reduce the risks of unauthorised access or changes to the operational system. Page 6 of 7

3.12. Training & Education Adequate security training and education must be provided to all people before they are provided with access to data or information. 3.13. Ownership All systems/processes/data must have a nominated owner / person responsible. 3.14. Fraud identification, detection and prevention Where relevant, appropriate mechanisms must be implemented and maintained to prevent and/or detect potential fraud. 3.15. Back-up/Archive Appropriately secured backup and storage for system/data must be provided to ensure that an asset can be restored. Copies of the current versions of the system software, data and accompanying documentation must be safely and securely stored and available so as to enable a quick and controlled recovery in case of a processing interruption. 3.16. Non-Repudiation Where relevant, adequate controls should be put in place to ensure that actions and events will have legal effect and cannot be challenged in this respect and cannot be denied by Supplier and that such actions are accountable to a particular individual within Supplier organisation. 3.17. Regular Review Regular reviews (at least annually) should be undertaken to ensure that the security of assets cannot be compromised. 3.18. Right of Audit Notwithstanding anything in any agreement you have entered into with Telefonica, in respect of security reviews, TEF UK shall have the right throughout the term of it agreement with you to undertake a security review at an agreed and convenient time to ensure that data has the appropriate level of security protection. This security protection will include measures relating to technical, physical, procedural and people measures and controls. -End- Page 7 of 7