Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used.

Similar documents
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

SECURITY POLICY REMOTE WORKING

ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING

INFORMATION SECURITY POLICY

Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Why do we need to protect our information? What happens if we don t?

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Congregation Data Security Education

Information Security Policy for Associates and Contractors

Angard Acceptable Use Policy

So the security measures you put in place should seek to ensure that:

Safe Haven Procedure. Final. Date Issued March 2009 Review Date March 2010 NHS East Midland Employees. Safe Haven Procedure: v1.

Information Classification and. Handling Policy

your hospitals, your health, our priority STANDARD OPERATING PROCEDURE: Safe Haven Procedure TW SOP 3 SOP NO: VERSION NO:

Course: Information Security Management in e-governance

BERKELEY COLLEGE DATA SECURITY POLICY

Department of Commerce Office of Security. Initial Information Security Briefing

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA

Policy Scope: The policy applies across the Division to all DPH workgroups who maintain, use, have access to, or come into contact with IIHI.

PS177 Remote Working Policy

INFORMATION MANAGEMENT & TECHNOLOGY SECURITY POLICY

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Three

University for the Creative Arts. Mobile Working and Remote Access Policy

CREDIT CARD NUMBER HANDLING PROCEDURES POLICY October

Information Technology Acceptable Usage Policy

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII)

Data Encryption Policy

Data Transfer Policy. Data Transfer Policy London Borough of Barnet

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Services. Protecting information. It s everyone s responsibility

Information Security It s Everyone s Responsibility

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

KENT COUNTY COUNCIL. Records Management Toolkit for Children s Centres

CITY UNIVERSITY OF HONG KONG. Information Classification and

Newcastle University Information Security Procedures Version 3

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Lync Quick Start Guide for MAC OS

2014 Core Training 1

Policy. Mobile Phone Use Policy. Contents

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Order. Directive Number: IM Stephen E. Barber Chief Management Officer

LSE PCI-DSS Cardholder Data Environments Information Security Policy

Mobile Device Policy

Annual Continuing Education (ACE) (Print version) Information Privacy and I.T. Security and Compliance

SECURITY POLICIES AND PROCEDURES

Ixion Group Policy & Procedure. Remote Working

Mobility and Young London Annex 4: Sharing Information Securely

Information Security Policy London Borough of Barnet

Protection of Computer Data and Software

Acceptable Use Guidelines

Information Security Code of Conduct

ABERDARE COMMUNITY SCHOOL

Bexley Safeguarding Children Board. Information Sharing and Secure Document Transfer Guidance

File Dropbox Service

Congregation Identity Theft Education Program

Standard Operating Procedure. Secure Use of Memory Sticks

Remote Access and Home Working Policy London Borough of Barnet

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

Policy Document Control Page

Information Security Policy

Guidelines for smart phones, tablets and other mobile devices

HIPAA Training for Hospice Staff and Volunteers

Secure Transfer of Information Guidance for staff

INFORMATION SECURITY POLICY

Central Bedfordshire Council. IT Acceptable Use Policy. Version 1.7 January 2016 Not Protected. Not Protected Page 1 of 11

Security Guidelines for Overseas Travel for Users

How To Ensure Your Office Meets The Privacy And Security Requirements Of The Health Insurance Portability And Accountability Act (Hipaa)

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Information Governance Manual Training Booklet

Data Protection Policy

Information Security Policy

Sensitive and Protected Data Management Procedure

Subject: U.S. Department of Housing and Urban Development (HUD) Privacy Protection Guidance for Third Parties

Identity Theft Prevention Program Compliance Model

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy

NHS Fife. Your Risk - Information Governance and Security Survey

Payment Card Industry Data Security Standard PCI DSS

Safe Haven Policy. Equality & Diversity Statement:

Human Resources Policy documents. Data Protection Policy

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

E-Safety and Computer Security Rules

PHI- Protected Health Information

Acceptable Use of Information Systems Policy

IG Toolkit Version 8. Information Security Assurance. Requirement 322. Detailed Guidance on Secure Transfers

Data and Information Security Policy

Virginia Commonwealth University School of Medicine Information Security Standard

Enterprise Information Security Procedures

DOCUMENT CONTROL PAGE

Information security management guidelines

Life Cycle of Records

Data Protection and Information Security Policy and Procedure

Privacy & Security Standards to Protect Patient Information

REVISION: This directive supersedes TSA MD , Handling Sensitive Personally Identifiable Information, dated March 13, 2008.

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

Transcription:

Handling information based on the protective marking OFFICIAL INFORMATION MARKING Legal and statutory obligations, in particular under the Data Protection Act, will be followed, whatever the protective marking used. General points Be stored and managed securely within MRC approved systems Handled in line with local guidance on open-plan working and clear desk principles. Not be accessed, read or discussed where you can be overlooked or overheard Not be left unattended and should be locked away when not in use. Only communicated or passed to others on a need to know basis Emailing material By default this information can be sent in the clear over the Internet. No restrictions on emailing information, however it should be limited on a need to know basis. You may choose to include additional handling tag and/or instructions, if appropriate. When receiving email you must follow any handling guidance stipulated by the sender. Where necessary adopt the transmission technique as used by the sender (eg, encryption of message if sending outside your email domain). Where information you have added has increased the sensitivity you may choose to password protect or encrypt to provide additional protection. Permitted to known contacts on a need to know basis. You must follow the document originator s lead on encryption when replying to or forwarding emails. Information should normally be sent by encrypted e-mail. Information can be sent unencrypted only after making a risk based decision on the likelihood of it being intercepted and the level of damage that may be caused. Consider using password protection where encryption is not appropriate. Moving information - by hand or post BY HAND: Protect at least by one cover/envelope. Authorisation should be obtained from the Carry in a nondescript bag in order to not draw attention to the contents.

Information Asset Owner if moving a significant volume of assets / records / files. Never leave papers unattended. BY POST/COURIER: Use single, unused envelope. Include return address on back of the envelope. Never mark the classification on envelope. Consider double envelope for highly sensitive assets (write the classification on the inner envelope only). Consider using registered Royal Mail service or reputable commercial courier s track and trace service. MOVING ASSETS OVERSEAS (BY HAND / POST / COURIER): Use single, unused envelope. Either by: Trusted hand under single cover; or: Include return address on back of the envelope. Never mark the classification on envelope. Consider double envelope for highly sensitive assets (and writing the classification on the inner envelope only). Consider using registered Royal Mail service or reputable commercial courier s track and trace service.

Faxing Faxes should not be assumed to be secure. Consider using encrypted email if possible to communicate sensitive information. Confirm the recipient s fax number. Recipients should be waiting to receive faxes containing personal data marked OFFICIAL. Sensitive material to be faxed should be kept to an absolute minimum. Printing Permitted but print only what you need and consider PIN printing. All printed materials must be disposed of appropriately when no longer required or being used. Photocopying Permitted but make only as many copies as you need, and control their circulation. Consider PIN printing/copying where appropriate. STORAGE Physical storage (of documents, digital media, when not in use) Protect in line with local guidance on open-plan working and clear desk principles. This may include: protecting physically within a secure building by a single lock (eg a locked filing cabinet, locked drawer or container); not leaving papers on desks or on top of cabinets overnight. Laptops must be locked away or secured in docking stations when left in the office, only encrypted laptops may be taken outside of an MRC establishment. Electronic storage Any electronic document received marked OFFICIAL should be saved with OFFICIAL in the title and also in electronic document and records management system metadata or notes fields. Appropriate controls should be used to limit access. Any electronic document received marked should be saved with in the title and also in electronic document and records management system metadata or notes fields. Appropriate controls must be used to limit visibility of the document and access.

Electronic storage on digital media (USB memory sticks, CDs, DVDs) Disposing of documents Only MRC supplied and approved portable media is to be used. The media must be encrypted. Delete protectively marked information held on digital media only within MRC buildings and on MRC computer systems. Dispose of documents appropriately. Information already in the public domain can be disposed of by recycling or as ordinary waste. Information marked OFFICIAL or must be disposed of with care, either using a secure disposal bin or by shredding using an approved cross-cut shredder. REMOTE WORKING General points Laptops and removable media used to store OFFICIAL and OFFICIAL SENSITIVE information must be encrypted. Information marked OFFICIAL or must not be emailed to or from home/personal e- mail accounts. Limit the amount of information you take out of the office. Only take what is necessary. Refer to local guidance on remote working and Bring your own device and contact your local IT Manager or the IT Security team at head office for further information. Telephone, videoconferencing and other tools You should not assume telephony systems, video conferencing or tools such as Microsoft Lync and Skype are secure. No restrictions but be careful of how your Details of material should be

discussion might be perceived by others in earshot and of straying into areas that could be deemed as OFFICIAL SENSITIVE. kept to an absolute minimum and should only be discussed where there is no risk of being overheard.