06100 POLICY SECURITY AND INFORMATION ASSURANCE



Similar documents
Mike Casey Director of IT

Rotherham CCG Network Security Policy V2.0

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

HMG Security Policy Framework

How To Protect Decd Information From Harm

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

HMG Security Policy Framework

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

Network Security Policy

NETWORK SECURITY POLICY

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

How To Ensure Network Security

developing your potential Cyber Security Training

PS177 Remote Working Policy

Information Governance Policy (incorporating IM&T Security)

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

ULH-IM&T-ISP06. Information Governance Board

Service Children s Education

Government Security Classifications April 2014

Information Security Policy

UK SBS Physical Security Policy

University of Sunderland Business Assurance Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

So the security measures you put in place should seek to ensure that:

National Approach to Information Assurance

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Network Security Policy

NETWORK SECURITY POLICY

How To Protect School Data From Harm

28400 POLICY IT SECURITY MANAGEMENT

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Policy Document. IT Infrastructure Security Policy

A practical guide to IT security

INFORMATION TECHNOLOGY SECURITY STANDARDS

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

University of Brighton School and Departmental Information Security Policy

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

Information Security Policy

INFORMATION SECURITY POLICY

Information Governance and Assurance Framework Version 1.0

ISO27001 Controls and Objectives

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Data Protection Policy

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

Supplier Information Security Addendum for GE Restricted Data

OFFICIAL. NCC Records Management and Disposal Policy

Nine Steps to Smart Security for Small Businesses

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

NOT PROTECTIVELY MARKED BUSINESS CONTINUITY. Specialist Operations Contingency Planning Business Continuity Manager

Protective Security Governance Policy. Outlines ANAO protective security arrangements

Gifts, Hospitality, Discounts, Travel, Concessions and Other Potential Conflicts of Interest

Highland Council Information Security Policy

Physical Security Policy

Information Security: Business Assurance Guidelines

Third Party Security Requirements Policy

CODE OF PRACTICE ON THE MANAGEMENT OF POLICE INFORMATION

Information security controls. Briefing for clients on Experian information security controls

Version: 2.0. Effective From: 28/11/2014

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

Information Governance Management Framework

Information security policy

NHS Business Services Authority Information Security Policy

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Information Governance Strategy & Policy

How To Ensure Information Security In Nhs.Org.Uk

Lancashire County Council Information Governance Framework

Somerset County Council - Data Protection Policy - Final

Information System Audit Guide

Merthyr Tydfil County Borough Council. Information Security Policy

REMOTE WORKING POLICY

Introduction. Application

Corporate Information Security Policy

Remote Access and Home Working Policy London Borough of Barnet

DVLA ELISE GSi Closed User Group Code of Connection

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

IS INFORMATION SECURITY POLICY

Newcastle University Information Security Procedures Version 3

Reducing the Cyber Risk in 10 Critical Areas

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

The post holder will be guided by general polices and regulations, but will need to establish the way in which these should be interpreted.

Information Security Incident Management Policy

Corporate Information Security Management Policy

Caedmon College Whitby

BUSINESS CONTINUITY MANAGEMENT POLICY

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Records Management Policy & Guidance

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Transcription:

Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information it holds must be for a policing purpose and managed in accordance with the force policy on MOPI 1. About This Policy 1.1. This policy outlines the mandatory security requirements and management arrangements to which Hampshire Constabulary employees and those working on behalf / for the Hampshire Constabulary must adhere. 1.2. This policy applies to all personnel (police officers, police staff, special constabulary, contractors, temporary staff and volunteers) who have access to protectively marked material in any form. 1.3. This policy is in support of the current version of the Corporate Information Management Strategy. 1.4. The Hampshire Constabulary has a responsibility to ensure that its information systems meet the standards set by the ACPO/ACPO(S) Information Systems Community Security Policy. 2. General Principles 2.1. This policy Deals with: a). b). c). d). e). Governance, Risk Management and Compliance; Protective Marking and Asset Control; Personnel Security; Information Security and Assurance; Physical Security.

3. Statement of Policy 3.1. Governance, Risk Management & Compliance 3.1.1. This section deals with: a). b). c). d). e). f). g). h). i). Governance; Roles, accountability and responsibilities; Risk management; Assurance; Self assessment; Central reporting; Audit and review; Culture, training and professionalism; International Agreements; 3.1.2. Governance 3.1.3. Hampshire Constabulary employees and those working on behalf / for the Hampshire Constabulary are required to familiarise themselves with the requirements of the Security & Information Assurance Procedures and comply with their provisions. 3.1.4. Security requirements for the Force originate from the Cabinet Office. The Hampshire Constabulary Policies and Procedures are aligned to the Cabinet Office Security Policy Framework to enable the effective protection and utilisation of Force assets (people, information and equipment). 3.1.5. The Security & Information Assurance Policies and Procedures outline the mandatory security policy requirements that all must meet when using Force assets or attending Force premises. Under certain circumstances additional security will be required. This could be due to threat levels, threat actors, impact levels etc. The Security & Information Assurance Policies and Procedures must also be extended, where necessary, to any organisations working on behalf of, or handling Force assets, such as contractors, Local

Authorities, or regular suppliers of goods and / or services. 3.1.6. Roles, accountability and responsibilities 3.1.7. Hampshire Constabulary have designated personnel who have overall responsibility for security within the Force. 3.1.8. The day to day responsibilities for all aspects of Protective Security are managed by the Security & Information Assurance Unit. 3.1.9. Overall responsibility for Force Security rests with the Deputy Chief Constable who takes the role of the Senior Information Risk Owner (SIRO). 3.1.10. Managers 3.1.11. To be aware of Information Security Policies and Procedures and their individual responsibility as well as those of their staff; to ensure compliance in their area of responsibility. 3.1.12. To regularly monitor staff IT accounts and information processes to ensure compliance 3.1.13. Employees, volunteer and non police personnel working on behalf or with the Constabulary 3.1.14. Are responsible for compliance with the Information Security Policies and Procedures to ensure that security measures are adhered to in order to prevent / minimise vulnerabilities to the organisation, it s staff and it s assets. 3.1.15. Risk Management 3.1.16. The Hampshire Constabulary have adopted a risk management approach to cover all areas of protective security across the organisation. 3.1.17. All Hampshire Constabulary assets must be registered and the person responsible for those assets must be identified and aware of their responsibilities. 3.1.18. Asset owners will need to understand the vulnerability and likelihood of attack from various threats, value them in terms of the impact from loss or failure of

confidentiality, integrity and availability and assign a proportionate level of protection to mitigate, and / or recover from, the potential loss or failure of those assets. The identified risk should be reviewed annually. 3.1.19. Audit and review 3.1.20. The Security & Information Assurance Unit will conduct internal reviews of security arrangements throughout the Force. These will include OpSec and Protective Security reviews. 3.1.21. The Security & Information Assurance Unit must demonstrate compliance with the controls contained within the Information Assurance Maturity Model. 3.1.22. Culture, training and professionalism 3.1.23. Hampshire Constabulary will ensure that: a). b). c). d). e). Board members responsible for security undergo security and risk management familiarisation upon appointment; All members of the Security & Information Assurance Unit will receive relevant training from agencies such as the Centre for Protection of National Infrastructure (CPNI) at the earliest opportunity after appointment; Security education and awareness will be built into all staff inductions, with regular familiarisation thereafter; Hampshire Constabulary plan to foster a culture of proportionate protective security; All security incidents will be reported as per The HANTSPOL Guidance and Instruction for Information Security to the Sy & IA Unit or via Confide in Us to allow for anonymous reporting of security incidents. 3.1.24. International Security agreements 3.1.25. Hampshire Constabulary will ensure that they will adhere to any UK obligations in multilateral or bilateral international agreements. 3.2. Protective marking and asset control

3.2.1. This section deals with: a). b). Legal Requirements; Official Secrets Acts; c). Data Protection Act 1998; d). e). f). g). h). i). j). k). Freedom of Information Act; The need to know principle; International Security Standards; International Security Agreements; Material originating outside of HMG; The Government Protective Marking Scheme; Universal Controls; Breaches; 3.2.2. Legal requirements 3.2.3. Hampshire Constabulary staff are to familiarise themselves with the Official Secrets Acts, Data Protection Act and Freedom of Information Act. Staff handling protectively marked information will be given guidance on how this legislation relates to their role. 3.2.4. Official Secrets Acts 3.2.5. Hampshire Constabulary employees will sign up to the Official Secrets Act on the signing of their contract. 3.2.6. Data Protection Act 1998 (DPA) 3.2.7. All Hampshire Constabulary employees must follow the minimum standards and procedure for handling citizen or personal data. 3.2.8. Procedure 02106 Data Protection describes Hampshire Constabulary employees responsibility under the Data Protection Act. 3.2.9. Freedom of Information Act (FOIA)

3.2.10. Any protectively marked material that is to be released under the Freedom of Information Act is de-classified first and is marked as such. The originator, or specified owner, must be consulted before protectively marked material can be de-classified. 3.2.11. Procedure 02109 Freedom of Information Responding to Requests describes the procedure to be followed by Hampshire Constabulary when dealing with FOIA requests. 3.2.12. MOPI 3.2.13. The Hampshire Constabulary will manage police information in accordance with the principles of the Code of Practice on the Management of Police Information, and the MoPI guidance. 3.2.14. For more information see Policy 30800 Management of Police Information (MoPI). 3.2.15. The need to know principle 3.2.16. Access to protectively marked assets is only to be granted on the basis of the need to know principle. 3.2.17. For more information see The Hantspol guidance & Instruction on Information Security. 3.2.18. International security standards 3.2.19. The GPMS is designed to meet the principles of the international standard of Information Security Management Systems (ISO/IEC 27000 series). 3.2.20. Material originating outside of Her Majesty s Government (HMG) 3.2.21. Hampshire Constabulary employees must ensure that non-hmg material which is marked to indicate sensitivity is handled at the equivalent level within the Protective Marking Scheme, or where there is no equivalence, to the level offered by PROTECT as minimum. 3.2.22. The Government Protective Marking System (GPMS)

3.2.23. All personnel must apply the Protective Marking in accordance with Government Protective Marking Scheme (GPMS) and the necessary controls and measures as outlined in this policy and subordinate linked documentation. 3.2.24. For more information see Procedure 06109 and the Security & Information Assurance Intranet pages: 3.2.25. Universal controls 3.2.26. The following baseline controls must be followed for all protectively marked material: 3.2.27. Access is granted on a genuine need to know and use basis 3.2.28. Assets must be clearly and conspicuously marked. Where this is not possible staff must have the appropriate security control and be made aware of the protection and controls required. 3.2.29. Only the originator or the designated owner can protectively mark an asset. Any change to the protective marking requires the originator or designated owner s permission. If they cannot be traced, a marking may be changed, but only by consensus with other key recipients 3.2.30. Assets sent overseas must be protected as indicated by the originator s marking and in accordance with any international agreement. Particular care must be taken to protect assets from foreign Freedom of Information legislation by use of national prefixes and caveats of special handling instructions 3.2.31. When destroying official records, held on any media, consideration must be given to those records that may be of historical interest the following link refers: Disposal Schedule Historical Records. 3.2.32. A file, or group of protectively marked documents or assets, must carry the protective marking of the highest marked document or asset contained within it (e.g. a file containing CONFIDETIAL and RESTRICTED material must be marked CONFIDENTIAL 3.2.33. Breaches

3.2.34. Deliberate or accidental compromise of protectively marked assets may lead to disciplinary, performance and / or criminal proceedings. 3.2.35. All security breaches will be reported to the Security & Information Assurance Unit: a). Phone: 79 3237; b). e-mail: Security Incident Mailbox. 3.2.36. For more information on Security Breaches see Procedure 06101. 3.3. Personnel Security 3.3.1. This Section Deals with: a). b). c). d). e). Risk Management; Force Security Vetting; National Security Vetting; Ongoing personnel security management ( Aftercare ); Appeals; 3.3.2. Risk Management 3.3.3. Hampshire Constabulary, as a part of the risk management approach to protective security, will assess the need to apply personnel security controls against specific posts and the access to sensitive assets (designated posts). 3.3.4. Hampshire Constabulary employ a risk management approach to Personnel Security in accordance with protective security principles. These seek to reduce the risk of damage, loss, or compromise of Hampshire Constabulary assets and/or reputation by application of personnel security controls before and during employment. These controls do not provide a guarantee of reliability and must be supported by effective line management, nor should they be considered an alternative to the correct application of the need to know principle.

3.3.5. Hampshire Constabulary when making a decision on a security clearance will take into account all information available to them and will evidence their decision. 3.3.6. When making a vetting decision judgement is exercised and all the information obtained during the clearance process is taken into consideration. The existence of one or more factors of concern does not necessarily or conclusively demonstrate unreliability or present an unmanageable risk. The PSVU will consider the nature, likelihood and credibility of the threat and adopts the ACPO National Vetting Policy as guidance for all of the Units processes and assessment criterion. 3.3.7. Force Security Vetting 3.3.8. All personnel wishing to join Hampshire Constabulary, or provide a service which requires access to its premises or information assets, must be subject to the appropriate vetting process as per the Association of Chief Police Officers (ACPO) National Vetting Policy. 3.3.9. National Security Vetting 3.3.10. Hampshire Constabulary will apply National Security Vetting only where it is necessary, proportionate and adds real value and in accordance with the ACPO National Vetting Policy and Government Protective Marking Scheme. 3.3.11. Ongoing personnel security management ( Aftercare ) 3.3.12. Hampshire Constabulary will conduct aftercare as required by the ACPO National Vetting Policy. This will include formal reviews of all vetting clearances, managers and individuals must participate in the process and are responsible for informing the Personnel Security & Vetting Unit (PSVU) if any change in circumstance that may impact on the suitability to hold security clearance. 3.3.13. Appeals 3.3.14. Vetting Unit Homepage 3.3.15. Hampshire Constabulary record all vetting results and will report where appropriate to the Professional Standards Tactical and Strategic TCG.

3.4. Information Security & Assurance 3.4.1. This Section deals with: a). b). c). d). e). f). g). h). i). j). k). l). Information security; Managing information risk; Business impact; Personal data; Roles and responsibilities; Accreditation and audit; Codes of connection and technical controls; Cryptography; Eavesdropping and Electro-magnetic countermeasures; Remote working / mobile media; Procurement; Reporting incidents; m). Secure disposal; n). o). Education, training and awareness; Business continuity and disaster recovery planning; 3.4.2. Information Security 3.4.3. Hampshire Constabulary employees, and those working on behalf / for the Hampshire Constabulary MUST adhere to all Hampshire Constabulary security policies and supporting procedures. 3.4.4. Managing information risk 3.4.5. As a part of the risk management and accreditation process an annual technical risk assessment of Hantspol and other relevant systems and applications will be completed.

3.4.6. Business impact 3.4.7. Hampshire Constabulary will in conjunction with the Protective Marking System, use Business Impact Levels (ILs) to assess and identify the impacts to the business through the loss of Confidentiality, Integrity and / or Availability of data and / or assets, should the risk be realised. Aggregation of data will be considered as a factor determining ILs. 3.4.8. Personal data 3.4.9. Hampshire Constabulary employees and those who work for / on behalf of the Constabulary must comply with the data protection principles as set out in the Data Protection Act 1998 and Procedure 02106 to ensure a high level of confidence that personal data is handled correctly. 3.4.10. Roles and responsibilities 3.4.11. Information risk must be specifically addressed in the departmental annual Statement on Internal Control (SIC), which is signed off by the Chief Constable 3.4.12. Accreditation and audit 3.4.13. All Hampshire Constabulary Information Systems will be formally accredited prior to installation. Accreditation will be reviewed annually or more often where re-accreditation conditions apply. 3.4.14. The HANTSPOL Accreditation Document Set contains the necessary information security assurance and risk calculations. 3.4.15. All new information assets and ICT systems will have an audit functionality to enable regular compliance checks and which will include a forensic readiness plan that will maximise the ability to preserver and analyse data generated by an ICT system, that may be required for legal and management purposes. 3.4.16. All new ICT systems must have suitable identification and authentication controls to enable the risk of unauthorised access to be managed and to enable auditing and the correct management of user accounts.

3.4.17. Codes of connection and technical controls 3.4.18. Hampshire Constabulary will follow the requirements of any codes of connection and / or shared services security policies to which they are signatories. 3.4.19. Hampshire Constabulary have the following technical policies in place, policy 28400 refers: a). b). c). d). e). Patching policy; Policy to manage risks posed by all forms of malicious software ( malware ), including viruses, spyware and phishing etc; Boundary security devices (e.g. firewalls); Content checking / blocking policy; Lockdown policy to restrict unnecessary services and ensure that no user has more privileges than required; 3.4.20. Cryptography 3.4.21. The Hampshire Constabulary will ensure that information where appropriate will be encrypted to the appropriate level. All CAPS approved encryption is kept in accordance with HMG IA Standard No. 4. 3.4.22. For more information contact the Security & Information Assurance Unit. 3.4.23. Remote working / mobile media 3.4.24. See Procedure 06102 for information on remote working (e.g. home or mobile). This procedure sets out the correct practices when working remotely. 3.4.25. Procurement 3.4.26. Security requirements will be specified in all contracts where applicable. Security requirements are mandatory for all ICT contracts and those contracts where personal data is involved. 3.4.27. Reporting incidents

3.4.28. All actual and suspected security incidents must be reported to the Security & Information Assurance Unit by e-mailing the Security Incidents Mailbox or calling 79 3237. 3.4.29. For more information on reporting security incidents see procedure 06101. 3.4.30. Secure disposal 3.4.31. All media used for storing or processing protectively marked or otherwise sensitive information must be disposed of or sanitised securely. 3.4.32. For more information on secure disposal see procedure 06112. 3.4.33. Education, training and awareness 3.4.34. All Hampshire Constabulary employees will receive appropriate security awareness and training, be familiarised with Security Operating Procedures (SyOPs) and will be made aware of the process for reporting incidents. 3.4.35. Business continuity and disaster recovery planning 3.4.36. Hampshire Constabulary will ensure that Business Continuity and Disaster Recovery Plans are in place at all relevant locations. 3.4.37. For more information on Business Continuity see Policy 29100. 3.5. Extensions to the Force Network 3.5.1. Extending the Force data network into premises that are not under the control of the Hampshire Constabulary will incur vulnerabilities and, impacts on the confidentiality, integrity and availability of our information systems. For further details on the process for extending the force data network into new locations and premises see link to Remote Access (Network Extensions) 3.6. Physical Security 3.6.1. This section deals with:

a). b). c). d). e). f). g). h). i). j). Purpose; Defence in Depth; Storage of sensitive assets; Secure containers; Secure rooms; Office areas; Building security; Physical access control; Incoming mail and deliveries; CCTV. 3.6.2. Purpose 3.6.3. Physical security involves the appropriate layout and design of facilities, combined with suitable security measures, to prevent unauthorised access and protection of Hampshire Constabulary, people, information, materials and infrastructure. This requires putting in place, or building into design, measures that prevent, deter, delay and detect, attempted or actual unauthorised access, acts of damage and or violence, and triggers an appropriate response. 3.6.4. Hampshire Constabulary s Baseline Objectives for the access, storage, control and transmission and disposal and destruction of assets can be found here. 3.6.5. Defence in Depth 3.6.6. Hampshire Constabulary will adopt a layered approach to physical security. 3.6.7. Storage of sensitive assets 3.6.8. In order to identify appropriate security measures the Security & Information Assurance Unit will conduct a Physical Security Assessment.

3.6.9. Critical, sensitive and protectively marked assets must be located in secure Hampshire Constabulary premises or approved premises and be protected by a defined perimeter where possible, with appropriate security barriers and entry controls. 3.6.10. Security containers 3.6.11. Protectively Marked or valuable material must be secured in appropriate security containers. Large amounts of protectively marked material or equipment which cannot be stored in a security container, must be stored in a secure room. 3.6.12. For more information on Protective Marking see Procedure 06109. 3.6.13. Secure rooms 3.6.14. Rooms holding protectively marked material or sensitive assets will have windows, doors, locks and entry control which meets the appropriate standard. 3.6.15. Offices must be adequately secured when unoccupied, e.g. windows and doors closed and where applicable locked. 3.6.16. Office areas 3.6.17. Hampshire Constabulary recognise and use the Need to Know principle. This is used to ensure that access to protectively marked material by individuals who do not have a need to access it is avoided. 3.6.18. Where practicable (adequate storage is available) a clear desk policy will exist. The purpose of a clear desk policy is to ensure that sensitive material is not left unattended. 3.6.19. A clear screen and wall policy will be enforced, screens must be positioned to prevent overlooking (e.g. overlooked by a window or reflective surfaces), where this is not possible other measures must be introduced, for example blinds. 3.6.20. Buildings 3.6.21. Hampshire Constabulary will assess the security risks to it s estate ensuring that security is fully integrated

at an early in the process of planning, selecting, designing and modifying their facilities. 3.6.22. In any building in which protectively marked or other valuable assets are stored physical security controls will exist these will take into account the level of sensitivity and the level of threat to the site or assets. 3.6.23. Sensitive / covert sites and areas 3.6.24. These sites / areas will include but are not limited to: a). Special Branch; b). Major Crime; c). Specialist Investigations; d). Scientific Services; e). Serious and Organised Crime; f). Intelligence Directorate; g). Professional Standards Department Anti- Corruption Unit; h). Professional Standards Department Security and Information Assurance. 3.6.25. Those sites listed above and those that use CONFIDENTIAL systems will require a higher level of security. 3.6.26. For advice of additional Security measures please contact the Security & Information Assurance Unit. 3.6.27. Physical Access Control 3.6.28. Hampshire Constabulary will control access to its estate using safeguards that will prevent unauthorised access. 3.6.29. Hampshire Constabulary staff must familiarise themselves with this policy and this guidance on physical access. 3.6.30. Access control refers to the practice of controlling and monitoring access to a property or asset.

3.6.31. All Hampshire Constabulary employees and non-police personnel working for or on behalf of the Constabulary are required to wear (if not in uniform) / carry their ID / Warrant Card when on Hampshire Constabulary premises (See procedure 06104). 3.6.32. Hampshire Constabulary employees are encouraged to challenge any individual who is not wearing an authorised identity card or uniform. 3.6.33. To restrict entry, Hampshire Constabulary premises will have either an automatic access control system (AACS) which works in conjunction with the ID / Warrant card to allow access for authorised personnel only or alternatively Mechanical Push Button Locks (MPBL) will be used. 3.6.34. A visitor is classed as someone which the station they are attending is not their normal place of work and/or they are not employed by Hampshire Constabulary e.g. contractor, from another agency. Visitors must report to either the reception or a staff member to advise of their presence. 3.6.35. Visitors must: a). b). c). d). Sign in and out of Hampshire Constabulary premises; Wear a temporary pass which must be returned on leaving; Be escorted whilst in the building; Regular contractors who have free and unsupervised access to the building must be vetted. 3.6.36. CCTV 3.6.37. Where CCTV is installed it will be done in accordance with the Data Protection Act 1998. 3.6.38. Working away from Hampshire Constabulary Premises 3.6.39. For information on how to securely work away from Hampshire Constabulary premises see procedure 06102.

4. Implications of the Policy 4.1. Financial Implications / Best Value 4.1.1. The implementation of the required information security standards will incur substantial resource implications for the Hampshire Constabulary. The cost of physical and technical security controls required for new initiatives will be included in their procurement. 4.2. Staffing / Training 4.2.1. All staff in the Force will receive relevant training with regard to information security and will be required to reaffirm compliance with the Security Operating Procedures annually. Computer based training has been developed for Information Security and Data Protection this must be completed by all new starters. 4.3. Bureaucracy 4.3.1. It is not envisaged that this policy will produce any undue bureaucracy. 4.4. Risk 4.4.1. The main risk attached to the implementation of this policy would be through budgetary restriction. 4.5. Consultation 4.5.1. In Creating this policy, consultation has been carried out with: 5. Monitoring/ Evaluation 5.1. The Professional Standards Department is responsible for the monitoring and, where appropriate, the enforcement of all breaches of 06100 Policy - Information Security and associated procedures.

6. Review 6.1. This policy will be reviewed every three years or more frequently as deemed necessary 7. Related Policies, Procedures and Information Sources 7.1. Related Force Policies/Procedures 7.1.1. 02100 Professional Standards 7.1.2. 28400- IT Security Management 7.1.3. 11200 Security at Police Buildings 7.2. Information Security Procedures 7.2.1. The HANTSPOL Guidance & Instruction for Information Security 7.2.2. 06101 User s Responsibilities in Respect of Information Systems 7.2.3. 06102 Remote Working / Mobile Media 7.2.4. 06104 Force Identity & Warrant Cards & PCSO Designation Cards 7.2.5. 06109 Protective Marking 7.2.6. 06112 Secure Erasure / Disposal 7.2.7. 02103 Data Protection 7.2.8. 02109 Freedom of Information Responding to Requests 7.2.9. 30802 Information Sharing 7.2.10. 22206 Use of E-mail 7.2.11. 22207 Internet Web Browsing

7.2.12. 11201 Security at Police Buildings 7.3. Information Sources 7.3.1. HMG Security Policy Framework 7.3.2. HMG Information Assurance Standards 7.3.3. ACPO / ACPOS Information Systems Community Security Policy 7.3.4. AD203 Equality Impact Assessment Origin: Information Management