University of Sunderland Business Assurance. Over-arching Information Governance Policy. Document Classification: Public



Similar documents
University of Sunderland Business Assurance Information Security Policy

Information governance strategy

West Midlands Police and Crime Commissioner Records Management Policy 1 Contents

INFORMATION GOVERNANCE STRATEGY

Information Governance Policy

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

OFFICIAL. NCC Records Management and Disposal Policy

Information Governance Policy

Information Governance Strategy. Version No 2.0

1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.

Information Governance Policy

NHS Commissioning Board: Information governance policy

Information Governance Strategy. Version No 2.1

Highland Council Information Security Policy

Information Governance Strategy and Policy. OFFICIAL Ownership: Information Governance Group Date Issued: 15/01/2015 Version: 2.

Information Governance Framework

BEFORE USING THIS GUIDANCE, MAKE SURE YOU HAVE THE MOST UP TO DATE VERSION GUIDANCE 2 POLICY AREA: INFORMATION GOVERNANCE

2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.

INFORMATION GOVERNANCE STRATEGY NO.CG02

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

Caedmon College Whitby

Barnsley Clinical Commissioning Group. Information Governance Policy and Management Framework

Information Governance Strategy & Policy

Information Governance Policy

RECORDS MANAGEMENT POLICY

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

Information Governance Management Framework

Information Governance Policy

SOMERSET PARTNERSHIP NHS FOUNDATION TRUST RECORDS MANAGEMENT STRATEGY. Report to the Trust Board 22 September Information Governance Manager

Information & ICT Security Policy Framework

Corporate Records Management Policy

Information Governance Strategy :

Records Management Security of University Records Procedures

Information Governance Policy

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.

Records Management plan

INFORMATION GOVERNANCE POLICY

Information Governance Policy

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Information Governance Strategy

Version Number Date Issued Review Date V1 25/01/ /01/ /01/2014. NHS North of Tyne Information Governance Manager Consultation

Lancashire County Council Information Governance Framework

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Corporate Policy and Strategy Committee

INFORMATION SECURITY POLICY

Policy Document Control Page

WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public

PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

Information Governance Policy A council-wide information management policy. Version 1.0 June 2013

INFORMATION GOVERNANCE POLICY

Records Retention and Disposal Schedule. Information Management

Information Governance Policy

Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s):

Public Records (Scotland) Act Healthcare Improvement Scotland and Scottish Health Council Assessment Report

INFORMATION GOVERNANCE POLICY & FRAMEWORK

Information Management Strategy. July 2012

Information Governance Policy

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

RECORDS MANAGEMENT FRAMEWORK

EA-ISP-001 Information Security Policy

INFORMATION GOVERNANCE POLICY

Information Governance Framework and Strategy. November 2014

Ulster University Standard Cover Sheet

Information and records management. Purpose. Scope. Policy

INFORMATION GOVERNANCE POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

Information Governance Policy

Data Protection Policy June 2014

NHS Lanarkshire Information Governance Committee

BIG LOTTERY FUND Document archive and retention policy

Information Governance Strategy

Policy Document Control Page

How To Protect School Data From Harm

INFORMATION GOVERNANCE POLICY

Information Governance Policy Version - Final Date for Review: 1 October 2017 Lead Director: Performance, Quality and Cooperate Affairs

Basic Records Management Practices for Saskatchewan Government*

Auditing data protection a guide to ICO data protection audits

Data Protection Breach Management Policy

Information Management Policy CCG Policy Reference: IG 2 v4.1

NHS Waltham Forest Clinical Commissioning Group Information Governance Policy

Information Governance Policy

INFORMATION GOVERNANCE

Transcription:

University of Sunderland Business Assurance Over-arching Information Governance Policy Document Classification: Public Policy Reference Central Register IG001 Policy Reference Faculty / Service IG 001 Policy Owner Director of Business Assurance Date Policy Written May 2013 Date Policy Last Updated May 2014 Author Date to Information Governance Group Assurance Manager, Business Assurance 19 th June 2014 Date to Executive Date for next Review Comments Updated to include reference to the University s Corporate Plan and refreshed list of underlying policies. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 1

Contents 1. Introduction...3 2. Purpose and Scope...3 2.1. Opportunity...3 2.2. Experience...3 2.3. Support...3 2.4. Sustainability...3 3. Information Governance Management...4 3.1. Objective:...4 3.2. Responsibilities...4 3.3. Governance Groups...5 3.3.1. Information Governance Group...5 3.3.2. Information Champions Group...5 3.3.3. Technical Security Group...5 4. Confidentiality and Data Protection...5 4.1. Objective:...5 4.2. Policies and Procedures...5 5. Information Security...6 5.1. Objective:...6 5.2. Policies and Procedures...6 6. Records Management...6 6.1. Objective:...6 6.2. Policies and Procedures...7 B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 2

1. Introduction Over-arching Information Governance Policy Information Governance is defined as the way by which information is handled. Information Governance is the term used to encompass the multi-disciplinary structures, policies, procedures, process and controls which are implemented to manage the processing of information within an organisation. It provides a framework for processing information in a confidential and secure manner, as determined by legislative acts, statutes and best practice guidance such as:- The Data Protection Act 1998 The Freedom of Information Act 2000 Environmental Information Regulations 2004 Computer Misuse Act 1990 Human Rights Act 1998 Access to Health Records Act 1990 Regulation of Investigatory Powers Act 2000 Lawful Business Practice Regulations 2000 Mental Capacity Act 2005 Privacy and Electronic Communications (EC Directive) Regulations 2003 (as amended) 2. Purpose and Scope This policy applies to all University staff and independent contractors, and to all information, in all formats. The purpose of this document is to provide a framework for the handling of information in the University to ensure regulatory and statutory compliance and to ensure that appropriate use of timely and accurate information assists in the delivery of the core themes of the Corporate Plan: 2.1. Opportunity Support transnational education and collaboration with partner institutions 2.2. Experience Support researchers in their obtaining and handling of research information 2.3. Support Facilitating appropriate sharing of information with prospective employers and partner agencies 2.4. Sustainability Contribute to the University s carbon reduction targets through implementing initiatives such as: Electronic retrieval of off-site records Introduction of alternative methods of working to reduce staff travel B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 3

3. Information Governance Management 3.1. Objective To ensure appropriate management arrangements are in place to effectively manage the Information Governance agenda. 3.2. Responsibilities Board of Governors and Vice Chancellor Ultimate responsibility information governance rests with the Board of Governors. The Vice Chancellor, has executive responsibility for all aspects of information governance and together with the Board of Governors, will ensure that proper procedures are in place to fully implement this policy. The Vice Chancellor is responsible signing any undertakings with the Information Commissioner on behalf of the University due to non-compliance. Senior Information Risk Owner (SIRO) Overall responsibility for this policy lies with the Director of Business Assurance, who performs the role of the University s Senior Information Risk Owner (SIRO) The SIRO is responsible for: Ensuring that an overall culture exists that values and protects information within the organisation Owning the organisation s overall information risk policy and risk assessment process, testing its outcome and ensuring that it is used Owning the organisation s information incident management framework The Assurance Manager (Business Assurance - Information Governance), responsible to the Director for Business Assurance, is responsible for drawing up information governance policy, process and guidance and ensuring compliance with this policy. The Assurance Manager will oversee the Information Governance Framework and ensure its successful operation. The IT Security Manager (ITS), reporting to the Head of Technology Services: IT, is responsible for developing IT Security Policy, standards and guidelines. He/she is also responsible for ensuring that effective IT Security systems, controls and training programs are operationally implemented, fit for purpose and available across the University. The Legal Support & Data Protection Officer is responsible for developing policy, process and guidance relating to Data Protection and can provide advice on collecting, using and protecting personal information. The University Deans of Faculty and Directors of Support Services have responsibility for ensuring compliance with the University s Information Governance policies and ensuring any issues of non-compliance are addressed. They have responsibility for ensuring that an appropriate member of staff, in each Faculty and Service, takes on the role of Information Champion. Individual employees and contractors have responsibility for ensuring that they comply with this policy and any related policies and guidance. Staff should attend training and awareness sessions provided by the University. Employees also have a duty to report any incidents or near misses in relation to information security. B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 4

3.3. Governance Groups 3.3.1. Information Governance Group The Information Governance Group is accountable to the University s Business Assurance Board. It is to act as a programme board for direction of the University s overall approach to Information Governance. Specifically, it is tasked with:- Holding an understanding of all elements of Information Governance, including relevant technical and legal requirements Overseeing all aspects of policy development in relation to Information Governance Overseeing all technical developments to support and enhance the University s approach to the management of Information Governance Governing the design and delivery of all training and development activity in relation to Information Governance 3.3.2. Information Champions Group Information Champions are accountable to their Dean of Faculty/Director of Service and have a responsibility to monitor information governance compliance and awareness and be the primary point of contact and source of information and support within the Faculty/Service. The Information Champions Group will report to the Information Governance Group. 3.3.3. Technical Security Group Faculty IT Technicians play a pivotal role in the application of technical IT Security controls within their Faculty and are accountable to their Dean of Faculty/Director of Service for ensuring the IT Services provided by the Faculty are in line with IT Security Policies & Standards. The technicians must also be a primary point of contact and source of information in relation to IT Security form an awareness perspective in supporting the Faculty/Service. The Technical Security Group will report to the Information Governance Group. 4. Confidentiality and Data Protection 4.1. Objective To ensure that all staff and contractors are aware of and comply with their obligations with regards to confidentiality. Compliance with legal and regulatory framework will be achieved, monitored and maintained. The obligation to keep information confidential arises out of the common law duty of confidentiality, the Data Protection Act 1998, professional obligations and staff employment contracts. In combination, these duties and obligations place all staff members with access to confidential personal information under a duty to keep that information safe and secure 4.2. Policies and Procedures To aid staff in complying with their duties and obligations with regards to confidentiality, the following policies and procedures will be in place: Data Protection Policy Subject Access Request (SAR) Procedures Staff Guide to Personal Information Student Guide to Personal Information Public Guide to Personal Information Data Sharing Agreement Guidance Non-Disclosure Agreement Guidance B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 5

5. Information Security 5.1. Objective To ensure that information systems are secure and respond to security related incident in whatever way is appropriate. To prevent loss, damage or compromise of assets and interruption to business activities. The main priorities for information security are:- creating a culture towards information security within the organisation ensuring security policies contain sufficient detail and strength to guide staff, particularly around o the identification and understanding of the types of information they deal with o removable media/portable computing o transfer of person identifiable information ensuring staff have access to policies and guidance and sufficient training to ensure they can fulfil their duties responsibly and securely 5.2. Policies and Procedures The following policies and procedures, as a minimum, will be in place in relation to Information Security: Information Security Policy IT Acceptable Use Policy IT Security Policy Information Risk Management Policy (and procedures) IT and Communications Interception and Monitoring Policy Mobile Device Management Policy IT Systems at Risk Policy University Network at Risk Policy JANET Acceptable Use Policy Backup/Disaster Recovery Policy Additionally, a set of IT Security standards and best practice guidance documents will be drawn up with the Technical Security Group. 6. Records Management 6.1. Objective To ensure that records are accessible and retrievable when and where required. This includes records on network drives, emails and attachments, web pages on Internet and Intranet sites and paper records held both off-site and on-site. Records management will concentrate on themes such as:- Creating and maintaining an inventory of existing corporate records Creation/File Naming conventions Storage Retention periods Archiving Disposal Compliance with legislation such as Freedom of Information Act /Environmental Information Regulations Electronic document management including use of cloud based services B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 6

Corporate records management (including policy management) Open access to outputs of publicly funded research 6.2. Policies and Procedures At a minimum, the following policies and procedures will be developed in relation to Records Management:- Records Management Policy Archive and Retention Policy Information Classification Policy Archiving and Retention Procedures FOI and EIR Policy FOI Procedures B u s i n e s s A s s u r a n c e 4 t h F l o o r, E d i n b u r g h B u i l d i n g - 0 1 9 1 5 1 5 2 4 0 7 Page 7