INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ

Size: px
Start display at page:

Download "INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ"

Transcription

1 INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO

2 Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies the information security policies defined in the University of Jyväskylä Security Policy. The information security policy and principles outline the aims, means, responsibilities and organisational measures by which information security is steered and implemented at the University. The information security policy and principles are applied to all data handling at the University throughout the entire lifespan of the data, regardless of the form of the data, the tools used and who is handling the data. The information security principles concern everyone working or studying at the University. These principles are also followed when obtaining services from external providers and, where applicable, with contract partners. Information security refers to the protection of data, services, information systems, digital communication, and relevant operating environments and practices against factors threatening the accessibility, integrity and confidentiality of data. Information security may be threatened by external as well as internal risk factors. Appropriate information security measures are selected and adjusted based on risk analyses. Information security activities include the planning and implementation of administrative, technical and other measures aiming at information security. The information security practices of the state administration provide a framework for the implementation of information security at the University. Information security objectives The objectives of information security help achieve the University s strategic goals in research, education and societal interaction. Secure data management and processing enhance the quality and overall security of university activities. Information security aims at ensuring appropriate data protection (confidentiality), guaranteeing the validity (integrity) of data, and contributing to the accessibility and usability of data for relevant purposes. Information security activities seek to ensure continuous operation under normal conditions as well as during disruptions thereof and in exceptional circumstances as described in the Emergency Powers Act (2011/1552). The University s obligations in exceptional circumstances are stipulated in the Universities Act (2009/558). The purpose of information security is to secure the functioning of various information systems, services and data networks that are important for the University s operation, prevent their unauthorised use as well as any intentional or unintentional loss or corruption of data. Information security control mechanisms and risk management measures ensure adequate safety and undisturbed functioning of the operating environment and practices. The University s information security fully meets the state administration standards for basic level information security 1. The basic level standards are implemented in administrative, 1 VAHTI 2/2010 Appendix 5 1

3 technical and practical solutions. In activities that require higher than basic-level data protection, the processes, practices, information systems and tools are protected in line with the higher standards of state administration 2. According to the principle of sufficient security, the standards are applied as seen fit with respect to the risks concerned. The information and data resources handled at the University have been identified and classified according to the classification principles defined by the University 3. The data processing environments and information systems have also been identified and classified accordingly. The classification is based on the publicity, confidentiality and importance of the data. Through continuous development, we seek to integrate information security into daily working practices. The University ensures that the staff has regular and sufficient opportunities for improving their information security competence. The phenomena relative to cyber security or digital safety are accounted for by identifying threats and controlling relevant risks in the operating environment. Means of information security management Information security risks are controlled by regular and systematic risk management. Information security follows the principle of sufficient protection. The activities are enhanced through continuous development. The array of information security measures is defined more specifically in a separate description of information security management. As for the fulfilment of the information security standards, the applicability and necessity of the requirements is considered from the perspective of the University s activities. Similarly, attention is paid to the costs as well as to the likelihood and possible consequences of actualised risks. Setting standards is subjected to risk management. Individual requirements can be fulfilled by substitutive procedures, provided that the procedure, related risk assessment and decision with relevant justifications have been duly documented. Planning for sustainability, recovery and preparedness is focused at least on the critical functions and processes of the University as well as on the information systems facilitating these. The capacity for action in disruptions or exceptional conditions is developed and maintained by regular training. Information security is implemented through various controls, practices and instructions included in processes as well as by various technical solutions for information systems. Information security measures are designed so that they do not cause any significant harm to the users and working processes. In the planning and implementation of information security mechanisms, the cost effects of the solutions are also considered. 2 VAHTI 2/2010 Appendix 5 3 Instructions for classifying and handling confidential data at the University of Jyväskylä 2

4 Any deviations in information security will be reacted to as quickly as possible in order to minimise their consequences. Such deviations are dealt with according to a predefined protocol. The information security competence and awareness of staff and students are developed through training and by informing them about information security issues. Main principles of information security Protected data The University owns the rights to the data processed at the University, unless otherwise prescribed by law or agreements. Upon leaving the employment or a contractual relationship with the University, the employee must return all University property to the employer, including data sets, ICT tools and equipment (computers, tablets, mobile and smartphones, data storage devices, etc.). As a rule, the body of information the University deals with is public, as one of the University s missions is to produce and disseminate new research-based knowledge. However, the University s operation also involves data that call for secrecy. There are two information security categories for such data 4, confidential and secret, each with their own rules for handling. As a rule, the secrecy obligation is based directly on law. Separate instructions will be issued for the classification and handling of data calling for secrecy. When dealing with personal or any other data that call for secrecy, the employees need to be especially careful and follow the instructions given by the University. Any data calling for secrecy (confidential as well as secret) and personal data may be primarily handled using tools and equipment provided by the University. Data belonging to the category confidential and personal data can also be handled in cloud services approved and agreed on by the University. Data in the category secret and sensitive personal data may be handled only with the particular devices and equipment the University has assigned for this purpose. Sensitive personal data must not be handled via remote access. Handling of personal or other data calling for secrecy with one s own devices intended for private use should be avoided. The use of public cloud services for handling this type of data is not permitted. Besides the policies outlined above, we must take into account what has been agreed with the co-operation partners about the handling and protection of data. Access and user rights Access and user rights to the University s systems and data are given only to persons who have a job, study rights or other contractual relationship with the University, or some other permission granted based on application. In this context, data refers to a body of information that is not made publicly available. Access and user rights are granted according to the extent the user s position requires. When the contractual relationship ends, the access and user rights are revoked. These rights are always checked when the person s job description or user role changes, and otherwise 4 Instructions for classifying and handling confidential data at the University of Jyväskylä 3

5 on a regular basis according to the yearly information security agenda. The rights to confidential, secret or personal data are granted only when the person s duties so require (the need-to-know principle). If a person s work involves the handling of such data, the person must receive appropriate induction to secrecy practices before the user rights are granted. ICT devices University staff or persons in a contractual relationship equivalent to employment may access the University network with an ID provided and devices administered by the University, but when necessary also using their own equipment, as long as the data processing environment allows this. Students may access the network with their own devices and user IDs granted by the University. In order to ensure security, the University can limit access to its services, systems or network for people using their own devices. Those using their own devices are responsible for the information security of this equipment and for protecting the data handled on it. They must take care that the use of their own devices will not jeopardise the security of the University s network and the services available there. The University provides instructions for the protection and safe use of people s own devices. The University may set restrictions on software, applications and file formats to be used on the devices and systems it administers. Information systems and services Each information system and person register has a designated owner responsible for granting user rights and for preparing necessary personal data file and system descriptions. In regards to the University s common and general services, the rights to these systems are controlled and managed by IT Services, while for the subject-area specific systems of various units this responsibility belongs to the owner of the system. In systems involving sensitive personal information, a robust user identification procedure is applied. For the University s common services, IT Services keeps a record of the terminals, servers, telecommunication devices, information systems, and applications with related license information under its administration. Units are responsible for keeping similar records about the devices and licences they own and administer. When purchasing or developing new information systems that involve personal data, data protection principles are documented (default and builtin data protection). Personal security Security clearances are granted to personnel who deal with data calling for secrecy and who are eligible for personal security clearance according to the decision of the Finnish Security Intelligence Service (Dnro 258/2016). Security clearances are made in connection with recruitment and when launching new research projects. The backgrounds of staff who deal with data that calls for secrecy are checked according to the same principles. In its role as a service 4

6 provider, the University follows the client s instructions for security clearances and these are carried out on the client s behalf. Purchases The information security obligations for services purchased from outside of the University are negotiated with the service provider. Information security requirements are defined in connection with the bid for tenders and further specified upon the purchase. The service contracts are attached with provisions of information security either as incorporated in the main document or as a separate appendix for security issues (security agreement), if the service involves or produces data that requires protection. The same goes for data protection requirements, if the purchased service involves dealing with personal data. Guidelines for information security The University of Jyväskylä s information security activities comply with its Regulations. In addition to the Acts and Decrees mentioned in the University Regulations, those listed below are significant for information security issues: Act on the Openness of Government Activities (so-called Publicity Act, 1999/621) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) Personal Data Act (1999/523) Act on the Protection of Privacy in Working Life (2004/759) Information Society Code (2014/917) Security Clearance Act (2014/726) The Criminal Code of Finland (1889/39) In secrecy issues, the University s information security measures follow the Publicity Act (Act on the Openness of Government Activities 621/1999). In principle, information created at the University is public. Based on the Publicity Act or some specific legislation, however, a particular set of data or pieces of information may be classified as requiring secrecy. Secrecy may also be based on agreements made between contract partners. Regarding data protection, the University follows the EU General Data Protection Regulation as well as related national legislative specifications. The University has appointed a data protection coordinator independent of other activities. The development of information security is guided by the existing standards as well as by the recognition of risks and their potential consequences for intellectual capital, information systems and the operating environment. The university s information security management builds mainly on the information security practices of the state administration, which are guided by the VAHTI instructions. The structure of information security management is consistent with the ISO standard. 5

7 Information security responsibilities and organisation At the University of Jyväskylä, the Rector, with the assistance of the director of administration, is responsible for information security at the University. Information security measures are steered by the Information Security Steering Group. The Rector appoints the members of this group based on proposals by the faculties and independent units. The steering group is chaired by the director of administration and its agenda is prepared by the information security manager. The information security manager is responsible for the implementation of information security at the University and leads operational activities in this domain. Information security implementation is supported by an Information Security Group. The director of administration appoints the group members based on proposals from faculties and independent institutes. The group is chaired by the information security manager and the information security manager of IT Services acts as the secretary of the group. The group has a representative from each faculty and independent institute as well as from HR administration and IT Services. The data protection coordinator has the right to participate in the activities of this group. Responsibility for information security in the faculties lies with the deans, in the independent institutes with their directors, and in University Services with the director of administration. The registrar is also responsible for related data protection. The data protection coordinator monitors and supervises that the EU General Data Protection Regulation and other data protection legislation as well as appropriate register holder s procedures are followed. The implementation of information security and data protection is supervised by the information security manager and the data protection coordinator. For general services, the implementation of information security in technical systems (technical information security) falls under the responsibility of IT Services. IT Services must have sufficient expertise for the specification and implementation of necessary technical solutions as well as for the information security control of information networks and systems. As regards units own services, the implementation and control of information security for technical systems are the responsibility of the system owner. The information security manager of IT Services coordinates the implementation of technical information security in IT Services and the units. It is the duty of supervisors to ensure that their staff know the information security principles and responsibilities and receives the necessary training. Every staff member, student or other authorised user of the University s services is obligated to follow the instructions given. Everyone is, by their own actions, responsible for the implementation of information security and promoting the development of a good information security culture. Information security training Induction to information security issues always covers the basic principles of information security and the general principles related to the handling of data calling for secrecy. Persons 6

8 who handle personal data or other information calling for secrecy are provided with separate training on the classification and processing of such data. Records are kept of the personnel who have participated in induction sessions and other training. The information security manager ensures that there is appropriate information security induction and training available for staff and students. The level of the staff s information security competence is assessed by an online test. Following the information security principles and guidelines Every employee, student or anyone otherwise in a contractual relationship with the University is obligated to follow the principles defined in this document and the instructions specifying these, other information security guidelines provided by the University as well as the rules for the use of information systems and networks, computers and other ICT equipment. Neglecting or acting counter to these policies, principles or instructions is considered an infringement of information security. Deliberate negligence of the information security principles and instructions may lead to sanctions. Depending on the severity of the information security infringement, the consequences for a staff member may be as follows: an admonishment a verbal warning a written warning 5 termination of user rights 6 dismissal from employment 7. Admonishments are given by the University s information security staff. The authority to decide on the other consequences is determined by Rector s decision on personnel matters and directions for its implementation 8. The consequences for a student may be as follows: an admonishment a verbal warning a written warning 9 suspension 9 Admonishments are given by the University s information security staff. The authority for deciding on the other consequences is determined by the Universities Act 10. The regulations for the use of information systems include illustrative examples of various infringements, their severity, and consequences. 5 Employment Contracts Act (2001/55) Chapter 7, Section 2 6 Employment Contracts Act (2001/55) Chapter 7, Section 2 7 Employment Contracts Act (2001/55) Chapter 8, Section 1 8 Rector s decision on personnel matters and directions for its implementation 9 Universities Act (2009/558) Chapter 5, Section Universities Act (2009/588) Chapter 5, Section 45 a 7

9 If an infringement gives reason to suspect a crime, the director of administration decides whether the University should request a police investigation of the incident. When a crime is suspected, the University can suspend user rights. User rights may also be suspended or revoked when the user is considered to pose a significant threat to information security at the University. Monitoring and surveillance The respective owner is responsible for monitoring and supervising the implementation of information security for each information system, resource or service. The implementation of administrative information security at the University is monitored by means of external audits, internal inspection and reviews. In addition, technical information security is evaluated by means of continuous technical surveillance. The most important environments and systems are subjected to separate information security checks according to an audit plan. For any systems and services crucial to the University s operation, an external reviewer checks their information security before these are taken into use, and thereafter according to the audit plan. IT Services is responsible for the surveillance of information systems and networks both within the intranet and at the Internet interface. Any notices of vulnerability issued by system and software suppliers, authorities or other partners are followed actively. Software-based vulnerabilities are scanned within the systems on a regular basis. The risks and their potential effects arising from such vulnerabilities are reviewed to provide a basis for remedial actions. The control arrangements for external information systems are ensured by agreements. The data protection coordinator supervises and monitors, according to a separate work plan, the appropriateness of data protection regulations, the given guidelines and processing of personal data. The possibility to audit the processes and systems of external service providers is ensured by agreements. In any case, based on risk assessments, audits are conducted at least once during the contract term. The information security requirements set for the service providers are monitored regularly in customer meetings. Control for deviations It is every employee s duty to notify the information security manager (tietoturva@jyu.fi) and their own supervisor about any observed information security deviations or shortcomings as well as suspected misconducts or information security infringements. The handling and management of information security deviations are described in separate instructions. Detected deviations are utilised in developing data-secure practices, processes and technical environments. If the deviations give reason to suspect a crime, the director of administration decides whether a police investigation of the incident should be requested. 8

10 Approval and maintenance of information security policies and principles Information security policies and principles are drafted and maintained by the University s information security manager together with the Information Security Group. The information security policy as part of the general safety and security policy is reviewed by the Information Security Steering Group at least every five years, and it is approved by the University Board. The information security principles are reviewed annually by the Information Security Steering Group, and they are approved by the Rector. The information security policy is published on the University s website while the information security principles are available on the intranet. A public version is distributed to contract partners when necessary. The processual history of these information security principles The University of Jyväskylä Information Security Principles were drafted by Information Security Manager Teijo Roine, and before the final approval they have been reviewed as follows: in meetings of the Information Security Group on 6 February 2017, 7 March 2017, and 9 May 2017 in the Information Security Steering Group on 23 March 2017 and 9 June 2017 in the University Management Group on 15 May 2017 in the co-operation procedure on 15 June 2017 In addition, comments on these principles have been requested by from IT Services. Jyväskylä, 16 June 2017 Matti Manninen, Rector 9

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Data Processing Agreement

Data Processing Agreement In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

A1 Information Security Supplier / Provider Requirements

A1 Information Security Supplier / Provider Requirements A1 Information Security Supplier / Provider Requirements Requirements for suppliers & providers A1 Information Security Management System Classification: public Seite 1 Version history Version history

More information

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17 GUIDELINES ON SECURITY MEASURES FOR OPERATIONAL AND SECURITY RISKS UNDER EBA/GL/2017/17 12/01/2018 Guidelines on the security measures for operational and security risks of payment services under Directive

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Seven Requirements for Successfully Implementing Information Security Policies and Standards

Seven Requirements for Successfully Implementing Information Security Policies and Standards Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

19 Dec The forwarding and returning obligation does not concern messages containing malware or spam.

19 Dec The forwarding and returning obligation does not concern messages containing malware or spam. E-mail rules 1/5 E-mail rules These e-mail rules concern all users of the university's e-mail systems. The parts aimed at university staff members concern all of the University's units, their employees

More information

Rules for LNE Certification of Management Systems

Rules for LNE Certification of Management Systems Rules for LNE Certification of Management Systems Application date: March 10 th, 2017 Rev. 040716 RULES FOR LNE CERTIFICATION OF MANAGEMENT SYSTEMS CONTENTS 1. PURPOSE... 3 2. SCOPE... 3 3. DEFINITION

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery Business Continuity and Disaster Recovery Index Section Title 1. Executive Summary 2. Policy Statement 3. Strategy 4. Governance 5. Key Documentation 6. Testing 1 Executive Summary Business Continuity

More information

Talenom Plc. Description of Data Protection and Descriptions of Registers

Talenom Plc. Description of Data Protection and Descriptions of Registers Talenom Plc. Description of Data Protection and Descriptions of Registers TALENOM DESCRIPTION OF DATA PROTECTION Last updated 14 March 2018 Scope Limitations Data protection principles Personal data Registers

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION Introduction The IFFO RS Certification Programme is a third party, independent and accredited

More information

ICT Security Policy. ~ 1 od 21 ~

ICT Security Policy. ~ 1 od 21 ~ ICT Security Policy ~ 1 od 21 ~ Index 1 INTRODUCTION... 3 2 ELEMENTS OF SECURITY CONTROL... 4 2.1 INFORMATION MEDIA MANAGEMENT... 4 2.2 PHYSICAL PROTECTION... 6 2.3 COMMUNICATION AND PRODUCTION MANAGEMENT...

More information

Level Access Information Security Policy

Level Access Information Security Policy Level Access Information Security Policy INFOSEC@LEVELACCESS.COM Table of Contents Version Control... 3 Policy... 3 Commitment... 3 Scope... 4 Information Security Objectives... 4 + 1.800.889.9659 INFOSEC@LEVELACCESS.COM

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

Eco Web Hosting Security and Data Processing Agreement

Eco Web Hosting Security and Data Processing Agreement 1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

Oracle Data Cloud ( ODC ) Inbound Security Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

Data Processor Agreement

Data Processor Agreement Data Processor Agreement Data Controller: Customer located within the EU (the Data Controller ) and Data Processor: European Representative Company: ONE.COM (B-one FZ-LLC) One.com A/S Reg.no. Reg.no. 19.958

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

Information Security Strategy

Information Security Strategy Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone

More information

Digital Signatures Act 1

Digital Signatures Act 1 Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date)

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) STORAGE OF SSAN Security Risk Assessment and SECURITY PLAN (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) IMPLEMENTED: (insert date) LICENCE DETAILS: No: Issue date: (Note: You

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

FSC STANDARD. Standard for Multi-site Certification of Chain of Custody Operations. FSC-STD (Version 1-0) EN

FSC STANDARD. Standard for Multi-site Certification of Chain of Custody Operations. FSC-STD (Version 1-0) EN FOREST STEWARDSHIP COUNCIL INTERNATIONAL CENTER FSC STANDARD Standard for Multi-site Certification of Chain of Custody Operations FSC-STD-40-003 (Version 1-0) EN 2007 Forest Stewardship Council A.C. All

More information

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR )

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) May 2018 Document Classification Public Q&A for Citco Fund Services clients in relation to The General Data Protection

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Data Processing Clauses

Data Processing Clauses Data Processing Clauses The examples of processing clauses below are proposed pending the adoption of standard contractual clauses within the meaning of Article 28.8 of general data protection regulation.

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Leiden University Regulations on ICT and Internet Use. Version

Leiden University Regulations on ICT and Internet Use. Version 1 Leiden University Regulations on ICT and Internet Use Version 1.0 4-11-2014 These Regulations state the rules regarding the use of ICT and internet facilities offered by Leiden University to its students,

More information

DATA PROTECTION LAWS OF THE WORLD. Bahrain

DATA PROTECTION LAWS OF THE WORLD. Bahrain DATA PROTECTION LAWS OF THE WORLD Bahrain Downloaded: 7 April 2018 BAHRAIN Last modified 25 January 2017 LAW There is currently no standalone data protection law in Bahrain. A draft is being reviewed before

More information

Information Bulletin

Information Bulletin Application of Primary and Secondary Reference Documents Version 1.1 Approved for release July 2014 Table of Contents 1.0 Purpose statement... 3 2.0 Audience... 3 3.0 BCA requirements and referenced documents...

More information

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Lakeshore Technical College Official Policy

Lakeshore Technical College Official Policy Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

FIRESOFT CONSULTING Privacy Policy

FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING abides by the Australian Privacy Principles ( APPs ), which provides relative information to businesses in relation to the collection, disclosure,

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

Policy Title; Business Continuity Management Policy. Date Published/Reviewed; February 2018

Policy Title; Business Continuity Management Policy. Date Published/Reviewed; February 2018 Policy Title; Business Continuity Management Policy Date Published/Reviewed; February 2018 Business Lead; Head of Strategic Governance CCMT sponsor; Deputy Chief Constable Thames Valley Police ensures

More information

Privacy Breach Policy

Privacy Breach Policy 1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

The Client is responsible for regularly updating its registered details.

The Client is responsible for regularly updating its registered details. 1 (6) Page Contract terms, client Introduction SSG Standard Solutions Group AB (hereinafter referred to as SSG ) provides various services for clients that work in industry, such as a web platform for

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Timber Products Inspection, Inc.

Timber Products Inspection, Inc. Timber Products Inspection, Inc. Product Certification Public Document Timber Products Inspection, Inc. P.O. Box 919 Conyers, GA 30012 Phone: (770) 922-8000 Fax: (770) 922-1290 TP Product Certification

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

!IlflimTIII~III~III~l~I~IIII!

!IlflimTIII~III~III~l~I~IIII! This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp 12-0429!IlflimTIII~III~III~l~I~IIII!

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

Investigation. City of Edmonton Office of the City Auditor. ETS Workforce Development. January 14, 2019

Investigation. City of Edmonton Office of the City Auditor. ETS Workforce Development. January 14, 2019 City of Edmonton Office of the City Auditor Investigation ETS Workforce Development January 14, 2019 1200, Scotia Place, Tower 1 10060 Jasper Ave Edmonton, AB T5J 3R8 Phone: 780-496-8300 edmonton.ca/auditor

More information

The New Government Security Classification System -

The New Government Security Classification System - The New Government Security Classification System -? Industry The guidance in this booklet is being developed for use from April 2014. It is but is being shared with industry in order to raise awareness

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information