Policy General Policy GP20

Size: px
Start display at page:

Download "Policy General Policy GP20"

Transcription

1 Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology Version 1

2 CONTENTS Definitions INTRODUCTION SCOPE EXCEPTIONS PERSONAL IDENTIFIABLE INFORMATION USAGE Entitlement to Access Withdrawal of accounts software Personal accounts Personal use of your NHS Wirral account Your address Acceptable content for messages Unacceptable content for messages Keeping your secure Distribution Disclosure Accessing someone else s Signatures, footers and disclaimers Storage and archiving Sending Personal Identifiable Information (PII) Usage Monitoring ADDITIONAL CLAUSES YOUR ACCEPTANCE /10

3 Definitions The Policy The Organisation or WCT or Wirral CT Internet Usage or Internet Use Usage WHIS Service Desk This document (The Internet Usage Policy of Wirral Community NHS Trust). Wirral Community NHS Trust. Access by you to internet and intranet sites, systems and other on-line resources whilst on NHS Wirral premises or whilst using NHS Wirral computer equipment or facilities. Your use of Wirral CT s system, whether that be on NHS Wirral premises or elsewhere. Wirral Health Informatics Service, WCT s I.T. service provider. The I.T. helpdesk operated for Wirral Community NHS Trust by Wirral Health Informatics Service. Tel: (0151) or support@sd.whis.nhs.uk. 1. INTRODUCTION This document is the Usage Policy of Wirral Community NHS Trust and replaces all previous versions. All Wirral CT staff must read, understand and agree to abide by this policy and its rules. By accessing and using the system you are AUTOMATICALLY agreeing to adhere to this policy 2. SCOPE This Policy applies to all of the following: Wirral CT staff working on Wirral CT premises. Wirral CT staff not on Wirral CT premises but using Wirral CT equipment or facilities (e.g. staff working at home on a work laptop). Other individuals and groups using Wirral CT computer equipment or facilities. If you are allowing or facilitating the use of Wirral CT computer systems by non- Wirral CT staff, e.g. you have a contractor temporarily working in your department or a visitor using your equipment, you must ensure that they abide by the rules of this policy. 3/10

4 3. EXCEPTIONS If you are temporarily using the computer systems of another NHS organisation, e.g. another neighbouring Trust, you should abide by that organisation s own usage policy. In certain circumstances, clauses within this policy may temporarily be waived for staff of Wirral CT s I.T. provider, i.e. Wirral Health Informatics Service or its subcontractors, in order that they may carry out investigative or testing activities. If you wish to request any additional exceptions to the rules within this Policy, please contact the WHIS Service Desk: ext tel: (0151) or e- mail support@sd.whis.nhs.uk 4. PERSONAL IDENTIFIABLE INFORMATION Wirral CT operates a Code of Conduct for Handling Personal Identifiable Information. You should become familiar with the Code and keep up to date with any changes that are made. The Code of Conduct for Handling Personal Identifiable Information is available via the policies section of Wirral CT s internet site. Personal Identifiable Information can relate to members of staff as well as patients and can be as simple as including one or more of the following items: Name Address Date of Birth Post Code Sex Occupation NI Number NHS Number Ethnic Group Local identifier (e.g. hospital or GP Practice Number) Clauses later in this Policy refer to how you should deal with Personal Identifiable Information when using . Be sure that you understand those clauses and the Code of Conduct, above. Breaches of the Code may be regarded as gross misconduct and may result in serious disciplinary action being taken, up to and including dismissal. 5. USAGE 5.1 Entitlement to Access As an employee of the Trust and through authorisation by your manager you are entitled to use the facilities of Wirral CT, in some exceptional cases your entitlement may be specifically withdrawn or refused by Wirral CT. 4/10

5 5.2 Withdrawal of accounts If a member of staff is to leave the organisation permanently, they or their manager must inform the WHIS Service Desk (ext 8899 or tel: (0151) or support@sd.whis.nhs.uk) in advance. Upon agreement, the person s account will be closed and deleted. If a member of staff is to leave the organisation temporarily, e.g. for a period of maternity leave, they or their manager must inform the WHIS Service Desk (ext or tel: (0151) or support@sd.whis.nhs.uk) in advance. Upon agreement, the person s account will be temporarily suspended. In the case of misuse, Wirral CT may at its discretion withdraw the facility from a member of staff software Wirral CT uses either Microsoft Outlook or Microsoft Outlook Web Access as its client software. You should not install or use any other client software unless you have been given permission to do so by the Service Desk. Wirral CT may in future make other client software available to staff, in which case you will be informed in advance that it is to be deployed. 5.4 Personal accounts You must not access any personal (non NHS) accounts while using Wirral CT computers. 5.5 Personal use of your NHS Wirral account You are allowed to use your Wirral CT account for a limited amount of personal use if it is necessary for you to send or receive a personal while you are in work. On occasions when you use your Wirral CT account for personal use you must, as far as possible, continue to adhere to all the requirements of this policy. This means that you should ensure that s you send and s you receive do not contravene any rule in this policy. If you receive a personal which contravenes the rules in this policy, e.g. one which contains unacceptable material, you should delete it immediately. 5/10

6 5.6 Your address Your Wirral CT address will be in the format this will be set up and maintained for you by the WHIS Service Desk. You should not make any alteration to any software such that a different address is presented. 5.7 Acceptable content for messages Wirral CT provides you with access to facilitate your work for the organisation. It is expected that you may use your account to exchange messages which contain information about NHS activities, health information, or other professional sphere of activity such as Finance, HR and others. You may send s which contain personal identifiable information (defined in Section 4, above), but only if you adhere to the rules on ing personal identifiable information laid out in section 5.15, below. 5.8 Unacceptable content for messages s you send should not contain material which may be considered offensive. Offensive material includes text and/or images of a pornographic or non-medical sexual nature and hostile text and/or images relating to gender, ethnicity, race, sex, sexual orientation, religious or political convictions and disability. You should not send any s which are in furtherance of any business or commercial concern other than Wirral CT. You should not send s which contain frivolous material such as jokes or cartoons. You should not send bulk s, i.e. to a large number of colleagues, any such messages must be submitted to and distributed by Wirral CT communications team. You should not use to distribute any material in breach of intellectual property rights, e.g. distributing a publication in contravention of copyright law. 5.9 Keeping your secure Do not tell your password to any other person, nor make it available to be found by any other person. If you need another person to access your e- mails, please see Accessing someone else s , below. If you are leaving your computer for even a short period of time, you should ensure that your account is not left open and accessible. You can do this by locking your workstation (in Windows XP, press Ctrl-Alt-Del and choose Lock Workstation ). 6/10

7 If you see someone else s software left open on a computer, you must not read or view their s in their absence. Nor should you make any attempt to open someone else s account without their prior permission. You should not give out a colleague s address to anyone outside the NHS unless you know for sure that your colleague will be happy for you to do so. For example, it may be inappropriate to pass your colleague s address to a patient Distribution If you have to send an to a group of people, you should use the pre-set groups which are available within your software. If no pre-set group exists for the selection of people you wish to contact, you may create a list yourself and use that. The largest groups such as All Staff should only be used through the communications or corporate affairs departments. If you receive an message which was sent to a large number of other people as well as yourself, you should only use Reply to All if it is strictly necessary that your reply is seen by all those people. If you receive a non-work related message which tells you to Pass this on to all your contacts or similar, you should not do so. If a message worded that way genuinely appears to be alerting of danger or other matter of importance to the organisation you should verbally alert a senior member of staff Disclosure You should be aware that the information contained in your s may be subject to public disclosure under the Freedom of Information Act Unless the information is legally exempt from disclosure, the confidentiality of any s you send and any replies you receive cannot be guaranteed Accessing someone else s Under normal circumstances it should not be necessary for you to access a Wirral CT colleague s account. If there is an ongoing need for you and colleagues to view s jointly, you should approach the WHIS Service Desk (ext or tel: (0151) or support@sd.whis.nhs.uk) who, if appropriate, will set up a shared address for you. If you are going to need access to a colleague s account while they are on holiday, for example, then before they go away you should ask that person to set up a rule within their software such that their incoming messages are automatically forwarded to you. 7/10

8 If you need to access a colleague s account but they are not available (e.g. they are already on holiday) then you should approach that person s manager and discuss the matter with them. Your colleague s manager should then contact the WHIS Service Desk (ext or tel: (0151) or e- mail support@sd.whis.nhs.uk) for instructions Signatures, footers and disclaimers There is a standard signature which you must include at the end of any you send. Wirral CT communications Team can supply the most recent standard. Wirral CT includes a disclaimer at the end of all outgoing messages you send. You should not alter, move or remove that wording in any way Storage and archiving Your software will be set up by WHIS to automatically archive your older messages to a safe place on the system, so that you can view them later if you wish. There is a limit on how much you can store in your Inbox and its sub-folders. If you exceed that limit you should delete unnecessary messages or perform a manual archive. If you do not take your Inbox back underneath the size limit, you may not be able to send or receive s properly. If you need to, please contact the WHIS Service Desk for assistance (ext or tel: (0151) or e- mail support@sd.whis.nhs.uk) Sending Personal Identifiable Information (PII) and confidential information You must familiarise yourself with what Personal Identifiable Information means. See section 4 of this policy. You can Personal Identifiable Information and confidential information although any information sent to a non Wirral CT address MUST be encrypted (see table below). To encrypt the , type the word ENCRYPT into the subject line of the to enable this, if you need advice regarding the encryption process please contact the WHIS Service Desk (ext.8899 or tel: (0151) or support@sd.whis.nhs.uk). Remember; The issue of sending Personal Identifiable Information and other confidential information within s is very important, only send only the minimum required and only to those people who need to know, if you are in any doubt regarding what can and cannot be sent, please contact either the Governance Team (Helen Partington, Deputy Caldicott Guardian, Helen.partington@wirralct.nhs.uk) or the WHIS Service Desk (ext 8899 or tel: (0151) or support@sd.whis.nhs.uk). 8/10

9 You are sending an containing confidential information Is this NO You must from your department or account. To any other e NO Insert ENCRYPT into the subject line. This will ensure that the is sent securely Usage Monitoring To any other e mail account NO, seek advice from Governance / WHIS Service desk. Wirral CT s system automatically retains a list of all messages sent and received by staff over a preceding period of time. The list of all s sent and received will only be examined if required, and will only be examined by senior management of Wirral CT and/or WHIS technicians acting on Wirral CT management s instruction. In exceptional circumstances which warrant formal investigation, the list may be examined by NHS Connecting for Health or by the Police or other legal authority. Wirral CT and/or WHIS may at any time inspect the usage of an individual member of staff. This may be in order to resolve a technical 9/10

10 problem or may be as part of an investigation into possible misuse. This may take place without you being given prior notice. In exceptional circumstances such as investigation of misuse, Wirral CT may inspect the contents of any message but will only do so in accordance with the Regulation of Investigatory Powers Act (2000). 6. ADDITIONAL CLAUSES In addition to the definitions of what is and is not acceptable laid out in sections 5.7 and 5.8, Wirral CT and Wirral Health Informatics Service jointly reserve the right to consider other types of material and activity as unacceptable at their discretion. When necessary, staff will be advised of changes to the types of material which are acceptable and unacceptable. Wirral CT is the arbiter of matters relating to this policy. Decisions and interpretations by Wirral CT as regards unacceptable use of are final, other than in instances which demand criminal prosecution. Wilful contravention of the rules within this policy will in most cases lead to the immediate withdrawal of the relevant facility and may lead to disciplinary action being taken against the individual. As a participant in the NHS network, Wirral CT will fulfil its obligation to report any breaches of security and any serious misuse of to NHS Connecting for Health. Neither Wirral CT nor Wirral Health Informatics Service will accept any responsibility for loss or damage to any user resulting from use of Wirral CT e- mail services if that loss or damage is the result of that user having contravened the rules in this policy. Any personal use of those Internet or e- mail facilities carried out by a member of staff is carried out at his or her own risk. 7. YOUR ACCEPTANCE By accessing and using the system you are AUTOMATICALLY agreeing to adhere to this policy If you have read this policy and there are parts of it which you do not understand, please contact the WHIS Service Desk for advice: tel: Ext or Tel: (0151) or support@sd.whis.nhs.uk. 10/10

DOCUMENT CONTROL Electronic Mail Policy 8 HI002

DOCUMENT CONTROL Electronic Mail Policy 8 HI002 Title: Version: Reference Number: Scope: DOCUMENT CONTROL Electronic Mail Policy 8 HI002 This policy applies to all users accessing the NHS mail service, via the Trust network. This policy applies to all

More information

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we

More information

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

NHS Lanarkshire Clinical Mailbox User Guide. For use in Community Pharmacies. CLINICAL Mailbox User Guide V8 For CP September 2014 Page 1 of 15

NHS Lanarkshire Clinical Mailbox User Guide. For use in Community Pharmacies. CLINICAL Mailbox User Guide V8 For CP September 2014 Page 1 of 15 NHS Lanarkshire Clinical Mailbox User Guide For use in Community Pharmacies CLINICAL Mailbox User Guide V8 For CP September 2014 Page 1 of 15 INTRODUCTION... 3 ACCESSING YOUR NHS CLINICAL MAILBOX ON N3

More information

Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL

Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual Overview Purpose Electronic mail (email) is a business communication tool within ADHB and this policy outlines use of email

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Access to personal accounts and lawful business monitoring

Access to personal  accounts and lawful business monitoring Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY 1 Your Data Protection Responsibilities DATA PROTECTION POLICY 1.1 Everyone has rights with regard to how their personal data is handled. Personal data is any information that a person can be identified

More information

The General Data Protection Regulation

The General Data Protection Regulation PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Safe Haven and Information Sharing Policy

Safe Haven and Information Sharing Policy Safe Haven and Information Sharing Policy Reference No: Version: 3 Ratified by: P_IG_17 LCHS Trust Board Date ratified: 9 th January 2018 Name of originator/author: Name of approving committee/responsible

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Data Handling Security Policy

Data Handling Security Policy Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

Information Technology Access Control Policy & Procedure

Information Technology Access Control Policy & Procedure Information Technology Access Control Policy & Procedure Version 1.0 Important: This document can only be considered valid when viewed on the PCT s intranet/u: Drive. If this document has been printed

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Remote Working & Mobile Devices Security Standard

Remote Working & Mobile Devices Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information

More information

DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES

DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES You have been given this Notice because Babington collects, uses and stores information about colleagues

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

Information Governance and Code of Conduct

Information Governance and Code of Conduct This document is also available in other languages and formats upon request Information Governance and Code of Conduct For further information and guidance contact the Information Governance team: Tel:

More information

The John Fisher School ICT Policy

The John Fisher School ICT Policy The John Fisher School ICT Policy Responsible: Governors Resources Committee Review Date: May 2018 The need for a policy All The John Fisher School s information communication technology (ICT) facilities

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

Network Account Management Security Standard

Network Account Management Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Network Account Management Security Number: Scope of this Document: Recommending Committee: Approving Committee: SS06 All Staff/ Services Users Joint Information Governance

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

NHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy

NHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy NHS Ayrshire & Arran Organisation & Human Resource Development Policy Appropriate Use of IT Facilities Policy Version: 1.5 Date Approved: 2016-01-25 Author: Dept O&HRD, IT Security & Review date: 2018-01-25

More information

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Internet,  , Social Networking, Mobile Device, and Electronic Communication Policy TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ): Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this

More information

INFORMATION SYSTEMS SECURITY POLICY (ISSP)

INFORMATION SYSTEMS SECURITY POLICY (ISSP) INFORMATION SYSTEMS SECURITY POLICY (ISSP) Policy Number & Category IG 02 Information Governance Version Number & Date Version 3.7 February 2009 Ratifying Committee Date Approved March 2009 Next Review

More information

Acceptable Use of Policy

Acceptable Use of  Policy Acceptable Use of email Policy Printed copies must not be considered the definitive version DOCUMENT CONTROL POLICY NO. 82 Policy Group: Author: Reviewer: Information Assurance and Security Andrew Turner

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE

CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE INTENDED USE This Code is intended for the school s staff to provide directions in their work as to the standards for use

More information

Brasenose College ICT Systems Privacy Notice (v1.2)

Brasenose College ICT Systems Privacy Notice (v1.2) Brasenose College ICT Systems Privacy Notice (v1.2) A summary of what this notice explains Brasenose College is committed to protecting the privacy and security of personal data. This notice applies to

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions After having undertaken a period of research within recreational cricket, this document is aimed at addressing the frequently asked questions from cricket Clubs, Leagues, Boards

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Information Handling and Classification Table

Information Handling and Classification Table Information Handling and Classification Table Title: Information Classification and Handling Table Reference: IS-07a Status: Approved Version: 1.2 Date: March 2018 Classification: Non-Sensitive/Open Author(s)

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

Grand Avenue Primary and Nursery School ICT Data management. Contents

Grand Avenue Primary and Nursery School ICT Data management. Contents Grand Avenue Primary and Nursery School ICT Data management Contents 1. Acceptable Use Statement 2. Transfer and Offsite Use of Sensitive Data 3. E-safety 4. Declaration Introduction These three policy

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

E RADAR. All Rights Reserved. Acceptable Use Policy

E RADAR. All Rights Reserved.  Acceptable Use Policy Email Acceptable Use Policy For further help, please contact support@eradar.eu Item Number LD 0002 Author E RADAR LIMITED Disclaimer This template is provided with the understanding that the publisher

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

Access Rights and Responsibilities. A guide for Individuals and Organisations

Access Rights and Responsibilities. A guide for Individuals and Organisations Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making

More information

Birmingham Midshires - Terms and Conditions Mortgage Intermediaries On-line Terms of Use (June 2017)

Birmingham Midshires - Terms and Conditions  Mortgage Intermediaries On-line Terms of Use (June 2017) Birmingham Midshires - Terms and Conditions http://www.bmsolutions.co.uk/terms/ Mortgage Intermediaries On-line Terms of Use (June 2017) 1. General Which Terms Apply? - Directly Authorised Firms:If you

More information

IT Appropriate Use - Best Practice for Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions

IT Appropriate Use - Best Practice for  Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions IT Appropriate Use - Best Practice for Email Guidelines Section 1 - Purpose / Objectives (1) Email is used at Victoria University as a business communication tool and users are obliged to use this tool

More information

FIRESOFT CONSULTING Privacy Policy

FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING abides by the Australian Privacy Principles ( APPs ), which provides relative information to businesses in relation to the collection, disclosure,

More information

BRIDGEWATER SURGERIES. Privacy Notice

BRIDGEWATER SURGERIES. Privacy Notice BRIDGEWATER SURGERIES Privacy Notice We understand how important it is to keep your personal information safe and secure and we take this very seriously. We have taken steps to make sure your personal

More information

Usage Policy Document Number: OIL-IS-POL-EU

Usage Policy Document Number: OIL-IS-POL-EU Email Usage Policy Document Number: OIL-IS-POL-EU Document Details Title Email Usage Policy Description Acceptable usage of emails by users Version 1.0 Author Information Security Manager Classification

More information

Information Governance Incident Reporting Policy

Information Governance Incident Reporting Policy Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

BRITISH LIBRARY COMPLAINTS POLICY

BRITISH LIBRARY COMPLAINTS POLICY BRITISH LIBRARY COMPLAINTS POLICY INTRODUCTION 1. The British Library is committed to providing excellent service, and we invite feedback - to ensure the continuous improvement of the services and facilities

More information

This policy also applies to personal information about you that the Federation collects from any other third party.

This policy also applies to personal information about you that the Federation collects from any other third party. ANMF Policy Privacy The Australian Nursing and Midwifery Federation (the Federation) is an organisation of employees (ie a trade union) registered under Commonwealth industrial laws. The Federation is

More information

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) ADMINISTRATIVE POLICY NO. 13-01 ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) I. POLICY ISSUANCE This policy provides uniform guidelines and policies on the issuance and return of

More information

POLICY. Version: 1.1 Quality and Performance Committee Date ratified: 12 th July 2017

POLICY. Version: 1.1 Quality and Performance Committee Date ratified: 12 th July 2017 EMAIL POLICY Version: 1.1 Ratified by: Quality and Performance Committee Date ratified: 12 th July 2017 Name & Title of originator/author: John Robinson, Senior Information Governance Specialist (embed

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Terms & Conditions. Privacy, Health & Copyright Policy

Terms & Conditions. Privacy, Health & Copyright Policy 1. PRIVACY Introduction Terms & Conditions Privacy, Health & Copyright Policy When you access our internet web site you agree to these terms and conditions. Bupa Wellness Pty Ltd ABN 67 145 612 951 ("Bupa

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC

More information

Advocacy Service Guide

Advocacy Service Guide Advocacy Service Guide Advocacy is a means of empowering people by supporting them to assert their views and claim their entitlements and where necessary representing and negotiating on their behalf. Advocacy

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Data Loss Assessment and Reporting Procedure

Data Loss Assessment and Reporting Procedure Data Loss Assessment and Reporting Procedure Governance and Legal Services Strategy, Planning and Assurance Directorate Approved by: Data Governance & Strategy Group Approval Date: July 2016 Review Date:

More information

Breach Notification Form

Breach Notification Form Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

Complaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development

Complaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development Complaints and Compliments Policy Date Approved: 28 September 2016 Approved By: Ownership: Governing Body Corporate Development Date of Issue: August 2017 Proposed Date of Review: August 2019 Date of Equality

More information

Privacy Policy Wealth Elements Pty Ltd

Privacy Policy Wealth Elements Pty Ltd Page 1 of 6 Privacy Policy Wealth Elements Pty Ltd Our Commitment to you Wealth Elements Pty Ltd is committed to providing you with the highest levels of client service. We recognise that your privacy

More information

Name of Policy: Computer Use Policy

Name of Policy: Computer Use Policy Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

Data Processing Agreement DPA

Data Processing Agreement DPA Data Processing Agreement DPA between Clinic Org. no. «Controller». and Calpro AS Org. nr. 966 291 281. «Processor» If the parties have executed a Data Management Agreement, the Date Management Agreement

More information

INFORMATION CODE OF CONDUCT

INFORMATION CODE OF CONDUCT Title & Version Contact Point Information Compliance, DoI 2(3), (020) 7091 5084 (Internal Network 78-5084) Location Summary Room 1 East, Edinburgh House The Information Code of Conduct sets out the policy

More information

SCOTTISH ENVIRONMENT PROTECTION AGENCY. Information Technology Acceptable Use Procedure. Final Version 5.10 Page 1 of 7

SCOTTISH ENVIRONMENT PROTECTION AGENCY. Information Technology Acceptable Use Procedure. Final Version 5.10 Page 1 of 7 SCOTTISH ENVIRONMENT PROTECTION AGENCY Information Technology Acceptable Use Procedure Final Version 5.10 Page 1 of 7 SCOTTISH ENVIRONMENT PROTECTION AGENCY Information Technology Acceptable Use Procedure

More information

ICT Portable Devices and Portable Media Security

ICT Portable Devices and Portable Media Security ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data

More information

FLIPOUT Privacy Charter. We will handle any information we collect about you in accordance with our privacy Policy

FLIPOUT Privacy Charter. We will handle any information we collect about you in accordance with our privacy Policy Flip Out Trampoline Arena Franchises Pty Ltd Suite 9, 308 High Street, Penrith NSW 2750 PO Box 1850, Penrith 2751 1300 FLIP OUT FLIPOUT Privacy Charter We will handle any information we collect about you

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

Ulster University Standard Cover Sheet

Ulster University Standard Cover Sheet Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information

More information

International Client Centre Terms and Conditions V.1.0 Page 1

International Client Centre Terms and Conditions V.1.0 Page 1 Old Mutual International Isle of Man Limited - Client Centre Service E-commerce Registration Application and Terms & Conditions Valuations only For Original Single or Joint Policyholders IMPORTANT: This

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy Malpractice and Maladministration Policy Introduction This policy is aimed at our customers, including learners, who are delivering/registered on BCS approved qualifications or units within or outside

More information

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

EMPLOYEE USE OF TECHNOLOGY AGREEMENT 2000--ADMINISTRATION 2600--OFFICE TECHNOLOGY EMPLOYEE USE OF TECHNOLOGY AR 2620 Page 1 of 10 EMPLOYEE USE OF TECHNOLOGY AGREEMENT Revised: 4/01/02, 5/24/04, 2/10/10 Superintendent of Schools Page 2 of

More information

Privacy Notice. General Information Protection Regulation ( GDPR )

Privacy Notice. General Information Protection Regulation ( GDPR ) Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise

More information

Terms and Conditions 01 January 2016

Terms and Conditions 01 January 2016 Terms and Conditions 01 January 2016 thehealthsource: Terms and Conditions Page 1 of 7 This Agreement (the Agreement ) is entered into by and between thehealthsource (Pty) Ltd and the entity agreeing to

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,

More information

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers; 65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment

More information

Policy on Privacy and Management of Personal Information

Policy on Privacy and Management of Personal Information Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and

More information

Information Governance Policy

Information Governance Policy 2015 Information Governance Policy University of Wolverhampton Version 1.0 28 th October 2015 Policy Approval Procedure Information Governance Policy Policy Author: Stephen Hill Dept.: DAS Information

More information

Computer Use and File Sharing Policy

Computer Use and File Sharing Policy Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.

More information

Mobile Working Policy. Item 15.3

Mobile Working Policy. Item 15.3 Mobile Working Policy Item 15.3 Authorship: Committee Approved: Chris Wallace, Information Governance Manager, North Yorkshire & Humber Commissioning Support Unit Management Team Approved date: Review

More information

PRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record.

PRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record. 1. Introduction 1.1 From time to time Business & Risk Solutions Pty Ltd ("the Company") is required to collect, hold, use and/or disclose personal information relating to individuals (including, but not

More information