Policy General Policy GP20
|
|
- Ashlynn Marshall
- 6 years ago
- Views:
Transcription
1 Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology Version 1
2 CONTENTS Definitions INTRODUCTION SCOPE EXCEPTIONS PERSONAL IDENTIFIABLE INFORMATION USAGE Entitlement to Access Withdrawal of accounts software Personal accounts Personal use of your NHS Wirral account Your address Acceptable content for messages Unacceptable content for messages Keeping your secure Distribution Disclosure Accessing someone else s Signatures, footers and disclaimers Storage and archiving Sending Personal Identifiable Information (PII) Usage Monitoring ADDITIONAL CLAUSES YOUR ACCEPTANCE /10
3 Definitions The Policy The Organisation or WCT or Wirral CT Internet Usage or Internet Use Usage WHIS Service Desk This document (The Internet Usage Policy of Wirral Community NHS Trust). Wirral Community NHS Trust. Access by you to internet and intranet sites, systems and other on-line resources whilst on NHS Wirral premises or whilst using NHS Wirral computer equipment or facilities. Your use of Wirral CT s system, whether that be on NHS Wirral premises or elsewhere. Wirral Health Informatics Service, WCT s I.T. service provider. The I.T. helpdesk operated for Wirral Community NHS Trust by Wirral Health Informatics Service. Tel: (0151) or support@sd.whis.nhs.uk. 1. INTRODUCTION This document is the Usage Policy of Wirral Community NHS Trust and replaces all previous versions. All Wirral CT staff must read, understand and agree to abide by this policy and its rules. By accessing and using the system you are AUTOMATICALLY agreeing to adhere to this policy 2. SCOPE This Policy applies to all of the following: Wirral CT staff working on Wirral CT premises. Wirral CT staff not on Wirral CT premises but using Wirral CT equipment or facilities (e.g. staff working at home on a work laptop). Other individuals and groups using Wirral CT computer equipment or facilities. If you are allowing or facilitating the use of Wirral CT computer systems by non- Wirral CT staff, e.g. you have a contractor temporarily working in your department or a visitor using your equipment, you must ensure that they abide by the rules of this policy. 3/10
4 3. EXCEPTIONS If you are temporarily using the computer systems of another NHS organisation, e.g. another neighbouring Trust, you should abide by that organisation s own usage policy. In certain circumstances, clauses within this policy may temporarily be waived for staff of Wirral CT s I.T. provider, i.e. Wirral Health Informatics Service or its subcontractors, in order that they may carry out investigative or testing activities. If you wish to request any additional exceptions to the rules within this Policy, please contact the WHIS Service Desk: ext tel: (0151) or e- mail support@sd.whis.nhs.uk 4. PERSONAL IDENTIFIABLE INFORMATION Wirral CT operates a Code of Conduct for Handling Personal Identifiable Information. You should become familiar with the Code and keep up to date with any changes that are made. The Code of Conduct for Handling Personal Identifiable Information is available via the policies section of Wirral CT s internet site. Personal Identifiable Information can relate to members of staff as well as patients and can be as simple as including one or more of the following items: Name Address Date of Birth Post Code Sex Occupation NI Number NHS Number Ethnic Group Local identifier (e.g. hospital or GP Practice Number) Clauses later in this Policy refer to how you should deal with Personal Identifiable Information when using . Be sure that you understand those clauses and the Code of Conduct, above. Breaches of the Code may be regarded as gross misconduct and may result in serious disciplinary action being taken, up to and including dismissal. 5. USAGE 5.1 Entitlement to Access As an employee of the Trust and through authorisation by your manager you are entitled to use the facilities of Wirral CT, in some exceptional cases your entitlement may be specifically withdrawn or refused by Wirral CT. 4/10
5 5.2 Withdrawal of accounts If a member of staff is to leave the organisation permanently, they or their manager must inform the WHIS Service Desk (ext 8899 or tel: (0151) or support@sd.whis.nhs.uk) in advance. Upon agreement, the person s account will be closed and deleted. If a member of staff is to leave the organisation temporarily, e.g. for a period of maternity leave, they or their manager must inform the WHIS Service Desk (ext or tel: (0151) or support@sd.whis.nhs.uk) in advance. Upon agreement, the person s account will be temporarily suspended. In the case of misuse, Wirral CT may at its discretion withdraw the facility from a member of staff software Wirral CT uses either Microsoft Outlook or Microsoft Outlook Web Access as its client software. You should not install or use any other client software unless you have been given permission to do so by the Service Desk. Wirral CT may in future make other client software available to staff, in which case you will be informed in advance that it is to be deployed. 5.4 Personal accounts You must not access any personal (non NHS) accounts while using Wirral CT computers. 5.5 Personal use of your NHS Wirral account You are allowed to use your Wirral CT account for a limited amount of personal use if it is necessary for you to send or receive a personal while you are in work. On occasions when you use your Wirral CT account for personal use you must, as far as possible, continue to adhere to all the requirements of this policy. This means that you should ensure that s you send and s you receive do not contravene any rule in this policy. If you receive a personal which contravenes the rules in this policy, e.g. one which contains unacceptable material, you should delete it immediately. 5/10
6 5.6 Your address Your Wirral CT address will be in the format this will be set up and maintained for you by the WHIS Service Desk. You should not make any alteration to any software such that a different address is presented. 5.7 Acceptable content for messages Wirral CT provides you with access to facilitate your work for the organisation. It is expected that you may use your account to exchange messages which contain information about NHS activities, health information, or other professional sphere of activity such as Finance, HR and others. You may send s which contain personal identifiable information (defined in Section 4, above), but only if you adhere to the rules on ing personal identifiable information laid out in section 5.15, below. 5.8 Unacceptable content for messages s you send should not contain material which may be considered offensive. Offensive material includes text and/or images of a pornographic or non-medical sexual nature and hostile text and/or images relating to gender, ethnicity, race, sex, sexual orientation, religious or political convictions and disability. You should not send any s which are in furtherance of any business or commercial concern other than Wirral CT. You should not send s which contain frivolous material such as jokes or cartoons. You should not send bulk s, i.e. to a large number of colleagues, any such messages must be submitted to and distributed by Wirral CT communications team. You should not use to distribute any material in breach of intellectual property rights, e.g. distributing a publication in contravention of copyright law. 5.9 Keeping your secure Do not tell your password to any other person, nor make it available to be found by any other person. If you need another person to access your e- mails, please see Accessing someone else s , below. If you are leaving your computer for even a short period of time, you should ensure that your account is not left open and accessible. You can do this by locking your workstation (in Windows XP, press Ctrl-Alt-Del and choose Lock Workstation ). 6/10
7 If you see someone else s software left open on a computer, you must not read or view their s in their absence. Nor should you make any attempt to open someone else s account without their prior permission. You should not give out a colleague s address to anyone outside the NHS unless you know for sure that your colleague will be happy for you to do so. For example, it may be inappropriate to pass your colleague s address to a patient Distribution If you have to send an to a group of people, you should use the pre-set groups which are available within your software. If no pre-set group exists for the selection of people you wish to contact, you may create a list yourself and use that. The largest groups such as All Staff should only be used through the communications or corporate affairs departments. If you receive an message which was sent to a large number of other people as well as yourself, you should only use Reply to All if it is strictly necessary that your reply is seen by all those people. If you receive a non-work related message which tells you to Pass this on to all your contacts or similar, you should not do so. If a message worded that way genuinely appears to be alerting of danger or other matter of importance to the organisation you should verbally alert a senior member of staff Disclosure You should be aware that the information contained in your s may be subject to public disclosure under the Freedom of Information Act Unless the information is legally exempt from disclosure, the confidentiality of any s you send and any replies you receive cannot be guaranteed Accessing someone else s Under normal circumstances it should not be necessary for you to access a Wirral CT colleague s account. If there is an ongoing need for you and colleagues to view s jointly, you should approach the WHIS Service Desk (ext or tel: (0151) or support@sd.whis.nhs.uk) who, if appropriate, will set up a shared address for you. If you are going to need access to a colleague s account while they are on holiday, for example, then before they go away you should ask that person to set up a rule within their software such that their incoming messages are automatically forwarded to you. 7/10
8 If you need to access a colleague s account but they are not available (e.g. they are already on holiday) then you should approach that person s manager and discuss the matter with them. Your colleague s manager should then contact the WHIS Service Desk (ext or tel: (0151) or e- mail support@sd.whis.nhs.uk) for instructions Signatures, footers and disclaimers There is a standard signature which you must include at the end of any you send. Wirral CT communications Team can supply the most recent standard. Wirral CT includes a disclaimer at the end of all outgoing messages you send. You should not alter, move or remove that wording in any way Storage and archiving Your software will be set up by WHIS to automatically archive your older messages to a safe place on the system, so that you can view them later if you wish. There is a limit on how much you can store in your Inbox and its sub-folders. If you exceed that limit you should delete unnecessary messages or perform a manual archive. If you do not take your Inbox back underneath the size limit, you may not be able to send or receive s properly. If you need to, please contact the WHIS Service Desk for assistance (ext or tel: (0151) or e- mail support@sd.whis.nhs.uk) Sending Personal Identifiable Information (PII) and confidential information You must familiarise yourself with what Personal Identifiable Information means. See section 4 of this policy. You can Personal Identifiable Information and confidential information although any information sent to a non Wirral CT address MUST be encrypted (see table below). To encrypt the , type the word ENCRYPT into the subject line of the to enable this, if you need advice regarding the encryption process please contact the WHIS Service Desk (ext.8899 or tel: (0151) or support@sd.whis.nhs.uk). Remember; The issue of sending Personal Identifiable Information and other confidential information within s is very important, only send only the minimum required and only to those people who need to know, if you are in any doubt regarding what can and cannot be sent, please contact either the Governance Team (Helen Partington, Deputy Caldicott Guardian, Helen.partington@wirralct.nhs.uk) or the WHIS Service Desk (ext 8899 or tel: (0151) or support@sd.whis.nhs.uk). 8/10
9 You are sending an containing confidential information Is this NO You must from your department or account. To any other e NO Insert ENCRYPT into the subject line. This will ensure that the is sent securely Usage Monitoring To any other e mail account NO, seek advice from Governance / WHIS Service desk. Wirral CT s system automatically retains a list of all messages sent and received by staff over a preceding period of time. The list of all s sent and received will only be examined if required, and will only be examined by senior management of Wirral CT and/or WHIS technicians acting on Wirral CT management s instruction. In exceptional circumstances which warrant formal investigation, the list may be examined by NHS Connecting for Health or by the Police or other legal authority. Wirral CT and/or WHIS may at any time inspect the usage of an individual member of staff. This may be in order to resolve a technical 9/10
10 problem or may be as part of an investigation into possible misuse. This may take place without you being given prior notice. In exceptional circumstances such as investigation of misuse, Wirral CT may inspect the contents of any message but will only do so in accordance with the Regulation of Investigatory Powers Act (2000). 6. ADDITIONAL CLAUSES In addition to the definitions of what is and is not acceptable laid out in sections 5.7 and 5.8, Wirral CT and Wirral Health Informatics Service jointly reserve the right to consider other types of material and activity as unacceptable at their discretion. When necessary, staff will be advised of changes to the types of material which are acceptable and unacceptable. Wirral CT is the arbiter of matters relating to this policy. Decisions and interpretations by Wirral CT as regards unacceptable use of are final, other than in instances which demand criminal prosecution. Wilful contravention of the rules within this policy will in most cases lead to the immediate withdrawal of the relevant facility and may lead to disciplinary action being taken against the individual. As a participant in the NHS network, Wirral CT will fulfil its obligation to report any breaches of security and any serious misuse of to NHS Connecting for Health. Neither Wirral CT nor Wirral Health Informatics Service will accept any responsibility for loss or damage to any user resulting from use of Wirral CT e- mail services if that loss or damage is the result of that user having contravened the rules in this policy. Any personal use of those Internet or e- mail facilities carried out by a member of staff is carried out at his or her own risk. 7. YOUR ACCEPTANCE By accessing and using the system you are AUTOMATICALLY agreeing to adhere to this policy If you have read this policy and there are parts of it which you do not understand, please contact the WHIS Service Desk for advice: tel: Ext or Tel: (0151) or support@sd.whis.nhs.uk. 10/10
DOCUMENT CONTROL Electronic Mail Policy 8 HI002
Title: Version: Reference Number: Scope: DOCUMENT CONTROL Electronic Mail Policy 8 HI002 This policy applies to all users accessing the NHS mail service, via the Trust network. This policy applies to all
More informationPRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust
PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we
More informationUCL Policy on Electronic Mail ( )
LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD
More informationNHS Lanarkshire Clinical Mailbox User Guide. For use in Community Pharmacies. CLINICAL Mailbox User Guide V8 For CP September 2014 Page 1 of 15
NHS Lanarkshire Clinical Mailbox User Guide For use in Community Pharmacies CLINICAL Mailbox User Guide V8 For CP September 2014 Page 1 of 15 INTRODUCTION... 3 ACCESSING YOUR NHS CLINICAL MAILBOX ON N3
More informationAuckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL
Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual Overview Purpose Electronic mail (email) is a business communication tool within ADHB and this policy outlines use of email
More informationAccess Control Policy
Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,
More informationAccess to personal accounts and lawful business monitoring
Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...
More informationINFORMATION TECHNOLOGY SECURITY POLICY
INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin
More informationDATA PROTECTION POLICY
1 Your Data Protection Responsibilities DATA PROTECTION POLICY 1.1 Everyone has rights with regard to how their personal data is handled. Personal data is any information that a person can be identified
More informationThe General Data Protection Regulation
PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationSafe Haven and Information Sharing Policy
Safe Haven and Information Sharing Policy Reference No: Version: 3 Ratified by: P_IG_17 LCHS Trust Board Date ratified: 9 th January 2018 Name of originator/author: Name of approving committee/responsible
More informationAcceptable Usage Policy (Student)
Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)
More informationThis Policy applies to all staff and other authorised users in St Therese School.
St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way
More informationPS Mailing Services Ltd Data Protection Policy May 2018
PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect
More informationData Handling Security Policy
Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,
More informationINFORMATION SECURITY AND RISK POLICY
INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:
More informationSAFE USE OF MOBILE PHONES AT WORK POLICY
SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31
More informationInformation Technology Access Control Policy & Procedure
Information Technology Access Control Policy & Procedure Version 1.0 Important: This document can only be considered valid when viewed on the PCT s intranet/u: Drive. If this document has been printed
More informationData Encryption Policy
Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager
More informationPS 176 Removable Media Policy
PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data
More informationRemote Working & Mobile Devices Security Standard
TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information
More informationDATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES
DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES You have been given this Notice because Babington collects, uses and stores information about colleagues
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationHIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice
More informationCommunication and Usage of Internet and Policy
Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority
More informationInformation Governance and Code of Conduct
This document is also available in other languages and formats upon request Information Governance and Code of Conduct For further information and guidance contact the Information Governance team: Tel:
More informationThe John Fisher School ICT Policy
The John Fisher School ICT Policy Responsible: Governors Resources Committee Review Date: May 2018 The need for a policy All The John Fisher School s information communication technology (ICT) facilities
More informationACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010
INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig
More informationNetwork Account Management Security Standard
TRUST-WIDE NON-CLINICAL DOCUMENT Network Account Management Security Number: Scope of this Document: Recommending Committee: Approving Committee: SS06 All Staff/ Services Users Joint Information Governance
More informationPolicy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.
London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate
More informationNHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy
NHS Ayrshire & Arran Organisation & Human Resource Development Policy Appropriate Use of IT Facilities Policy Version: 1.5 Date Approved: 2016-01-25 Author: Dept O&HRD, IT Security & Review date: 2018-01-25
More informationInternet, , Social Networking, Mobile Device, and Electronic Communication Policy
TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use
More informationIt applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).
Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations
More informationINFORMATION ASSET MANAGEMENT POLICY
INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives
More informationWithin the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):
Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this
More informationINFORMATION SYSTEMS SECURITY POLICY (ISSP)
INFORMATION SYSTEMS SECURITY POLICY (ISSP) Policy Number & Category IG 02 Information Governance Version Number & Date Version 3.7 February 2009 Ratifying Committee Date Approved March 2009 Next Review
More informationAcceptable Use of Policy
Acceptable Use of email Policy Printed copies must not be considered the definitive version DOCUMENT CONTROL POLICY NO. 82 Policy Group: Author: Reviewer: Information Assurance and Security Andrew Turner
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationCODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE
CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE INTENDED USE This Code is intended for the school s staff to provide directions in their work as to the standards for use
More informationBrasenose College ICT Systems Privacy Notice (v1.2)
Brasenose College ICT Systems Privacy Notice (v1.2) A summary of what this notice explains Brasenose College is committed to protecting the privacy and security of personal data. This notice applies to
More informationREGULATION BOARD OF EDUCATION FRANKLIN BOROUGH
R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources
More informationFrequently Asked Questions
Frequently Asked Questions After having undertaken a period of research within recreational cricket, this document is aimed at addressing the frequently asked questions from cricket Clubs, Leagues, Boards
More informationSubject: Kier Group plc Data Protection Policy
Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective
More informationInformation Handling and Classification Table
Information Handling and Classification Table Title: Information Classification and Handling Table Reference: IS-07a Status: Approved Version: 1.2 Date: March 2018 Classification: Non-Sensitive/Open Author(s)
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationData protection policy
Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees
More informationData Protection Policy
Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance
More informationGrand Avenue Primary and Nursery School ICT Data management. Contents
Grand Avenue Primary and Nursery School ICT Data management Contents 1. Acceptable Use Statement 2. Transfer and Offsite Use of Sensitive Data 3. E-safety 4. Declaration Introduction These three policy
More informationUWTSD Group Data Protection Policy
UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful
More informationCOMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2
COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles
More informationE RADAR. All Rights Reserved. Acceptable Use Policy
Email Acceptable Use Policy For further help, please contact support@eradar.eu Item Number LD 0002 Author E RADAR LIMITED Disclaimer This template is provided with the understanding that the publisher
More informationAcceptable Use Policy
IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations
More informationData protection. 3 April 2018
Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd
More informationPUPIL ICT ACCEPTABLE USE POLICY
PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status
More informationAccess Rights and Responsibilities. A guide for Individuals and Organisations
Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making
More informationBirmingham Midshires - Terms and Conditions Mortgage Intermediaries On-line Terms of Use (June 2017)
Birmingham Midshires - Terms and Conditions http://www.bmsolutions.co.uk/terms/ Mortgage Intermediaries On-line Terms of Use (June 2017) 1. General Which Terms Apply? - Directly Authorised Firms:If you
More informationIT Appropriate Use - Best Practice for Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions
IT Appropriate Use - Best Practice for Email Guidelines Section 1 - Purpose / Objectives (1) Email is used at Victoria University as a business communication tool and users are obliged to use this tool
More informationFIRESOFT CONSULTING Privacy Policy
FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING abides by the Australian Privacy Principles ( APPs ), which provides relative information to businesses in relation to the collection, disclosure,
More informationBRIDGEWATER SURGERIES. Privacy Notice
BRIDGEWATER SURGERIES Privacy Notice We understand how important it is to keep your personal information safe and secure and we take this very seriously. We have taken steps to make sure your personal
More informationUsage Policy Document Number: OIL-IS-POL-EU
Email Usage Policy Document Number: OIL-IS-POL-EU Document Details Title Email Usage Policy Description Acceptable usage of emails by users Version 1.0 Author Information Security Manager Classification
More informationInformation Governance Incident Reporting Policy
Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator
More informationUWC International Data Protection Policy
UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of
More informationBRITISH LIBRARY COMPLAINTS POLICY
BRITISH LIBRARY COMPLAINTS POLICY INTRODUCTION 1. The British Library is committed to providing excellent service, and we invite feedback - to ensure the continuous improvement of the services and facilities
More informationThis policy also applies to personal information about you that the Federation collects from any other third party.
ANMF Policy Privacy The Australian Nursing and Midwifery Federation (the Federation) is an organisation of employees (ie a trade union) registered under Commonwealth industrial laws. The Federation is
More informationADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)
ADMINISTRATIVE POLICY NO. 13-01 ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) I. POLICY ISSUANCE This policy provides uniform guidelines and policies on the issuance and return of
More informationPOLICY. Version: 1.1 Quality and Performance Committee Date ratified: 12 th July 2017
EMAIL POLICY Version: 1.1 Ratified by: Quality and Performance Committee Date ratified: 12 th July 2017 Name & Title of originator/author: John Robinson, Senior Information Governance Specialist (embed
More informationUniversity of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
More informationTerms & Conditions. Privacy, Health & Copyright Policy
1. PRIVACY Introduction Terms & Conditions Privacy, Health & Copyright Policy When you access our internet web site you agree to these terms and conditions. Bupa Wellness Pty Ltd ABN 67 145 612 951 ("Bupa
More informationMobile Working Policy
Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of
More informationPathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke
Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC
More informationAdvocacy Service Guide
Advocacy Service Guide Advocacy is a means of empowering people by supporting them to assert their views and claim their entitlements and where necessary representing and negotiating on their behalf. Advocacy
More informationAcceptable Use Policy
Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationData Loss Assessment and Reporting Procedure
Data Loss Assessment and Reporting Procedure Governance and Legal Services Strategy, Planning and Assurance Directorate Approved by: Data Governance & Strategy Group Approval Date: July 2016 Review Date:
More informationBreach Notification Form
Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More informationComplaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development
Complaints and Compliments Policy Date Approved: 28 September 2016 Approved By: Ownership: Governing Body Corporate Development Date of Issue: August 2017 Proposed Date of Review: August 2019 Date of Equality
More informationPrivacy Policy Wealth Elements Pty Ltd
Page 1 of 6 Privacy Policy Wealth Elements Pty Ltd Our Commitment to you Wealth Elements Pty Ltd is committed to providing you with the highest levels of client service. We recognise that your privacy
More informationName of Policy: Computer Use Policy
Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership
More informationSt Bernard s Primary School Data Protection Policy
St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General
More informationData Processing Agreement DPA
Data Processing Agreement DPA between Clinic Org. no. «Controller». and Calpro AS Org. nr. 966 291 281. «Processor» If the parties have executed a Data Management Agreement, the Date Management Agreement
More informationINFORMATION CODE OF CONDUCT
Title & Version Contact Point Information Compliance, DoI 2(3), (020) 7091 5084 (Internal Network 78-5084) Location Summary Room 1 East, Edinburgh House The Information Code of Conduct sets out the policy
More informationSCOTTISH ENVIRONMENT PROTECTION AGENCY. Information Technology Acceptable Use Procedure. Final Version 5.10 Page 1 of 7
SCOTTISH ENVIRONMENT PROTECTION AGENCY Information Technology Acceptable Use Procedure Final Version 5.10 Page 1 of 7 SCOTTISH ENVIRONMENT PROTECTION AGENCY Information Technology Acceptable Use Procedure
More informationICT Portable Devices and Portable Media Security
ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data
More informationFLIPOUT Privacy Charter. We will handle any information we collect about you in accordance with our privacy Policy
Flip Out Trampoline Arena Franchises Pty Ltd Suite 9, 308 High Street, Penrith NSW 2750 PO Box 1850, Penrith 2751 1300 FLIP OUT FLIPOUT Privacy Charter We will handle any information we collect about you
More informationEnviro Technology Services Ltd Data Protection Policy
Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:
More informationUlster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information
More informationInternational Client Centre Terms and Conditions V.1.0 Page 1
Old Mutual International Isle of Man Limited - Client Centre Service E-commerce Registration Application and Terms & Conditions Valuations only For Original Single or Joint Policyholders IMPORTANT: This
More informationMalpractice and Maladministration Policy
Malpractice and Maladministration Policy Introduction This policy is aimed at our customers, including learners, who are delivering/registered on BCS approved qualifications or units within or outside
More informationEMPLOYEE USE OF TECHNOLOGY AGREEMENT
2000--ADMINISTRATION 2600--OFFICE TECHNOLOGY EMPLOYEE USE OF TECHNOLOGY AR 2620 Page 1 of 10 EMPLOYEE USE OF TECHNOLOGY AGREEMENT Revised: 4/01/02, 5/24/04, 2/10/10 Superintendent of Schools Page 2 of
More informationPrivacy Notice. General Information Protection Regulation ( GDPR )
Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise
More informationTerms and Conditions 01 January 2016
Terms and Conditions 01 January 2016 thehealthsource: Terms and Conditions Page 1 of 7 This Agreement (the Agreement ) is entered into by and between thehealthsource (Pty) Ltd and the entity agreeing to
More informationData Protection Policy
Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,
More informationXpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;
65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment
More informationPolicy on Privacy and Management of Personal Information
Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and
More informationInformation Governance Policy
2015 Information Governance Policy University of Wolverhampton Version 1.0 28 th October 2015 Policy Approval Procedure Information Governance Policy Policy Author: Stephen Hill Dept.: DAS Information
More informationComputer Use and File Sharing Policy
Computer Use and File Sharing Policy Williamson College recognizes the value of computer and other electronic resources to improve student learning and enhance the administration and operation of its school.
More informationMobile Working Policy. Item 15.3
Mobile Working Policy Item 15.3 Authorship: Committee Approved: Chris Wallace, Information Governance Manager, North Yorkshire & Humber Commissioning Support Unit Management Team Approved date: Review
More informationPRIVACY POLICY. 3.1 This policy does not apply to the collection, holding, use or disclosure of personal information that is an employee record.
1. Introduction 1.1 From time to time Business & Risk Solutions Pty Ltd ("the Company") is required to collect, hold, use and/or disclose personal information relating to individuals (including, but not
More information