Bring Your Own Device (BYOD) Policy

Size: px
Start display at page:

Download "Bring Your Own Device (BYOD) Policy"

Transcription

1 Bring Your Own Device (BYOD) Policy Document History Document Reference: Document Purpose: Date Approved: 22 nd September 2017 To set out the operating principles and security controls that apply to personal devices that have been authorised to process organisational data. Approving Committee: Information Governance Management and Technology Committee Version Number: 2 Status: Approved Next Revision Due: 22 nd September 2019 Developed by: Policy Sponsor: Target Audience: Associated Documents: CCG Information Governance Leads, Nottinghamshire Health Informatics Service, Information Governance Management and Technology Committee Director of Outcomes and Information, Greater Nottingham CCGs This policy applies to any person directly employed, contracted or volunteering with the CCG All Information Governance Policies and the Information Governance Toolkit This information can be made available in alternative formats, such as easy read or large print, and may be available in alternative languages, upon request. Please contact or maccg.foi@nhs.net. 1

2 Revision History Version Date Summary of Changes 0.1 November 2013 First draft for consultation 0.2 November 2014 Second Draft NHIS capabilities statement for BYOD Mobile Device Management. 1.0 November 2016 No changes 1.1 August 2017 Reviewed by NHIS in line with NHS Digital guidance and best practice. 1.2 September 2017 Approved by Nottinghamshire Information Governance Management and Technology Committee 2.0 October 2017 Final version issued to all CCGs Policy Dissemination information Reference Number Title Bring your Own Device Policy Available from 2

3 Contents 1 Introduction Purpose Scope Duties and Responsibilities Organisational Policy Acceptable Use Devices and Support Reimbursement Security Risks/Liabilities/Disclaimers Equality and Diversity References... 9 Appendix One: Airwatch Provision of Corporate Bubble and Security Arrangements: Appendix Two: Bring Your Own Device Application Form BYOD - USER GUIDE Appendix Three NHSMail Account Management for Managers (Frequently Asked Questions)

4 1 Introduction This Policy applies to Nottinghamshire County Clinical Commissioning Groups (CCGs), subsequently referred to in this document as the CCG(s). They include: NHS Mansfield and Ashfield CCG NHS Newark and Sherwood CCG NHS Nottingham North and East CCG NHS Nottingham West CCG NHS Rushcliffe CCG The underlying feature of Bring Your Own Device (BYOD) is that the user owns, maintains and supports the device. This means that the data controller (the employing organisation) will have significantly less control over the device than it would have over a traditional corporately owned and provided device. Whilst ownership is not corporate, responsibility for the ownership of the data remains with the data controller. It is important to remember that the data controller must remain in control of the personal data for which they are responsible, regardless of the ownership of the device used to carry out the processing. Connection of a personally owned device to corporate networks is subject to all organisational policy in respect of information security and the protection of data and equipment as listed at section 5. 2 Purpose Bring Your Own device (BYOD) can be seen as a means of obtaining cost and resource efficiencies as the staff member may be providing the equipment e.g. Smartphone, Laptop etc. rather than the organisation purchasing this directly for them. The Bring Your Own Device Policy shall be used to enable appropriate controls and procedures to be enforced on personal devices that have been authorised to process NHS data. Mobile working solutions and VPN (Virtual Private Network remote connection) connections are only permitted on corporately owned devices, because of the significant support requirements, device management and encryption, in addition to end user training requirements. 3 Scope This policy applies to all employees (permanent, seconded, contractors, management and clinical trainees, apprentices, temporary staff and volunteers) of the CCG. Third Parties with whom the CCG may agree information sharing protocols will be governed by this policy and associated information sharing agreements. Any user seeking to connect a personally owned device, must gain authority via their line management structures to connect and provide a budget code to meet the cost of the 4

5 connection of the device to Airwatch, prior to the request being made to Nottinghamshire Health Informatics Service (NHIS) or through the NHS Customer Portal at Device Management and NHSmail NHSmail is the recommended system for transfer of personal confidential data (PCD) as the system is encrypted end-to-end. As a user of the NHSmail platform, individuals must operate in accordance to a clear set of guidance, policies and procedures to ensure the service is being used effectively, appropriately and safely. Every NHSmail user is required to accept the Acceptable Use Policy when they register for the service. For further guidance please see the Internet and policy. While it is recognised that one of the key benefits of NHSmail is that it can be accessed anywhere on any device via the Web application (OWA), staff choosing to access their NHSmail Web account on unencrypted, personal or non-work provided device must do so in line with the policy for Electronic Remote Working. Access under these circumstances is permitted for View Only purposes staff are advised to contact their Information Governance lead if further guidance is required. While using the NHSmail Web function staff must also abide by the following rules: a) Ensuring that if NHSmail is being accessed via the Web, staff must not auto save the password on their device; b) If accessing NHSmail Web on a personal device (such as an iphone) staff must ensure that a screen saver prompting a mandatory password is kept on the device at all times. If adding NHSmail Web as an app on to their device staff must contact Nottinghamshire Health Informatics Service to have AirWatch installed on the device prior to set up; c) Staff must be vigilant of the environment in which they access s and ensure confidentiality is maintained at all times (e.g. if accessing from a home computer ensure that no friends or family members are able to see s); d) Always check that NHSmail is logged out after use. As the personal device used to access NHSmail Web will likely not be encrypted staff must not save any s outside the secure web portal, access is permitted to merely view s or calendar. User guidance and frequently asked questions regarding use of NHS Mail is available at Appendix 3. Should an individual wish to use either a personal device to connect to NHSmail, or a mobile device that cannot be encrypted or allow the organisational policies to be applied, they must have approval from their own organisation to ensure compliance with local information governance policies. BYOD Policy applies Smart Phone Tablet/iPad Home Laptop 5

6 VPN connection* NO NO YES Access to Mail via app YES YES NO Access to Mail via Portal YES YES YES 4 Duties and Responsibilities The CCG has a legal duty to comply with the Data Protection Act The Accountable Officer is responsible for ensuring that the responsibility for data protection is allocated appropriately within the CCG and that the role is supported. All staff must adhere to CCG policies and procedures relating to the processing of personal information, and the data controller (organisation) must assure themselves that the technical solutions for the security of data are sufficient for the data being processed, specifically where these risks are increased through mobile working and personal ownership of devices. Specific policies of note for all BYOD users and authorisers are listed in section 5 below. All devices shall be configured and operated in accordance with this policy and the organisation shall determine which types of devices are relevant to this policy. NHIS will maintain a list of authorised devices. All users will be required to sign the Acceptable Use Policy at Appendix 2. The capability assessment of Airwatch is contained at Appendix 1, as information for the product which is the supported solution provided via NHIS for the effective provision of Bring Your Own Device (BYOD). 5 Organisational Policy This policy should be read in conjunction with other relevant organisational Policies, including but not limited to: Confidentiality and Data Protection Policy Electronic Remote Working Policy Information Risk Policy Information Security Policy Internet and Policy Safe haven Procedure The CCGs grant their employees the privilege of purchasing and using smartphones and tablets of their choosing at work for their convenience. The organisation reserves the right to revoke this privilege if users do not abide by the policies and procedures outlined above. This policy is intended to protect the security and integrity of the CCGs data and guard against both data leakage and data loss. 6

7 6 Acceptable Use Employees remain subject to organisational policy and procedure in respect of personal conduct, data and information security, and physical security, including but not limited to those policies outlined above. Devices may not be used at any time to: Store or transmit illicit material Store or transmit proprietary information belonging to another organisation Harass others Engage in outside business activities The CCG has a zero-tolerance policy for texting or ing while driving and only handsfree talking while driving is permitted provided that it is safe and legal to do so. 7 Devices and Support NHIS Service Desk will discuss the connection of any device with the end user, to ensure that the device is authorised and can be connected prior to organisational authorisation and purchase of Airwatch licence and recurrent fee. In regard to support, personal owned devices are not organisationally supported devices. Only connectivity issues are supported by NHIS; employees should contact the device manufacturer or their carrier for operating system for hardware-related issues. NHIS will maintain a list of authorised devices that can be used as BYOD devices and will maintain a list of authorised users. 8 Reimbursement The CCG will not reimburse the employee for the cost purchase or associated with the device: including but not limited to: Roaming charges, plan charges and overcharges and applications for personal use. 9 Security Employees access to the organisation s data is limited based on user profiles defined by organisational policy and is automatically enforced. An essential element of maintaining the security of the data is that the BYOD applications are managed and controlled. In order to ensure that maximum protection is provided against malicious code, the permitted devices shall: Permit security patches and updates to be installed Be devices that shall enable the use of Mobile Device Management (MDM). 7

8 Users shall be required to update devices as soon as the update becomes available. The connection to the corporate bubble will be remotely wiped if: o the device is lost, o the employee terminates his or her employment, o NHIS or the CCG detect a data or policy breach, a virus or similar threat to the security of the organisation s data and technology infrastructure. For note for each organisation user and authoriser are associated risks of NHIS Service Desk Opening hours Mon Fri to 18.00, excluding public holidays. Devices lost, stolen or otherwise compromised during times when the service desk is closed are to be reported as soon as possible following the event. Organisations instructing NHIS to undertake mobile device management services do so with an understanding and acceptance of this risk. Provision of the corporate bubble includes a strong perimeter in that any content or attachments contained within the corporate bubble cannot be saved outside of the application or locally on the device, Any attempt to side step or circumvent security measures in place will be considered under the CCG disciplinary policies as outlined in policy requirements in section 5, for clarification this includes any attempt to screen capture or otherwise photograph content to enable its onwards transmission outside of security parameters. All users are required to report any incident on their BYOD as they would for any CCG IT equipment. 10 Risks/Liabilities/Disclaimers The organisation reserves the right to disconnect devices or disable services without notification should a security incident or risk occurs. The CCG reserves the right to take appropriate disciplinary action up to and including termination for noncompliance with this policy and those referenced as relevant in section 5. Lost or stolen devices must be reported to the NHIS Service Desk within 24 hours. Employees are responsible for notifying their mobile carrier immediately upon loss of a device. The employee is expected to use his or her devices in an ethical manner at all times and adhere to the CCGs related acceptable use policies as referenced in section 5. The employee is personally liable for all costs associated with his or her device. 11 Equality and Diversity 8

9 The CCG aims to design and implement policy documents that meet the diverse needs of our services, population and workforce, ensuring that none are placed at a disadvantage over others. It takes into account current UK legislative requirements, including the Equality Act 2010 and the Human Rights Act 1998, and promotes equal opportunities for all. This document has been designed to ensure that no-one receives less favourable treatment due to their personal circumstances, i.e. the protected characteristics of their age, disability, sex (gender), gender reassignment, sexual orientation, marriage and civil partnership, race, religion or belief, pregnancy and maternity. Appropriate consideration has also been given to gender identity, socio-economic status, immigration status and the principles of the Human Rights Act. In carrying out its functions, the CCG must have due regard to the Public Sector Equality Duty (PSED). This applies to all the activities for which the organisation is responsible, including policy development, review and implementation. 12 Due Regard This policy has been reviewed in relation to having due regard to the Public Sector Equality Duty (PSED) of the Equality Act 2010 to eliminate discrimination, harassment, victimisation; to advance equality of opportunity; and foster good relations. 13 References Information Commissioners Office Bring Your Own Device: NHS Digital To request connection of a Personally Owned device please go to: and select the option equipment, and BYOD Connection. 9

10 Appendix One: Airwatch Provision of Corporate Bubble and Security Arrangements: NHIS chose Airwatch as Industry leader in the support and maintenance of secure mobile access solutions: Enrol personal devices into Airwatch and enable employees to choose the most productive device Supports all operating systems and latest device models Isolate and protect corporate and personal information Configure policies and settings based on device ownership Configure what is collected based on the device ownership Locate, lock and perform and enterprise or full device wipe In connecting via Airwatch, mobile device management is available via organisation specific console, providing assurance of security, apps, status and last connection /update to the corporate network. Configuration specific to NHIS supported organisations has provided a MINIMUM criterion for the safe connection of devices ensuring that the configuration complies with organisational requirements and relevant UK Law. This MINUMIM criterion has been shared with all NHIS customers receiving Airwatch services. Enhancements to the MINIMUM are available, further details can be provided via the NHIS Business Relationships Team. NHIS MINIMUM mobile device management set up BYOD devices Corporate bubble delivering Outlook content only. Requirement Provisioned Managed Assured Secure Content Yes Group Policy : NHIS Standard Reporting Delivered Template available to Secure perimeter of Content Remote wipe / severance Password Reset enabled nominated CCG User Yes Group Policy: NHIS Standard Reporting Template available to nominated CCG User Yes Group Policy : NHIS Standard Reporting Template available to nominated CCG User Yes Individual Option; Can be mandated by NHIS GPS Tracking No Group Policy: NHIS Observance of Regulation of Investigatory Powers Act 2000 Standard Reporting Template available to nominated CCG User Standard Reporting Template available to nominated CCG User 10

11 Appendix Two: Bring Your Own Device Application Form Bring your Own Device Policy Statement Please note that all of the requirements below must be agreed prior to any connection to the NHIS managed networks, as a separate requirement to those relating to behaviours as stated by the individuals employing organisation. NHIS have provided support for Airwatch within existing Service Level Agreement Hours This means that any loss or compromise of devices outside of operational hours (Mon Fri, 9 5 excluding public holidays), must be reported by the service user on the next working day. Airwatch secures each device after 5 minutes of inactivity, minimising the risk of inappropriate access to corporate data, and this limitation is accepted by all customer organisations. The employing organisation has committed to supporting this process, by sharing HR starters and leavers information. At the close of employment, Airwatch will wipe content from the device. Requirement The mobile device remains your responsibility NHIS will not undertake fix / maintenance / replacement of your device. The device must be as factory settings i.e. not Jailbroken to be clear: Jailbreaking increases the risk of malware infection or hacking. A jailbroken device can be easily victimized by a Trojan or accessed remotely by an intruder. Any security measures provided by ios or installed third-party applications may be rendered inoperable or untrustworthy. The device must be included in the device listing of those which we can install Airwatch. Airwatch will be installed on the device, and the cost of this is to be met by: the individual / employing organisation * (delete as appropriate), and this mandates and enforces a 6 digit passcode to be in place at all times. Agreed (Yes or No) For NHIS Confirmation Signature of employee NHIS have the right to wipe the device if notified that security / access is compromised. Should the user input the incorrect passcode 11

12 Requirement in excess of the permitted number of attempts (5), Airwatch will automatically wipe the device. NHIS will take no responsibility for the loss / removal of any personal data held on the device associated with the operation of security on the device. If you lose your device then you must inform NHIS immediately if this is outside of operational hours, then on the next working day. Agreed (Yes or No) Signature of employee Employee Declaration I ( ) have read and understood the Bring Your Own Device Policy Statement and consent to adhere to the rules outlined. I understand this is in addition to any policy of my employing organisation in regard to mobile device access and behaviours. Employee Signature Date Print Name Manager Signature Date Print Name Managers Authorized Budget Code (agreed to be charged for Air watch license and annual support.) IT Admin Signature Date Print Name 12

13 BYOD - USER GUIDE Individuals will only be able to use their own IT equipment for official purposes if they have been given authorisation to do so. The use of personal IT equipment for work is termed Bring Your Own Device (BYOD) and includes devices such as: Laptop or MacBook Tablet or IPad Smartphone Work purposes is defined as Accessing your organisational i.e. work account Accessing, working on, storing and transmitting your organisations information data through a laptop, tablet or smartphone i.e. work documents Accessing your organisations Intranet, SharePoint or NHS/Social Care internal website Authorisation If an individual wishes to use their own device for work purposes, you will need your line manager and NHIS permission to do so. Devices should not be connected to the network until this permission has been received. There is a list of devices and operating systems that are authorised to be used as BYODs and the user will need to confirm that their device complies with the requirements. What do I need to know? Some or all of the following measures may be applied to your device: A passcode will be required for you to access your device. This is to ensure that it is you that is using the device. This is an authorisation procedure and will prevent anyone gaining access to the data on the device. A second passcode may be applied to use any of the applications on the device Your device will be set with a number of failed log in attempts after which the data will be remotely wiped of all data; this is usually between 3 and 5 failed login attempts You will be required to allow device patches and updates on your BYOD as soon as you are notified. These will appear as a prompt on your device and will come from NHIS If your BYOD is a smartphone your organisation will have installed Mobile Device Management (MDM) Airwatch on your device to control what can be loaded onto the device. This should not be removed. As your BYOD will be accessing, processing, transmitting and possibly storing work data that is potentially classified or sensitive, the device must be protected for the maximum classification of data that is processed on it. The organisations data handling procedures must be followed and the device treated as if it was a work device. 13

14 DO Protect the device lock it away when not in use Protect your passcode and any other passwords required for using the device Lock the screen when not in use DON T Leave the device in public areas, your car or around for other people to easily obtain it Share your passcode Lend it to friends, colleagues or family. What should I do if I lose my device? If your device has been lost or stolen, or you think its contents may have been compromised: Report it to your line manager as soon as possible Inform the NHIS Service Desk Treat the loss as an information security incident or data breach and report as indicated in your organisations Incident Reporting Procedure. 14

15 Appendix Three NHSmail Account Management for Managers (Frequently Asked Questions) Contents 1. New Member of Staff 1.1 How do I check if someone has an NHSMail Account? 1.2 I have a new member of staff that needs an NHSMail Account, how do I get one set up? 1.3 I have a new member of staff with an existing NHSMail account, what do I need to do? 2. Long Term Absence 2.1. I have a member of staff on long term absence, what do I need to do? 2.2. A member of staff has returned from long term absence, what should I do? 3. Amending an Account 3.1 How do I amend an NHSMail account? 3.2 I ve changed my name, will amending this change my address? 4. NHSMail Account Terminations 4.1. A member of staff is leaving the NHS what do I need to do? 4.2. A member of staff is leaving to work at another NHS organisation, what do I need to do? 4.3. I want the s created while in my organisation removing from a leavers account, what do I need to do? This document is designed to support managers with the process of managing NHSmail accounts for staff. NHS staff are permitted to have one publicly funded account. 15

16 1. New Member of Staff NHSmail accounts are transferrable between organisations. When a new member of staff is appointed it is therefore important to find out if they already have an NHSmail account before you request one from the Nottinghamshire Health Informatics Service desk. 1.1 How do I check if someone has an NHSmail Account? You can check for an existing NHSmail account on the NHSmail Portal using People Finder, alternatively you can search in the NHSmail global address list. Often the best approach is to ask the individual if they have an NHSmail account. 1.2 I have a new member of staff that needs an NHSmail Account, how do I get one set up? A new NHSmail account should be requested via the Nottinghamshire Health Informatics Service desk using the Nottinghamshire Health Informatics Service portal. At the top of the page access IT Accounts and select Request a New Account. On completion of the form you will be provided with a call reference number, when the account has been created you will be notified by . The mailbox owner will need to call the Nottinghamshire Health Informatics Service desk and quote the call reference number to obtain the account details. Please note the password on a newly created NHSmail account expires if the account is not activated within 30 days. 1.3 I have a new member of staff with an existing NHSmail account, what do I need to do? Before Nottinghamshire Health Informatics Service can add this account to your organisation the previous organisations IT service desk will need to mark the NHSmail account as a leaver, please advise the individual that if this hasn t already been done they need to action this before commencing their new role in the organisation. When the account has been marked as a leaver by the previous organisation, log into the Nottinghamshire Health Informatics Service portal and in the IT Accounts section select Amend an Account. Complete the form and in the Optional field at the bottom of the form add the existing NHSmail address. The service desk will join the account to the organisation. N.B If the user cannot remember the contact details of their previous IT department they should contact the NHSmail service desk and log a call for their account to be marked as a leaver. Please see section 4.3 for contact details. 16

17 2. Long Term Absence If an NHSmail account password is not changed within 90 days the account will be disabled, after a further 90 days the account is deleted. accounts for staff on long-term absence (e.g. maternity leave) need to be managed to ensure they are not deleted as part of this automated inactive account deletion process. 2.1 I have a member of staff on long-term absence, what do I need to do? Log into the Nottinghamshire Health Informatics Service portal and in the IT Accounts section select Delete an Account (you are not deleting the account). Enter the individual s name, Select the NHSmail 2 button then select continue. Complete the details section and in the drop-down box for Type of Leaver select Disable the account. This will hide the account from the address book, prevent the user from logging into the account, and keep the account available to be activated by the Nottinghamshire Health Informatics Service desk for 180 days. 2.2 A member of staff has returned from long-term absence, what should I do? Contact the Nottinghamshire Health Informatics Service desk on (Mitel 4040) and ask for their account to be enabled. If the individual requires a password re-set, they will need to contact the service desk personally. If the account has not been enabled for over 180 days Nottinghamshire Health Informatics Service will need to contact the national service desk with a request to re-instate the account. 3. Amending an Account If a member of staff changes their name, job role or phone number the Nottinghamshire Health Informatics Service desk should be contacted to amend the account. 3.1 How do I amend an NHSmail account? End staff are able to add and amend contact numbers linked to their NHSmail account, this is done by logging into the NHSmail Portal and BEFORE logging into , select the Profile link on the blue banner at the top of the page, from here you will be able to add and remove phone numbers. All other account changes e.g. name, job role and organisation, must be carried out by the service desk. Log into the Nottinghamshire Health Informatics Service portal 17

18 and select IT Accounts, select Amend an Account, complete and submit the changes form. 3.2 I have changed my name; will amending this change my address? The service desk can amend your name on your account by following the steps in section 3.1. The old address, with your previous name, will be held in the NHSmail portal, which means any s sent to your previous address will be automatically forwarded to your new address. 4. NHSmail Account Terminations When a member of staff leaves, it is important that the NHSmail account be removed from your organisation promptly. 4.1 A member of staff is leaving the NHS what do I need to do? Log into the Nottinghamshire Health Informatics Service portal, select the IT accounts section and then select Delete an Account; this will open a leaver form. Complete the form and at the end select in the type of leaver drop down box Mark as Leaver. As the account will not be joined to another NHS organisation, the account will be permanently deleted after 30 days. 4.2 A member of staff is leaving to work at another NHS organisation, what do I need to do? Log into the Nottinghamshire Health Informatics Service portal, select the IT Accounts section and then select Delete an Account, this will open a leavers form. Complete the form and in the type of leaver drop down box Mark as Leaver. The account can then be joined to the new NHS organisation by their IT service desk. They have 30 days in which to do this before the account is disabled. 4.3 I want the s created while in my organisation removing from a leavers account, what do I need to do? Firstly, you need to manage the account exactly as in point 4.2 above. For the s in the account to be deleted a call will need to be logged with the national service desk (Nottinghamshire Health Informatics Service are unable to delete data within accounts). The National NHSmail Helpdesk can be contacted on or helpdesk@nhs.net. 18

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

Information Technology Access Control Policy & Procedure

Information Technology Access Control Policy & Procedure Information Technology Access Control Policy & Procedure Version 1.0 Important: This document can only be considered valid when viewed on the PCT s intranet/u: Drive. If this document has been printed

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 2015 City of Glasgow College Charity Number: SCO 36198 Page 1 of 9 Table of Contents 1. Introduction... 3 2. Purpose and Aims... 4 3. Scope... 4 4. Policy Statement... 5 4.1

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

Policy & Procedure. IT Password Policy. Policy Area. Version Number 2. Approving Committee SMT. Date of Approval 26 September 2017

Policy & Procedure. IT Password Policy. Policy Area. Version Number 2. Approving Committee SMT. Date of Approval 26 September 2017 Policy & Procedure Policy Area IT Password Policy IT Version Number 2 Approving Committee SMT Date of Approval 26 September 2017 Date of Equality Impact Assessment 03 August 2016 Date of Review 01 November

More information

Policy on the Provision of Mobile Phones

Policy on the Provision of Mobile Phones Provision of Mobile Phones Policy on the Provision of Mobile Phones Originator name: Section / Dept: Implementation date: Date of next review: Related policies: Policy history: Roger Stickland Approval

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Remote Working & Mobile Devices Security Standard

Remote Working & Mobile Devices Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information

More information

Policies Procedures & Guidelines. Mobile Device Policy. Version: 1.3. Date ratified: May Date issued: 21 June 2010 Review date: 15/01/2011

Policies Procedures & Guidelines. Mobile Device Policy. Version: 1.3. Date ratified: May Date issued: 21 June 2010 Review date: 15/01/2011 Policies Procedures & Guidelines Mobile Device Policy Version: 1.3 Ratified by: IM&T Steering Group Date ratified: May 2010 Name of originator/author: Urszula Niewiadomska Date issued: 21 June 2010 Review

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Trinity Multi Academy Trust

Trinity Multi Academy Trust Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope

More information

BHIG - Mobile Devices Policy Version 1.0

BHIG - Mobile Devices Policy Version 1.0 Version 1.0 Authorised by: CEO Endorsed By: Chief Operations Officer 1 Document Control Version Date Amended by Changes Made 0.1 20/01/2017 Lars Cortsen Initial document 0.2 29/03/2017 Simon Hahnel Incorporate

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

Mobile Computing Policy

Mobile Computing Policy Mobile Computing Policy Issue sheet Document reference NHSBSAIS004 Document location Title NHS Business Services Authority Mobile computing policy Author Head of Security and Information Assurance Issued

More information

Network Account Management Security Standard

Network Account Management Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Network Account Management Security Number: Scope of this Document: Recommending Committee: Approving Committee: SS06 All Staff/ Services Users Joint Information Governance

More information

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS WHITE PAPER BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS INTRODUCTION As more companies embrace the broad usage of individual liable mobile devices or BYOD for access to corporate applications and data,

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

Name of Policy: Computer Use Policy

Name of Policy: Computer Use Policy Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership

More information

Access to personal accounts and lawful business monitoring

Access to personal  accounts and lawful business monitoring Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...

More information

Data Handling Security Policy

Data Handling Security Policy Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,

More information

ICT Portable Devices and Portable Media Security

ICT Portable Devices and Portable Media Security ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations

More information

Pharmacy - Frequently Asked Questions

Pharmacy - Frequently Asked Questions Pharmacy - Frequently Asked Questions Published October 2017 Version 4 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body

More information

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section. TITLE MOBILE WIRELESS DEVICES AND SERVICES SCOPE Provincial APPROVAL AUTHORITY Alberta Health Services Executive SPONSOR Information Technology PARENT DOCUMENT TITLE, TYPE AND NUMBER Not applicable DOCUMENT

More information

NHSmail Migration Communications Plan Template

NHSmail Migration Communications Plan Template NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin

More information

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act Date Approved: January 27, 2010-Board Date of Next Review: May 2023 Dates of Amendments: May 17, 2018 Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

Policy General Policy GP20

Policy General Policy GP20 Email Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Mobile Device policy Frequently Asked Questions April 2016

Mobile Device policy Frequently Asked Questions April 2016 Mobile Device policy Frequently Asked Questions April 2016 In an attempt to help the St. Lawrence University community understand this policy, the following FAQ document was developed by IT in collaboration

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Completed (Section 12) Minor amendments made to Section 3 and 5.

Completed (Section 12) Minor amendments made to Section 3 and 5. Policy Type Information Governance Corporate Standard Operating Procedure Human Resources X Policy Name CO26: Electronic Signature Policy Status Committee approved by Final CCG Executive In Common Date

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

Mobile Computing Policy

Mobile Computing Policy Mobile Computing Policy Overview and Scope 1. The purpose of this policy is to ensure that effective measures are in place to protect against the risks of using mobile computing and communication facilities..

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Q and A from the family information sessions 18/10/2016

Q and A from the family information sessions 18/10/2016 Q and A from the family information sessions 18/10/2016 NDIS responses Questions Q: Can a nominee/responsible Person or Guardian access their family members information? Q: Can there be more than one nominee

More information

Mobile Working Policy. Item 15.3

Mobile Working Policy. Item 15.3 Mobile Working Policy Item 15.3 Authorship: Committee Approved: Chris Wallace, Information Governance Manager, North Yorkshire & Humber Commissioning Support Unit Management Team Approved date: Review

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Mobile configuration guide for NHSmail

Mobile configuration guide for NHSmail Mobile configuration guide for NHSmail Version 3 Published July 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Bring Your Own Device Policy (BYOD) Created October Review Date September 2017 V1.1

Bring Your Own Device Policy (BYOD) Created October Review Date September 2017 V1.1 UTC @MediaCityUK Bring Your Own Device Policy (BYOD) Created October 2016 - Review Date September 2017 V1.1 Purpose of this document The UTC is committed to prepare all students and teachers to maximize

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Information Governance Incident Reporting Policy

Information Governance Incident Reporting Policy Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Information Governance Incident Reporting Procedure

Information Governance Incident Reporting Procedure Information Governance Incident Reporting Procedure : 3.0 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 15 th February 2016 Name of originator /author (s): Responsible Committee /

More information

The purpose of this guidance is: To provide a comprehensive understanding to complying with the universities Acceptable Use Policy.

The purpose of this guidance is: To provide a comprehensive understanding to complying with the universities Acceptable Use Policy. Policy Acceptable Use Guidance 1 Introduction This guidance compliments the University of East London s Acceptable Use Policy. It puts into perspective specific situations that will help you provide a

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services Augusta University Medical Center Policy Library Mobile Device Policy Policy Owner: Information Technology Support and Services POLICY STATEMENT Augusta University Medical Center (AUMC) discourages the

More information

Data Loss Assessment and Reporting Procedure

Data Loss Assessment and Reporting Procedure Data Loss Assessment and Reporting Procedure Governance and Legal Services Strategy, Planning and Assurance Directorate Approved by: Data Governance & Strategy Group Approval Date: July 2016 Review Date:

More information

PCA Staff guide: Information Security Code of Practice (ISCoP)

PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

GDPR Draft: Data Access Control and Password Policy

GDPR Draft: Data Access Control and Password Policy wea.org.uk GDPR Draft: Data Access Control and Password Policy Version Number Date of Issue Department Owner 1.2 21/01/2018 ICT Mark Latham-Hall Version 1.2 last updated 27/04/2018 Page 1 Contents GDPR

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Acorn Trust Mobile Phone Policy

Acorn Trust Mobile Phone Policy Acorn Trust Mobile Phone Policy Written by: J Buckley, Trust Business Manager Date agreed: 17 th May 2016 Date reviewed: Next Review Date: Summer 2018 Chairs Signature Mission Statement The Acorn Trust

More information

Guidance for sending and receiving an encrypted NHSmail

Guidance for sending and receiving an encrypted NHSmail Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted

More information

Statutory Notifications

Statutory Notifications Registration under the Health and Social Care Act 2008 Statutory Notifications Guidance for registered providers and managers of NHS GP and other primary medical services May 2013 Statutory notifications

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

DEPARTMENT OF THE NAVY UNITED STATES NAVAL ACADEMY 121 BLAKE ROAD ANNAPOLIS MARYLAND

DEPARTMENT OF THE NAVY UNITED STATES NAVAL ACADEMY 121 BLAKE ROAD ANNAPOLIS MARYLAND DEPARTMENT OF THE NAVY UNITED STATES NAVAL ACADEMY 121 BLAKE ROAD ANNAPOLIS MARYLAND 21402-1300 USNAINST 851 0.02A 28/ITSD USNA INSTRUCTION 851 0.02A From: Superintendent, U.S. Naval Academy Subj: GOVERNMENT-ISSUED

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

No References to Check Joanne Shawcross..Date

No References to Check Joanne Shawcross..Date Document Type: Standard Operating Procedure Document Title: Guest WiFi user guide Scope: This covers the initial process needed to authenticate a connect a device to the trusts Public WiFi Author / Title:

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Policy & Procedure Privacy Policy

Policy & Procedure Privacy Policy NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

Access to University Data Policy

Access to University Data Policy UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public

More information

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017 GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015

More information

Information Handling and Classification Table

Information Handling and Classification Table Information Handling and Classification Table Title: Information Classification and Handling Table Reference: IS-07a Status: Approved Version: 1.2 Date: March 2018 Classification: Non-Sensitive/Open Author(s)

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

Terms and Conditions 01 January 2016

Terms and Conditions 01 January 2016 Terms and Conditions 01 January 2016 thehealthsource: Terms and Conditions Page 1 of 7 This Agreement (the Agreement ) is entered into by and between thehealthsource (Pty) Ltd and the entity agreeing to

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

EX107OFC Application for permission to prepare a transcript or report from a recording made other than by the court

EX107OFC Application for permission to prepare a transcript or report from a recording made other than by the court EX107OFC Application for permission to prepare a transcript or report from a recording made other than by the court This form gives limited permission to prepare a transcript or report from a recording

More information

Rationale: Why BYOD? BYOD Guidelines. BCR BYOD Agreement

Rationale: Why BYOD? BYOD Guidelines. BCR BYOD Agreement Rationale: Why BYOD? At Brigidine College Randwick, our vision for learning fosters a love of deep learning, encourages students to think critically and creatively and provides a foundation for authentic

More information

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019 Ormiston Academies Trust E-Security policy Date adopted: Autumn Term 2018 Next review date: Autumn Term 2019 Policy type Author Statutory James Miller OAT DPO Approved by Exec, July 2018 Release date July

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

Use of Mobile Devices on Voice and Data Networks Policy

Use of Mobile Devices on Voice and Data Networks Policy World Agroforestry Centre Policy Series MG/C/4/2012 Use of Mobile Devices on Voice and Data Networks Policy One of the policies on information security and business continuity which will be audited by

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information