Severn Trent Water. Telecommunications Policy and Access Procedure

Size: px
Start display at page:

Download "Severn Trent Water. Telecommunications Policy and Access Procedure"

Transcription

1 Severn Trent Water Telecommunications Policy and Access Procedure

2 Contents STW Telecommunications Policy: 5-12 Health and Safety: Access Procedures: STW LSH Sites Access Policy [Controlled / protected]

3 Overview This document has been set out in the form of a presentation to provide telecommunications companies and their contractors with the procedure to follow to ensure safe working on STW land and buildings. The aim is to provide a system for full compliance with STW s statutory obligations and safety policies whilst encouraging the use of its land and buildings by telecommunications operators where this is appropriate. 3 STW LSH Sites Access Policy [Controlled / protected]

4 Administration of Policy and Access Procedure Lambert Smith Hampton have been appointed as managing agents by STW and will act as a central point of contact for all telecoms enquires and access requirements with the exception of out of hours emergencies. Lambert Smith Hampton will arrange all pre-build accesses and prestart meetings. Site Access Requests should be arranged via:- 4 STW LSH Sites Access Policy [Controlled / protected]

5 Policy As with any commercial organisation STW looks to maximise income from its land portfolio in order to generate income that helps to keep water charges as low as possible. The management of our telecoms portfolio is just one of many income generating streams of the property portfolio. The use of mobile phone technology provides obvious benefits to Severn Trent Water and to society as a whole. However, the use of the land to accommodate new installations should be precautionary and this means adopting the applicable recommendations of the Government; public health bodies and Industry best practice. 5 STW LSH Sites Access Policy [Controlled / protected]

6 Policy The first point of contact for mobile network operators proposing to install a base station on Severn Trent Property should be via Severn Trent Water s managing agent, Lambert Smith Hampton (LSH) LSH will compile an outline proposal and checklist to allow the initial assessment of the proposal by Property Services and the Operations site manager. The recommendation will clearly highlight any issues and allocate the proposal a Green, Amber or Red status. This rating and supporting information will be submitted to STW for ratification and approval by Property Services and Operational site manager. 6 STW LSH Sites Access Policy [Controlled / protected]

7 Design Antennas on water towers and existing buildings should be located to minimise visual impact. Fixings must preserve the integrity of the structure and may be specified by STW. Equipment cabins should be located externally unless the site has a dedicated radio room. Size, location and colour must be appropriate to the site. Radio masts and cabins must be located away from underground apparatus. Mains record drawings will be provided where possible but tracing may be necessary in certain cases. Screening or colour coding of equipment cabins and cable trays may be required and should be considered when proposing equipment locations. The location of cabins must consider the impact of noise pollution. Underground cable troughs are to be preferred to overhead cable ladders as a means of linking to the equipment cabin. Troughs require heavy duty vehicle covers. The design must consider site security and incorporate a separate fenced access where possible to maintain the existing integrity of the site. 7 STW LSH Sites Access Policy [Controlled / protected]

8 Acquisition/Upgrade Drawings Operators must provide sufficiently detailed scale drawings to show all build/upgrade proposals. These must include: Antenna location and fixings equipment cabinets cable runs and trays dedicated electricity supply and communication cable routes security fencing and screening warning sign location PDF copies of the proposal drawings should be provided to Lambert Smith Hampton via or online. Any required amendments will be notified to the operator, or their agents, by return. Where appropriate, proposals will be assessed by the STW Supervising Operational Site Manager and STW Property Services Full construction drawings are required when operators request the pre-start meeting. To avoid delay these must accord with the approved proposal drawings. 8 STW LSH Sites Access Policy [Controlled / protected]

9 Planning Operators will be required to confirm they have obtained any necessary planning consent prior to completion of legal documentation, or build access, if earlier. Queries raised by STW customers may be directed to the operator/local Planning Authority. Sensitive sites may require landscaping to form part of the planning application. 9 STW LSH Sites Access Policy [Controlled / protected]

10 Legal Documentation Telecommunications operators will be required to complete Standard STW legal documentation as required by the agreed Multi Site Agreement (MSA) in force, or under a standard STW lease/licence at the discretion of Severn Trent Water. Completion of this documentation will generally be required prior to access. Wayleave documentation will be completed separately with the appropriate service provider; the form of wayleave documentation and route of all power and communication cables will be at the discretion of Severn Trent Water. 10 STW LSH Sites Access Policy [Controlled / protected]

11 Early Access Early access will not generally be permitted Exceptions may be made where the standard STW early access agreement has been signed by the telecommunications operator and there is an agreed form of lease/licence. Full details available from Lambert Smith Hampton on request 11 STW LSH Sites Access Policy [Controlled / protected]

12 STW Site Acquisition Flow Chart New Telecomms Enquiry End Site not nominated End Not Agreed No LSH request STW Ops & Property Services for in principle clearance yes Site visit arranged by LSH LSH collate site specific information LSH negotiate terms with operator LSH undertake STW consultations Operator provides proposal draw. Drawing Survey/MSV Site nominated Agreed Operations, Estates Recreation, Legal, Property Services LSH prepare formal recommendation for STW Approved Yes cleared No End Legal Completion Operator provides method stat. etc LSH arrange pre-start/build Operators instal.report & Final inspection Operator instructed to complete re-instate. No Yes LSH issue legal instructions Early Access End STW signs instal.report. returns to LSH Yes Approved No 12 STW LSH Sites Access Policy [Controlled / protected]

13 Health & Safety Severn Trent Water has a Mobile Phone Masts Safety Standard and a Managing Contractors & Suppliers Standard which provide information and guidance on what the business must do to comply with the H&S legislation and protect its employees, contractors and customers. A copy of these Standards can be made available if required. 13 STW LSH Sites Access Policy [Controlled / protected]

14 Health and Safety Policy Telecommunications operators must provide STW with a copy of their current Health and Safety Policy on request. Access may be withheld if this document has not been provided. This will be assessed by STW in accordance with their own Health and Safety standards. Once accepted by STW the H&S document will be held by Lambert Smith Hampton and made available as required to STW, their agents and contractors. Updates to the Health and Safety Policy must be notified to STW. 14 STW LSH Sites Access Policy [Controlled / protected]

15 Risk Assessments & Method Statements All works must comply with the requirements of the STW Managing Contractors & Suppliers Standard. All access, other than initial ground level surveys, will require a site specific Risk Assessment & Method Statement (RAMS). They must be submitted for approval prior to any work commencing. All RAMS must accord to the telecoms operators current Health and Safety Policy, as submitted to STW. They should detail proposed working methods and outline safety measures needed to control the hazards identified. 15 STW LSH Sites Access Policy [Controlled / protected]

16 Hazards RAMS must address all risks associated with the work to be undertaken. STW will help address specific site hazards risks by identifying them to the operator/contractor, upon request for access, on the form Site Hazard Check List. (SHCL) The provision of the SHCL and the subsequent checking of the RAMS does not relieve the operator/contractor of any of his responsibilities for Health and Safety. The contractor alone is responsible for the day to day safety of their employees and others who may be affected by the work. Operators and Contractors must be aware of site security and abide by STW s closed gate policy. Any radiation risks and associated exclusion zones must be highlighted. 16 STW LSH Sites Access Policy [Controlled / protected]

17 Approval and Supervision Proposals may require independent assessment which will be notified to the operator prior to the assessment. If the operator wishes to proceed, all costs of the assessment and any required design changes will be met by the operator. For example: Water Towers may require structural reports and access to restricted areas may require periodic sampling e.g. bacteriological testing of potable water. Specific proposals may require on site supervision the costs of which will be met by the operator. Supervision requirements will be notified upon request for access. 17 STW LSH Sites Access Policy [Controlled / protected]

18 Warning Signs In addition to meeting the statutory notification requirements telecoms operators must ensure: All antenna and equipment cabins carry an identification sign naming : the operator any appropriate hazard sign and a 24 hour contact telephone number. 18 STW LSH Sites Access Policy [Controlled / protected]

19 Access - Principles All access arrangements must comply with the requirements of STW including the Managing Contractors & Suppliers Standard. The STW site manager will always be responsible for the site, including the authorisation of access requests The procedure will apply to all STW sites unless determined otherwise by the site manager. (e.g. access to STW non operational land) The STW site manager will have regard to STW Health and Safety Standards when assessing operators/contractors RAMS. Contractors are responsible for ensuring all information contained in RAMS is passed to all sub-contractors. 19 STW LSH Sites Access Policy [Controlled / protected]

20 Site Security - General STW operate a security system in order to comply with their statutory requirements. For the majority of sites, operators will have their own locks on site. Where this is not possible, the issuing of site gate keys or current codes for combination locks, where necessary, will be the responsibility of the site manager. Keys for some sites, due to security requirements, may not be issued at all and operator locks not permitted. In such cases this will be identified to the operator and a system of accompanied visits set up to maintain access. 20 STW LSH Sites Access Policy [Controlled / protected]

21 Site Security Keys (1) The issuing of site gate keys, where appropriate, will be the responsibility of the site manager. Keys must be collected for every visit. The loss of keys by a nominated key holder ( including his/her agents and contractors) will lead to keys being withdrawn. STW will reserve the right to temporarily withdraw all keys should higher security levels be imposed. Emergency access will be maintained during the period of increased security by supervised site visits. Rights to withdraw keys are reserved as a reasonable instruction by STW managers to maintain security. The loss of keys may require the replacement of an entire suite of locks and the operator/contractor will be charged accordingly. 21 STW LSH Sites Access Policy [Controlled / protected]

22 Site Security Keys (2) In order to restrict access, the majority of locks are suited which results in a single key giving access to a large number of sites and buildings. The loss of a single key can have a significant impact on the business and could result in the need for large numbers of locks to be replaced. It is therefore essential that all these keys can be accounted for and that staff take responsibility of keys issued to them. For this reason, the ST Site Manager will maintain a log of issued keys consisting of contact details, level of access and time scales. The log will provide a complete audit trail including delivery, issue and return of all keys. Where keys are issued (and this applies only to a small number of sites) they are issued directly by STW to the contractor who will be visiting site for that day only. Keys are released by the authorising site manager in line with their specific site processes and only once LSH completed the access request/rams process and the site manager has confirmed approval. 22 STW LSH Sites Access Policy [Controlled / protected]

23 Site Security Keys (3) Issued keys are subject to the following conditions: The key will be used exclusively in the performance of official duties, as authorised by Severn Trent (ST). The key must be kept in a secure place when not being used and should never be left in a vehicle or site cabin. Only the key holder or standby key holder can use the key. It must not be loaned to colleagues or any other party including sub contractors. Personal details of key holder s will be kept on file in accordance with the Data Protection Act. In the event of a security incident these details will be made available to Police and Government security agencies. Any applicant requesting access must provide names and contact details of the key holder for the visit. The key must be returned on completion of use. If returned by post than it must be sent by recorded delivery. Failure to return the key could result in police action being taken. Damage or loss of the key must be reported to LSH or your ST contact immediately. The issuing depot or office should check the applicant has prior authorisation prior to releasing keys and then advises LSH or the site manager if a key is lost, damaged or not returned. Under exceptional circumstances, issued keys may be recalled and access to sites revoked without warning. 23 STW LSH Sites Access Policy [Controlled / protected]

24 Site Access Policy Overview (1) Access is controlled by LSH to ensure works are permitted and do not impact on the delivery of water supply or waste services. All access requests must be submitted via LSH s online access request site: 24 STW LSH Sites Access Policy [Controlled / protected]

25 Site Access Policy Overview (2) Requests must be submitted online, together with all necessary drawings, consents and health & safety documentation appropriate to the proposed work. A minimum of 7 working days' notice is required to arrange access and the acceptance of documentation by Lambert Smith Hampton and Severn Trent Water. Incomplete forms will not be processed. Access cannot be arranged by phone. 25 STW LSH Sites Access Policy [Controlled / protected]

26 Site Access Procedure 1 4 main categories of access exist: Survey build maintenance and emergency. Several sub-categories also exist. In all build cases (new sites, upgrades, variations or additional equipment) the operator must have obtained property approval clearance before initiating the access procedure and provide evidence of consent on request. Upon receipt of completed information, a request will be forwarded to the relevant Severn Trent Site Manager. 26 STW LSH Sites Access Policy [Controlled / protected]

27 Site Access Procedure 2 If the works are substantial or in proximity to sensitive areas, further information may be requested by Severn Trent Water. Authorisation to Enter a Severn Trent Water Site Form will be issued at this time at the discretion of the Site Manager. Once consent has been granted by Severn Trent and all of the above documents have been completed LSH will advise the requestor that consent is granted together with conditions of entry. Severn Trent Water reserves the right to charge a fee for access should personnel be required to attend to facilitate access or oversee the works. 27 STW LSH Sites Access Policy [Controlled / protected]

28 Site Access - Completion of Works A Confirmation of Works form must be returned to LSH within 5 workings days of completion of the works. This will trigger a site inspection by STW site manager with the contractor/operator being asked to return if the site has not been left to their reasonable satisfaction. 28 STW LSH Sites Access Policy [Controlled / protected]

29 Emergency Site Access An online request must be submitted for all Emergency requests; reasonable justification and details of the emergency must be provided. Emergency Out of Hours access only to be made via STW Network Control Centre in COSC on STW LSH Sites Access Policy [Controlled / protected]

30 Site Access Costs Where appropriate, Severn Trent will have to assign technicians from other water related duties to accompany these visits. Severn Trent Water will endeavour to accommodate access requests particularly in the event of an emergency however; this is not guaranteed and depends entirely upon the availability staff and other planned works on site which may take precedence. Failure to attend an arranged appointment or failure to give required 48 hours cancellation notice will result in a supplementary charge on top of the hourly rate to cover administration costs. 30 STW LSH Sites Access Policy [Controlled / protected]

TELECOMMUNICATIONS ACCESS POLICY 2011

TELECOMMUNICATIONS ACCESS POLICY 2011 TELECOMMUNICATIONS ACCESS POLICY 2011 The Vice Chancellor and Principal, as delegate of the Senate of the University of Sydney, adopts the following policy. Dated: 31 January 2011 Signature: Name: Michael

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT

REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT IFC SERVICE DESCRIPTION 17 OCTOBER 2016 Page 1 of 9 SERVICE DESCRIPTION 2-14: INTERNATIONAL FALCON CONNECTION SERVICE (IFC Service) 1. THE SERVICE

More information

Mailbox Rental Terms and Conditions

Mailbox Rental Terms and Conditions Mailbox Rental Terms and Conditions (valid from 26th September 2018) Subject to the customer ("the Customer") observing the Terms and Conditions set out below, Mail Boxes Etc. ("the Company") agrees to

More information

Ulster University Policy Cover Sheet

Ulster University Policy Cover Sheet Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Switching Process and Rules Systems Operations Framework. Document Number:

Switching Process and Rules Systems Operations Framework. Document Number: Switching Process and Rules Systems Operations Framework Document Number: 4808076 TABLE OF CONTENTS 1. INTRODUCTION... 5 1.1 PURPOSE... 5 1.2 HIERARCHY... 5 2. PROCESSES... 7 2.1 SWITCHING OPERATOR AUTHORISATION

More information

Description of the Application Process for Small Embedded Generators

Description of the Application Process for Small Embedded Generators Description of the Application Process for Small Embedded Generators This document describes the Application Process for Small Embedded Generators (as required under section 5.3.3A of the National Electricity

More information

PRIVACY NOTICE. 1.2 We may obtain or collect your Personal Data from various sources including but not limited to:

PRIVACY NOTICE. 1.2 We may obtain or collect your Personal Data from various sources including but not limited to: PRIVACY NOTICE This Privacy Notice is issued by BGR FOODSERVICE SDN. BHD. (445653-K) ( the Company or BFSB ) and/or its related companies, as defined in the Companies Act, 1965 (collectively Group ) pursuant

More information

Green Star Volume Certification. Process Guide

Green Star Volume Certification. Process Guide Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

This procedure sets out the usage of mobile CCTV units within Arhag.

This procedure sets out the usage of mobile CCTV units within Arhag. CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards

More information

Protocol and Guideline for Establishing Wireless Telecommunication Facilities Within City of Brampton

Protocol and Guideline for Establishing Wireless Telecommunication Facilities Within City of Brampton Protocol and Guideline for Establishing Wireless Telecommunication Facilities Within City of Brampton (February 2002) (Revised, January 2011) Council approval CW062-2011 (Revised, February 2011) revisions

More information

CERTIFICATION CONDITIONS

CERTIFICATION CONDITIONS 1 of 5 + CERTIFICATION CONDITIONS PERMIT NO 000/0. SATAS SOUTH AFRICAN TECHNICAL AUDITING SERVICES Pty Ltd Co Reg No 2002/015355/07 AGREEMENT ENTERED INTO WITH Co Reg No.. 2 of 5 CERTIFICATION CONDITIONS

More information

Information Bulletin

Information Bulletin Application of Primary and Secondary Reference Documents Version 1.1 Approved for release July 2014 Table of Contents 1.0 Purpose statement... 3 2.0 Audience... 3 3.0 BCA requirements and referenced documents...

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

M T BUCKLEY & Co Chartered Accountants

M T BUCKLEY & Co Chartered Accountants M T BUCKLEY & Co Chartered Accountants 2 Beulah Walk, Woldingham, Caterham, Surrey CR3 7LL Telephone: 01883 650420 Mobile: 07876 030622 1. PURPOSE OF THIS POLICY PRIVACY POLICY This policy describes how

More information

DATA PROCESSING TERMS

DATA PROCESSING TERMS DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica

More information

Access to personal accounts and lawful business monitoring

Access to personal  accounts and lawful business monitoring Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Privacy Notice For Our Customers And Contacts

Privacy Notice For Our Customers And Contacts Privacy Notice For Our Customers And Contacts What Is The Purpose Of This Notice? This notice applies to all businesses operating within The Alumasc Group plc group of Companies (the Group ), as follows:

More information

Castle View Primary School Data Protection Policy

Castle View Primary School Data Protection Policy Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff

More information

New Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code )

New Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code ) New Zealand Telecommunications Forum Code for Vulnerable End Users of Telecommunication Services ( Vulnerable End User Code ) Code Status: Code Classification: Date: Review Status: For Public Consultation

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS Prepared by: Approved by: Chief Procurement Officer John Baskerville Chief Executive File number: D2015/65737 June 2015 MANAGEMENT

More information

Scheme Document SD 003

Scheme Document SD 003 Scheme Document SD 003 Management Systems (ISO 9001, ISO 14001, BS OHSAS 18001 & PN111 Factory Production Control) SD 003 Rev 03.6 10 Oct 2013 Page 1 of 13 (blank) SD 003 Rev 03.6 10 Oct 2013 Page 2 of

More information

Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017

Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017 Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017 Copyright 2017 International Finance Corporation. All rights reserved. The material in this publication is copyrighted by International

More information

PROCEDURE Cryptographic Security. Number: G 0806 Date Published: 6 July 2010

PROCEDURE Cryptographic Security. Number: G 0806 Date Published: 6 July 2010 1.0 About this procedure This procedure explains the specific requirements that staff handling cryptographic material must follow. Cryptographic material is the medium by which we will configure any computer

More information

Ongoing conformance of the product with the standard is the responsibility of the certificate holder and the Australian manufacturer or importer.

Ongoing conformance of the product with the standard is the responsibility of the certificate holder and the Australian manufacturer or importer. 1. Preface The (TECS) offered by Comtest Certification Body is based on a type test scheme, which is one where a representative sample is provided for testing and certification, and does not include any

More information

Service Schedule BT Web Starter

Service Schedule BT Web Starter 1. SERVICE DESCRIPTION Service Overview 1.1 The Service includes the construction and hosting of a business website as further described in this Service Schedule. It does not include the provision of any

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Subject access policy and template response letters

Subject access policy and template response letters Barham Parish Council. Subject Access Requests ( SAR ) Checklist Inform data subjects of their right to access data and provide an easily accessible mechanism through which such a request can be submitted

More information

Governance of the use of as a valid UNC communication

Governance of the use of  as a valid UNC communication Stage 01: : u Governance of the use of email as a valid UNC communication At what stage is this document in the process? This modification proposes business rules to ensure that appropriate assurance is

More information

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION Introduction The IFFO RS Certification Programme is a third party, independent and accredited

More information

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy

More information

ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES

ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES 1. INTRODUCTION 1.1 The Office of Information Technology Services ( OITS ) has the responsibility of managing

More information

Telecommunications Equipment Certification Scheme FEBRUARY 2017

Telecommunications Equipment Certification Scheme FEBRUARY 2017 Telecommunications Equipment Certification Scheme FEBRUARY 2017 Canberra Red Building Benjamin Offices Chan Street Belconnen ACT PO Box 78 Belconnen ACT 2616 T +61 2 6219 5555 F +61 2 6219 5353 Melbourne

More information

PRIVACY POLICY Last Updated May, 2018

PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY OVERVIEW This Privacy Policy establishes rules to govern the collection, use and disclosure of personal information collected by Banff & Lake Louise

More information

Rules for LNE Certification of Management Systems

Rules for LNE Certification of Management Systems Rules for LNE Certification of Management Systems Application date: March 10 th, 2017 Rev. 040716 RULES FOR LNE CERTIFICATION OF MANAGEMENT SYSTEMS CONTENTS 1. PURPOSE... 3 2. SCOPE... 3 3. DEFINITION

More information

IT Security Standard Operating Procedure

IT Security Standard Operating Procedure IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Rules for Operators. Version 6 / Version 6, 13 May 2011 Page 1/12

Rules for Operators. Version 6 / Version 6, 13 May 2011 Page 1/12 Rules for Operators Version 6 / 2011-05-13 Version 6, 13 May 2011 Page 1/12 TABLE OF CONTENTS 1. Introduction... 3 2. Application for certification and FAMI-QS associate membership... 3 3. Assessment of

More information

Acquisition & Use of University Supplied Mobile Devices Policy

Acquisition & Use of University Supplied Mobile Devices Policy Acquisition & Use of University Supplied Mobile Devices Policy 1. Introduction 2. Device Definitions 3. Principles of the Policy 4. Eligibility 5. Tariffs & Hardware 6. Administration of Mobile Contracts

More information

I. PURPOSE III. PROCEDURE

I. PURPOSE III. PROCEDURE A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks

More information

Patient Reported Outcome Measures (PROMs)

Patient Reported Outcome Measures (PROMs) Patient Reported Outcome Measures (PROMs) Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Service Schedule BT Web Manager

Service Schedule BT Web Manager 1. SERVICE DESCRIPTION Service Overview 1.1 The Service includes the construction and hosting of a business website as further described in this Service Schedule. It does not include the provision of any

More information

Colocation Specific Terms and Conditions

Colocation Specific Terms and Conditions Colocation Specific Terms and Conditions 1 DEFINITIONS These Specific Terms and Conditions are to be read in conjunction with our General Terms and Conditions. All definitions contained within these Specific

More information

PANORAMA Data Security & Access Protocol

PANORAMA Data Security & Access Protocol PANORAMA Data Security & Access Protocol ALL DATA Security Any data provided to the PANORAMA Data Management Facility by external data guardians will be stored securely on the Flinders Medical Centre Y

More information

BRE Global Limited Scheme Document SD 186: Issue No December 2017

BRE Global Limited Scheme Document SD 186: Issue No December 2017 BRE Global Limited Scheme Document SD 186: Issue No. 11.1 Commercial-in-Confidence Page 1 of 9 Introduction This certification scheme has been designed to promote the use of sustainable materials and

More information

Procedures for responding to requests for personal data to support Data Protection Policy

Procedures for responding to requests for personal data to support Data Protection Policy Procedures for responding to requests for personal data to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection Policy HERIOT-WATT

More information

Freedom of Information and Protection of Privacy (FOIPOP)

Freedom of Information and Protection of Privacy (FOIPOP) Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30

More information

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy

More information

CITY OF TORONTO TELECOMMUNICATION TOWER AND ANTENNA PROTOCOL (Industry Canada Local Land-use Authority Consultation)

CITY OF TORONTO TELECOMMUNICATION TOWER AND ANTENNA PROTOCOL (Industry Canada Local Land-use Authority Consultation) Attachment 1: Approved Telecommunications Protocol (Adopted by City Council - March 3, 4 and 5, 2008) CITY OF TORONTO TELECOMMUNICATION TOWER AND ANTENNA PROTOCOL (Industry Canada Local Land-use Authority

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

SCI QUAL INTERNATIONAL PTY LTD ENQUIRY & APPLICATION/RENEWAL FORM FOR CERTIFICATION

SCI QUAL INTERNATIONAL PTY LTD ENQUIRY & APPLICATION/RENEWAL FORM FOR CERTIFICATION SCI QUAL INTERNATIONAL PTY LTD ENQUIRY & APPLICATION/RENEWAL FORM FOR CERTIFICATION Enquiry Application Renewal COMPANY DETAILS COMPANY NAME TRADING NAME ABN WEBSITE POSTAL ADDRESS LOCATION ADDRESS ORGANISATION

More information

As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above.

As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. B (1)B (2) * In the case of a non-hong Kong ID cardholder, state the passport number or any identification

More information

Accreditation & Certification Supplier Guide

Accreditation & Certification Supplier Guide Accreditation & Certification Supplier Guide Network Connectivity Products and Services Connected Health Version 1.0 Table of Contents 1 PREFACE... 3 1.1 AUDIENCE...3 1.2 PURPOSE...3 1.3 SCOPE...3 2 CONNECTED

More information

The West End Community Trust Privacy Policy

The West End Community Trust Privacy Policy The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed

More information

Preparing for the NBN. Fixed Wireless Connections

Preparing for the NBN. Fixed Wireless Connections Preparing for the NBN Fixed Wireless Connections Preparing for the NBN Congratulations on choosing to join the National Broadband Network Your new fixed wireless connection will give you access to world-class

More information

University of Wyoming Mobile Communication Device Policy Effective January 1, 2013

University of Wyoming Mobile Communication Device Policy Effective January 1, 2013 University of Wyoming Mobile Communication Device Policy Effective January 1, 2013 Introduction and Purpose This policy allows the University to meet Internal Revenue Service (IRS) regulations and its

More information

The General Data Protection Regulation

The General Data Protection Regulation PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how

More information

We may change the privacy notice from time to time by amending this page. What type of information will we collect from you?

We may change the privacy notice from time to time by amending this page. What type of information will we collect from you? This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and

More information

RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES

RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES ISSUED DECEMBER 2018 Table Of Contents 1. Model A sub-branches... 2 2. Model B sub-branches... 6 1 SUB-BRANCH STANDARD OPERATING PROCEDURES (SOPs) These

More information

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date)

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) STORAGE OF SSAN Security Risk Assessment and SECURITY PLAN (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) IMPLEMENTED: (insert date) LICENCE DETAILS: No: Issue date: (Note: You

More information

Communications Room Policy

Communications Room Policy Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

0522: Governance of the use of as a valid UNC communication

0522: Governance of the use of  as a valid UNC communication Stage 01: Modification 0522: Governance of the use of email as a valid UNC communication At what stage is this document in the process? This modification proposes business rules to ensure that appropriate

More information

Outgoing Ltd Official Ticketing Agent Terms and Conditions

Outgoing Ltd Official Ticketing Agent Terms and Conditions Outgoing Ltd Official Ticketing Agent Terms and Conditions In these terms and conditions "Outgoing" refers to Outgoing Ltd. Outgoing sells all tickets as an agent on behalf of the organisers and Outgoing

More information

Post-accreditation monitoring report: British Computer Society (BCS) September 2006 QCA/06/2926

Post-accreditation monitoring report: British Computer Society (BCS) September 2006 QCA/06/2926 Post-accreditation monitoring report: British Computer Society (BCS) September 2006 QCA/06/2926 Contents Introduction... 3 Regulating external qualifications... 3 About this report... 3 About British Computer

More information

RVC DATA PROTECTION POLICY

RVC DATA PROTECTION POLICY RVC DATA PROTECTION POLICY POLICY and PROCEDURES Responsibility of Data Protection Officer Review Date July 2019 Approved by CEC Author D.Hardyman-Rice CONTENTS PAGE 1) Policy Statement 3 2) Key definitions

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

We may change the privacy notice from time to time by amending this page.

We may change the privacy notice from time to time by amending this page. Holland & Odam Updated 4 th May 2018 This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand

More information

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website Privacy Policy 1. Policy Objectives 1.1 The Police Association Victoria (the Association) is the organisation representing sworn police officers at all ranks, protective services officers, police reservists

More information

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients. Privacy policy 1 Background This document sets out the policy of Polemic Forensic ABN 60 392 752 759 ( Polemic ) relating to the protection of the privacy of personal information. Polemic is a business

More information

Getting Started with Smartlicence

Getting Started with Smartlicence Getting Started with Smartlicence Table of Contents 1 Purpose... 3 1.1 Data Protection Act... 3 1.2 Electronic Driver Entitlement Checking Service (edecs)... 3 2 Get Started... 4 2.1 Step 1: Complete the

More information

APM Accreditation for training providers Application Guidance Notes

APM Accreditation for training providers Application Guidance Notes APM Accreditation for training providers Application Guidance Notes APM Accreditation for training providers Guidance Notes CONTENTS Overview 2 Application process 3 Guidance on completing your application

More information

Eco Web Hosting Security and Data Processing Agreement

Eco Web Hosting Security and Data Processing Agreement 1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have

More information

Privacy Policy. Full name and contact details (including your contact number, and postal address).

Privacy Policy. Full name and contact details (including your contact number,  and postal address). 01326 270212 sales@htiddy.co.uk www.htiddy.co.uk Privacy Policy This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this

More information

This policy also applies to personal information about you that the Federation collects from any other third party.

This policy also applies to personal information about you that the Federation collects from any other third party. ANMF Policy Privacy The Australian Nursing and Midwifery Federation (the Federation) is an organisation of employees (ie a trade union) registered under Commonwealth industrial laws. The Federation is

More information

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Wireless Communication Device Policy Policy No September 2, Standard. Practice Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to

More information

The Data Protection Act 1998 Clare Hall Data Protection Policy

The Data Protection Act 1998 Clare Hall Data Protection Policy The Data Protection Act 1998 Clare Hall Data Protection Policy Introduction This document is a guide to the main requirements of the new Data Protection Act (DPA) that came into force on 24th October 2001.

More information

Terms and Conditions for Electronic Banking Services (Internet Banking and ELBA business)

Terms and Conditions for Electronic Banking Services (Internet Banking and ELBA business) Terms and Conditions for Electronic Banking Services (Internet Banking and ELBA business) Version 2019 1. Purpose, Participation Agreement a) Electronic Banking The conditions govern communication between

More information

GUIDELINES FOR DOCUMENT CONTROL

GUIDELINES FOR DOCUMENT CONTROL GUIDELINES FOR DOCUMENT CONTROL Issue Number Prepared (P), Reviewed (R), Amended (A) Approved by Date of Approval ONE (Superseded Tranz Rail document Q002 Company Documentation) P J O Connell (P) A E Neilson

More information

Service Level Agreement

Service Level Agreement Service Level Agreement General This document is a Service Level Agreement (SLA) setting out the levels of services to be provided to you by Luminet. This document must be read in conjunction with our

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES

DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES You have been given this Notice because Babington collects, uses and stores information about colleagues

More information

Regulations for Compulsory Product Certification

Regulations for Compulsory Product Certification Regulations for Compulsory Product Certification Chapter I General Provisions Article 1 Based on relevant laws and regulations covering product safety licensing and product quality certification so as

More information

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc

More information

GENERAL PRIVACY POLICY

GENERAL PRIVACY POLICY GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy

More information

We may change the privacy notice from time to time by amending this page.

We may change the privacy notice from time to time by amending this page. This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and

More information

CELL PHONE POLICY Page 1 of 5 City of Manteca Administrative Policy and Procedure

CELL PHONE POLICY Page 1 of 5 City of Manteca Administrative Policy and Procedure CELL PHONE POLICY Page 1 of 5 Section 1: Purpose The City of Manteca recognizes that cellular telephones enhance the level of City services by allowing employees to remain in contact with the office or

More information

TELEPHONE AND MOBILE USE POLICY

TELEPHONE AND MOBILE USE POLICY TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University

More information

PEFC N 04 Requirements for certification bodies and accreditation bodies

PEFC N 04 Requirements for certification bodies and accreditation bodies PEFC N 04 Requirements for certification and accreditation Organisation Articles of Association for PEFC Norway Forest certification PEFC N 01 Norwegian PEFC certification system for sustainable forestry

More information