Severn Trent Water. Telecommunications Policy and Access Procedure
|
|
- Kelley Pierce
- 6 years ago
- Views:
Transcription
1 Severn Trent Water Telecommunications Policy and Access Procedure
2 Contents STW Telecommunications Policy: 5-12 Health and Safety: Access Procedures: STW LSH Sites Access Policy [Controlled / protected]
3 Overview This document has been set out in the form of a presentation to provide telecommunications companies and their contractors with the procedure to follow to ensure safe working on STW land and buildings. The aim is to provide a system for full compliance with STW s statutory obligations and safety policies whilst encouraging the use of its land and buildings by telecommunications operators where this is appropriate. 3 STW LSH Sites Access Policy [Controlled / protected]
4 Administration of Policy and Access Procedure Lambert Smith Hampton have been appointed as managing agents by STW and will act as a central point of contact for all telecoms enquires and access requirements with the exception of out of hours emergencies. Lambert Smith Hampton will arrange all pre-build accesses and prestart meetings. Site Access Requests should be arranged via:- 4 STW LSH Sites Access Policy [Controlled / protected]
5 Policy As with any commercial organisation STW looks to maximise income from its land portfolio in order to generate income that helps to keep water charges as low as possible. The management of our telecoms portfolio is just one of many income generating streams of the property portfolio. The use of mobile phone technology provides obvious benefits to Severn Trent Water and to society as a whole. However, the use of the land to accommodate new installations should be precautionary and this means adopting the applicable recommendations of the Government; public health bodies and Industry best practice. 5 STW LSH Sites Access Policy [Controlled / protected]
6 Policy The first point of contact for mobile network operators proposing to install a base station on Severn Trent Property should be via Severn Trent Water s managing agent, Lambert Smith Hampton (LSH) LSH will compile an outline proposal and checklist to allow the initial assessment of the proposal by Property Services and the Operations site manager. The recommendation will clearly highlight any issues and allocate the proposal a Green, Amber or Red status. This rating and supporting information will be submitted to STW for ratification and approval by Property Services and Operational site manager. 6 STW LSH Sites Access Policy [Controlled / protected]
7 Design Antennas on water towers and existing buildings should be located to minimise visual impact. Fixings must preserve the integrity of the structure and may be specified by STW. Equipment cabins should be located externally unless the site has a dedicated radio room. Size, location and colour must be appropriate to the site. Radio masts and cabins must be located away from underground apparatus. Mains record drawings will be provided where possible but tracing may be necessary in certain cases. Screening or colour coding of equipment cabins and cable trays may be required and should be considered when proposing equipment locations. The location of cabins must consider the impact of noise pollution. Underground cable troughs are to be preferred to overhead cable ladders as a means of linking to the equipment cabin. Troughs require heavy duty vehicle covers. The design must consider site security and incorporate a separate fenced access where possible to maintain the existing integrity of the site. 7 STW LSH Sites Access Policy [Controlled / protected]
8 Acquisition/Upgrade Drawings Operators must provide sufficiently detailed scale drawings to show all build/upgrade proposals. These must include: Antenna location and fixings equipment cabinets cable runs and trays dedicated electricity supply and communication cable routes security fencing and screening warning sign location PDF copies of the proposal drawings should be provided to Lambert Smith Hampton via or online. Any required amendments will be notified to the operator, or their agents, by return. Where appropriate, proposals will be assessed by the STW Supervising Operational Site Manager and STW Property Services Full construction drawings are required when operators request the pre-start meeting. To avoid delay these must accord with the approved proposal drawings. 8 STW LSH Sites Access Policy [Controlled / protected]
9 Planning Operators will be required to confirm they have obtained any necessary planning consent prior to completion of legal documentation, or build access, if earlier. Queries raised by STW customers may be directed to the operator/local Planning Authority. Sensitive sites may require landscaping to form part of the planning application. 9 STW LSH Sites Access Policy [Controlled / protected]
10 Legal Documentation Telecommunications operators will be required to complete Standard STW legal documentation as required by the agreed Multi Site Agreement (MSA) in force, or under a standard STW lease/licence at the discretion of Severn Trent Water. Completion of this documentation will generally be required prior to access. Wayleave documentation will be completed separately with the appropriate service provider; the form of wayleave documentation and route of all power and communication cables will be at the discretion of Severn Trent Water. 10 STW LSH Sites Access Policy [Controlled / protected]
11 Early Access Early access will not generally be permitted Exceptions may be made where the standard STW early access agreement has been signed by the telecommunications operator and there is an agreed form of lease/licence. Full details available from Lambert Smith Hampton on request 11 STW LSH Sites Access Policy [Controlled / protected]
12 STW Site Acquisition Flow Chart New Telecomms Enquiry End Site not nominated End Not Agreed No LSH request STW Ops & Property Services for in principle clearance yes Site visit arranged by LSH LSH collate site specific information LSH negotiate terms with operator LSH undertake STW consultations Operator provides proposal draw. Drawing Survey/MSV Site nominated Agreed Operations, Estates Recreation, Legal, Property Services LSH prepare formal recommendation for STW Approved Yes cleared No End Legal Completion Operator provides method stat. etc LSH arrange pre-start/build Operators instal.report & Final inspection Operator instructed to complete re-instate. No Yes LSH issue legal instructions Early Access End STW signs instal.report. returns to LSH Yes Approved No 12 STW LSH Sites Access Policy [Controlled / protected]
13 Health & Safety Severn Trent Water has a Mobile Phone Masts Safety Standard and a Managing Contractors & Suppliers Standard which provide information and guidance on what the business must do to comply with the H&S legislation and protect its employees, contractors and customers. A copy of these Standards can be made available if required. 13 STW LSH Sites Access Policy [Controlled / protected]
14 Health and Safety Policy Telecommunications operators must provide STW with a copy of their current Health and Safety Policy on request. Access may be withheld if this document has not been provided. This will be assessed by STW in accordance with their own Health and Safety standards. Once accepted by STW the H&S document will be held by Lambert Smith Hampton and made available as required to STW, their agents and contractors. Updates to the Health and Safety Policy must be notified to STW. 14 STW LSH Sites Access Policy [Controlled / protected]
15 Risk Assessments & Method Statements All works must comply with the requirements of the STW Managing Contractors & Suppliers Standard. All access, other than initial ground level surveys, will require a site specific Risk Assessment & Method Statement (RAMS). They must be submitted for approval prior to any work commencing. All RAMS must accord to the telecoms operators current Health and Safety Policy, as submitted to STW. They should detail proposed working methods and outline safety measures needed to control the hazards identified. 15 STW LSH Sites Access Policy [Controlled / protected]
16 Hazards RAMS must address all risks associated with the work to be undertaken. STW will help address specific site hazards risks by identifying them to the operator/contractor, upon request for access, on the form Site Hazard Check List. (SHCL) The provision of the SHCL and the subsequent checking of the RAMS does not relieve the operator/contractor of any of his responsibilities for Health and Safety. The contractor alone is responsible for the day to day safety of their employees and others who may be affected by the work. Operators and Contractors must be aware of site security and abide by STW s closed gate policy. Any radiation risks and associated exclusion zones must be highlighted. 16 STW LSH Sites Access Policy [Controlled / protected]
17 Approval and Supervision Proposals may require independent assessment which will be notified to the operator prior to the assessment. If the operator wishes to proceed, all costs of the assessment and any required design changes will be met by the operator. For example: Water Towers may require structural reports and access to restricted areas may require periodic sampling e.g. bacteriological testing of potable water. Specific proposals may require on site supervision the costs of which will be met by the operator. Supervision requirements will be notified upon request for access. 17 STW LSH Sites Access Policy [Controlled / protected]
18 Warning Signs In addition to meeting the statutory notification requirements telecoms operators must ensure: All antenna and equipment cabins carry an identification sign naming : the operator any appropriate hazard sign and a 24 hour contact telephone number. 18 STW LSH Sites Access Policy [Controlled / protected]
19 Access - Principles All access arrangements must comply with the requirements of STW including the Managing Contractors & Suppliers Standard. The STW site manager will always be responsible for the site, including the authorisation of access requests The procedure will apply to all STW sites unless determined otherwise by the site manager. (e.g. access to STW non operational land) The STW site manager will have regard to STW Health and Safety Standards when assessing operators/contractors RAMS. Contractors are responsible for ensuring all information contained in RAMS is passed to all sub-contractors. 19 STW LSH Sites Access Policy [Controlled / protected]
20 Site Security - General STW operate a security system in order to comply with their statutory requirements. For the majority of sites, operators will have their own locks on site. Where this is not possible, the issuing of site gate keys or current codes for combination locks, where necessary, will be the responsibility of the site manager. Keys for some sites, due to security requirements, may not be issued at all and operator locks not permitted. In such cases this will be identified to the operator and a system of accompanied visits set up to maintain access. 20 STW LSH Sites Access Policy [Controlled / protected]
21 Site Security Keys (1) The issuing of site gate keys, where appropriate, will be the responsibility of the site manager. Keys must be collected for every visit. The loss of keys by a nominated key holder ( including his/her agents and contractors) will lead to keys being withdrawn. STW will reserve the right to temporarily withdraw all keys should higher security levels be imposed. Emergency access will be maintained during the period of increased security by supervised site visits. Rights to withdraw keys are reserved as a reasonable instruction by STW managers to maintain security. The loss of keys may require the replacement of an entire suite of locks and the operator/contractor will be charged accordingly. 21 STW LSH Sites Access Policy [Controlled / protected]
22 Site Security Keys (2) In order to restrict access, the majority of locks are suited which results in a single key giving access to a large number of sites and buildings. The loss of a single key can have a significant impact on the business and could result in the need for large numbers of locks to be replaced. It is therefore essential that all these keys can be accounted for and that staff take responsibility of keys issued to them. For this reason, the ST Site Manager will maintain a log of issued keys consisting of contact details, level of access and time scales. The log will provide a complete audit trail including delivery, issue and return of all keys. Where keys are issued (and this applies only to a small number of sites) they are issued directly by STW to the contractor who will be visiting site for that day only. Keys are released by the authorising site manager in line with their specific site processes and only once LSH completed the access request/rams process and the site manager has confirmed approval. 22 STW LSH Sites Access Policy [Controlled / protected]
23 Site Security Keys (3) Issued keys are subject to the following conditions: The key will be used exclusively in the performance of official duties, as authorised by Severn Trent (ST). The key must be kept in a secure place when not being used and should never be left in a vehicle or site cabin. Only the key holder or standby key holder can use the key. It must not be loaned to colleagues or any other party including sub contractors. Personal details of key holder s will be kept on file in accordance with the Data Protection Act. In the event of a security incident these details will be made available to Police and Government security agencies. Any applicant requesting access must provide names and contact details of the key holder for the visit. The key must be returned on completion of use. If returned by post than it must be sent by recorded delivery. Failure to return the key could result in police action being taken. Damage or loss of the key must be reported to LSH or your ST contact immediately. The issuing depot or office should check the applicant has prior authorisation prior to releasing keys and then advises LSH or the site manager if a key is lost, damaged or not returned. Under exceptional circumstances, issued keys may be recalled and access to sites revoked without warning. 23 STW LSH Sites Access Policy [Controlled / protected]
24 Site Access Policy Overview (1) Access is controlled by LSH to ensure works are permitted and do not impact on the delivery of water supply or waste services. All access requests must be submitted via LSH s online access request site: 24 STW LSH Sites Access Policy [Controlled / protected]
25 Site Access Policy Overview (2) Requests must be submitted online, together with all necessary drawings, consents and health & safety documentation appropriate to the proposed work. A minimum of 7 working days' notice is required to arrange access and the acceptance of documentation by Lambert Smith Hampton and Severn Trent Water. Incomplete forms will not be processed. Access cannot be arranged by phone. 25 STW LSH Sites Access Policy [Controlled / protected]
26 Site Access Procedure 1 4 main categories of access exist: Survey build maintenance and emergency. Several sub-categories also exist. In all build cases (new sites, upgrades, variations or additional equipment) the operator must have obtained property approval clearance before initiating the access procedure and provide evidence of consent on request. Upon receipt of completed information, a request will be forwarded to the relevant Severn Trent Site Manager. 26 STW LSH Sites Access Policy [Controlled / protected]
27 Site Access Procedure 2 If the works are substantial or in proximity to sensitive areas, further information may be requested by Severn Trent Water. Authorisation to Enter a Severn Trent Water Site Form will be issued at this time at the discretion of the Site Manager. Once consent has been granted by Severn Trent and all of the above documents have been completed LSH will advise the requestor that consent is granted together with conditions of entry. Severn Trent Water reserves the right to charge a fee for access should personnel be required to attend to facilitate access or oversee the works. 27 STW LSH Sites Access Policy [Controlled / protected]
28 Site Access - Completion of Works A Confirmation of Works form must be returned to LSH within 5 workings days of completion of the works. This will trigger a site inspection by STW site manager with the contractor/operator being asked to return if the site has not been left to their reasonable satisfaction. 28 STW LSH Sites Access Policy [Controlled / protected]
29 Emergency Site Access An online request must be submitted for all Emergency requests; reasonable justification and details of the emergency must be provided. Emergency Out of Hours access only to be made via STW Network Control Centre in COSC on STW LSH Sites Access Policy [Controlled / protected]
30 Site Access Costs Where appropriate, Severn Trent will have to assign technicians from other water related duties to accompany these visits. Severn Trent Water will endeavour to accommodate access requests particularly in the event of an emergency however; this is not guaranteed and depends entirely upon the availability staff and other planned works on site which may take precedence. Failure to attend an arranged appointment or failure to give required 48 hours cancellation notice will result in a supplementary charge on top of the hourly rate to cover administration costs. 30 STW LSH Sites Access Policy [Controlled / protected]
TELECOMMUNICATIONS ACCESS POLICY 2011
TELECOMMUNICATIONS ACCESS POLICY 2011 The Vice Chancellor and Principal, as delegate of the Senate of the University of Sydney, adopts the following policy. Dated: 31 January 2011 Signature: Name: Michael
More informationData Protection Policy
Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance
More informationIt applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).
Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations
More informationSt Bernard s Primary School Data Protection Policy
St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General
More informationREVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT
REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT IFC SERVICE DESCRIPTION 17 OCTOBER 2016 Page 1 of 9 SERVICE DESCRIPTION 2-14: INTERNATIONAL FALCON CONNECTION SERVICE (IFC Service) 1. THE SERVICE
More informationMailbox Rental Terms and Conditions
Mailbox Rental Terms and Conditions (valid from 26th September 2018) Subject to the customer ("the Customer") observing the Terms and Conditions set out below, Mail Boxes Etc. ("the Company") agrees to
More informationUlster University Policy Cover Sheet
Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationSwitching Process and Rules Systems Operations Framework. Document Number:
Switching Process and Rules Systems Operations Framework Document Number: 4808076 TABLE OF CONTENTS 1. INTRODUCTION... 5 1.1 PURPOSE... 5 1.2 HIERARCHY... 5 2. PROCESSES... 7 2.1 SWITCHING OPERATOR AUTHORISATION
More informationDescription of the Application Process for Small Embedded Generators
Description of the Application Process for Small Embedded Generators This document describes the Application Process for Small Embedded Generators (as required under section 5.3.3A of the National Electricity
More informationPRIVACY NOTICE. 1.2 We may obtain or collect your Personal Data from various sources including but not limited to:
PRIVACY NOTICE This Privacy Notice is issued by BGR FOODSERVICE SDN. BHD. (445653-K) ( the Company or BFSB ) and/or its related companies, as defined in the Companies Act, 1965 (collectively Group ) pursuant
More informationGreen Star Volume Certification. Process Guide
Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage
More informationPS Mailing Services Ltd Data Protection Policy May 2018
PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationThis procedure sets out the usage of mobile CCTV units within Arhag.
CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards
More informationProtocol and Guideline for Establishing Wireless Telecommunication Facilities Within City of Brampton
Protocol and Guideline for Establishing Wireless Telecommunication Facilities Within City of Brampton (February 2002) (Revised, January 2011) Council approval CW062-2011 (Revised, February 2011) revisions
More informationCERTIFICATION CONDITIONS
1 of 5 + CERTIFICATION CONDITIONS PERMIT NO 000/0. SATAS SOUTH AFRICAN TECHNICAL AUDITING SERVICES Pty Ltd Co Reg No 2002/015355/07 AGREEMENT ENTERED INTO WITH Co Reg No.. 2 of 5 CERTIFICATION CONDITIONS
More informationInformation Bulletin
Application of Primary and Secondary Reference Documents Version 1.1 Approved for release July 2014 Table of Contents 1.0 Purpose statement... 3 2.0 Audience... 3 3.0 BCA requirements and referenced documents...
More information1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.
1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the
More informationM T BUCKLEY & Co Chartered Accountants
M T BUCKLEY & Co Chartered Accountants 2 Beulah Walk, Woldingham, Caterham, Surrey CR3 7LL Telephone: 01883 650420 Mobile: 07876 030622 1. PURPOSE OF THIS POLICY PRIVACY POLICY This policy describes how
More informationDATA PROCESSING TERMS
DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica
More informationAccess to personal accounts and lawful business monitoring
Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More informationPrivacy Notice For Our Customers And Contacts
Privacy Notice For Our Customers And Contacts What Is The Purpose Of This Notice? This notice applies to all businesses operating within The Alumasc Group plc group of Companies (the Group ), as follows:
More informationCastle View Primary School Data Protection Policy
Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff
More informationNew Zealand Telecommunications Forum. Code for Vulnerable End Users of Telecommunication Services. ( Vulnerable End User Code )
New Zealand Telecommunications Forum Code for Vulnerable End Users of Telecommunication Services ( Vulnerable End User Code ) Code Status: Code Classification: Date: Review Status: For Public Consultation
More informationSAFE USE OF MOBILE PHONES AT WORK POLICY
SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31
More informationPOWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS
POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS Prepared by: Approved by: Chief Procurement Officer John Baskerville Chief Executive File number: D2015/65737 June 2015 MANAGEMENT
More informationScheme Document SD 003
Scheme Document SD 003 Management Systems (ISO 9001, ISO 14001, BS OHSAS 18001 & PN111 Factory Production Control) SD 003 Rev 03.6 10 Oct 2013 Page 1 of 13 (blank) SD 003 Rev 03.6 10 Oct 2013 Page 2 of
More informationChapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017
Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017 Copyright 2017 International Finance Corporation. All rights reserved. The material in this publication is copyrighted by International
More informationPROCEDURE Cryptographic Security. Number: G 0806 Date Published: 6 July 2010
1.0 About this procedure This procedure explains the specific requirements that staff handling cryptographic material must follow. Cryptographic material is the medium by which we will configure any computer
More informationOngoing conformance of the product with the standard is the responsibility of the certificate holder and the Australian manufacturer or importer.
1. Preface The (TECS) offered by Comtest Certification Body is based on a type test scheme, which is one where a representative sample is provided for testing and certification, and does not include any
More informationService Schedule BT Web Starter
1. SERVICE DESCRIPTION Service Overview 1.1 The Service includes the construction and hosting of a business website as further described in this Service Schedule. It does not include the provision of any
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationSubject access policy and template response letters
Barham Parish Council. Subject Access Requests ( SAR ) Checklist Inform data subjects of their right to access data and provide an easily accessible mechanism through which such a request can be submitted
More informationGovernance of the use of as a valid UNC communication
Stage 01: : u Governance of the use of email as a valid UNC communication At what stage is this document in the process? This modification proposes business rules to ensure that appropriate assurance is
More informationCERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION
CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION Introduction The IFFO RS Certification Programme is a third party, independent and accredited
More informationWorld Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018
World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy
More informationATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES
ATTACHMENT A POLICES AND PROCEDURES REGARDING CELLULAR TELEPHONES AND MOBILE COMMUNICATION DEVICES 1. INTRODUCTION 1.1 The Office of Information Technology Services ( OITS ) has the responsibility of managing
More informationTelecommunications Equipment Certification Scheme FEBRUARY 2017
Telecommunications Equipment Certification Scheme FEBRUARY 2017 Canberra Red Building Benjamin Offices Chan Street Belconnen ACT PO Box 78 Belconnen ACT 2616 T +61 2 6219 5555 F +61 2 6219 5353 Melbourne
More informationPRIVACY POLICY Last Updated May, 2018
PRIVACY POLICY Last Updated May, 2018 PRIVACY POLICY OVERVIEW This Privacy Policy establishes rules to govern the collection, use and disclosure of personal information collected by Banff & Lake Louise
More informationRules for LNE Certification of Management Systems
Rules for LNE Certification of Management Systems Application date: March 10 th, 2017 Rev. 040716 RULES FOR LNE CERTIFICATION OF MANAGEMENT SYSTEMS CONTENTS 1. PURPOSE... 3 2. SCOPE... 3 3. DEFINITION
More informationIT Security Standard Operating Procedure
IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance
More informationElement Finance Solutions Ltd Data Protection Policy
Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments
More informationRules for Operators. Version 6 / Version 6, 13 May 2011 Page 1/12
Rules for Operators Version 6 / 2011-05-13 Version 6, 13 May 2011 Page 1/12 TABLE OF CONTENTS 1. Introduction... 3 2. Application for certification and FAMI-QS associate membership... 3 3. Assessment of
More informationAcquisition & Use of University Supplied Mobile Devices Policy
Acquisition & Use of University Supplied Mobile Devices Policy 1. Introduction 2. Device Definitions 3. Principles of the Policy 4. Eligibility 5. Tariffs & Hardware 6. Administration of Mobile Contracts
More informationI. PURPOSE III. PROCEDURE
A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks
More informationPatient Reported Outcome Measures (PROMs)
Patient Reported Outcome Measures (PROMs) Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationAccess Control Policy
Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,
More informationService Schedule BT Web Manager
1. SERVICE DESCRIPTION Service Overview 1.1 The Service includes the construction and hosting of a business website as further described in this Service Schedule. It does not include the provision of any
More informationColocation Specific Terms and Conditions
Colocation Specific Terms and Conditions 1 DEFINITIONS These Specific Terms and Conditions are to be read in conjunction with our General Terms and Conditions. All definitions contained within these Specific
More informationPANORAMA Data Security & Access Protocol
PANORAMA Data Security & Access Protocol ALL DATA Security Any data provided to the PANORAMA Data Management Facility by external data guardians will be stored securely on the Flinders Medical Centre Y
More informationBRE Global Limited Scheme Document SD 186: Issue No December 2017
BRE Global Limited Scheme Document SD 186: Issue No. 11.1 Commercial-in-Confidence Page 1 of 9 Introduction This certification scheme has been designed to promote the use of sustainable materials and
More informationProcedures for responding to requests for personal data to support Data Protection Policy
Procedures for responding to requests for personal data to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection Policy HERIOT-WATT
More informationFreedom of Information and Protection of Privacy (FOIPOP)
Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30
More informationAdkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts
Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy
More informationCITY OF TORONTO TELECOMMUNICATION TOWER AND ANTENNA PROTOCOL (Industry Canada Local Land-use Authority Consultation)
Attachment 1: Approved Telecommunications Protocol (Adopted by City Council - March 3, 4 and 5, 2008) CITY OF TORONTO TELECOMMUNICATION TOWER AND ANTENNA PROTOCOL (Industry Canada Local Land-use Authority
More informationGDPR Compliance. Clauses
1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The
More informationSCI QUAL INTERNATIONAL PTY LTD ENQUIRY & APPLICATION/RENEWAL FORM FOR CERTIFICATION
SCI QUAL INTERNATIONAL PTY LTD ENQUIRY & APPLICATION/RENEWAL FORM FOR CERTIFICATION Enquiry Application Renewal COMPANY DETAILS COMPANY NAME TRADING NAME ABN WEBSITE POSTAL ADDRESS LOCATION ADDRESS ORGANISATION
More informationAs set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above.
As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. B (1)B (2) * In the case of a non-hong Kong ID cardholder, state the passport number or any identification
More informationAccreditation & Certification Supplier Guide
Accreditation & Certification Supplier Guide Network Connectivity Products and Services Connected Health Version 1.0 Table of Contents 1 PREFACE... 3 1.1 AUDIENCE...3 1.2 PURPOSE...3 1.3 SCOPE...3 2 CONNECTED
More informationThe West End Community Trust Privacy Policy
The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed
More informationPreparing for the NBN. Fixed Wireless Connections
Preparing for the NBN Fixed Wireless Connections Preparing for the NBN Congratulations on choosing to join the National Broadband Network Your new fixed wireless connection will give you access to world-class
More informationUniversity of Wyoming Mobile Communication Device Policy Effective January 1, 2013
University of Wyoming Mobile Communication Device Policy Effective January 1, 2013 Introduction and Purpose This policy allows the University to meet Internal Revenue Service (IRS) regulations and its
More informationThe General Data Protection Regulation
PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how
More informationWe may change the privacy notice from time to time by amending this page. What type of information will we collect from you?
This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and
More informationRSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES
RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES ISSUED DECEMBER 2018 Table Of Contents 1. Model A sub-branches... 2 2. Model B sub-branches... 6 1 SUB-BRANCH STANDARD OPERATING PROCEDURES (SOPs) These
More informationSTORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date)
STORAGE OF SSAN Security Risk Assessment and SECURITY PLAN (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) IMPLEMENTED: (insert date) LICENCE DETAILS: No: Issue date: (Note: You
More informationCommunications Room Policy
Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More information0522: Governance of the use of as a valid UNC communication
Stage 01: Modification 0522: Governance of the use of email as a valid UNC communication At what stage is this document in the process? This modification proposes business rules to ensure that appropriate
More informationOutgoing Ltd Official Ticketing Agent Terms and Conditions
Outgoing Ltd Official Ticketing Agent Terms and Conditions In these terms and conditions "Outgoing" refers to Outgoing Ltd. Outgoing sells all tickets as an agent on behalf of the organisers and Outgoing
More informationPost-accreditation monitoring report: British Computer Society (BCS) September 2006 QCA/06/2926
Post-accreditation monitoring report: British Computer Society (BCS) September 2006 QCA/06/2926 Contents Introduction... 3 Regulating external qualifications... 3 About this report... 3 About British Computer
More informationRVC DATA PROTECTION POLICY
RVC DATA PROTECTION POLICY POLICY and PROCEDURES Responsibility of Data Protection Officer Review Date July 2019 Approved by CEC Author D.Hardyman-Rice CONTENTS PAGE 1) Policy Statement 3 2) Key definitions
More informationSubject: Kier Group plc Data Protection Policy
Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective
More informationNHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy
NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification
More informationCreative Funding Solutions Limited Data Protection Policy
Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments
More informationWe may change the privacy notice from time to time by amending this page.
Holland & Odam Updated 4 th May 2018 This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand
More informationPolicy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website
Privacy Policy 1. Policy Objectives 1.1 The Police Association Victoria (the Association) is the organisation representing sworn police officers at all ranks, protective services officers, police reservists
More informationPolemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.
Privacy policy 1 Background This document sets out the policy of Polemic Forensic ABN 60 392 752 759 ( Polemic ) relating to the protection of the privacy of personal information. Polemic is a business
More informationGetting Started with Smartlicence
Getting Started with Smartlicence Table of Contents 1 Purpose... 3 1.1 Data Protection Act... 3 1.2 Electronic Driver Entitlement Checking Service (edecs)... 3 2 Get Started... 4 2.1 Step 1: Complete the
More informationAPM Accreditation for training providers Application Guidance Notes
APM Accreditation for training providers Application Guidance Notes APM Accreditation for training providers Guidance Notes CONTENTS Overview 2 Application process 3 Guidance on completing your application
More informationEco Web Hosting Security and Data Processing Agreement
1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have
More informationPrivacy Policy. Full name and contact details (including your contact number, and postal address).
01326 270212 sales@htiddy.co.uk www.htiddy.co.uk Privacy Policy This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this
More informationThis policy also applies to personal information about you that the Federation collects from any other third party.
ANMF Policy Privacy The Australian Nursing and Midwifery Federation (the Federation) is an organisation of employees (ie a trade union) registered under Commonwealth industrial laws. The Federation is
More informationWireless Communication Device Policy Policy No September 2, Standard. Practice
Standard This establishes the business need and use of cellular phones (hereinafter referred to as wireless communication devices ) as an effective means of conducting City of Richland business, and to
More informationThe Data Protection Act 1998 Clare Hall Data Protection Policy
The Data Protection Act 1998 Clare Hall Data Protection Policy Introduction This document is a guide to the main requirements of the new Data Protection Act (DPA) that came into force on 24th October 2001.
More informationTerms and Conditions for Electronic Banking Services (Internet Banking and ELBA business)
Terms and Conditions for Electronic Banking Services (Internet Banking and ELBA business) Version 2019 1. Purpose, Participation Agreement a) Electronic Banking The conditions govern communication between
More informationGUIDELINES FOR DOCUMENT CONTROL
GUIDELINES FOR DOCUMENT CONTROL Issue Number Prepared (P), Reviewed (R), Amended (A) Approved by Date of Approval ONE (Superseded Tranz Rail document Q002 Company Documentation) P J O Connell (P) A E Neilson
More informationService Level Agreement
Service Level Agreement General This document is a Service Level Agreement (SLA) setting out the levels of services to be provided to you by Luminet. This document must be read in conjunction with our
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationGDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd
GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document
More informationDATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES
DATA PROTECTION PRIVACY NOTICE PROTECTING YOUR PERSONAL INFORMATION: YOUR RIGHTS, OUR RESPONSIBILITIES You have been given this Notice because Babington collects, uses and stores information about colleagues
More informationRegulations for Compulsory Product Certification
Regulations for Compulsory Product Certification Chapter I General Provisions Article 1 Based on relevant laws and regulations covering product safety licensing and product quality certification so as
More information(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and
SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc
More informationGENERAL PRIVACY POLICY
GENERAL PRIVACY POLICY Introduction The Australian Association of Consultant Pharmacy Pty Ltd (ACN 057 706 064) (the AACP) is committed to protecting the privacy of your personal information. This privacy
More informationWe may change the privacy notice from time to time by amending this page.
This privacy notice sets out how we will process personal data we collect from or about you, or which you provide to us. Please read this notice carefully to understand why data is being collected and
More informationCELL PHONE POLICY Page 1 of 5 City of Manteca Administrative Policy and Procedure
CELL PHONE POLICY Page 1 of 5 Section 1: Purpose The City of Manteca recognizes that cellular telephones enhance the level of City services by allowing employees to remain in contact with the office or
More informationTELEPHONE AND MOBILE USE POLICY
TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University
More informationPEFC N 04 Requirements for certification bodies and accreditation bodies
PEFC N 04 Requirements for certification and accreditation Organisation Articles of Association for PEFC Norway Forest certification PEFC N 01 Norwegian PEFC certification system for sustainable forestry
More information