Application for connection to YJS CUG and Hub (v6.0)

Size: px
Start display at page:

Download "Application for connection to YJS CUG and Hub (v6.0)"

Transcription

1 Application for connection to YJS CUG and Hub (v6.0) Name of Local Authority / Applicant organisation Contact Name Position Address Telephone: I/We wish to apply for connectivity to the Youth Justice System Closed User Group (YJS CUG). In accordance with the terms and conditions of connection, the following information is now supplied: 1. (See clause 13 / Note 13) A requirement of connection is that the management of the remote systems and networks is compliant with the requirements of ISO/IEC To this end, please state the date of last review carried out, and the date when your next compliance review is planned Date of last review Date of next review (It is implicit in this statement that any shortcomings highlighted by the review will be remedied.) 2. We understand and can confirm compliance with all elements of the Terms and Conditions of connection which are attached to this document subject to the qualifications and areas of noncompliance highlighted in the attached covering letter dated [ ] and signed by [ ] for and on behalf of [ ] Local Authority. Signature Name (please print) Date Position On behalf of : (Organisation name) Return to: Wiring up Youth Justice ICT Admin YJB, 11 Carteret Street London, SW1H 1DL Page 1 of 8

2 Terms & Conditions for Connection to YJS CUG and Message Exchange Statement of requirement 1. The connecting authority will ensure that information requested through the YJS CUG system is used only for valid business purposes, and will be proactive in ensuring that YJB services are not abused or misused. The connecting authority will ensure that all users in its organisation comply with the Data Protection Act and applicable professional codes of conduct in order to ensure that all information including that classified as RESTRICTED is treated as the originator intended. The connecting authority acknowledges that any breach of these provisions may result in access to YJS CUG networks and facilities being suspended or terminated. 2. The connecting authority will install and manage a case management server for use by Youth Offending Team (YOT) personnel and take necessary steps to restrict access to those with a need to know. The connecting authority will inform YJS CUG administrators of the internal server address used by that server. 3. As a condition of connection to the YJS CUG, the connecting authority will either permit the installation upon its premises of a dedicated encryption device which will be supplied by, and remotely managed by, YJS CUG personnel, or supply a dedicated IP address from the connecting authorities GCSx network range. 4. The internal network linking the YOT Case Management server to the YJS CUG device shall if possible be an Ethernet or similar wired network. If a Wireless Local Area Network (LAN) is to be employed, directly or indirectly on the same network, it shall comply with, or exceed, the minimum standards outlined in Appendix A. In case of doubt, the matter should be referred to the YJS CUG Administrators. 5. The connecting authority agrees to notify and coordinate with the WUYJ Technical Services Manager of all planned changes to the organisation s technical infrastructure that could impact access to, or could impact the integrity of, the YJS CUG connection and service or any other investments made by the YJB in Youth Justice System information systems (notably Connectivity, easset, Secure , YJ MIS, Remote Working). The connecting authority should present such proposed changes to the WUYJ Technical Services Manager for acceptability, compliance, compatibility and security testing. This includes, but is not limited to, changes to the LAN or WAN infrastructure, software changes to current case management systems which support YJB schemas and components or taking into live service any release of software with interfaces to YJB systems that is not listed on the YJB accredited product list. 6. The connecting authority will ensure that all members and employees of its organisation who are permitted access to the YJS CUG understand the conditions on which connection has been granted as set out in this document. 7. In the event of a breach, or suspected breach, the connecting authority understand that as a part of this agreement the YJS CUG Administrators reserve the right to initiate an investigation into the incident and that the cooperation of connecting organisations is necessary. 8. The connecting authority confirms that in the event of a suspected security breach or security breach they will provide any assistance necessary to locate the source of the breach and fully assist the YJS CUG Administrations in any investigation. 9. The connecting authority confirm that all users of its IT systems: are authorised users and can be individually identified by having unique user names and passwords (passwords should be a minimum of 8 alphanumeric characters and changed at least every 90 days) are instructed not to share their user credentials, and that if any user credential is compromised it will be changed as soon as possible. Page 2 of 8

3 10. The connecting authority will ensure that only users with a documented and approved requirement to access YOT case management services and thus the YJS CUG will be able to do so. A record of approved users will be held by the end user organisation, but made available to the YJS CUG Accreditor if required. User management processes will ensure that only current, valid user accounts exist within the system. 11. The connecting authority will not transmit information through the YJS CUG and /or YJS Hub that it knows, suspects, or has been advised is of a higher level of sensitivity than the service is designed to carry (that is, RESTRICTED material). If a case warranting a higher Protective Marking may be encountered, processing of that case will be handled separately. 12. The connecting authority confirms that its organisation has secure data storage facilities; and that its data archiving and retention policies are consistent with the nature of the data stored. 13. The connecting authority confirms that an appropriate business-focused risk assessment of its computer systems and regular reviews/audits of the IT infrastructure (e.g. to BS7799/ISO17799) have taken place or is planned. 14. The connecting authority confirms that its organisation prevents unescorted visitors from entering areas of its premises where IT systems are held, including those that have access to the YJS CUG. 15. The connecting authority confirms that portable computers or devices that will be used for sending/receiving YJS CUG data or for storing RESTRICTED data is appropriately protected against unauthorised use by encryption/ passwords/ physical locks/ removable disks or memory or other similar devices. 16. The connecting authority confirms that its networks are adequately protected against external interference, and that the mechanisms employed are frequently monitored and maintained. 17. The connecting authority confirms that all servers used to run case management software and access the YJS CUG are running an up-to-date anti-virus package with regular and frequent updates being applied. 18. The connecting authority confirms that operating system updates and security patches are regularly applied to all servers and client machines used to access the YJS CUG. This will include all case management software patches. 19. The connecting authority recognises the guidelines for the use of Data Collection solutions, and confirms that solutions adopted will be compliant. If there is any doubt what this means, the connecting authority will consult YJS CUG Administrators. Page 3 of 8

4 Appendix A: Terms and Conditions Notes General The YJS CUG is managed and administered by the Youth Justice Board for England and Wales (YJB) on behalf of the Youth Justice System (YJS). The YJS CUG is a secured network for providing interconnection between the various parties that make up the Youth Justice Service / System; these include YOTs, the YJB, other CJOs and the secure estates. It is necessary that each part of the user community plays their part in maintaining the security of the overall system, and certain requirements are of necessity placed upon the connecting organisation although these are kept to a minimum. 1. All information being passed between the Local Authority, YJS CUG, or end user is for official use only and should not be exposed to a wider circulation than strictly necessary for the official purpose. Certain information will be of a personal nature and subject to the Data Protection Act 1998 (DPA). Information of a sensitive nature may be marked as RESTRICTED* by government departments or other agencies although not all connecting organisations adhere to the Government s Protective Marking scheme. Information which does not contain any protective marking should therefore be examined and depending upon content it should be regarded as sensitive information and handled appropriately. The YJS CUG and Hub will treat all information as RESTRICTED whilst it is within its domain. * Restricted information, for the purpose of this agreement, is defined as criminal justice / youth justice sensitive business information (that may or may not bear the Government Protective marking of RESTRICTED), the unauthorised disclosure of which would :- cause substantial distress to individuals; prejudice the investigation or facilitate the commission of crime; breach proper undertakings to maintain the confidence of information provided by third parties or undermine the proper management of the public sector and its operations 2. In order to ensure that any information received via the YJS CUG is adequately protected and available only for the stated purpose, and that other connecting organisation information cannot be sent or accessed via the YJS CUG, the server upon which Youth Offending information is stored and processed should be dedicated to the task, and not shared with other services. The YJS CUG connection device (see 3 below) will only accept traffic from the connecting organisations case management server IP address. The network managers in the connecting organisation are required to notify the YJS CUG administrators of the internal address of this server in order that they may set the connectivity and security parameters appropriately. If the case management server(s) is not dedicated to that sole purpose, the YJS CUG Accreditor will need to be satisfied that an equivalent strong separation exists within the system. Such that the YJS CUG connection and YOT case management data and systems cannot be accessed by parties other than YOT personnel. 3. In order to protect the integrity of the YJS CUG and YJS Hub and also to protect connecting organisations, the YJB will either provide an Internet-connected encryption device or use the connecting authorities Government Connect (GCSx) network connection to provide the secure link to the YJS Message Exchange. The encryption device will be installed to provide a direct connection between the YOTs case management server and the YJS Message Exchange. The encryption device will require a fixed public IP address upon the Internet and a fixed internal IP address upon the backend. In order to configure the device, the YJS CUG Administrators will need to be aware of these IP addresses as well as the internal IP address of the YOT case management server(s) and any other intermediate connection information dependent upon the type of connectivity offered. If the secure connection from the YOT case management server to the YJB CUG is to be made via the Government Connect GCSx network, the YJB require a separate, dedicated, IP address feed into the connecting authorities GCSx network. The YJS CUG Administrators will need to be aware of the GCSx IP Page 4 of 8

5 address as well as the internal IP address of the YOT case management server(s) and any other intermediate connection information dependent upon the type of connectivity offered. Further technical information can be obtained from the YJS CUG Administrators. 4. The security assessment of the YJS CUG assumes that the network structure of the connecting authority is hard-wired. Early wireless LAN (WLAN) installations were notoriously insecure, and although modern WLAN installations are much improved, the YJS CUG Accreditor will wish to have detail of the particular WLAN installation not compliant with at least the minimum standard below for reassurance that the security assessment is not affected by the presence of WLAN in the network. As a minimum, the WLAN should be protected by WPA2 using either certificate or shared-key. Traffic encryption should be enforced at its highest possible level, but at least 128bit AES. Only authorised and authenticated users must be allowed access to the system where practical, Access Control Lists should be used as a control mechanism. All default username and password combinations should be changed or removed from the devices, which should be managed by suitably-qualified support staff from a secure network management centre. Wireless access points should be controlled to keep the network signals within building boundaries, and the WLAN should not be used to link buildings across public spaces. The WLAN should not broadcast its identity. Internal IP addresses or other details of the Wireless devices should not be revealed unnecessarily. 5. The installation of the crypto device to facilitate a connection to the YJS CUG, and the initial acceptance of the code of connection, will have reassured the YJS CUG Accreditor of the security of the installed link and that the risk to the YJS CUG as a result of the connecting organisation s presence is acceptable. The connecting authority should not deploy technical infrastructure changes which would impact access to, or could impact the integrity of YJS services. Any change of circumstance within the systems and networks of the connecting organisation which affects the YJS CUG connection and service or any other investments made by the YJB in Youth Justice System information systems (notably Connectivity, easset, Secure , YJ MIS, Remote Working) and/or changes (or may change) the security assessment should be presented to the WUYJ Technical Services Manager. This process will enable assessment and proving of service and connectivity and also allow for the security impact of proposed changes to be assessed to preserve the investments made in information sharing. 6. It is a requirement that all staff within the connecting organisation that is permitted to use the YJS CUG for any purpose understand the conditions under which connectivity is granted, and undertake personally not to abuse the system or the information supplied, or circumvent any security measures put in place. I.e. staff with access to the YOT Case Management System(s). This must be implemented as a part of induction training and staff awareness programmes. Management must be aware of their responsibility to enforce compliance with this requirement. 7. Any actual or suspected breach of security is a potential risk to all participants in the YJS CUG, and YJS CUG Administrators will wish to investigate and correct any problem. In doing so, it is important that the connecting organisation and their technical staff offer assistance if required. If a security breach is found to have occurred within the connecting organisation, or as the result of accidental or deliberate action of the staff of the connecting organisation, the investigation will be passed to the connecting organisation to be resolved. The YJS CUG Administrators will notify all connecting parties of any security breach. 8. A necessary part of any investigation carried out under the terms of note 7 above is accurate record keeping by all parties. The YJS CUG Administrators will maintain traffic records relating to all traffic flowing through the YJS Hub system. It is expected that the connecting organisation will maintain logging on their systems at a level which would enable the investigating officers to follow a suspect message to its source or destination the connecting organisation. The connecting organisation should maintain these records for a minimum period of one calendar month after which they may be destroyed if not required from any other purpose. 9. It is a requirement of the YJS CUG that within the connecting organisation the actions of individual members of staff are traceable. In practice, this means that each user of the system shall have an Page 5 of 8

6 individual logon identity and password, to which the individual alone shall have access. Group accounts should not be used for access to the YOT case management system (and YJS CUG), and neither should a single dedicated terminal, under a generic user name, be used for the purpose. Staff in the connecting organisation should be told that the sharing of identities and passwords is not permitted. This is necessary in order to undertake any investigation outlined in Para 7, which requires the ability to trace a suspect transaction to the individual generating it. 10. In order to ensure that only appropriate members of staff within the connecting organisation have access to information supplied through the YJS CUG, the connecting organisation shall ensure that access to the appropriate server and case management software is controlled and that a list is maintained of those having access. A formal process should exist in order to grant an individual user access to the system. If an individual user resigns or moves on, his access right should be revoked, and a formal modification process must be in place to ensure that this happens. The YJS CUG Administrators may wish to be assured that adequate processes are in place. 11. The YJS CUG is an accredited system which is designed to handle material which is protectively marked to the government classification of RESTRICTED and can be safely used for most personal information or other official information which fits within the definition of that classification level. Any material of a more sensitive nature which properly falls within the definition of a higher classification cannot be transmitted across the YJS CUG. Such information will not be adequately protected, and the presence of premium information may increase the risk of attack against the network to the detriment of the service as a whole. Connecting organisations are asked to make sure that their users understand this requirement. 12. The YJS CUG is designed to provide secure delivery mechanisms for information which is sensitive or protectively marked as detailed in Note 11 above. It is the responsibility of the connecting organisation to protect this information in an appropriate manner once received. This will imply that such information will be stored in ways which restrict access to those with a need to know the content of the information, that the information will not be placed in any open data repository and that it will be securely deleted when no longer required. 13. All connecting organisations are expected to be compliant with standard ISO/IEC 17799, which is the international standard for information security management. This standard defines a common approach to the management of information security, and ensures that all organisations are operating to the same minimum standard. Local authorities were also obliged to comply with the security standard by 2005 as part of their Implementing Electronic Government (IEG) requirements. The requirement that all participants connecting to YJS CUG are compliant with the standard also assists in building confidence that information can be shared without unnecessary risk. 14. Information supplied by means of the YJS CUG may be of a sensitive nature, and access to this information is controlled. A part of this control is that visitors within the connecting organisations premises should not be offered the opportunity to misuse equipment or view information by being offered unescorted access. All visitors to areas where this information is available, and who are not employees of the connecting organisation should be escorted at all times. 15. In many offices, users may be supplied with portable computers which enable them to connect remotely to their place of work. In this case, it may be possible for end-users to receive, download, or transmit information via the YJS CUG and that information should be protected whilst at the user's laptop or portable device. Because of the likelihood of theft or loss, and the difficulty in maintaining full access control of portable devices at all times, special precautions need to be taken with all sensitive information including that supplied through YJS CUG. There are many mechanisms available in the market place to assist organisations in this, and it is not the intention to dictate any specific solution. However, if the connecting organisation intends providing a remote access solution for users with access to YJS CUG, the YJS CUG Administrators may wish to know which precautions are in place and to be assured that the information which is supplied is adequately protected. 16. It is expected that the network services of the connecting organisation which are externally facing will be protected by some suitable mechanism and most commonly a firewall security solution. This is Page 6 of 8

7 assumed to be the case when considering the risk profile of the YJS CUG. Any applicant for connectivity who has an alternative approach to network protection should discuss this with the YJS CUG Administrators. 17. It is expected that the connecting organisation will run appropriate antivirus software on their network servers and client computers. It is mandated for servers providing connectivity to the YJS CUG. The chosen antivirus product should be updated regularly to ensure that all information passed to the YJS CUG and connecting organisations is virus free. 18. In order to reduce vulnerabilities of systems within the connecting organisation it is expected that all servers and networked devices are routinely patched to the latest relevant patch state. A failure to do so may permit exploitation through known vulnerabilities which will damage the system of the connecting organisation and may additionally endanger the security of the YJS CUG. Connecting organisations are therefore asked to confirm that they apply relevant updates regularly. 19. Following a security review of Digital Pens and Citrix / 3G solutions the following guidelines on technology used in automated information-gathering should be taken into account: If a local authority has developed or intends to develop an alternative solution to this problem, the solution must be evaluated by YJS CUG Administrators prior to use as a part of the wider YJS CUG network. Several solutions have been evaluated and passed by YJS CUG Security Accreditors as part of the Wiring up Youth Justice Programme: (a) (b) (c) The Bradford Solution to remote working is based upon a thin client terminal server solution, in their case a tablet PC employing a CITRIX service. The tablet PC connects via a 3G mobile phone card. This operates across an encrypted VPN (Virtual Private Network) which uses a 6-digit Secure-ID token as part of the authentication process. This solution, and others similar, is secure for use within YJS provided that users are made aware of the need to keep tokens and access information safe, and that the technical teams keep software at its latest patch state. The Leeds Solution to remote working is built upon a digital-pen with which written material can be captured and subsequently transmitted by mobile phone. It is secure under normal circumstances provided that the mobile phone being used is supplied by the local authority and has a control over the Bluetooth settings to avoid promiscuous sharing of data, and of software installed upon it. Another requirement would be that data is not downloaded to the phone until transmission of the information is about to take place. This solution and others similar to it may be used in normal circumstances provided that, where cases are particularly sensitive, alternative arrangements for transmission of the data should be made. Other solutions to remote data capture may be added to this list from time to time. Page 7 of 8

8 Document Control Date Version Change Reference 09/10/ Initial approved version 19/03/ /07/ Cover page updated to cater for recording that supplementary documentation has been provided to support the submitted Code of Connection Clause 5 updated to clarify the scope of changes to local authority infrastructure which should be notified to the WUYJ Technical Service Manager. Page 8 of 8

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

Company Policy Documents. Information Security Incident Management Policy

Company Policy Documents. Information Security Incident Management Policy Information Security Incident Management Policy Information Security Incident Management Policy Propeller Studios Ltd is responsible for the security and integrity of all data it holds. Propeller Studios

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

GDPR Draft: Data Access Control and Password Policy

GDPR Draft: Data Access Control and Password Policy wea.org.uk GDPR Draft: Data Access Control and Password Policy Version Number Date of Issue Department Owner 1.2 21/01/2018 ICT Mark Latham-Hall Version 1.2 last updated 27/04/2018 Page 1 Contents GDPR

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Mobile Computing Policy

Mobile Computing Policy Mobile Computing Policy Overview and Scope 1. The purpose of this policy is to ensure that effective measures are in place to protect against the risks of using mobile computing and communication facilities..

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

Schedule Identity Services

Schedule Identity Services This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth

More information

IT Security Standard Operating Procedure

IT Security Standard Operating Procedure IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

ADIENT VENDOR SECURITY STANDARD

ADIENT VENDOR SECURITY STANDARD Contents 1. Scope and General Considerations... 1 2. Definitions... 1 3. Governance... 2 3.1 Personnel... 2 3.2 Sub-Contractors... 2 3.3. Development of Applications... 2 4. Technical and Organizational

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Computer Security Policy

Computer Security Policy Administration and Policy: Computer usage policy B 0.2/3 All systems Computer and Rules for users of the ECMWF computer systems May 1995 Table of Contents 1. The requirement for computer security... 1

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications

More information

The Data Protection Act 1998 Clare Hall Data Protection Policy

The Data Protection Act 1998 Clare Hall Data Protection Policy The Data Protection Act 1998 Clare Hall Data Protection Policy Introduction This document is a guide to the main requirements of the new Data Protection Act (DPA) that came into force on 24th October 2001.

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Data Protection Policy

Data Protection Policy The Worshipful Company of Framework Knitters Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act 1998 (DPA) [UK] For information on this

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Status: Released Page 2 of 7 Introduction Our Data Protection policy indicates that we are dedicated to and responsible of processing the information of our employees, customers,

More information

ISC10D026. Report Control Information

ISC10D026. Report Control Information ISC10D026 Report Control Information Title: General Information Security Date: 28 January 2011 Version: v3.08 Reference: ICT/GISP/DRAFT/3.08 Authors: Steve Mosley Quality Assurance: ISSC Revision Date

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Gatekeeper Public Key Infrastructure Framework. Information Security Registered Assessors Program Guide

Gatekeeper Public Key Infrastructure Framework. Information Security Registered Assessors Program Guide Gatekeeper Public Key Infrastructure Framework Information Security Registered Assessors Program Guide V 2.1 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work is copyright.

More information

Site Builder Privacy and Data Protection Policy

Site Builder Privacy and Data Protection Policy Site Builder Privacy and Data Protection Policy This policy applies to the work of the Third Age Trust s Site Builder Team. The policy sets out the approach of the Team in managing personal information

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

Information Security Policy for Associates and Contractors

Information Security Policy for Associates and Contractors Information Security Policy for Associates and Contractors Version: 1.13 Date: 11 October 2016 Reference: 67972761 Location: Livelink Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Credentials Policy. Document Summary

Credentials Policy. Document Summary Credentials Policy Document Summary Document ID Credentials Policy Status Approved Information Classification Public Document Version 1.0 May 2017 1. Purpose and Scope The Royal Holloway Credentials Policy

More information

A Homeopath Registered Homeopath

A Homeopath Registered Homeopath A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17 GUIDELINES ON SECURITY MEASURES FOR OPERATIONAL AND SECURITY RISKS UNDER EBA/GL/2017/17 12/01/2018 Guidelines on the security measures for operational and security risks of payment services under Directive

More information

Terms and Conditions for External accounts Service

Terms and Conditions for External accounts Service Terms and Conditions for External accounts Service You must read these Terms and Conditions before using External accounts service. IMPORTANT INFORMATION External accounts service is an account aggregation

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017 Wye Valley NHS Trust Data protection audit report Executive summary June 2017 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection Act

More information

Healing School - A Science Academy GDPR Policy (Exams) 2018/19

Healing School - A Science Academy GDPR Policy (Exams) 2018/19 Healing School - A Science Academy GDPR Policy (Exams) 2018/19 This policy is reviewed annually to ensure compliance with current regulations Author Date adopted by MAT Directors Mrs D Barnard Review Date

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security GLOBAL PAYMENTS AND CASH MANAGEMENT Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy Malpractice and Maladministration Policy Introduction This policy is aimed at our customers, including learners, who are delivering/registered on BCS approved qualifications or units within or outside

More information

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019 Ormiston Academies Trust E-Security policy Date adopted: Autumn Term 2018 Next review date: Autumn Term 2019 Policy type Author Statutory James Miller OAT DPO Approved by Exec, July 2018 Release date July

More information

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No PROPOSAL FORM Cyber Insurance Underwritten by The Hollard Insurance Co. Ltd, an authorised Financial Services Provider www.itoo.co.za @itooexpert ITOO is an Authorised Financial Services Provider. FSP.

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

1.3 More information about eduroam is available at the relevant eduroam Service Provider (ESP) website detailed in Schedule 1 of this document.

1.3 More information about eduroam is available at the relevant eduroam Service Provider (ESP) website detailed in Schedule 1 of this document. 1.0 Background to this document 1.1 This document sets out guidelines that cover the control of the supply and receipt of Internet access for educational purposes, that is primarily (but not exclusively)

More information

Grid Security Policy

Grid Security Policy CERN-EDMS-428008 Version 5.7a Page 1 of 9 Joint Security Policy Group Grid Security Policy Date: 10 October 2007 Version: 5.7a Identifier: https://edms.cern.ch/document/428008 Status: Released Author:

More information

UKIP needs to gather and use certain information about individuals.

UKIP needs to gather and use certain information about individuals. UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:

More information

Ulster University Standard Cover Sheet

Ulster University Standard Cover Sheet Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information

More information

Client Computing Security Standard (CCSS)

Client Computing Security Standard (CCSS) Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices

More information

Introduction to SURE

Introduction to SURE Introduction to SURE Contents 1. Introduction... 3 2. What is SURE?... 4 3. Aim and objectives of SURE... 4 4. Overview of the facility... 4 5. SURE operations and design... 5 5.1 Logging on and authentication...

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

CYBER SECURITY POLICY REVISION: 12

CYBER SECURITY POLICY REVISION: 12 1. General 1.1. Purpose 1.1.1. To manage and control the risk to the reliable operation of the Bulk Electric System (BES) located within the service territory footprint of Emera Maine (hereafter referred

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Digital Health Cyber Security Centre

Digital Health Cyber Security Centre Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

BT Compute Protect Schedule to the General Terms

BT Compute Protect Schedule to the General Terms BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service

More information

Telecommunications Equipment Certification Scheme FEBRUARY 2017

Telecommunications Equipment Certification Scheme FEBRUARY 2017 Telecommunications Equipment Certification Scheme FEBRUARY 2017 Canberra Red Building Benjamin Offices Chan Street Belconnen ACT PO Box 78 Belconnen ACT 2616 T +61 2 6219 5555 F +61 2 6219 5353 Melbourne

More information

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT AGREEMENT DATED [ ] BETWEEN: (1) SHELTERMANAGER LTD and (2) [ ] ( The Customer ) BACKGROUND (A) (B) (C) This Agreement is to ensure there is in place

More information

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Complying with RBI Guidelines for Wi-Fi Vulnerabilities A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines

More information