ICT Priority 1 Incident Handling

Size: px
Start display at page:

Download "ICT Priority 1 Incident Handling"

Transcription

1 ICT Priority 1 Incident Handling Target Audience Target Audience All Staff Version 1.0 October 2016

2 Ref. Contents Page 1.0 Introduction Purpose Objectives Process (09:00 hrs -17:00 hrs) Incident Handling - Within the First of 10 Minutes Within the First 20 Minutes Within 20minutes 30minutes Within 30minutes 45minutes Every 1 hour Until Resolved Post Incident Handling Priority 1 Escalation Flowchart in Hours Impact and Urgency Matrix Call Logging Standards Procedures connected to this Policy Links to Relevant Legislation Links to Relevant National Standards Links to other Key Policies Roles and Responsibilities for this Policy Training Equality Impact Assessment Data Protection and Freedom of Information Monitoring this policy is working in practice 15 Version 1.0 October

3 Explanation of terms used in this policy Priority (P1) - an unplanned critical event that satisfies any of the following criteria: Any faults that prevent the effective use of any major ICT services and or prevents absolutely necessary business transactions for example: Total loss of , Internet, EHR, Oasis, Site down, etc. Version 1.0 October

4 1.0 Introduction The ICT Service Desk is the first point of contact for the support of ICT services for all Black Country Partnership NHS Foundation Trust users of IT. The ICT Service Desk handles all queries from customers and third party suppliers including fault reports, assistance with services, requests for change and enhancements to I.T services. All requests for assistance should first be logged with the ICT Service desk, which will manage the calls to resolution. Calls will be categorised as either Incidents or Service Requests. In general, resolution of incidents takes precedence over fulfilment of service requests. 2.0 Purpose The purpose of this policy is to define the actions, communications and escalation steps that are to be used to manage a Priority 1 incident for all staff within ICT Services. 3.0 Objectives To Identify the trigger Information To define what is a Priority 1 Incident 4.0 Process (09:00 hrs -17:00 hrs) This process must be followed when Service Desk Engineers receive a Phone call, , System Alert, Web Portal incident or have been assigned an incident which meets the criteria of a Priority 1 Incident. This includes when an incident is either initially logged as a Priority 1, or if an existing incident is escalated to a Priority 1 from a lower priority. It is to be followed in its entirety and no stages are to be bypassed or omitted. Failure to follow this policy can cause significant delays to our users and may lead to disciplinary action. 4.1 Incident Handling - Within the First of 10 Minutes 1. An Incident is logged with the Service desk either via phone/ /self service Portal by the affected Service Area, by Proactive Alarm or by phone/ from a third party support vendor i.e. Virgin media, BT etc. 2. The initial prioritisation and categorisation of the incident should be performed using the Impact and urgency matrix below inline the agreed minimum data set that is required when logging all incidents Impact Service Impacted Department Impacted Employee Impacted Urgency High P1 P2 P3 Med P2 P3 P4 Low P3 P4 P5 (**see Impact and urgency Matrix for and the agreed Minimum Data Set) 3. The Service desk Engineer who logs the Incident is to verbally confirm with 2 nd Line Service desk Engineers that the incident is a Priority 1 and agree an incident owner. This is required before effective handover Version 1.0 October

5 4. The Service desk Engineer informs ICT Services via using the P1 Notifications Distribution List that a Priority 1 Incident has been raised and provides an initial Response and Resolution timescale 5. The Incident Owner (2 nd Line Service desk Engineer) is required to perform all suitable diagnostic tests using the available tools to ascertain as much detail as possible on the critical fault. The Incident Owner records all actions and activities performed throughout lifecycle of incident, and should always be kept up to date of what is happening with the incident. The Incident Owner is the main information point for all parties involved both internally and externally. At this stage an initial SOA (Service Outage Analysis) Form is completed with all information known at this point, and added to the SOA index. The SOA is to be completed on the incident resolution and saved to the Draft SOA folder as per SOA instructions 4.2 Within the First 20 Minutes 6. The Incident Owner liaises with the relevant Technical Specialists providing the master incident record number (Ticket Reference), summary of the issue, how many customers are affected and what the business impact is. Priority 1 investigation and diagnosis takes precedence over any work assigned to all Technical Specialists, until a Lead Technical Specialist is established. The Lead Technical Specialist takes full responsibility for site visits, remote work and ultimately the resolution of the incident 7. The Incident Owner contacts the following managers in the order listed below. (Preferably in person or by phone) I. ICT Service Desk Coordinator II. ICT Service Delivery Manager III. ICT Network Manager IV. ICT Technical Support Team Leader V. ICT Services Manager The ICT Management team will decide who the escalation manager will be for this incident. The Escalation Manager has the responsibility for organisational wide communications. The Escalation Manger is also responsible for the escalation of the incident both internally and externally with all involved parties. The Escalation Manager is responsible for the co-ordination and delivery of hourly updates if required, using suitable communication channels, both in terms of organisational wide communications, customer specific communications and system owner communications 8. The Escalation Manager has full jurisdiction over all of the ICT Services resources and assets including Service Desk Engineers, ICT Support officers, Asset officers, and Senior Technical Support Engineers 9. The Incident Owner is to ensure that all of the individuals identified below have been made aware that they are being named. The Incident Owner will then the Priority 1 notifications distribution list & System Owners informing them of: a. Incident Number: b. Site Name: c. Description of Problem: d. Incident Owner: e. Lead Technical Specialist: f. Escalation Manager: Version 1.0 October

6 4.3 Within 20minutes 30minutes 10. The Incident Owner contacts via /phone all users associated with the incident, ascertaining who should be kept up to date on progress of the incident and include the associated users in to the main list. If multiple sites are affected there should be at least one nominated user from each site. (Recommend to nominate main reception staff for updates) 11. The Incident Owner adds all additional users into the association of the incident record within the Service Desk Incident Management System (Kayako). The Incident Owner is to keep the primary association as the first person who initially reported the issue unless instructed otherwise by a member of the ICT Services Management Team 12. The Lead Technical Specialist attempts to resolve the incident remotely during this period, if a solution is not possible remotely or further investigation required then Lead Technical Specialist MUST visit the site/location in question 13. The Incident Owner contacts any external providers i.e. N3, BT, Virgin, NHS.net informing the 3 rd party vendor of the incident and logs an incident with the 3 rd party vendor for investigation. The incident owner should always provide the 3 rd party vendor with our local incident reference number 14. The Escalation Manager, Incident Owner and Lead Technical Specialist discuss the probable underlying cause of the incident, and review any possible solutions or workarounds, Estimated a resolution time, prepare initial communications that are to be sent to the all of the affected customers informing them of the issue at hand, what is affected and where is affected 4.4 Within 30minutes 45minutes 15. The Lead Technical Specialist investigates the root cause of the incident, defining where this resides and whether internal or external support is required. i.e. is the issue with a faulty switch, router issue, server failure, power failure 16. The Incident Owner receives timely updates from Lead Technical Specialist as to the root cause of the incident and updates the Escalation Manager and any external party vendors that are involved. The Incident Owner is to maintain an accurate log of times of conversations and relevant information in the Master Incident Record on the Service Desk Incident Management System - Kayako (this could be the initial Incident or may be changed to a Problem record) 17. The Incident Owner and Escalation Manager discuss sending incident specific communications to all associated customers/staff detailing where the root cause is believed to be at this time, informing them that an engineer is onsite working on the issue and also that we are working alongside any relevant external parties. The communication should include the expected resolution time or the time of the next update. If an estimated resolution time cannot be provided then Communications must state this and so that customers can initiate their relevant Business Continuity Procedures if required 18. The Escalation Manager informs the Priority 1 Notifications distribution list & System Owner on the root cause analysis and progress updates 19. The Escalation Manager assesses the complexity of the Priority 1 in question and if necessary raises a Lessons Learnt Document 4.5 Every 1 hour Until Resolved 20. The Lead Technical Specialist updates the Incident Owner of the latest information on Site/Service issue. The Incident Owner updates the Master Incident Record and informs all Service Desk Engineers to assign any additional incidents that relate to this incident into the Master Incident or Problem record Version 1.0 October

7 21. The Incident Owner liaises with all involved 3 rd parties on what the latest updates are. The Incident Owner Discussing ETA s and escalates the incident both internally and externally where required. The Incident Owner should immediately inform the Escalation Manager if timescales are insufficient or the incident has stagnated 22. If there is a significant difference in information known and Incident content since the last update, the Incident Owner immediately updates the Incident and all associated items 23. The Escalation Manager s the Priority 1 Notifications distribution list & System Owner providing the latest updates on the incident so that all public facing staff have the latest relevant up to date information. Information should be given as: i. Internal Only (potentially sensitive information) ii. External (what users need to know) 24. The Escalation Manager updates any relevant external news items such as the Trusts intranet with latest information and incident content updates. 4.6 Post Incident Handling The Escalation Manager is responsible for setting up a post Priority 1 Incident meeting to discuss the Lessons Learnt Document if one was raised, the meeting can be a Telephone Conference call if a face to face meeting is not required. If no problems were encountered during the Priority 1 timeline then this meeting can be only a few minutes. The people below are required to attend such meetings: ICT Operations manager ICT Services Manager ICT Service Delivery Manager ICT Technical Support Team Leader ICT Network Manager Escalation Manager Lead Technical Specialist Incident Owner Any other IT associated staff required Version 1.0 October

8 4.7 Priority 1 Escalation Flowchart in Hours Priority 1 Escalation Flowchart In Hours Within 10 Minutes Within 30 Minutes Within 45 Minutes Every 60 Minutes Thereafter Helpdesk Alert Helpdesk Engineers Incident Owner Inform Managers, Technical Specialists of Issue Contact/Ascertain Associated Users and send out P1 to Dist List Contacts Relevant external Providers Incident Owner receives update from Technical Specialist Incident Owner liaises with all involved and ensures Master Incident is accurate and up to date sending comms where needed Technical Specialist Technical Specialist attempts remote Diagnosis Resolution Technical Specialist Investigates root cause and cascades Technical Specialist updates incident owner of latest Information Escalation Manager Escalation Manager Prepares Initial Comms Inform P1 Distribution list and System Owner Assess Complexity and if necessary raise Lessons Learnt Escalation Manager Cascades information internally to keep all updated Escalation Manager updates external news items with latest information Version 1.0 October

9 4.8 Impact and Urgency Matrix Version 1.0 October

10 4.9 Call Logging Standards 5.0 Procedures connected to this Policy There are no standard operating procedures currently connected to this policy. 6.0 Links to Relevant Legislation The Data Protection Act 1998 The Act came into force in 1984 and was updated in The Act sets out rules for people who use or store data about living people and gives rights to those people whose data has been collected. The law applies to data held on computers or any sort of storage system, even paper records. The law covers personal data such as your address, telephone number, address, job history etc. The main principles of the Act are: - If you collect data about people for one reason, you must not use it for a different reason; - You must not give people's data to other people or organisations unless they agree; Version 1.0 October

11 - People have the right to look at data that any organisations store about them; - You must not keep the data for longer than you need to and it must be kept up to date; - You must not send the data to places outside of the European Economic Area unless adequate levels of protection exist; - Organisations that store data about people must register with the Information Commissioner s Office; - If you store data about people you must make sure that it is secure and well protected; - If an organisation has data about you that is wrong, then you have a right to ask them to change it The Computer Misuse Act 2000 The Act is a law first introduced in 1990 to try to fight the growing threat of hackers and hacking. The law has three parts, it is a crime to: - Access a computer without permission there must be intent to access a program or data stored on a computer, and the person must know that this access is not authorised. This is why login screens often carry a message saying that access is limited to authorised persons: this may not prevent a determined and ingenious hacker getting access to the system, but they will not be able to claim ignorance of committing an offence - Access a computer without permission, with intent to commit a further offence there must be intent to access a program or data stored on a computer, and the person must know that this access is not authorised. This is why login screens often carry a message saying that access is limited to authorised persons: this may not prevent a determined and ingenious hacker getting access to the system, but they will not be able to claim ignorance of committing an offence - Change, break or copy files without permission Altering data as in the case of a nurse who observed a doctor entering his password and used it to alter patients' drug dosages and treatment records Removing data for instance to cover up evidence of wrongdoing Adding to the contents of a computer for instance it has been held that sending an under a false name results in unauthorised modifications to the content of the mail server The intent need not be directed at any particular computer, program or data, so this provision covers damage caused by computer viruses - even though the virus author need not have known or intended that any particular system would be affected. 6.1 Links to Relevant National Standards There are no relevant national standards linked to this policy. 6.2 Links to other Key Policies ICT Change Control Policy The purpose of this policy is to mitigate any risks associated with implementation of changes to the Trust ehealth systems. ICT and Internet Acceptable Use Policy The purpose of this policy is to clearly define the acceptable usage and standards that apply to all Trust and NHS and internet Systems by employees and all Version 1.0 October

12 other sponsored/ authorised individuals. ICT Remote Access Policy The aim of this policy is to set out the security measures, practices and restrictions in place to minimise the risks for connecting to Black Country Partnership NHS Foundation Trust s internal network from external hosts via remote access technology, and/or for utilising the Internet for business purposes via third-party Internet service providers. ICT Portable Devices and Portable Media Security Policy The aim of this policy is to ensure the security of the Black Country Partnership NHS Foundation Trust portable data devices. ICT Telecommunications Policy The purpose of this policy is to set out the key principles regarding the use of Telecommunications equipment within the Trust. ICT Security Policy The purpose of this policy is to provide management direction, support and outline how information security is managed throughout the Trust. The approach adopted conforms to ISO standard 27000, specifically relating to Information Security Management Systems (ISMS). The policy also aims to develop a positive culture of information security throughout the Trust. Version 1.0 October

13 7.0 Roles and Responsibilities for this Policy Title Role Key Responsibilities ICT Staff Adherence - have a responsibility to familiarise themselves with this policy and adhere to its principles - ensure they understand their responsibilities for priority 1 incidents and be accountable for their actions - compliance with all Trust policies is a condition of employment and a breach of this policy may result in disciplinary action - any breaches or incidents relating to this policy and area of practice are reported on DATIX, the Trust s electronic incident reporting system - if a member of staff has concerns about the way this policy is being implemented or about this area of practice in general, they should raise this with their line manager. If they feel unable to raise the matter with them, he/she may write to an Executive Director. If they feel unable to raise the matter with an Executive Director, he/she may write to the Chairman or a Non-Executive Director. If he/she is unsure about raising a concern or requires independent advice or support, they can contact:- - their Trade Union representative - the relevant professional body ICT Manager Information Governance Steering Group Director of Strategy, Estates and ICT Implementation Lead Scrutiny and Performance Executive Lead - the NHS Whistleblowing Helpline ensure a robust framework is in place so the Trust complies with national legislation and guidance relating to ICT security - ensure that Groups are fully informed of their role in maintaining the required standards of practice relating to Priority 1 Incidents - lead on strategies and innovations to improve more secure and efficient methods of mobile technology - policy lead/author of this policy - oversee the governance of information management across the Trust - receive incidents, breaches and specific issues in relation to the delivery, development and monitoring of ICT information management systems - review all policies, guidelines and procedures relating to information and ICT security systems - lead responsibility for the implementation of this policy - allocation of resources to support the implementation of this policy - Chair of the Trust s Information Governance Steering Group - any serious concerns regarding the implementation of this policy are brought to the attention of the Board of Directors Version 1.0 October

14 8.0 Training What aspect(s) Is this training covered in the Which staff groups of this policy will Trust s Mandatory and Risk How often will Who will ensure and If no, how will the Who will deliver the require this require staff Management Training Needs staff require monitor that staff have training be delivered? training? training? training? Analysis document? training this training? n/a n/a n/a n/a n/a n/a n/a 9.0 Equality Impact Assessment Black Country Partnership NHS Foundation Trust is committed to ensuring that the way we provide services and the way we recruit and treat staff reflects individual needs, promotes equality and does not discriminate unfairly against any particular individual or group. The Equality Impact Assessment for this policy has been completed and is readily available on the Intranet. If you require this in a different format e.g. larger print, Braille, different languages or audio tape, please contact the Equality & Diversity Team on Ext or EqualityImpact.assessment@bcpft.nhs.uk 10.0 Data Protection and Freedom of Information This statement reflects legal requirements incorporated within the Data Protection Act and Freedom of Information Act that apply to staff who work within the public sector. All staff have a responsibility to ensure that they do not disclose information about the Trust s activities in respect of service users in its care to unauthorised individuals. This responsibility applies whether you are currently employed or after your employment ends and in certain aspects of your personal life e.g. use of social networking sites etc. The Trust seeks to ensure a high level of transparency in all its business activities but reserves the right not to disclose information where relevant legislation applies. Version 1.0 October

15 11.0 Monitoring this policy is working in practice What key elements will be monitored? (measurable policy objectives) Where described in policy? How will they be monitored? (method + sample size) Who will undertake this monitoring? How Frequently? Group/Committee that will receive and review results Group/Committee to ensure actions are completed Evidence this has happened All incidents relating to noncompliance and / or breaches in security arising from remote access 4.0 Process DATIX, the Trust s electronic incident reporting system ICT Department Annually Information Governance Steering Group Information Governance Steering Group Reports and Minutes of meetings Version 1.0 October

16 Policy Details Title of Policy Unique Identifier for this policy State if policy is New or Revised Previous Policy Title where applicable Policy Category Clinical, HR, H&S, Infection Control etc. Executive Director whose portfolio this policy comes under Policy Lead/Author Job titles only Committee/Group responsible for the approval of this policy Month/year consultation process completed * Month/year policy approved Month/year policy ratified and issued Next review date Implementation Plan completed * Equality Impact Assessment completed * Previous version(s) archived * Disclosure status Key Words for this policy ICT Priority 1 Incident Handling Policy BCPFT-ICT-POL-07 New n/a ICT Director of Strategy, Estates and ICT ICT Manager Information Governance Steering Group August 2015 February 2016 October 2016 October 2019 Yes Yes Yes B can be disclosed to patients and the public ICT, P1 * For more information on the consultation process, implementation plan, equality impact assessment, or archiving arrangements, please contact Corporate Governance Review and Amendment History Version Date Details of Change 1.0 Oct 2016 New policy for BCPFT Version 1.0 October

ICT Portable Devices and Portable Media Security

ICT Portable Devices and Portable Media Security ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data

More information

DATA PROTECTION SELF-ASSESSMENT TOOL. Protecture:

DATA PROTECTION SELF-ASSESSMENT TOOL. Protecture: DATA PROTECTION SELF-ASSESSMENT TOOL Protecture: 0203 691 5731 Instructions for use touches many varied aspects of an organisation. Across six key areas, the self-assessment notes where a decision should

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Stopsley Community Primary School. Data Breach Policy

Stopsley Community Primary School. Data Breach Policy Stopsley Community Primary School Data Breach Policy Contents Page 1 Introduction... 3 2 Aims and objectives... 3 3 Policy Statement... 4 4 Definitions... 4 5 Training... 5 6 Identification... 5 7 Risk

More information

Information Security Strategy

Information Security Strategy Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone

More information

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017 GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Information Governance Incident Reporting Procedure

Information Governance Incident Reporting Procedure Information Governance Incident Reporting Procedure : 3.0 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 15 th February 2016 Name of originator /author (s): Responsible Committee /

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Information Governance Incident Reporting Policy

Information Governance Incident Reporting Policy Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator

More information

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017 Wye Valley NHS Trust Data protection audit report Executive summary June 2017 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection Act

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of

More information

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

A Homeopath Registered Homeopath

A Homeopath Registered Homeopath A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy Malpractice and Maladministration Policy Introduction This policy is aimed at our customers, including learners, who are delivering/registered on BCS approved qualifications or units within or outside

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

Policy. Business Resilience MB2010.P.119

Policy. Business Resilience MB2010.P.119 MB.P.119 Business Resilience Policy This policy been prepared by the Bi-Cameral Business Risk and Resilience Group and endorsed by the Management Boards of both Houses. It is effective from December to

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

Information Security Incident

Information Security Incident Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Version 1 Version: 1 Dated: 21 May 2018 Document Owner: Head of IT Security and Compliance Document History and Reviews Version Date Revision Author Summary of Changes

More information

Guardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY

Guardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY 1. Statement of Policy (Guardian) needs to collect and use certain types of information about the Individuals or Service Users with whom they come into contact in order to carry on our work. This personal

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

LOGGING AND AUDIT TRAILS

LOGGING AND AUDIT TRAILS LOGGING AND AUDIT TRAILS Policy LOGGING AND AUDIT TRAILS - POLICY TMP-POL-LAT V3.00-EN, 26/06/2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 Document Purpose... 3 1.2 Target Audience...3 1.3 Business Context...4

More information

National College for High Speed Rail DATA BREACH NOTIFICATION PROCEDURE

National College for High Speed Rail DATA BREACH NOTIFICATION PROCEDURE National College for High Speed Rail DATA BREACH NOTIFICATION PROCEDURE Document Reference Version Author Owner Workstream / Business area Classification Approval Level Version approval date Review schedule

More information

Information Technology Access Control Policy & Procedure

Information Technology Access Control Policy & Procedure Information Technology Access Control Policy & Procedure Version 1.0 Important: This document can only be considered valid when viewed on the PCT s intranet/u: Drive. If this document has been printed

More information

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL User Guide Name Amendment Version Reviewed by. Approved by. Lisa Whimperley Initial document Peter Kane Peter Kane creation. 31/10/2017 The Hartree Centre

More information

Introduction to the Personal Data (Privacy) Ordinance

Introduction to the Personal Data (Privacy) Ordinance Introduction to the Personal Data (Privacy) Ordinance Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the Ordinance

More information

Statutory Notifications

Statutory Notifications Registration under the Health and Social Care Act 2008 Statutory Notifications Guidance for registered providers and managers of NHS GP and other primary medical services May 2013 Statutory notifications

More information

Eco Web Hosting Security and Data Processing Agreement

Eco Web Hosting Security and Data Processing Agreement 1 of 7 24-May-18, 11:50 AM Eco Web Hosting Security and Data Processing Agreement Updated 19th May 2018 1. Introduction 1.1 The customer agreeing to these terms ( The Customer ), and Eco Web Hosting, have

More information

NHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy

NHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy NHS Ayrshire & Arran Organisation & Human Resource Development Policy Appropriate Use of IT Facilities Policy Version: 1.5 Date Approved: 2016-01-25 Author: Dept O&HRD, IT Security & Review date: 2018-01-25

More information

Use of and Instant Messaging (IM) Policy

Use of  and Instant Messaging (IM) Policy Use of Email and Instant Messaging (IM) Policy Name of Author and Job Title: Mike Cavaye, IT & Digital Consultant Name of Review/Development Body: IT Services Ratification Body: Quality and Safety Group

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Hunsley Primary and Electronic Communications Policy

Hunsley Primary  and Electronic Communications Policy Hunsley Primary Email and Electronic Communications Policy This policy is applicable to Hunsley Primary Important: This document can only be considered valid when viewed on the school website. If this

More information

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018 1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess

More information

INFORMATION SYSTEMS SECURITY POLICY (ISSP)

INFORMATION SYSTEMS SECURITY POLICY (ISSP) INFORMATION SYSTEMS SECURITY POLICY (ISSP) Policy Number & Category IG 02 Information Governance Version Number & Date Version 3.7 February 2009 Ratifying Committee Date Approved March 2009 Next Review

More information

Policy on the Provision of Mobile Phones

Policy on the Provision of Mobile Phones Provision of Mobile Phones Policy on the Provision of Mobile Phones Originator name: Section / Dept: Implementation date: Date of next review: Related policies: Policy history: Roger Stickland Approval

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This

More information

Information Security Incident Reporting Policy

Information Security Incident Reporting Policy Information Security Incident Reporting Policy Date Published June 2016 Version 3 Last Approved Date 23 rd May 2018 Review Cycle 1 Year Review Date May 2019 Learning together; to be the best we can be

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013 Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal

More information

The Data Protection Act 1998 Clare Hall Data Protection Policy

The Data Protection Act 1998 Clare Hall Data Protection Policy The Data Protection Act 1998 Clare Hall Data Protection Policy Introduction This document is a guide to the main requirements of the new Data Protection Act (DPA) that came into force on 24th October 2001.

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Data Loss Assessment and Reporting Procedure

Data Loss Assessment and Reporting Procedure Data Loss Assessment and Reporting Procedure Governance and Legal Services Strategy, Planning and Assurance Directorate Approved by: Data Governance & Strategy Group Approval Date: July 2016 Review Date:

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Complaint Handling Procedure and Escalation Policy

Complaint Handling Procedure and Escalation Policy Complaint Handling Procedure and Escalation Policy COPYRIGHT STATEMENT This document is the property of Nottingham Rehab Ltd. and may not, without our express written consent, be copied in whole or in

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy )

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy ) Introduction This Policy applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers ("Site"), which

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

Network Account Management Security Standard

Network Account Management Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Network Account Management Security Number: Scope of this Document: Recommending Committee: Approving Committee: SS06 All Staff/ Services Users Joint Information Governance

More information

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ). PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our

More information

To be an active partner, always ready to improve by working with others

To be an active partner, always ready to improve by working with others Title of Report: Prepared By: Sponsor: Action Required: Statement of Assurance/Readiness Preparedness to Major Incidents Ben Cockerill, Emergency Planning Officer Kevin O Leary, Deputy Director of Operations

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

Information Governance Incident Reporting Policy and Procedure

Information Governance Incident Reporting Policy and Procedure Information Governance Incident Reporting Policy and Procedure Policy Number Target Audience Approving Committee IG007 CCG/GMSS Staff CCG Chief Officer Date Approved February 2018 Last Review Date February

More information

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies

More information

Made In Hackney Data Protection Policy Last Updated:

Made In Hackney Data Protection Policy Last Updated: Made In Hackney Data Protection Policy Last Updated: 16.05.2018 Definitions Charity GDPR Responsible Person Register of Systems Made In Hackney (MIH), a registered charity. means the General Data Protection

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST INFORMATION SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality assessment

More information

End User Terminal Service

End User Terminal Service Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Subcontracted Delivery Policy

Subcontracted Delivery Policy Subcontracted Delivery Policy Main points of policy 1. Background to the policy 2. Scope of the Policy 3. Policy Statement 4. Reasons for subcontracting 5. BCA contribution to improving own and subcontractor

More information

BOARD OF DIRECTORS (OPEN) Meeting Date: 14 th November 2018

BOARD OF DIRECTORS (OPEN) Meeting Date: 14 th November 2018 BORD OF DIRECTORS (OPEN) Meeting Date: 14 th November 2018 Open BoD 14.11.18 Item 14 TITLE OF PPER TO BE PRESENTED BY CTION REQUIRED Senior Information Risk Owner (SIRO) nnual Report Phillip Easthope,

More information

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION Introduction The IFFO RS Certification Programme is a third party, independent and accredited

More information

University Privacy Campaign. Introduction to the Personal Data (Privacy) Ordinance

University Privacy Campaign. Introduction to the Personal Data (Privacy) Ordinance University Privacy Campaign Introduction to the Personal Data (Privacy) Ordinance 1 Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

Policy on the Standardisation of Documentation

Policy on the Standardisation of Documentation Policy on the Standardisation of Documentation Policy Number Target Audience Approving Committee IMTD001 CCG Board members and staff CCG Executive Date Approved November 2013 Last Review Date July 2016

More information

BCS Specialist Certificate in Change Management Syllabus

BCS Specialist Certificate in Change Management Syllabus BCS Specialist Certificate in Change Management Syllabus Version 2.0 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales, CCEA or

More information

IDENTITY ASSURANCE PRINCIPLES

IDENTITY ASSURANCE PRINCIPLES IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance

More information

IT Service Level Agreement

IT Service Level Agreement The Glasgow School of Art IT Service Level Agreement September 2016 Policy Control Title IT Service Level Agreement Date Approved Sep 2016 Approving Bodies Executive Group Implementation Date September

More information

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.!

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.! enquiries@privacy.org.au http://www.privacy.org.au/ 28September2012 APFsubmission draftmandatorydatabreachnotification intheehealthrecordsystemguide. The Australian Privacy Foundation (APF) is the country's

More information

Castle View Primary School Data Protection Policy

Castle View Primary School Data Protection Policy Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Introduction WIT Diverse Campus Services Limited (herein after referred to as DCS) and/or its associated companies ( us or we ) have created this privacy statement to demonstrate

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

ITSM20F_Umang.   Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:

More information

WEST MIDLANDS POLICE Force Policy Document

WEST MIDLANDS POLICE Force Policy Document WEST MIDLANDS POLICE Force Policy Document POLICY TITLE: POLICY REFERENCE NO: Business Applications Inf/22 Executive Summary. In accordance with the HMG SPF Risk Management, West Midlands Police will ensure

More information

INFORMATION GOVERNANCE. Caldicott Approval Procedure

INFORMATION GOVERNANCE. Caldicott Approval Procedure NHS TAYSIDE INFORMATION GOVERNANCE Caldicott Approval Procedure Author: Peter McKenzie Review Group: Information Governance Group Review Date: September 2010 Last Update: September 2009 Document : NHST-ISC-CAP

More information

DETAILED POLICY STATEMENT

DETAILED POLICY STATEMENT Applies To: HSC Responsible Office: HSC Information Security Office Revised: New 12/2010 Title: HSC-200 Security and Management of HSC IT Resources Policy POLICY STATEMENT The University of New Mexico

More information

Information Governance Incidents Cyber Security Incidents and Near Misses Reporting Procedure

Information Governance Incidents Cyber Security Incidents and Near Misses Reporting Procedure Information Governance Incidents Cyber Security Incidents and Near Misses Reporting Procedure Procedure Number: IG05 Version: 2.3 Approved by: Information Governance Working Group Date approved January

More information

Dated 3 rd of November 2017 MEMORANDUM OF UNDERSTANDING SIERRA LEONE NATIONAL ehealth COORDINATION HUB

Dated 3 rd of November 2017 MEMORANDUM OF UNDERSTANDING SIERRA LEONE NATIONAL ehealth COORDINATION HUB Memorandum of Understanding for Joint Working by Ministry of Health and Sanitation, Ministry of Information and Communication on the Government of Sierra Leone ehealth Coordination Hub Dated 3 rd of November

More information

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

General Data Protection Regulation (GDPR) and the Implications for IT Service Management General Data Protection Regulation (GDPR) and the Implications for IT Service Management August 2018 WHITE PAPER GDPR: What is it? The EU General Data Protection Regulation (GDPR) replaces the Data Protection

More information

WIT Diverse Campus Services Ltd. Data Protection Policy

WIT Diverse Campus Services Ltd. Data Protection Policy WIT Diverse Campus Services Ltd. Data Protection Policy Introduction WIT Diverse Campus Services Limited and/or its associated companies ( us or we ) have created this privacy statement to demonstrate

More information