Mobile Phone Policy General Use
|
|
- David Joseph
- 6 years ago
- Views:
Transcription
1 Mobile Phone Policy General Use Author(s) Daniel Clifford, IT and Systems Project Manager Version 2.1 Version Date July 2013 Implementation/approval Date July 2013 Review Date July 2016 Review Body Policy Reference Number Information Governance Committee 223/tw/it/mp Version Date Status Amended By Changes /09/12 Final Sam Maddin New Policy Mubin Mullan 2.0 May 13 Draft Mubin Mullan Policy reviewed and put into new trust format Dan Clifford 2.1 June 13 Final Dan Clifford Revision of policy following Nursing feedback Page 1 of 13
2 Contents Policy Summary Introduction Scope Roles and Responsibilities Caldicott Guardian Senior Management Line Managers All Staff Patient & Visitors Policy Procedure CODE OF CONDUCT Areas of use Signage Patients & Visitors Staff EXEMPTIONS COMPLIANCE Training and Awareness Review Monitoring/Audit... 6 Appendices... 7 i. MHRA recommendations (as of June 2013)... 7 Sources of Evidence Equality Impact Assessment Policy Submission Form Page 2 of 13
3 Policy Summary This policy has been developed to ensure that all staff, patients and visitors are aware of the areas where the use of mobile phones is restricted or limited. 1. Introduction The Department of Health states that use of mobile phones in within NHS sites should be allowed, as long as their use does not affect: The safety of patients or other people Patients privacy and dignity The operation of medical equipment Interference from mobile phones can stop medical equipment from working properly, for example: dialysis machines defibrillators ventilators monitors pumps Loud ring tones and alarms on mobile phones can also be confused with alarms on medical equipment. This policy has been developed to ensure that all staff, patients and visitors are aware of the areas where the use of mobile phones is restricted or limited. 2. Scope This policy applies to all those working in the Trust, in whatever capacity. This policy also applies to staff that provide Trust services from non-trust sites e.g. General practice, children centres and schools. A failure to follow the requirements of the policy may result in investigation and management action being taken as considered appropriate. This may include formal action in line with the Trust's disciplinary or capability procedures for Trust employees; and other action in relation to other workers, which may result in the termination of an assignment, placement, secondment or honorary arrangement. This policy also applies to patients and visitors to the Trust whilst on Trust premises 3. Roles and Responsibilities 3.1 Caldicott Guardian Responsible for Patient Confidentiality across the Trust Ensures Mobile Phone policy is adhered to across the Trust 3.2 Senior Management All Senior Managers in the Trust must enforce this policy in their areas. 3.3 Line Managers Should ensure all current and future staff are instructed in this policy Page 3 of 13
4 3.4 All Staff All staff in the Trust must ensure that this policy is adhered to in all premises of the organisation 3.5 Patient & Visitors All Patients & Visitors on Trust premises must ensure that this policy is adhered to 4. Policy Procedure 4.1 CODE OF CONDUCT Areas of use Categories of mobile phone areas across the Trust can be split into three; Category 1 n Clinical areas/low risk patient areas (e.g. clinic waiting areas, corridors, reception areas), where mobile phones can be used by staff, patients and visitors alike. Category 2 Clinical Patient areas (e.g. general wards, departments, patient homes) where mobile phones can be used by staff, patients and visitors, but may be subject to local restrictions if their use is deemed to be affecting patient care, dignity or confidentiality. Category 3 Safety Critical Patient areas (e.g. Intensive Care/NICU/Theatres) Mobile phones must be switched off in these areas Signage Signage needs to be in place across all sites where the Trust provides services to indicate the code of conduct for usage as well as which category the area is and if mobiles can be used Patients & Visitors Patients and visitors mobile phones are their own responsibility when on Trust property. Patients and visitors must be mindful of moderation of tone, volume and language and may be informed if behavior is deemed disruptive. Telephone ringing and subsequent conversations may disrupt important patient/healthcare professional activities or may disturb and/or alarm patients who are resting Patient and visitors will not be allowed to charge mobile devices when on Trust property. Patients and visitors must switch phones to vibrate/silent in category 2 areas, if they wish to talk after 10pm or before 7am they must find a local category 1 area e.g. corridor Staff should advise patients who are leaving the ward to use their phone, or to smoke, that mobiles phone should NOT be used within 1m of active infusion pumps and monitors. Page 4 of 13
5 The use of camera phones may compromise patient confidentiality. The Maternity units may permit photos to be taken with a mobile phone, for example, parents with their newborn baby as long as no staff or other patients are in the photo. Patients and visitors using other devices (e.g. Laptop Computers/Tablets/Gaming Devices) enabled with wireless network capabilities must also apply to this code of conduct Staff Staff personal mobile phones are their own responsibility when on Trust property. Personal Mobiles must be kept on silent, unless working in a Category 3 area where they must be switched off. The only exemption being the staff member needs their phone on them for Trust business (e.g. consultant on call). Staff should not have their phones on them whilst in the clinical areas, they should be kept with other personal items e.g. handbag, backpack etc Staff must be mindful of moderation of tone, volume and language when using mobile phones on Trust premises Integral cameras/ document management functions within any form of personal mobile communication should never be used for clinical purposes. Charging of mobile phones is only allowed when using an official (t generic) phone charger that has a valid PET safety test certificate. Only spare power sockets can be used with an understanding that other devices will take priority where limited sockets are available. Mobile phone chargers will also have to be unplugged when not in use. It is an offence under the Road Traffic Act to use a handheld mobile phone whilst driving. Using a handheld mobile phone whilst driving on Trust business is not permitted. When staff are visiting clients/patients/service users in their own home phones should be placed on silent and phone calls not accepted during this time 4.2 EXEMPTIONS There are some special clinical circumstances where it is acceptable for mobile communication technology to be used where normally forbidden within this policy. These are considered to be: Senior on-call clinicians and managers who may need to be urgently contacted whilst in a patient area Where there is a clinical imperative that negates the use of all other means of communication Where there is an urgent need for translation at the bedside of a patient and no advocate is available to attend. Major incident declared. Staff who meet the criteria for a temporary exemption to the policy are politely asked to show consideration to the enforcement of the policy to NHS colleagues, patients and visitors. It is accepted that it is the circumstances at the time that dictate the clinical Page 5 of 13
6 imperative and as such people who are using their phones are requested to give consideration to politeness and professionalism. 4.3 COMPLIANCE The privacy and dignity of patients and compliance with health & safety is the duty of all staff, patients and visitors whilst on the hospital premises. For the reasons stated the Trust feels it is necessary from a clinical perspective that everyone complies with this policy. Patients or visitors who fail to adhere to the policy will be asked to leave the prohibited use area and security may be called if they become abusive or aggressive towards staff enforcing this policy, in line with the Trusts Violence & Aggression Policy. It should be noted the Trust does not accept the display of violence or aggression towards NHS staff whilst undertaking their work. Staff who fail to comply with the policy will be reported to their line manager and persistent breaches of the policy will be dealt with under the Trust s disciplinary procedure. 5. Training and Awareness This policy will be made available to all staff via the intranet and will also be placed on the Trust external website for the public and patients to see. Reference will be made to this policy at Induction of new staff members. 6. Review This Policy must be subject to review when any of the following conditions are met: The adoption of the Policy highlights errors or omissions in its content Where other policies/strategies/guidance issued by the Trust conflict with the information contained herein Where the procedural or guidance framework of the NHS evolves/changes such that revision would bring about improvement Three years elapse after approval of the current version 7. Monitoring/Audit Measurable Policy Objective Monitoring/Audit Frequency of monitoring Responsibility for performing the monitoring Monitoring reported to which groups/committees, inc responsibility for reviewing action plans Number of incidents of patients breaching the Record of this type of incident Six months Head of Patient Experience Patient Experience Committee Page 6 of 13
7 policy Number of disciplinary procedures brought as a result of failure Record from Human Resources Six Months Head of Employee Relations Workforce Committee Appendices i. MHRA recommendations (as of June 2013) Summary Healthcare providers should actively manage the use of the radio frequency spectrum in their own sites. This includes considering areas where medical devices will not be affected and therefore no restrictions apply and other areas where authorised staff can use communication devices authorised by the hospital. Report incidents to the MHRA when a medical device is suspected to have suffered electromagnetic interference. Further technical information The International Organisation for Standardization (external link) has published a technical report; ISO TR 21730:2005 'Health informatics - use of mobile wireless communication and computing technology in healthcare facilities - recommendations for the management of electromagnetic interference with medical devices'. Some points taken from this report: Misinformation regarding mobile wireless systems, electromagnetic interference and management procedures has led to a broad range of inconsistent policies among healthcare organisations. A balanced approach is necessary to ensure that all the benefits of mobile wireless technology can be made available to healthcare organisations. Overly-restrictive policies may act as obstacles to beneficial technology and may not address the growing need for personal communication of patients, visitors and the workforce. At the other extreme, unmanaged use of mobile communications can place patients at risk. One option involves issuing particular mobile wireless equipment to doctors and staff for healthcare-specific communication and health information access. This would allow the full benefit of wireless technology operating compatibly throughout the healthcare facility, even in sensitive areas in proximity of life-critical medical devices. Page 7 of 13
8 However this would need to be comprehensively managed, and would involve ad-hoc on-site testing of representative units of all life-critical medical devices in the equipment inventory to characterise any potential health-threatening issues. This is because the variety of medical equipment types makes EMI difficult to predict, and because older equipment is likely to be more susceptible than newer equipment that has been designed according to current radio frequency immunity standards. It may not be feasible for healthcare organisations to manage every mobile wireless handset that is randomly brought into their facility without certain restrictive limits. Restrictive policies for non-controlled mobile wireless handsets can be facilitated by offering numerous areas that are easily accessed throughout the healthcare facility where the use of mobile wireless handsets by patients, visitors and staff is permitted. Be aware that mobile devices transmit in three dimensions. Risk of interference High Medium Type of communication system Analogue emergency service radios. Private business radios (PBRs) and PMR446. E.g. porters' and maintenance staff radios (two-way radios). Cellphones (mobile phones). TETRA (Terrestrial Trunked Radio System). Laptop computers, palmtops and gaming devices fitted with higher power wireless networks such as GPRS* and 3G. HIPERLAN**. Recommendation Use in hospitals only in an emergency, never for routine communication. Minimise risks by changing to alternative lower risk technologies A total ban on these systems is not required and is impossible to enforce effectively. Should be switched off near critical care or life support medical equipment. Should be used only in designated areas. Authorised health and social care staff and external service personnel should always comply with local rules regarding use. Low Cordless telephones (including DECT***). Low power computer wireless networks such as RLAN**** systems and Bluetooth These systems are very unlikely to cause interference under most circumstances and need not be restricted. Page 8 of 13
9 Sources of Evidence MRHA Website nformation/mobilecommunicationsinterference/frequentlyaskedquestions/index.htm NHS Choices Website Page 9 of 13
10 8. Equality Impact Assessment Policy/Service Name: Author: Role: Directorate: Mobile Phone Policy Dan Clifford IT & Systems Project Manager Corporate Date June 2013 Equalities Impact Assessment Question Yes Comment 1. How does the attached policy/service fit into the trusts overall aims? Mobile awareness and interference with medical devices 2. How will the policy/service be implemented? Intranet / 3. What outcomes are intended by implementing the policy/delivering the service? 4. How will the above outcomes be measured? use of mobile phones in restricted areas, general mobile use awareness Number of incidents of patients breaching the policy Number of disciplinary procedures brought as a result of failure Dzinja Kabambe Niall Canavan 5. Who are they key stakeholders in respect of this policy/service and how have they been involved? Louise Egan Sarah Webb Marcia Smikle Submitted to IG Board for review 6. Does this policy/service impact on other policies or services and is that impact understood? 7. Does this policy/service impact on other agencies and is that impact understood? Page 10 of 13
11 8. Is there any data on the policy or service that will help inform the EqIA? 9. Are there are information gaps, and how will they be addressed/what additional information is required? Equalities Impact Assessment Question 10. Does the policy or service development have an adverse impact on any particular group? 11. Could the way the policy is carried out have an adverse impact on equality of opportunity or good relations between different groups? 12. Where an adverse impact has been identified can changes be made to minimise it? Yes Comment 13. Is the policy directly or indirectly discriminatory, and can the latter be justified? 14. Is the policy intended to increase equality of opportunity by permitting Positive Action or Reasonable Adjustment? If so is this lawful? Page 11 of 13
12 Policy Submission Form 1 Details of policy 1.1 Title of Policy: Mobile Phone Policy 1.2 Lead Executive Director Chief Operating Officer 1.3 Author/Title Daniel Clifford IT & Systems Project Manager 1.4 Lead Sub Committee Information Governance 1.5 Reason for Policy Mobile awareness and interference with medical devices 1.6 Who does policy affect? Staff, Patients, General Public 1.7 Are national guidelines/codes of practice incorporated? 1.8 Has an Equality Impact Assessment been carried out? Yes 2 Information Collation 2.1 Where was Policy information obtained from? Existing Trust Policy 3 Policy Management 3.1 Is there a requirement for a new or revised management structure if the policy is implemented? 3.2 If YES attach a copy to this form 3.3 If NO explain why General Usage guide only 4 Consultation Process 4.1 Was there internal/external consultation? Yes 4.2 List groups/persons involved Dzinja Kabambe, Niall Canavan, Louise Egan, Sarah Webb, Marcia Smikle Submitted to IG Board for review Page 12 of 13
13 Page 13 of 13
Use Of Mobile Communication Devices Within Healthcare Premises Policy
Use Of Mobile Communication Devices Within Healthcare Premises Policy Co-ordinator: Director of Facilities Reviewer: Working Group chaired by Director of Facilities Approver: GAPF Signature Signature Signature
More informationPolicies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors
Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use
More informationSAFE USE OF MOBILE PHONES AT WORK POLICY
SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31
More informationUse of Personal Mobile Phone Whilst on Duty
Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland
More informationNHS GREATER GLASGOW AND CLYDE
NHS GREATER GLASGOW AND CLYDE Policy on safe use of mobile communication devices, two-way radios, wireless routers, wireless computers within Healthcare premises. LEAD MANAGER: K. Fleming Head of Health
More informationGMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017
GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015
More informationBirmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018
1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess
More informationMobile Telephone. Management Policy
Mobile Telephone Management Policy 1 Policy Title: Executive Summary: Mobile Phone Management Policy A policy to ensure appropriate management of mobile phone purchasing, control, the usage and enabling
More informationNHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy
NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification
More informationINFORMATION SECURITY AND RISK POLICY
INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:
More informationData Encryption Policy
Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager
More informationNDIS Quality and Safeguards Commission. Incident Management System Guidance
NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the
More informationThe University of British Columbia Board of Governors
The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:
More informationRemote Working & Mobile Devices Security Standard
TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information
More informationICT Portable Devices and Portable Media Security
ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data
More informationINFORMATION TECHNOLOGY SECURITY POLICY
INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin
More informationCardiff University Security & Portering Services (SECTY) CCTV Code of Practice
Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date
More informationAccess Control Policy
Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,
More informationMobile Communication Policy
Mobile Communication Policy Document Type Author Owner (Dept) Mobile Communication Policy Chief Executive Health & Safety Date of Review June 2015 List of Contents Page No 1. Summary of Duties... 3 2.
More informationAcorn Trust Mobile Phone Policy
Acorn Trust Mobile Phone Policy Written by: J Buckley, Trust Business Manager Date agreed: 17 th May 2016 Date reviewed: Next Review Date: Summer 2018 Chairs Signature Mission Statement The Acorn Trust
More informationPolicy General Policy GP20
Email Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology
More informationThis procedure sets out the usage of mobile CCTV units within Arhag.
CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards
More informationPRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust
PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we
More informationData Sharing Agreement. Between Integral Occupational Health Ltd and the Customer
Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services
More informationMobile Phones and Electronic Devices Policy
Wetherby School Little Wetherby and Reception 19 Pembridge Villas London W11 3EP Wetherby School Years 1, 2 and 3 11 Pembridge Square London W2 4ED Mobile Phones and Electronic Devices Policy Policy reviewed
More informationAccess to personal accounts and lawful business monitoring
Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...
More informationWye Valley NHS Trust. Data protection audit report. Executive summary June 2017
Wye Valley NHS Trust Data protection audit report Executive summary June 2017 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection Act
More informationThe City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.
Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationInformation Governance Incident Reporting Policy
Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationAPF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.!
enquiries@privacy.org.au http://www.privacy.org.au/ 28September2012 APFsubmission draftmandatorydatabreachnotification intheehealthrecordsystemguide. The Australian Privacy Foundation (APF) is the country's
More informationACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010
INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig
More informationDate Approved: Board of Directors on 7 July 2016
Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory
More informationComputer and Internet Use Policy
Computer and Internet Use Policy Author Simon Allan Date Written Autumn 2015 Review Date Autumn 2018 Date Ratified by the Governing Body Autumn 2015 Computer and Internet Use Policy Outline/Overview This
More informationCorporate Information Security Policy
Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed
More informationComplaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development
Complaints and Compliments Policy Date Approved: 28 September 2016 Approved By: Ownership: Governing Body Corporate Development Date of Issue: August 2017 Proposed Date of Review: August 2019 Date of Equality
More informationPolicy on the Provision of Mobile Phones
Provision of Mobile Phones Policy on the Provision of Mobile Phones Originator name: Section / Dept: Implementation date: Date of next review: Related policies: Policy history: Roger Stickland Approval
More informationExams policy 2017/18. This policy is reviewed annually to ensure compliance with current regulations. Approved/reviewed by
Exams policy 2017/18 This policy is reviewed annually to ensure compliance with current regulations Approved/reviewed by Rachel Fawcett (Exams Officer) and Wendy Randall (School Business Manager) Approved
More informationInformation Governance Incident Reporting Procedure
Information Governance Incident Reporting Procedure : 3.0 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 15 th February 2016 Name of originator /author (s): Responsible Committee /
More informationNetwork Account Management Security Standard
TRUST-WIDE NON-CLINICAL DOCUMENT Network Account Management Security Number: Scope of this Document: Recommending Committee: Approving Committee: SS06 All Staff/ Services Users Joint Information Governance
More informationBring Your Own Device (BYOD) Policy
SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This
More informationInformation Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV
Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf
More informationInformation Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:
More informationMalpractice and Maladministration Policy
Malpractice and Maladministration Policy Introduction This policy is aimed at our customers, including learners, who are delivering/registered on BCS approved qualifications or units within or outside
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationINFORMATION GOVERNANCE. Caldicott Approval Procedure
NHS TAYSIDE INFORMATION GOVERNANCE Caldicott Approval Procedure Author: Peter McKenzie Review Group: Information Governance Group Review Date: September 2010 Last Update: September 2009 Document : NHST-ISC-CAP
More informationGuidance for Accident Reporting
Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need
More informationPS Mailing Services Ltd Data Protection Policy May 2018
PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect
More informationUse of and Instant Messaging (IM) Policy
Use of Email and Instant Messaging (IM) Policy Name of Author and Job Title: Mike Cavaye, IT & Digital Consultant Name of Review/Development Body: IT Services Ratification Body: Quality and Safety Group
More informationWASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information
WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationPolicy Checklist. Directorate of Human Resources & Organisational Development. Director of Human Resources & Organisational Development
Policy Checklist Name of Policy: Purpose of Policy: Procedure on Staff Use of Mobile Phones This procedure applies to Trust employees who are required to have access to a mobile phone in order to carry
More informationUlster University Policy Cover Sheet
Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective
More informationPUPIL ICT ACCEPTABLE USE POLICY
PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status
More informationPersonal Communication Devices and Voic Procedure
Personal Communication Devices and Voicemail Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 11.7.1 Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted
More informationGarth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY. Ratified by Curriculum and Pupil Development Committee:
Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY Policy Owner: Principal Amended: September 2017 Amended: March 2018 Ratified by Curriculum and Pupil Development Committee: 5-3-2015
More informationDate of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act
Date Approved: January 27, 2010-Board Date of Next Review: May 2023 Dates of Amendments: May 17, 2018 Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act
More informationMobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018
Mobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018 CONTENTS PURPOSE OF THE POLICY... 3 RATIONALE... 3 PHONE USE... 3 SECURITY... 4 RESPONSIBILITIES... 4 POLICY RELEASE
More informationPolicy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.
London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate
More informationSheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY
Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY 1. POLICY STATEMENT The purpose of the security strategy is to support the aim of the Trust, in the delivery of high quality clinical
More informationDATA PROTECTION SELF-ASSESSMENT TOOL. Protecture:
DATA PROTECTION SELF-ASSESSMENT TOOL Protecture: 0203 691 5731 Instructions for use touches many varied aspects of an organisation. Across six key areas, the self-assessment notes where a decision should
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationVersion Control of Study Specific Documents
SOP Title Version Control of Study Specific Documents SOP No. SOP 10 Author Consulted Departments Lead Manager Sign and Print Name Julia Farmery Revision V2.0: Sarah Fahy Lincolnshire Clinical Research
More informationPolicy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1.
London School of Economics & Political Science IMT Policy Network Connection Jethro Perkins Information Security Manager Version 1.1 Date 18/03/2015 Library reference ISM-PY-126 For latest version and
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationElectronic Device Policy (EDP)
Powerstown Educate Together National School Roll No: 20384J Powerstown Road, Tyrrelstown, Dublin 15 Telephone: 01 8272018 Email: info@powerstownet.com www.powerstownet.com Powerstown Educate Together National
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationBrook Learning Trust The Ebbsfleet Academy. Exam Policy
Brook Learning Trust The Ebbsfleet Academy Exam Policy 2016-2017 Contents Purpose of the policy... 4 Roles and responsibilities overview... 4 Head of Centre... 4 Exam Officer ()... 5 Leadership team (LT)...
More informationStatutory Notifications
Registration under the Health and Social Care Act 2008 Statutory Notifications Guidance for registered providers and managers of NHS GP and other primary medical services May 2013 Statutory notifications
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationPrivacy Impact Assessment
Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions
More informationHIPAA Privacy & Security Training. Privacy and Security of Protected Health Information
HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security
More informationMobile Working Policy
Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of
More informationShavington Academy Exams Policy
Shavington Academy Exams Policy The purpose of this exams policy is: to ensure the planning and management of exams is conducted efficiently and in the best interests of candidates; to ensure the operation
More informationData Protection Policy
The Worshipful Company of Framework Knitters Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act 1998 (DPA) [UK] For information on this
More informationBHIG - Mobile Devices Policy Version 1.0
Version 1.0 Authorised by: CEO Endorsed By: Chief Operations Officer 1 Document Control Version Date Amended by Changes Made 0.1 20/01/2017 Lars Cortsen Initial document 0.2 29/03/2017 Simon Hahnel Incorporate
More informationHSCIC Audit of Data Sharing Activities:
Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of
More informationCompany Policy Documents. Information Security Incident Management Policy
Information Security Incident Management Policy Information Security Incident Management Policy Propeller Studios Ltd is responsible for the security and integrity of all data it holds. Propeller Studios
More informationData validation and database lock down for RFL sponsored studies Document Number: 037
Data validation and database lock down for RFL sponsored studies Document Number: 037 Version: 1 Ratified by: Committee Date ratified: 30 September 2014 Name of originator/author: Directorate: Department:
More information1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.
1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the
More informationThe essential guide to creating a School Bring Your Own Device Policy. (BYOD)
The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationPS 176 Removable Media Policy
PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More informationSITE FILE MANAGEMENT
SITE FILE MANAGEMENT STANDARD OPERATING PROCEDURE NO SOP 08 DATE RATIFIED 4/7/13 NEXT REVIEW DATE 4/7/14 POLICY STATEMENT/KEY OBJECTIVES: To describe the procedure for the maintenance of essential documents
More informationData Protection Privacy Notice
PETA Limited Page 1 of 7 Data Protection Privacy Notice PETA Limited provides a range of services to both members of the public and to those employed within business. To enable us to provide a service,
More informationICGI Recommendations for Federal Public Websites
Get Email Updates Change Text Size A - Z Index Contact Us About Us Site Policies Suggest Content WEB CONTENT SOCIAL MEDIA MOBILE CHALLENGES & CONTESTS CONTACT CENTERS CUSTOMER Training EXPERIENCE Communities
More informationLEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL
LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL DIOCESE OF WAGGA WAGGA Policy Number 02/10 Policy Name Legal advice on the use of Mobile Phones,
More informationInformation Governance Incident Reporting Policy and Procedure
Information Governance Incident Reporting Policy and Procedure Policy Number Target Audience Approving Committee IG007 CCG/GMSS Staff CCG Chief Officer Date Approved February 2018 Last Review Date February
More informationThe General Data Protection Regulation
PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how
More informationDETAILED POLICY STATEMENT
Applies To: HSC Responsible Office: HSC Information Security Office Revised: New 12/2010 Title: HSC-200 Security and Management of HSC IT Resources Policy POLICY STATEMENT The University of New Mexico
More informationAuditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC
Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements
More informationInformation Security Strategy
Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone
More informationINFORMATION ASSET MANAGEMENT POLICY
INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives
More informationPOWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS
POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS Prepared by: Approved by: Chief Procurement Officer John Baskerville Chief Executive File number: D2015/65737 June 2015 MANAGEMENT
More informationInformation technology security and system integrity policy.
3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values
More informationAccess Rights and Responsibilities. A guide for Individuals and Organisations
Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making
More informationPolicy Title; Business Continuity Management Policy. Date Published/Reviewed; February 2018
Policy Title; Business Continuity Management Policy Date Published/Reviewed; February 2018 Business Lead; Head of Strategic Governance CCMT sponsor; Deputy Chief Constable Thames Valley Police ensures
More information