Mobile Phone Policy General Use

Size: px
Start display at page:

Download "Mobile Phone Policy General Use"

Transcription

1 Mobile Phone Policy General Use Author(s) Daniel Clifford, IT and Systems Project Manager Version 2.1 Version Date July 2013 Implementation/approval Date July 2013 Review Date July 2016 Review Body Policy Reference Number Information Governance Committee 223/tw/it/mp Version Date Status Amended By Changes /09/12 Final Sam Maddin New Policy Mubin Mullan 2.0 May 13 Draft Mubin Mullan Policy reviewed and put into new trust format Dan Clifford 2.1 June 13 Final Dan Clifford Revision of policy following Nursing feedback Page 1 of 13

2 Contents Policy Summary Introduction Scope Roles and Responsibilities Caldicott Guardian Senior Management Line Managers All Staff Patient & Visitors Policy Procedure CODE OF CONDUCT Areas of use Signage Patients & Visitors Staff EXEMPTIONS COMPLIANCE Training and Awareness Review Monitoring/Audit... 6 Appendices... 7 i. MHRA recommendations (as of June 2013)... 7 Sources of Evidence Equality Impact Assessment Policy Submission Form Page 2 of 13

3 Policy Summary This policy has been developed to ensure that all staff, patients and visitors are aware of the areas where the use of mobile phones is restricted or limited. 1. Introduction The Department of Health states that use of mobile phones in within NHS sites should be allowed, as long as their use does not affect: The safety of patients or other people Patients privacy and dignity The operation of medical equipment Interference from mobile phones can stop medical equipment from working properly, for example: dialysis machines defibrillators ventilators monitors pumps Loud ring tones and alarms on mobile phones can also be confused with alarms on medical equipment. This policy has been developed to ensure that all staff, patients and visitors are aware of the areas where the use of mobile phones is restricted or limited. 2. Scope This policy applies to all those working in the Trust, in whatever capacity. This policy also applies to staff that provide Trust services from non-trust sites e.g. General practice, children centres and schools. A failure to follow the requirements of the policy may result in investigation and management action being taken as considered appropriate. This may include formal action in line with the Trust's disciplinary or capability procedures for Trust employees; and other action in relation to other workers, which may result in the termination of an assignment, placement, secondment or honorary arrangement. This policy also applies to patients and visitors to the Trust whilst on Trust premises 3. Roles and Responsibilities 3.1 Caldicott Guardian Responsible for Patient Confidentiality across the Trust Ensures Mobile Phone policy is adhered to across the Trust 3.2 Senior Management All Senior Managers in the Trust must enforce this policy in their areas. 3.3 Line Managers Should ensure all current and future staff are instructed in this policy Page 3 of 13

4 3.4 All Staff All staff in the Trust must ensure that this policy is adhered to in all premises of the organisation 3.5 Patient & Visitors All Patients & Visitors on Trust premises must ensure that this policy is adhered to 4. Policy Procedure 4.1 CODE OF CONDUCT Areas of use Categories of mobile phone areas across the Trust can be split into three; Category 1 n Clinical areas/low risk patient areas (e.g. clinic waiting areas, corridors, reception areas), where mobile phones can be used by staff, patients and visitors alike. Category 2 Clinical Patient areas (e.g. general wards, departments, patient homes) where mobile phones can be used by staff, patients and visitors, but may be subject to local restrictions if their use is deemed to be affecting patient care, dignity or confidentiality. Category 3 Safety Critical Patient areas (e.g. Intensive Care/NICU/Theatres) Mobile phones must be switched off in these areas Signage Signage needs to be in place across all sites where the Trust provides services to indicate the code of conduct for usage as well as which category the area is and if mobiles can be used Patients & Visitors Patients and visitors mobile phones are their own responsibility when on Trust property. Patients and visitors must be mindful of moderation of tone, volume and language and may be informed if behavior is deemed disruptive. Telephone ringing and subsequent conversations may disrupt important patient/healthcare professional activities or may disturb and/or alarm patients who are resting Patient and visitors will not be allowed to charge mobile devices when on Trust property. Patients and visitors must switch phones to vibrate/silent in category 2 areas, if they wish to talk after 10pm or before 7am they must find a local category 1 area e.g. corridor Staff should advise patients who are leaving the ward to use their phone, or to smoke, that mobiles phone should NOT be used within 1m of active infusion pumps and monitors. Page 4 of 13

5 The use of camera phones may compromise patient confidentiality. The Maternity units may permit photos to be taken with a mobile phone, for example, parents with their newborn baby as long as no staff or other patients are in the photo. Patients and visitors using other devices (e.g. Laptop Computers/Tablets/Gaming Devices) enabled with wireless network capabilities must also apply to this code of conduct Staff Staff personal mobile phones are their own responsibility when on Trust property. Personal Mobiles must be kept on silent, unless working in a Category 3 area where they must be switched off. The only exemption being the staff member needs their phone on them for Trust business (e.g. consultant on call). Staff should not have their phones on them whilst in the clinical areas, they should be kept with other personal items e.g. handbag, backpack etc Staff must be mindful of moderation of tone, volume and language when using mobile phones on Trust premises Integral cameras/ document management functions within any form of personal mobile communication should never be used for clinical purposes. Charging of mobile phones is only allowed when using an official (t generic) phone charger that has a valid PET safety test certificate. Only spare power sockets can be used with an understanding that other devices will take priority where limited sockets are available. Mobile phone chargers will also have to be unplugged when not in use. It is an offence under the Road Traffic Act to use a handheld mobile phone whilst driving. Using a handheld mobile phone whilst driving on Trust business is not permitted. When staff are visiting clients/patients/service users in their own home phones should be placed on silent and phone calls not accepted during this time 4.2 EXEMPTIONS There are some special clinical circumstances where it is acceptable for mobile communication technology to be used where normally forbidden within this policy. These are considered to be: Senior on-call clinicians and managers who may need to be urgently contacted whilst in a patient area Where there is a clinical imperative that negates the use of all other means of communication Where there is an urgent need for translation at the bedside of a patient and no advocate is available to attend. Major incident declared. Staff who meet the criteria for a temporary exemption to the policy are politely asked to show consideration to the enforcement of the policy to NHS colleagues, patients and visitors. It is accepted that it is the circumstances at the time that dictate the clinical Page 5 of 13

6 imperative and as such people who are using their phones are requested to give consideration to politeness and professionalism. 4.3 COMPLIANCE The privacy and dignity of patients and compliance with health & safety is the duty of all staff, patients and visitors whilst on the hospital premises. For the reasons stated the Trust feels it is necessary from a clinical perspective that everyone complies with this policy. Patients or visitors who fail to adhere to the policy will be asked to leave the prohibited use area and security may be called if they become abusive or aggressive towards staff enforcing this policy, in line with the Trusts Violence & Aggression Policy. It should be noted the Trust does not accept the display of violence or aggression towards NHS staff whilst undertaking their work. Staff who fail to comply with the policy will be reported to their line manager and persistent breaches of the policy will be dealt with under the Trust s disciplinary procedure. 5. Training and Awareness This policy will be made available to all staff via the intranet and will also be placed on the Trust external website for the public and patients to see. Reference will be made to this policy at Induction of new staff members. 6. Review This Policy must be subject to review when any of the following conditions are met: The adoption of the Policy highlights errors or omissions in its content Where other policies/strategies/guidance issued by the Trust conflict with the information contained herein Where the procedural or guidance framework of the NHS evolves/changes such that revision would bring about improvement Three years elapse after approval of the current version 7. Monitoring/Audit Measurable Policy Objective Monitoring/Audit Frequency of monitoring Responsibility for performing the monitoring Monitoring reported to which groups/committees, inc responsibility for reviewing action plans Number of incidents of patients breaching the Record of this type of incident Six months Head of Patient Experience Patient Experience Committee Page 6 of 13

7 policy Number of disciplinary procedures brought as a result of failure Record from Human Resources Six Months Head of Employee Relations Workforce Committee Appendices i. MHRA recommendations (as of June 2013) Summary Healthcare providers should actively manage the use of the radio frequency spectrum in their own sites. This includes considering areas where medical devices will not be affected and therefore no restrictions apply and other areas where authorised staff can use communication devices authorised by the hospital. Report incidents to the MHRA when a medical device is suspected to have suffered electromagnetic interference. Further technical information The International Organisation for Standardization (external link) has published a technical report; ISO TR 21730:2005 'Health informatics - use of mobile wireless communication and computing technology in healthcare facilities - recommendations for the management of electromagnetic interference with medical devices'. Some points taken from this report: Misinformation regarding mobile wireless systems, electromagnetic interference and management procedures has led to a broad range of inconsistent policies among healthcare organisations. A balanced approach is necessary to ensure that all the benefits of mobile wireless technology can be made available to healthcare organisations. Overly-restrictive policies may act as obstacles to beneficial technology and may not address the growing need for personal communication of patients, visitors and the workforce. At the other extreme, unmanaged use of mobile communications can place patients at risk. One option involves issuing particular mobile wireless equipment to doctors and staff for healthcare-specific communication and health information access. This would allow the full benefit of wireless technology operating compatibly throughout the healthcare facility, even in sensitive areas in proximity of life-critical medical devices. Page 7 of 13

8 However this would need to be comprehensively managed, and would involve ad-hoc on-site testing of representative units of all life-critical medical devices in the equipment inventory to characterise any potential health-threatening issues. This is because the variety of medical equipment types makes EMI difficult to predict, and because older equipment is likely to be more susceptible than newer equipment that has been designed according to current radio frequency immunity standards. It may not be feasible for healthcare organisations to manage every mobile wireless handset that is randomly brought into their facility without certain restrictive limits. Restrictive policies for non-controlled mobile wireless handsets can be facilitated by offering numerous areas that are easily accessed throughout the healthcare facility where the use of mobile wireless handsets by patients, visitors and staff is permitted. Be aware that mobile devices transmit in three dimensions. Risk of interference High Medium Type of communication system Analogue emergency service radios. Private business radios (PBRs) and PMR446. E.g. porters' and maintenance staff radios (two-way radios). Cellphones (mobile phones). TETRA (Terrestrial Trunked Radio System). Laptop computers, palmtops and gaming devices fitted with higher power wireless networks such as GPRS* and 3G. HIPERLAN**. Recommendation Use in hospitals only in an emergency, never for routine communication. Minimise risks by changing to alternative lower risk technologies A total ban on these systems is not required and is impossible to enforce effectively. Should be switched off near critical care or life support medical equipment. Should be used only in designated areas. Authorised health and social care staff and external service personnel should always comply with local rules regarding use. Low Cordless telephones (including DECT***). Low power computer wireless networks such as RLAN**** systems and Bluetooth These systems are very unlikely to cause interference under most circumstances and need not be restricted. Page 8 of 13

9 Sources of Evidence MRHA Website nformation/mobilecommunicationsinterference/frequentlyaskedquestions/index.htm NHS Choices Website Page 9 of 13

10 8. Equality Impact Assessment Policy/Service Name: Author: Role: Directorate: Mobile Phone Policy Dan Clifford IT & Systems Project Manager Corporate Date June 2013 Equalities Impact Assessment Question Yes Comment 1. How does the attached policy/service fit into the trusts overall aims? Mobile awareness and interference with medical devices 2. How will the policy/service be implemented? Intranet / 3. What outcomes are intended by implementing the policy/delivering the service? 4. How will the above outcomes be measured? use of mobile phones in restricted areas, general mobile use awareness Number of incidents of patients breaching the policy Number of disciplinary procedures brought as a result of failure Dzinja Kabambe Niall Canavan 5. Who are they key stakeholders in respect of this policy/service and how have they been involved? Louise Egan Sarah Webb Marcia Smikle Submitted to IG Board for review 6. Does this policy/service impact on other policies or services and is that impact understood? 7. Does this policy/service impact on other agencies and is that impact understood? Page 10 of 13

11 8. Is there any data on the policy or service that will help inform the EqIA? 9. Are there are information gaps, and how will they be addressed/what additional information is required? Equalities Impact Assessment Question 10. Does the policy or service development have an adverse impact on any particular group? 11. Could the way the policy is carried out have an adverse impact on equality of opportunity or good relations between different groups? 12. Where an adverse impact has been identified can changes be made to minimise it? Yes Comment 13. Is the policy directly or indirectly discriminatory, and can the latter be justified? 14. Is the policy intended to increase equality of opportunity by permitting Positive Action or Reasonable Adjustment? If so is this lawful? Page 11 of 13

12 Policy Submission Form 1 Details of policy 1.1 Title of Policy: Mobile Phone Policy 1.2 Lead Executive Director Chief Operating Officer 1.3 Author/Title Daniel Clifford IT & Systems Project Manager 1.4 Lead Sub Committee Information Governance 1.5 Reason for Policy Mobile awareness and interference with medical devices 1.6 Who does policy affect? Staff, Patients, General Public 1.7 Are national guidelines/codes of practice incorporated? 1.8 Has an Equality Impact Assessment been carried out? Yes 2 Information Collation 2.1 Where was Policy information obtained from? Existing Trust Policy 3 Policy Management 3.1 Is there a requirement for a new or revised management structure if the policy is implemented? 3.2 If YES attach a copy to this form 3.3 If NO explain why General Usage guide only 4 Consultation Process 4.1 Was there internal/external consultation? Yes 4.2 List groups/persons involved Dzinja Kabambe, Niall Canavan, Louise Egan, Sarah Webb, Marcia Smikle Submitted to IG Board for review Page 12 of 13

13 Page 13 of 13

Use Of Mobile Communication Devices Within Healthcare Premises Policy

Use Of Mobile Communication Devices Within Healthcare Premises Policy Use Of Mobile Communication Devices Within Healthcare Premises Policy Co-ordinator: Director of Facilities Reviewer: Working Group chaired by Director of Facilities Approver: GAPF Signature Signature Signature

More information

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

Use of Personal Mobile Phone Whilst on Duty

Use of Personal Mobile Phone Whilst on Duty Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland

More information

NHS GREATER GLASGOW AND CLYDE

NHS GREATER GLASGOW AND CLYDE NHS GREATER GLASGOW AND CLYDE Policy on safe use of mobile communication devices, two-way radios, wireless routers, wireless computers within Healthcare premises. LEAD MANAGER: K. Fleming Head of Health

More information

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017 GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015

More information

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018 1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess

More information

Mobile Telephone. Management Policy

Mobile Telephone. Management Policy Mobile Telephone Management Policy 1 Policy Title: Executive Summary: Mobile Phone Management Policy A policy to ensure appropriate management of mobile phone purchasing, control, the usage and enabling

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Remote Working & Mobile Devices Security Standard

Remote Working & Mobile Devices Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information

More information

ICT Portable Devices and Portable Media Security

ICT Portable Devices and Portable Media Security ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Mobile Communication Policy

Mobile Communication Policy Mobile Communication Policy Document Type Author Owner (Dept) Mobile Communication Policy Chief Executive Health & Safety Date of Review June 2015 List of Contents Page No 1. Summary of Duties... 3 2.

More information

Acorn Trust Mobile Phone Policy

Acorn Trust Mobile Phone Policy Acorn Trust Mobile Phone Policy Written by: J Buckley, Trust Business Manager Date agreed: 17 th May 2016 Date reviewed: Next Review Date: Summer 2018 Chairs Signature Mission Statement The Acorn Trust

More information

Policy General Policy GP20

Policy General Policy GP20 Email Policy General Policy GP20 Applies to All employees Committee for Approval Quality and Governance Committee Date of Approval September 2012 Review Date June 2014 Name of Lead Manager Head of Technology

More information

This procedure sets out the usage of mobile CCTV units within Arhag.

This procedure sets out the usage of mobile CCTV units within Arhag. CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards

More information

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

Mobile Phones and Electronic Devices Policy

Mobile Phones and Electronic Devices Policy Wetherby School Little Wetherby and Reception 19 Pembridge Villas London W11 3EP Wetherby School Years 1, 2 and 3 11 Pembridge Square London W2 4ED Mobile Phones and Electronic Devices Policy Policy reviewed

More information

Access to personal accounts and lawful business monitoring

Access to personal  accounts and lawful business monitoring Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...

More information

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017 Wye Valley NHS Trust Data protection audit report Executive summary June 2017 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection Act

More information

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance. Policy Number: 10-09-02 Section: Roads and Traffic Subsection: Traffic Operations Effective Date: April 25, 2012 Last Review Date: Approved by: Council Owner Division/Contact: For information on the CCTV

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Information Governance Incident Reporting Policy

Information Governance Incident Reporting Policy Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.!

APF!submission!!draft!Mandatory!data!breach!notification! in!the!ehealth!record!system!guide.! enquiries@privacy.org.au http://www.privacy.org.au/ 28September2012 APFsubmission draftmandatorydatabreachnotification intheehealthrecordsystemguide. The Australian Privacy Foundation (APF) is the country's

More information

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010 INFORMATION SECURITY POLICY EMAIL ACCEPTABLE USE ISO 27002 7.1.3 Author: Owner: Organisation: Document No: Chris Stone Ruskwig TruePersona Ltd SP-7.1.3 No: 1.0 Date: 10 th January 2010 Copyright Ruskwig

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Computer and Internet Use Policy

Computer and Internet Use Policy Computer and Internet Use Policy Author Simon Allan Date Written Autumn 2015 Review Date Autumn 2018 Date Ratified by the Governing Body Autumn 2015 Computer and Internet Use Policy Outline/Overview This

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

Complaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development

Complaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development Complaints and Compliments Policy Date Approved: 28 September 2016 Approved By: Ownership: Governing Body Corporate Development Date of Issue: August 2017 Proposed Date of Review: August 2019 Date of Equality

More information

Policy on the Provision of Mobile Phones

Policy on the Provision of Mobile Phones Provision of Mobile Phones Policy on the Provision of Mobile Phones Originator name: Section / Dept: Implementation date: Date of next review: Related policies: Policy history: Roger Stickland Approval

More information

Exams policy 2017/18. This policy is reviewed annually to ensure compliance with current regulations. Approved/reviewed by

Exams policy 2017/18. This policy is reviewed annually to ensure compliance with current regulations. Approved/reviewed by Exams policy 2017/18 This policy is reviewed annually to ensure compliance with current regulations Approved/reviewed by Rachel Fawcett (Exams Officer) and Wendy Randall (School Business Manager) Approved

More information

Information Governance Incident Reporting Procedure

Information Governance Incident Reporting Procedure Information Governance Incident Reporting Procedure : 3.0 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 15 th February 2016 Name of originator /author (s): Responsible Committee /

More information

Network Account Management Security Standard

Network Account Management Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Network Account Management Security Number: Scope of this Document: Recommending Committee: Approving Committee: SS06 All Staff/ Services Users Joint Information Governance

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy Malpractice and Maladministration Policy Introduction This policy is aimed at our customers, including learners, who are delivering/registered on BCS approved qualifications or units within or outside

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

INFORMATION GOVERNANCE. Caldicott Approval Procedure

INFORMATION GOVERNANCE. Caldicott Approval Procedure NHS TAYSIDE INFORMATION GOVERNANCE Caldicott Approval Procedure Author: Peter McKenzie Review Group: Information Governance Group Review Date: September 2010 Last Update: September 2009 Document : NHST-ISC-CAP

More information

Guidance for Accident Reporting

Guidance for Accident Reporting Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Use of and Instant Messaging (IM) Policy

Use of  and Instant Messaging (IM) Policy Use of Email and Instant Messaging (IM) Policy Name of Author and Job Title: Mike Cavaye, IT & Digital Consultant Name of Review/Development Body: IT Services Ratification Body: Quality and Safety Group

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

Policy Checklist. Directorate of Human Resources & Organisational Development. Director of Human Resources & Organisational Development

Policy Checklist. Directorate of Human Resources & Organisational Development. Director of Human Resources & Organisational Development Policy Checklist Name of Policy: Purpose of Policy: Procedure on Staff Use of Mobile Phones This procedure applies to Trust employees who are required to have access to a mobile phone in order to carry

More information

Ulster University Policy Cover Sheet

Ulster University Policy Cover Sheet Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective

More information

PUPIL ICT ACCEPTABLE USE POLICY

PUPIL ICT ACCEPTABLE USE POLICY PUPIL ICT ACCEPTABLE USE POLICY Document control This document has been approved for operation within: All Trust Schools Date of last review August 2018 Date of next review August 2020 Review period Status

More information

Personal Communication Devices and Voic Procedure

Personal Communication Devices and Voic Procedure Personal Communication Devices and Voicemail Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 11.7.1 Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted

More information

Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY. Ratified by Curriculum and Pupil Development Committee:

Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY. Ratified by Curriculum and Pupil Development Committee: Garth Hill College THE USE OF MOBILE PHONES AND DIGITAL DEVICES POLICY Policy Owner: Principal Amended: September 2017 Amended: March 2018 Ratified by Curriculum and Pupil Development Committee: 5-3-2015

More information

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act Date Approved: January 27, 2010-Board Date of Next Review: May 2023 Dates of Amendments: May 17, 2018 Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

More information

Mobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018

Mobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018 Mobile Phone Policy January 2014 January 2015 January 2016 Reviewed 2017 Reviewed 2018 CONTENTS PURPOSE OF THE POLICY... 3 RATIONALE... 3 PHONE USE... 3 SECURITY... 4 RESPONSIBILITIES... 4 POLICY RELEASE

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY

Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY 1. POLICY STATEMENT The purpose of the security strategy is to support the aim of the Trust, in the delivery of high quality clinical

More information

DATA PROTECTION SELF-ASSESSMENT TOOL. Protecture:

DATA PROTECTION SELF-ASSESSMENT TOOL. Protecture: DATA PROTECTION SELF-ASSESSMENT TOOL Protecture: 0203 691 5731 Instructions for use touches many varied aspects of an organisation. Across six key areas, the self-assessment notes where a decision should

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Version Control of Study Specific Documents

Version Control of Study Specific Documents SOP Title Version Control of Study Specific Documents SOP No. SOP 10 Author Consulted Departments Lead Manager Sign and Print Name Julia Farmery Revision V2.0: Sarah Fahy Lincolnshire Clinical Research

More information

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1.

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1. London School of Economics & Political Science IMT Policy Network Connection Jethro Perkins Information Security Manager Version 1.1 Date 18/03/2015 Library reference ISM-PY-126 For latest version and

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

Electronic Device Policy (EDP)

Electronic Device Policy (EDP) Powerstown Educate Together National School Roll No: 20384J Powerstown Road, Tyrrelstown, Dublin 15 Telephone: 01 8272018 Email: info@powerstownet.com www.powerstownet.com Powerstown Educate Together National

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Brook Learning Trust The Ebbsfleet Academy. Exam Policy

Brook Learning Trust The Ebbsfleet Academy. Exam Policy Brook Learning Trust The Ebbsfleet Academy Exam Policy 2016-2017 Contents Purpose of the policy... 4 Roles and responsibilities overview... 4 Head of Centre... 4 Exam Officer ()... 5 Leadership team (LT)...

More information

Statutory Notifications

Statutory Notifications Registration under the Health and Social Care Act 2008 Statutory Notifications Guidance for registered providers and managers of NHS GP and other primary medical services May 2013 Statutory notifications

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

Shavington Academy Exams Policy

Shavington Academy Exams Policy Shavington Academy Exams Policy The purpose of this exams policy is: to ensure the planning and management of exams is conducted efficiently and in the best interests of candidates; to ensure the operation

More information

Data Protection Policy

Data Protection Policy The Worshipful Company of Framework Knitters Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act 1998 (DPA) [UK] For information on this

More information

BHIG - Mobile Devices Policy Version 1.0

BHIG - Mobile Devices Policy Version 1.0 Version 1.0 Authorised by: CEO Endorsed By: Chief Operations Officer 1 Document Control Version Date Amended by Changes Made 0.1 20/01/2017 Lars Cortsen Initial document 0.2 29/03/2017 Simon Hahnel Incorporate

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of

More information

Company Policy Documents. Information Security Incident Management Policy

Company Policy Documents. Information Security Incident Management Policy Information Security Incident Management Policy Information Security Incident Management Policy Propeller Studios Ltd is responsible for the security and integrity of all data it holds. Propeller Studios

More information

Data validation and database lock down for RFL sponsored studies Document Number: 037

Data validation and database lock down for RFL sponsored studies Document Number: 037 Data validation and database lock down for RFL sponsored studies Document Number: 037 Version: 1 Ratified by: Committee Date ratified: 30 September 2014 Name of originator/author: Directorate: Department:

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

The essential guide to creating a School Bring Your Own Device Policy. (BYOD)

The essential guide to creating a School Bring Your Own Device Policy. (BYOD) The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Architecture and Standards Development Lifecycle

Architecture and Standards Development Lifecycle Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page

More information

SITE FILE MANAGEMENT

SITE FILE MANAGEMENT SITE FILE MANAGEMENT STANDARD OPERATING PROCEDURE NO SOP 08 DATE RATIFIED 4/7/13 NEXT REVIEW DATE 4/7/14 POLICY STATEMENT/KEY OBJECTIVES: To describe the procedure for the maintenance of essential documents

More information

Data Protection Privacy Notice

Data Protection Privacy Notice PETA Limited Page 1 of 7 Data Protection Privacy Notice PETA Limited provides a range of services to both members of the public and to those employed within business. To enable us to provide a service,

More information

ICGI Recommendations for Federal Public Websites

ICGI Recommendations for Federal Public Websites Get Email Updates Change Text Size A - Z Index Contact Us About Us Site Policies Suggest Content WEB CONTENT SOCIAL MEDIA MOBILE CHALLENGES & CONTESTS CONTACT CENTERS CUSTOMER Training EXPERIENCE Communities

More information

LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL

LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL LEGAL ADVICE ON THE USE OF MOBILE PHONES, PROTABLE COMPUTER GAMES, TAPE RECORDERS AND CAMERAS IN SCHOOL DIOCESE OF WAGGA WAGGA Policy Number 02/10 Policy Name Legal advice on the use of Mobile Phones,

More information

Information Governance Incident Reporting Policy and Procedure

Information Governance Incident Reporting Policy and Procedure Information Governance Incident Reporting Policy and Procedure Policy Number Target Audience Approving Committee IG007 CCG/GMSS Staff CCG Chief Officer Date Approved February 2018 Last Review Date February

More information

The General Data Protection Regulation

The General Data Protection Regulation PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how

More information

DETAILED POLICY STATEMENT

DETAILED POLICY STATEMENT Applies To: HSC Responsible Office: HSC Information Security Office Revised: New 12/2010 Title: HSC-200 Security and Management of HSC IT Resources Policy POLICY STATEMENT The University of New Mexico

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

Information Security Strategy

Information Security Strategy Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS Prepared by: Approved by: Chief Procurement Officer John Baskerville Chief Executive File number: D2015/65737 June 2015 MANAGEMENT

More information

Information technology security and system integrity policy.

Information technology security and system integrity policy. 3359-11-10.3 Information technology security and system integrity policy. (A) Need for security and integrity. The university abides by and honors its long history of supporting the diverse academic values

More information

Access Rights and Responsibilities. A guide for Individuals and Organisations

Access Rights and Responsibilities. A guide for Individuals and Organisations Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making

More information

Policy Title; Business Continuity Management Policy. Date Published/Reviewed; February 2018

Policy Title; Business Continuity Management Policy. Date Published/Reviewed; February 2018 Policy Title; Business Continuity Management Policy Date Published/Reviewed; February 2018 Business Lead; Head of Strategic Governance CCMT sponsor; Deputy Chief Constable Thames Valley Police ensures

More information