Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY

Size: px
Start display at page:

Download "Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY"

Transcription

1 Sheffield Teaching Hospitals NHS Foundation Trust SECURITY STRATEGY 1. POLICY STATEMENT The purpose of the security strategy is to support the aim of the Trust, in the delivery of high quality clinical services, through the provision of a secure environment. 2. RESPONSIBILITY The ultimate responsibility for security within the Trust rests with the Chief Executive. At Executive board level it rests with the Director of Human Resources, who delegates certain responsibilities through the Director of Hotel Services to the Security Manager. As well as being a management responsibility, security is also the responsibility of every member of staff, who should make every effort to ensure the strategy works for the benefit of all. 3. STRATEGY AIMS The strategy seeks to ensure: - (a) The personal safety at all times of patients, residents, staff and visitors. (b) (c) (d) The protection of property against fraud, theft and damage. To produce a safe atmosphere in which the uninterrupted delivery of quality health care can be delivered. The reporting and detection of all incidents relative to the above. 4. BASIC PRINCIPLES 4.1 Deter Criminal activity where possible by putting in place essential access control and other counter measures. 4.2 Deny The criminal opportunity, not only by physical barriers, but by putting in place effective systems of loss prevention and property control. 4.3 Detect The criminal act. The earlier the criminal act is detected and reported the greater the chances of preventing the offenders getting away. Raised awareness of security at all levels will both detect and reduce the risk of crime. 4.4 Responding Effectively to security issues and problems, with workable counter-measures. 4.5 Review Review the strategy after every incident, also after counter measures have been put in place, to evaluate their effectiveness. 5. WHERE WE ARE 5.1 Deter The installation of additional close circuit television cameras and the upgrading of existing cameras across the Trust together with the commissioning of a new Control Room at the Northern Campus has greatly reduced the incidents of car crime, general theft and damage right across the Trust. The instillation of additional access control and improved lighting across the Trust has proved a deterrent to criminal activities in those particular areas.

2 Audible alarm boxes have been fitted outside a number of vulnerable areas, where alarms are situated and these are gradually being brought through to one of the two Control Rooms for monitoring. The introduction of Access Control has greatly enhanced security in the more sensitive areas of the hospital, especially in the Maternity and Paediatric areas where a baby tagging system is in use. Combined with the Photo ID Badge scheme, fob and swipe cards, identification and legitimate access is now under computer control in all areas of the Trust. 5.2 Deny Audits of areas such as the stores, catering and pharmacy have put in place improved systems of control to deny criminal opportunity. 5.3 Detect To assist in the early reporting and detecting of crime a Hospital Watch Scheme is in the process of being started at each hospital to increase staff awareness and encourage prompt reporting of suspicious or criminal incidents. Informative signs are displayed at all entry / exits where the public has access. 5.4 Response To any situation is the responsibility of the Security staff who give twenty-four hour security cover across the Trust. This response has resulted in a number of criminal offences being detected and offenders arrested. There is also swift feedback to persons reporting incidents. 5.5 Staff Awareness All new starters at the Trust attend a thirty-minute briefing on hospital and personal security. New entrants to the School of Nursing and Junior Grade Doctors also receive an introductory talk on security and personal safety. A weekly Security Bulletin is published which highlights incidents and involvement of the security staff and others in the prevention and detection of crime. Close liaison is maintained with the South Yorkshire Police and regular patrols around the sites are conducted along with Crime Reduction Displays. 6. STAFF IDENTIFICATION Personal identification has been encouraged hospital wide and the security strategy supports the policy of all staff wearing identification badges. Photographic identification badges for staff are produced by the Security Service at the Northern Campus and by HR at the Central Campus. The computerised Photo ID Badge scheme combined with the access control swipe card or fob system has greatly enhanced Security across the Trust. 7. INCIDENT REPORTING Any incident whether actual or perceived should be reported to the Security Staff on extension or bleep 103 at the Central Campus and extension or bleep 423 at the Northern Campus. All thefts and other criminal incidents should also be reported to the Police. In addition all staff should be aware of the 2222 system for alerting the Security Service and Police in the event of incidents of violence and aggression or other serious incidents.

3 8. FIRE AND SAFETY The overlapping interests of security and fire safety policies are recognised and there is full co-operation between the Fire Officer and Security Manager. 9. STAFF INVOLVEMENT Managers and staff have responsibilities for personal security, whilst at work, under The Management of Health and Safety at Work Regulations 1999 the Health and Safety at Work Regulations 1992 and the Crime and Disorder Act It is the responsibility of all staff to be vigilant and promote good safety practice across the Trust. The Hospital Watch Scheme and incident reporting procedures via DATIX and the Counter Fraud and Security Management Service (CFSMS) are designed to help with the promotion of this good practice and to encourage staff to be security conscious. 10. ACCESS CONTROL SYSTEM For information on the issue and use of the Access Control System (Swipe Card and fob) please see appendix SECURITY ADVICE Advice on all aspects of security is available from the Security Manager on extension or bleep 181 or his Deputy on or bleep102. However, an immediate response to any security matter will be directed by the control rooms on extension or bleep 103 at the Central Campus and extension or bleep 423 at the Northern Campus or via 2222 across the Trust. Date reviewed: June 2004 Date to be reviewed: June 2006 To be reviewed by: Executive responsible: Security Manager Director of Human Resources

4 Appendix 1 Sheffield Teaching Hospitals NHS Trust GUIDE FOR GOOD PRACTICE SECURITY OF ATTRACTIVE ITEMS It is suggested each Directorate should ensure that there is an up to date inventory of items attractive to criminals of items costing less than 5,000 per item, for example, computers, calculators, mobile telephones and projectors. In 1993 the NHS Management Executive commissioned a review of Security and Crime Prevention in the NHS called- Preventing Crime in the NHS - the Management Challenge which recommended: - (a) (b) (c) (d) (e) each room to have an inventory of all items list all serial numbers, makes, models etc. regular update of lists (monthly intervals recommended) designate one individual within each department / ward to be responsible for taking the audit identify all items with postcode and directorate or some other form of identification The Security Adviser advises that all managers should: - (a) (b) (c) (a) ensure all thefts are reported promptly to Security and the Police and entered on DATIX monitor developing trends, and ensure security of items Reporting Thefts All stolen / missing items to be reported to Security and the Police, who together, will be responsible for investigating the crime. (b) Developing Trends When ordering items, purchasers should note whether it is new or replacement, condemned, stolen or missing. New items should be included on the inventory where necessary, replacements amended and condemned, stolen or missing items deleted. All stolen and missing items should be reported on DATIX so that trends developing across the Trust can be investigated. All new equipment purchased to be security marked as a deterrent against theft. (c) Ensuring Security of Items Managers should consider the security of all items of value coming into their departments and in consultation with the Security Manager or his Deputy be able to demonstrate how security will be introduced and maintained. The purchase and fitting of security alarms, access control, CCTV etc should be undertaken only after consultation with the Security Manager or his Deputy, to ensure consistency where possible throughout the Trust. The Bio Medical Engineering Department keeps current records of all items maintained by them in a central database.

5 (d) Computers The Information Technology Department audit and keeping a list of all serial numbers, models and make. Asset identification labels are attached to all hardware across the Trust and improvements to internal software integrity is being carried out. (e) Insurance Trust property is insured but the excess payable is 20,000 and therefore only extremely valuable items over 20,000 or multiple claims caused by flood, fire etc would be reclaimable from the Trust s insurance Policy. This means that lost, stolen or damaged property, which requires replacing, would have to come out of the directorate or departments own funds.

6 Appendix 2 Sheffield Teaching Hospitals NHS Foundation Trust ACCESS CONTROL POLICY 1. POLICY STATEMENT The purpose of the security strategy is to promote a safe and secure environment for patients, visitors and staff the broad principles, responsibility and strategic aims of the Trust s policy on security are laid down under the Security Policy. 1.2 The purpose of this document is to provide management and users of the access control system guidelines on the policy and operating procedures relative to the systems. 2. ACCESS CONTROL SYSTEM There are currently three access control systems in operation across the Trust. The Northern Campus utilises the Control Systems International I/NET 2000 personal computer controlled system operated by fob readers. The system was installed by and is maintained by Marshall s Fire and Security Ltd. The Royal Hallamshire Hospital (RHH) and Jessop Wing utilises the Andover Access Control System personal computer controlled system operated installed and maintained by North East Controls Ltd. Western Park Hospital does not currently have an automated access control system but limited installation of a system is to begin in the near future. This system will be the same as that utilised at the RHH and Jessop Wing and will be card swipe access. Charles Clifford Dental Hospital utilises a separate system called Sentinel Control Systems. This too is swipe card access and is maintained by Albion Detection Systems Ltd. 2.1 These systems give card or fob access to designated areas. The issue of cards and fobs is as follows: Directorates to be responsible for deciding which members of their staff should be issued with a swipe card or fob access. They will need to take into account members of staff from other Directorates who might require legitimate access into their area. Swipe cards and fobs can be computer programmed to operate as required. The facility exists therefore to confine the use of each card relative to the working pattern of the individual (e.g. staff member works , five day week - can be programmed to be effective only during these times). Please therefore carefully complete the relevant application form. This form must be supplied to the Security Office at the Northern Campus and Estates at the Central Campus Completed forms will be considered taking account of the overall security of the hospital, its perimeter access and sensitive areas. The following will then occur: - (i) (ii) (iii) the details will be input a swipe card or fob will be issued to designated person against signature the system will be monitored and voidance of swipe cards or fobs from computer system 2.2 The system is capable of recording database details of the name and department of the holder of the card together with a personal reference number applicable to the card or fob issued.

7 2.3 Recorded details are also maintained of the number, date and time each card or fob is used on the system. 2.4 The card or fob remains the property of Sheffield Teaching Hospitals NHS Foundation Trust and any loss or defacing of the card or fob will result in the holder having to pay a fee of for the card and 5.00 for the fob 2.5 In the event of swipe cards or fobs being required for a limited period, either for part-time staff or students, the following procedure will apply: Contractors Part-Time Staff Where such staff require access to a controlled area the issue of a swipe card or fob will be at the discretion of the directorate concerned. Student Nurses As above for part time staff. The issuing of I/D to contractors across the Trust is the responsibility of Estates Department. 2.7 Staff Terminating Employment It shall be the responsibility of heads of departments and/or Business Managers to ensure the return of swipe cards and fobs to the Security Manager when a member of their Directorate/Department terminates their employment. In any case the fact that a member of staff has terminated their employment should be notified to the Security Manager in order that checks can be made on the Access Control computer system to delete the swipe card or fob where appropriate. 3. LOSS OF CARD The loss of any card or fob must immediately be reported to Security in order that they can be made void from the system, thus preserving security. The information should be passed to the Access Control Computer Operator, on extension at the Northern Campus or Estates on for the Central Campus. 4. INTERFERENCE - ABUSE OF SYSTEM It must be noted that any interference with the door/closer - swipe card or fob system will be monitored by the computer control system. 4.1 The system is capable of recording and notifying if any door is kept ajar or forced. In this event it will become a security matter, and may result in a report being obtained and the individual staff member concerned made subject to disciplinary proceedings under the Trust s policy. 5. MONITORING OF USAGE The system can print on demand the following: - (I) (ii) usage of all cards and fobs into the respective Directorate usage of an individual card or fob into the respective Directorate Such a request can only be originated by one of the Directorate Team Managers of the Directorate concerned and should be forwarded to the Security Manager.

8 8. BUILDING BLOCK SYSTEM It is envisaged that eventually the swipe card /fob systems will spread to other areas of the Trust, especially sensitive areas and to enhance outside perimeter security, in order to strengthen the Trust s security policy. 9. ACCESS CONTROL FORMS Forms relative to the issue of swipe cards and fobs to staff and instructions on using the cards can be seen at Appendices A, B, C, respectively. Directorates should ensure they have sufficient stock of these forms where access control is in operation. 10. TRAINING Advice on the policy, handling and use of the system is always available from the Security Manager or his Deputy.

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

Acorn Trust Mobile Phone Policy

Acorn Trust Mobile Phone Policy Acorn Trust Mobile Phone Policy Written by: J Buckley, Trust Business Manager Date agreed: 17 th May 2016 Date reviewed: Next Review Date: Summer 2018 Chairs Signature Mission Statement The Acorn Trust

More information

The University of Sheffield CCTV and Body worn cameras (BWC) Privacy Impact Assessment

The University of Sheffield CCTV and Body worn cameras (BWC) Privacy Impact Assessment The University of Sheffield CCTV and Body worn cameras (BWC) Privacy Impact Assessment 1. INTRODUCTION 1.1 This Privacy Impact Assessment (PIA) CCTV and BWC is recommended in The Surveillance Camera Code

More information

Use Of Mobile Communication Devices Within Healthcare Premises Policy

Use Of Mobile Communication Devices Within Healthcare Premises Policy Use Of Mobile Communication Devices Within Healthcare Premises Policy Co-ordinator: Director of Facilities Reviewer: Working Group chaired by Director of Facilities Approver: GAPF Signature Signature Signature

More information

Logging an Incident on Datix Web

Logging an Incident on Datix Web Logging an Incident on Datix Web Contents How to Log an Incident Using Datix Web... 4 Section 1 What happened?... 4 Section 2 - What Type of Incident is this?... 5 Section 3 Doctor Review for Patient-Related

More information

Privacy Impact Assessment

Privacy Impact Assessment Automatic Number Plate Recognition (ANPR) Deployments Review Of ANPR infrastructure February 2018 Contents 1. Overview.. 3 2. Identifying the need for a (PIA).. 3 3. Screening Questions.. 4 4. Provisions

More information

Laguna Honda Hospital and Rehabilitation Center. Security Management Plan

Laguna Honda Hospital and Rehabilitation Center. Security Management Plan Laguna Honda Hospital and Rehabilitation Center Security Management Plan 2018-2019 REFERENCES California Code of Regulations, Title 8, Sections 8 CCR 3203 et seq. California Code of Regulations, Title

More information

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017 GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015

More information

Ulster University Policy Cover Sheet

Ulster University Policy Cover Sheet Ulster University Policy Cover Sheet Document Title DATA CENTRE ACCESS POLICY 3.2 Custodian Approving Committee Data Centre & Operations Manager ISD Committee Policy approved date 2017 09 08 Policy effective

More information

Aged Care Security Solutions. security.gallagher.com

Aged Care Security Solutions. security.gallagher.com Aged Care Security Solutions security.gallagher.com Aged care security solutions The safety of residents and staff is the most important thing. Our objective at Gallagher is to create innovative solutions

More information

The University of Sheffield CCTV Privacy Impact Assessment

The University of Sheffield CCTV Privacy Impact Assessment Security Services. The University of Sheffield CCTV Privacy Impact Assessment Richard Yates Security Services Manager Arts Tower, Western Bank. Et : 29232 r.yates@sheffield.ac.uk March 2016 Version: 01

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Policies & Procedures Effective Date: January 24, Key Control

Policies & Procedures Effective Date: January 24, Key Control LSU Health Sciences Center Page 1 of 9 Key Control POLICY: Lost or stolen keys can pose a serious threat to the University s security and the potential theft or loss of State property. In order to provide

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

Best Practices for Campus Security. January 26, 2017

Best Practices for Campus Security. January 26, 2017 Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner

More information

Business Continuity Policy

Business Continuity Policy Business Continuity Policy Version Number: 3.6 Page 1 of 14 Business Continuity Policy First published: 07-01-2014 Amendment record Version Date Reviewer Comment 1.0 07/01/2014 Debbie Campbell 2.0 11/07/2014

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

Data Center Access Policies and Procedures

Data Center Access Policies and Procedures Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 1 Table of Contents UITS Data Center Access Policies and Procedures!3 Introduction!3. Overview!3 Data Center Access!3 Data

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc. Global Risks Peculiar to Resorts: Prevention, Management, Litigation Richard G. Hudak Managing Partner Resort Security Consulting Inc. www.resortsecurity.com Presenters Richard G. Hudak, Managing Partner,

More information

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase

More information

Information Governance Incident Reporting Policy

Information Governance Incident Reporting Policy Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Communications Room Policy

Communications Room Policy Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents

More information

The General Data Protection Regulation

The General Data Protection Regulation PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how

More information

Statutory Notifications

Statutory Notifications Registration under the Health and Social Care Act 2008 Statutory Notifications Guidance for registered providers and managers of NHS GP and other primary medical services May 2013 Statutory notifications

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS Glossary of Terms National Business Crime Solution To share is to participate - To participate is to drive change. FREQUENTLY ASKED QUESTIONS ABCP Association of Business Crime Partnerships ACPO Association

More information

Guidance for Accident Reporting

Guidance for Accident Reporting Guidance for Accident Reporting Produced by Date approved and agreed Health, Safety and Wellbeing 1 st February 2016 Review Date 1 st February 2017 Version 1.0 Document reference HSW/GN/AR If you need

More information

Update on 2018 Security Goal Plans and Strategies

Update on 2018 Security Goal Plans and Strategies Update on 2018 Security Goal Plans and Strategies City of Dallas Public Safety and Criminal Justice Committee January 8, 2018 Chief James D. Spiller Dallas Area Rapid Transit 1 AGENDA DART Board of Directors

More information

Data Privacy Breach Policy and Procedure

Data Privacy Breach Policy and Procedure Data Privacy Breach Policy and Procedure Document Information Last revision date: April 16, 2018 Adopted date: Next review: January 1 Annually Overview A privacy breach is an action that results in an

More information

Data Protection Privacy Notice

Data Protection Privacy Notice PETA Limited Page 1 of 7 Data Protection Privacy Notice PETA Limited provides a range of services to both members of the public and to those employed within business. To enable us to provide a service,

More information

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018 This privacy policy is published to provide transparent information about how we use, share and store any personal information that you may provide

More information

Information Security Incident

Information Security Incident Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

This procedure sets out the usage of mobile CCTV units within Arhag.

This procedure sets out the usage of mobile CCTV units within Arhag. CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Dealing with Bomb Threats, Suspicious Packages and Vehicles Procedure

Dealing with Bomb Threats, Suspicious Packages and Vehicles Procedure Dealing with Bomb Threats, Suspicious Packages and Vehicles Procedure Lead Manager Responsible Director Approved by Annette McCafferty David Loudon Resilience Group Date Approved Date for Review December

More information

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS Prepared by: Approved by: Chief Procurement Officer John Baskerville Chief Executive File number: D2015/65737 June 2015 MANAGEMENT

More information

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin

More information

Customer Service Excellence Response Audit (QM054c) Department: Quality Assurance. Summary by: Nassir Ahad (Quality Improvement Auditor)

Customer Service Excellence  Response Audit (QM054c) Department: Quality Assurance. Summary by: Nassir Ahad (Quality Improvement Auditor) Customer Service Excellence Email Response Audit 2013-14 (QM054c) Department: Quality Assurance Summary by: Nassir Ahad (Quality Improvement Auditor) Date: November 2013 Background: In December 2009, the

More information

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

Date of Next Review: May Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act Date Approved: January 27, 2010-Board Date of Next Review: May 2023 Dates of Amendments: May 17, 2018 Cross References: Electronic Communication Systems- Acceptable Use policy (A.29) Highway Traffic Act

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section.

NOTE: The first appearance of terms in bold in the body of this document (except titles) are defined terms please refer to the Definitions section. TITLE MOBILE WIRELESS DEVICES AND SERVICES SCOPE Provincial APPROVAL AUTHORITY Alberta Health Services Executive SPONSOR Information Technology PARENT DOCUMENT TITLE, TYPE AND NUMBER Not applicable DOCUMENT

More information

TELEPHONE AND MOBILE USE POLICY

TELEPHONE AND MOBILE USE POLICY TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University

More information

Mobile Phones and Electronic Devices Policy

Mobile Phones and Electronic Devices Policy Wetherby School Little Wetherby and Reception 19 Pembridge Villas London W11 3EP Wetherby School Years 1, 2 and 3 11 Pembridge Square London W2 4ED Mobile Phones and Electronic Devices Policy Policy reviewed

More information

University Facilities Management (UFM) Access Control Procedure (non-residence areas)

University Facilities Management (UFM) Access Control Procedure (non-residence areas) University Facilities Management (UFM) Access Control Procedure (non-residence areas) Date of Issue: October 1, 2015 A. PURPOSE University Facilities Management s (UFM) Lock Shop Access Control Procedure

More information

Number: USF System Emergency Management Responsible Office: Administrative Services

Number: USF System Emergency Management Responsible Office: Administrative Services POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last

More information

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:

Pasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference: CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function

More information

Norfolk & Suffolk Crime Prevention Guidance Note Building Site Security

Norfolk & Suffolk Crime Prevention Guidance Note Building Site Security Norfolk & Suffolk Crime Prevention Guidance Note Building Site Security. The construction industry loses an estimated 43m a year through theft or vandalism, that s almost 1m per week (source: Home Office).

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Crime Prevention Policy

Crime Prevention Policy 4.0 Final Crime Prevention Guidelines EQUALITY IMPACT The Trust strives to ensure equality of opportunity for all both as a major employer and as a provider of health care. This policy has therefore been

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES

Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Physical and Environmental Security Policy Document Number: OIL-IS-POL-PES Document Details Title Description Version 1.0 Author Classification Physical and Environmental Security Policy Physical and Environmental

More information

Incident Training Guide

Incident Training Guide Incident Training Guide Using the Main Application V1.4 (Non WHS Unit User) WHS Version Control Document Title: Incident Training Guide using the Main Application Document Issue: Version 1.4 Date Issued:

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

Information Services Office 365 Board. Mail Migration

Information Services Office 365 Board. Mail Migration Date: 24.09.12 B Information Services Office 365 Board Mail Migration Brief description of the paper This paper details the findings from the investigations undertaken regarding the migration of all student

More information

The policy is applicable whenever a pupil is on the school campus, as well as on school trips and extra-curricular activities.

The policy is applicable whenever a pupil is on the school campus, as well as on school trips and extra-curricular activities. Author/reviewer responsible: Head of Wellbeing ISI DOC CODE: n/a Reviewed by: PPC, SPS SMT Date of last review: 02/18 Authorised by resolution of: SPS SMT Date of authorisation: 02/18 Date of next review:

More information

Mobile Phone Policy General Use

Mobile Phone Policy General Use Mobile Phone Policy General Use Author(s) Daniel Clifford, IT and Systems Project Manager Version 2.1 Version Date July 2013 Implementation/approval Date July 2013 Review Date July 2016 Review Body Policy

More information

Aneurin Bevan Health Board

Aneurin Bevan Health Board Aneurin Bevan Health Board Information Governance Committee Minutes of the meeting held on 10 February 2010, 2pm, in the Small Boardroom, Mamhilad House Present: Prof Janet Wademan - Independent Member

More information

ISC10D026. Report Control Information

ISC10D026. Report Control Information ISC10D026 Report Control Information Title: General Information Security Date: 28 January 2011 Version: v3.08 Reference: ICT/GISP/DRAFT/3.08 Authors: Steve Mosley Quality Assurance: ISSC Revision Date

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

TELECOMMUNICATIONS ACCESS POLICY 2011

TELECOMMUNICATIONS ACCESS POLICY 2011 TELECOMMUNICATIONS ACCESS POLICY 2011 The Vice Chancellor and Principal, as delegate of the Senate of the University of Sydney, adopts the following policy. Dated: 31 January 2011 Signature: Name: Michael

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Zubair A Rehman Bin Saeed

Zubair A Rehman Bin Saeed Zubair A Rehman Bin Saeed https://pk.linkedin.com/in/zubairabdulrehmanbinsaeed 0304-6090990 / 0324-500559 Pakistan Safety Security & Loss Prevention Management Protecting People Assets & Property I am

More information

XAVIER UNIVERSITY Building Access Control Policy

XAVIER UNIVERSITY Building Access Control Policy Effective: March 25, 2019 Last Updated: March 20, 2019 XAVIER UNIVERSITY Building Access Control Policy Responsible University Office: Auxiliary Services, Physical Plant Responsible Executive: Vice President,

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

DATA SUBJECT ACCESS REQUEST PROCEDURE

DATA SUBJECT ACCESS REQUEST PROCEDURE DATA SUBJECT ACCESS REQUEST PROCEDURE DATA PROTECTION ACT 1998 This procedure seeks to ensure that the Transport Executive receives and processes Data Subject Access Requests in accordance with the Data

More information

Process Definition: Security Services

Process Definition: Security Services Process Definition: Services 1. SUMMARY Process Definition: Services 1.1. This document defines the processes provided by the Services team in detail. 1.2. The relationship between this Business Unit process

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

This policy should be read in conjunction with LEAP s Conflict of Interest Policy.

This policy should be read in conjunction with LEAP s Conflict of Interest Policy. Policy Number 4.1 Policy Name Release No. 2 Release Date August 2017 Date For Next Review August 2018 Policy LEAP Social Services/Different Abilities Services (LEAP) is committed to the effective, timely

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group,

Management. Port Security. Second Edition KENNETH CHRISTOPHER. CRC Press. Taylor & Francis Group. Taylor & Francis Group, Port Security Management Second Edition KENNETH CHRISTOPHER CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business Preface

More information

Do the police code information in any way to indicate a mental health crisis? Or submit notifications/referrals to mental health services?

Do the police code information in any way to indicate a mental health crisis? Or submit notifications/referrals to mental health services? Freedom of Information Request Reference N o : FOI 000709-18 I write in connection with your request for information received by Suffolk Constabulary on the xxx 2018 in which you sought access to the following

More information

Standard CIP-006-3c Cyber Security Physical Security

Standard CIP-006-3c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security

More information

Electronic Device Policy (EDP)

Electronic Device Policy (EDP) Powerstown Educate Together National School Roll No: 20384J Powerstown Road, Tyrrelstown, Dublin 15 Telephone: 01 8272018 Email: info@powerstownet.com www.powerstownet.com Powerstown Educate Together National

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures Agreement and Disclosures INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking Service and all other services made available

More information

SITE FILE MANAGEMENT

SITE FILE MANAGEMENT SITE FILE MANAGEMENT STANDARD OPERATING PROCEDURE NO SOP 08 DATE RATIFIED 4/7/13 NEXT REVIEW DATE 4/7/14 POLICY STATEMENT/KEY OBJECTIVES: To describe the procedure for the maintenance of essential documents

More information

IT Security Standard Operating Procedure

IT Security Standard Operating Procedure IT Security Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not be utilised as guidance

More information

Remote Working & Mobile Devices Security Standard

Remote Working & Mobile Devices Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information

More information

BRITISH LIBRARY COMPLAINTS POLICY

BRITISH LIBRARY COMPLAINTS POLICY BRITISH LIBRARY COMPLAINTS POLICY INTRODUCTION 1. The British Library is committed to providing excellent service, and we invite feedback - to ensure the continuous improvement of the services and facilities

More information

Guernsey Police Business Plan

Guernsey Police Business Plan Guernsey Police Business Plan 2013 2016 Contents 1. Introduction 2. Our Vision & Values 3. Achievements for the period 2011-12 4. Priorities for the period 2013-16 Appendices Appendix A Force structure

More information

Compliance with ISPS and The Maritime Transportation Security Act of 2002

Compliance with ISPS and The Maritime Transportation Security Act of 2002 Mr. Melchor Becena Security Administrator Port Everglades SecurePort Conference Miami, Florida 25-27 27 February, 2004 Compliance with ISPS and The Maritime Transportation Security Act of 2002 Overview

More information

St Edmund Arrowsmith Catholic Centre for Learning

St Edmund Arrowsmith Catholic Centre for Learning St Edmund Arrowsmith Catholic Centre for Learning Mobile Device Policy (Students) September 2016 This Policy was adopted and ratified by the Full Governing Body of SEA. C.F.L. at the meeting held on Signed...

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:

More information

Timico Data Centres: Access Policy

Timico Data Centres: Access Policy Timico Data Centres: Access Policy Timico Ltd 2012 Page: 1 of 6 1 Contents 1 Contents... 2 2 Version control... 2 3 Overview... 3 4 Introduction... 3 5 Rules of conduct... 3 6 Access request procedure...

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

Information Services IT Security Policies L. Network Management

Information Services IT Security Policies L. Network Management Information Services IT Security Policies L. Network Management Version 1.1 Last updated: 11th August 2010 Approved by Directorate: 2nd July 2009 Review date: 1st August 2011 Primary owner of security

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

A guide to placing your DSA order

A guide to placing your DSA order A guide to placing your DSA order THE LEADING SUPPLIER OF DSA EQUIPMENT TO THE UK DSA Student Guide Welcome to Barry Bennett, the leading supplier of DSA equipment to the UK. We are a family owned business

More information

2017/2018 Havant & South Downs College hsdc.ac.uk

2017/2018 Havant & South Downs College hsdc.ac.uk 2017/2018 Mike Gaston, Principal & CEO Havant & South Downs College, South Downs Campus College Road, Waterlooville, PO7 8AA 023 9387 9999 college@hsdc.ac.uk hsdc.ac.uk WELCOME At Havant & South Downs

More information

Broadcast Notification solutions

Broadcast Notification solutions Broadcast Notification solutions Fast, accurate group communication to enhance your security response security.gallagher.com Broadcast Notification solutions Mobile Network Provider Staff in building 2

More information

University of North Texas System Administration Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including

More information

Standard CIP-006-4c Cyber Security Physical Security

Standard CIP-006-4c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-4c 3. Purpose: Standard CIP-006-4c is intended to ensure the implementation of a physical security

More information

1. To provide an update on the development of the SPA Assurance Map.

1. To provide an update on the development of the SPA Assurance Map. Meeting SPA Date and Time 9 June 2014 1015hrs Location Britannia Building, Room B024, Glasgow Caledonian University Title of Paper Assurance Map Item Number 8.2 Presented By Graham Stickle For Approval

More information

In Company Abrasive Wheels Instructor / Examiner Training & Certification

In Company Abrasive Wheels Instructor / Examiner Training & Certification Health & Safety Certification & Services Ltd Central Administration Office - 100 Princes Street, Kettering, Northamptonshire, NN16 8RR Tel: 01536 414966 Fax: 01536 416933 email: info@hscsltd.co.uk WEB

More information