Information Governance Policy (incorporating IM&T Security)

Size: px
Start display at page:

Download "Information Governance Policy (incorporating IM&T Security)"

Transcription

1 (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the Trust and third parties supplying goods and services to the Trust Version 5.1 Approved by Caldicott & IG Committee Date approved 14th June 2016 Ratified by Executive Management Committee Date ratified 22nd July 2016 Author Information Governance Manager Lead Director Director of Finance Name of Responsible individual/committee Caldicott & IG Committee TPSG- Consultation Caldicott & IG Committee BHT Document BHT Pol 051 Reference Department Document IG0005 Reference Date Issued May 2016 Review Date May 2019 Target Audience All Trust Staff Location Swan Live Intranet Policies & Guidelines/Policies & Strategies/Information Governance Equality Impact June 2016 Assessment

2 Approval and Authorisation Completion of the following detail signifies the review and approval of this document, as minuted in the senior management group meeting shown. Version Authorising Group Date 2.0 Caldicott & Information Governance Committee Dec Ratified Trust Management Committee April Ratified Trust Management Committee Caldicott & Information Governance Committee Dec Ratified by Trust Management Committee March Ratified by Executive Management Committee Change History Version Status Reason for change Author Date 2.6 Draft Minor amendments following consultation A Chilcott Dec Draft Circulated to Joint Management & Staff Committee A Chilcott Jan Approved Caldicott & Information Governance Chairman s A Chilcott April 10 action 3.0 Ratified Ratified Trust Management Committee A Chilcott May 10 Informal annual review no changes A Chilcott July Draft Formal review minor changes only. Circulated to A Chilcott Feb 13 Caldicott & IG Committee 4.0 Approved Caldicott Committee Chairman s action noted at the A Chilcott Apr 13 meeting TNC Minor change to section 4 re removal of SIRO job A Chilcott Jan 14 title 4.2 Update Annual informal review - Updated section 3.3- L Pask/ Nov 2014 Information Security regarding the new logging and reporting requirements of SIRI to the IG Incident Reporting Tool in the IG Toolkit. Section 5- updated 5.3 Caldicott Review2 and added new section 5.5 -HSCIC S Abraham 4.3 Draft Circulated to Caldicott and IG Committee L Pask / Nov 2014 S Abraham 4.3 Approved Caldicott and IG meeting L Pask / Mar Draft Formal review Added new section 5.6 NHS Constitution for England Revised section 6 Monitoring this policy Approved Approved by - Caldicott and IG Committee TPSG 1 S Abraham L Pask / S Abraham May 2016 June Approved Ratified by EMC July Added new section 5.7 following consultation Accessible Information Standard L Pask Aug 2016 Related Documents Ref # Document title Document Reference Document location 1 Confidentiality Code of Practice IG0008 Intranet

3 Ref # Document title Document Reference Document location 2 IT Access to Secure Areas Procedure IG0047 Intranet 3 Confidentiality and Data Protection Code of Conduct & IG0012 Intranet Agreement for Third Parties Supplying Goods, Services or Consultancy to the Trust 4 Freedom of Information Policy BHT Pol 042 Intranet 5 IT Network Remote Access Policy IG0056 Intranet 6 IT Asset Management procedure IG0054 Intranet 7 Safe Haven Procedure IG0048 Intranet 8 Computer User Access Management Policy IG0031 Intranet 9 IT Computer Usage Policy IG0009 Intranet 10 Trust Incident Reporting Policy & Procedure Intranet 11 Handling Reported Information Security Incidents Procedure IG0043 Intranet 12 IT Virus Control Procedure IG0044 Intranet 13 IT Network Security Policy IG0042 Intranet 14 IT Internet Access Policy IG0034 Intranet 15 IT User Account and Usage Policy IG0035 Intranet 16 Procedure for Implementing New Databases and Information IG0025 Intranet Flows 17 IT Server Security Procedure IG0055 Intranet 18 Information Governance Strategy IG0041 Intranet 19 Risk Management Policy BHT Pol 079 Intranet 20 Risk Management Strategy BHT S019 Intranet 21 Waste Management Policy BHT Pol 095 Intranet 22 Records Management Policy BHT Pol 125 Intranet 23 Records Management Strategy BHT S018 Intranet 24 Information Risk Policy IG0088 Intranet Reference Documents Ref Document title # 1. NHS Code of Conduct & Accountability code of conduct & Accountability 2. Freedom of Information Act a/2000/36/contents 3. Data Protection Act a/1998/29/contents 4. Health & Social Care Act a/2012/7/contents/enacted 5. NHS Care Records Guarantee (2011) V5 asmartcards/documents/crg. pdf 6. Caldicott Review 2 Dept of Health The Information Governance Review (2013) 7. HSCIC Sept A Guide to Confidentiality in Health & Social Care- Treating confidential information with respect. ent/uploads/system/uploads/ attachment_data/file/ / _InfoGovernance_ accv2.pdf ia/12822/guide-toconfidentiality-in-health-andsocial-care/pdf/hscicguide-to-confidentiality.pdf Internet Internet Internet Internet Internet Internet Internet 2

4 Table of Contents 1. PURPOSE SCOPE POLICY PRINCIPLES Openness Legal Compliance Information Security Information Quality Assurance MANAGEMENT STRUCTURE AND RESPONSIBILITY LEGISLATION AND KEY REFERENCE DOCUMENTS MONITORING THIS POLICY REVIEW OF THIS POLICY APPENDIX A - INFORMATION MANAGEMENT AND SECURITY FRAMEWORK. 12 3

5 1. PURPOSE Information is a vital and valuable asset, both in terms of the clinical management of individual patients and the efficient management of services and resources. It plays a key part in corporate governance, service planning and performance management. It is of paramount importance to ensure that the Trust s information and key information assets are efficiently managed, and to have a solid strategy in place to comply in full with the legal, regulatory and governance requirements and mandates. The purpose of the Policy is to establish a robust governance framework for information management and preserving the confidentiality, integrity, security and accessibility of data, processing systems and information in Buckinghamshire Healthcare NHS Trust. Appendix A provides a more detailed set of requirements in relation to information management and technology security controls. The Trust monitors its Information Governance (IG) controls through the Health and Social Care Information Centre (HSCIC) IG Toolkit (supported by Department of Health), which is a mandatory performance and management self-assessment tool, ensuring compliance with the legal and regulatory requirements of handling information, covering the areas of: Information Governance Management Confidentiality and Data Protection Assurance Information Security Assurance Clinical Information Assurance Secondary Use Assurance Corporate Information Assurance All information security requirements in the NHS Information Governance toolkit are based on the international standard BS ISO/IEC 27002: SCOPE This policy applies to all information, information systems, networks, applications, location, staff employed or working on behalf of the Trust and third parties supplying goods and services to the Trust. 3. POLICY PRINCIPLES The principles are to establish and maintain the security and confidentiality of information, information systems, applications and networks owned or held by the Trust by: Ensuring that all members of staff are aware of their personal responsibilities and fully comply with the relevant legislation as described in this and other policies. Introducing a consistent approach to security, ensuring that all members of staff fully understand their own responsibility and the need for an appropriate balance between openness and confidentiality in the management and use of information. Creating and maintaining within the organisation a level of awareness of the need for Information Security as an integral part of the day to day business and explaining how it should be implemented in the organisation. Supporting the principles of corporate governance and recognising its public accountability and at the same time safeguarding the confidentiality and security 4

6 of both personal information about patient and staff and commercially sensitive information. Recognising the need to share patient information with other health organisations and other agencies in a controlled manner consistent with the interests of the patient and, in some circumstances, the public interest. Protecting information assets under the control of the Trust. There are 4 key interlinked strands to the Information Governance Policy: Openness Legal compliance Information security Quality assurance 3.1 Openness Non-confidential information about the Trust and its services should be available to the public through a variety of media, in line with the NHS Code of Conduct & Accountability The Trust will establish and maintain policies to ensure compliance with the Freedom of Information Act 2000 The Trust will undertake or commission regular assessments and audits of its policies and arrangements for openness Patients should have ready access to information relating to their own health care, their options for treatment and their rights as patients The Trust will have clear procedures and arrangements for liaison with the press and broadcasting media The Trust will have clear procedures and arrangements for handling queries from patients and the public 3.2 Legal Compliance The Trust will comply with the Data Protection Act 1998 and will establish and maintain appropriate and adequate administration arrangements for responding to data subject access requests within the timescales defined under the Act. The Trust regards all identifiable information relating to patients and staff as confidential except where exemptions can be applied. Trust staff will be made aware of all other relevant legislation and guidance relating to information security and confidentiality. Patients will be informed of the purpose for which information is being collected and who may access it. Direct consent will be sought from the patient where appropriate for the collection, processing and disclosure of data. Procedures and guidance will be provided to ensure appropriate disclosure of patient information, having regard to established professional ethics, patient consent, and formal access controls for clinical records and statutory requirements. The Trust will undertake or commission regular assessments and audits of its compliance with legal requirements. 5

7 The Trust will establish and maintain policies to ensure compliance with the common law duty of confidentiality and all relevant Acts of Parliament. Patient and/or staff information will be shared with other agencies in accordance with agreed protocols and relevant legislation (e.g. Health and Social Care Act, Crime and Disorder Act, Protection of Children Act). 3.3 Information Security Systems will be established to ensure that corporate records including health records are available and accessible at all times. The Trust will establish effective authorisation procedures for the use and access to confidential information and records. Control over access and disclosure to health records is overseen by the Caldicott Guardian. The Trust will establish and maintain policies for the effective and secure management of its information assets and resources. The Trust will undertake or commission regular assessments and audits of its information and IT security arrangements. The Trust will promote effective confidentiality and security practice to its staff through policies, procedures and training. The Trust will establish and maintain incident reporting procedures which will include the monitoring and investigation where appropriate, of reported instances of actual or potential breaches of confidentiality or information security. All IG Serious Incidents Requiring Investigations (SIRI) will be assessed and graded by using Health & Social Care Information Centre (HSCIC) checklist guidance. All level 2 or above IG serious incidents are logged onto the Incident Reporting Tool in the IG Toolkit which then will automatically notify the Department of Health and Information Commissioners Office. 3.4 Information Quality Assurance The Trust will establish and maintain policies and procedures for information quality assurance and the effective management of records. The Trust will undertake or commission regular assessments and audits of its information quality and records management arrangements. Information Asset Owners and Line Managers are expected to take ownership of, and seek to improve, the quality of information within their services. Wherever possible, information quality should be assured at the point of collection. Data standards will be set through clear and consistent definition of data items, in accordance with national standards. 4. MANAGEMENT STRUCTURE AND RESPONSIBILITY All Trust staff are required to maintain the security, confidentiality, integrity and availability of all Trust information including that which relates to patients and staff. Information Governance responsibilities will be detailed in all job descriptions and staff contracts of employment and in the contracts for all suppliers and other external users. Non compliance with the policy can result in disciplinary action. 6

8 Trust Board It is the role of the Trust Board to define the Trust s policy in respect of Information Governance and risk and meeting legal, statutory and NHS requirements. Is responsible for ensuring that sufficient resources are provided to support the requirement of the policy. The responsibility for this is delegated through the Chief Executive Officer to the Finance Director as Senior Information Risk Owner (SIRO). Executive Management This committee is the forum for making major operational decisions and assists the Chief Executive in the performance of their duties. Committee Development and implementation of strategy, operational plans, policies, procedures and budgets. Monitoring of operating and financial performance. The assessment and control of risk, prioritisation and allocation of resources. Receives and acts on reports from the SIRO through the Caldicott & Information Governance Committee. Senior Information Risk Owner (SIRO) Information Asset Owner (IAO) Caldicott & Information Governance Committee The Senior Information Risk Owner is responsible for and takes ownership of the organisation s Information Governance/risk policy and acts as advocate for Information Governance risk on the Board. Authorises the Information Governance Toolkit Self-Assessment submissions. Ensures that an effective information assurance governance infrastructure is in place including information asset ownership, reporting, defined roles and responsibilities. Ensures that the Caldicott and Information Governance Committee have a suitably experienced chairman in place. Information Asset Owners are senior individuals involved in running the relevant business. Their responsibility is to identify, understand and address risk to the information assets they own. Responsible for the operational management of Trust s records in accordance with Trust policy. Accountable to the SIRO for providing assurance on the security and use of their information assets. This committee is responsible for overseeing day to day Information Governance issues. Develop, maintain and approve policies, standard procedures and guidance. Coordinate and raise awareness of Information Governance in the Trust. Report on an exception basis to the Trust Management Committee on information Governance issues and risk Support the Senior Information Risk Manager in completion of their delegated duties. Direct and monitor compliance with the HSCIC Information Governance Toolkit. 7

9 Caldicott Guardian The Caldicott Guardian acts in a strategic, advisory and facilitative capacity in the use and sharing of patient information. Responsible for approving, monitoring and reviewing protocols governing access to person identifiable information by staff within the Trust and other organisations both NHS and non NHS. Information Governance Provides expert technical advice and guidance to the Trust on matters relating to information governance. Manager/Information Acts as the Trust Information Security Manager. Security Officer Develops and provides suitable Information Governance training for all staff. Monitors actual or potential reported information security incidents within the organisation. Refer to policy IG0043 Handling Reported Security Incidents (BHT Pol 221). Supports and assists the IT security officer with regard to IT/information security incidents. Responsible for the timely completion and submission of the end of financial year HSCIC IG Toolkit self-assessment. Head of IT Operations / IT Security Officer Provides expert technical advice to the Trust on matters relating to IT Security and ensures compliance and conformance. Acts as the Trust IT Security Manager. Supports and assists Information Security Officer with regard to IT/information security incidents. Managers Responsible for ensuring that the policy and its supporting standards and guidelines are built into local processes and that there is ongoing compliance. That all staff job descriptions contain the relevant responsibility for information security, confidentiality and records management. That staff undertake information governance mandatory training and ongoing training needs are routinely assessed. Managers shall be individually responsible for the security of their physical environment where information is processed and stored. Day to day responsibility for the management of trust records within their respective area/department. All staff All staff, whether permanent, temporary or contracted, including students, contractors and volunteer staff shall comply with information security policy and procedures including the maintenance of data confidentiality and data integrity and ensure that no breach of information security or confidentiality, result from their actions. Failure to do so may result in disciplinary action. All staff must ensure they keep appropriate records of their work in the Trust and manage those records in keeping with this policy and with any other guidance subsequently produced. Each member of staff shall be responsible for the operational security of the information systems they use. All staff are required to undertake relevant Information Governance training covering confidentiality and information security. Third Party Contractors/third parties Appropriate contracts and confidentiality/information security agreements shall be in place with third party contractors/ third parties where potential or actual access to information assets is identified. 8

10 5. LEGISLATION AND KEY REFERENCE DOCUMENTS 5.1 The Trust is obliged to abide by all relevant UK and European Union legislation. The requirement to comply with this legislation shall be devolved to employees and agents of the Trust, who may be held personally accountable for any breaches of information security for which they may be held responsible. The Trust shall comply with the following legislation, key documents and other legislation as appropriate: The Data Protection Act (1998) The Data Protection (Processing of Sensitive Personal Data) Order 2000 The Copyright, Designs and patents Act (1988) The Computer Misuse Act (1990) The Health and Safety at Work Act (1974) Human Rights Act (1998) Regulation of Investigatory Powers Act 2000 Freedom of Information Act 2000 Health & Social Care Act 2008 Confidentiality: NHS Code of Practice Records Management: NHS Code of Practice Information Security Management: NHS Code of Practice Caldicott Committee Report 1997 and Caldicott Review The NHS Care Record Guarantee for England 2005 (Revised 2011) sets out the rules that govern how patient information is used in the NHS and what control the patient can have over this. It covers people's access to their own records, controls on others' access, how access will be monitored and policed, options people have to further limit access, access in an emergency, and what happens when someone cannot make decisions for themselves. Everyone who works for the NHS or for organisations delivering services under contract to the NHS has to comply with this guarantee. 5.3 The Department of Health Committee s Report on the Review of Patient Identifiable Information published December 1997 made a number of recommendations including the appointment of a Caldicott Guardian in all NHS organisations (Health Service Circular 1999/012) and also led to the establishment of a set of six clear principles, reflecting best practice in the handling of confidential patient information. The Principles were revised in September 2013 by the Caldicott 2 review Panel in their report Information To share or not to share: The Information Governance Review. This review highlighted the need for an appropriate balance between the protection of patient information and the need to share patient information when sharing would be in the patient s best interests, which has lead to the introduction of a new seventh Caldicott Principle. 5.4 A Cabinet Office data handling review in December 2008 mandated a range of standards for managing information and to ensure compliance with the Data Protection Act These are reflected within the NHS Information Governance Toolkit (Department of Health mandated self-assessment against compliance with current legislation, standards and national guidance). 5.5 In September 2013, the Health and Social Care Information Centre (HSCIC) also published A Guide to Confidentiality in Health & Social Care - Treating confidential information with respect. This guide summarises existing laws, principles and obligations 9

11 when using or sharing confidential information and describes the confidentiality rules that people are entitled to expect to be followed in care settings run by the NHS or publicly funded adult social care services. 5.6 The NHS Constitution for England (revised 2013) sets out a series of patients rights and NHS pledges. All NHS bodies and private and third sector providers supplying NHS services are required by law to take account of the constitution in their decisions and actions. The relevant right for this requirement is: You have the right to privacy and confidentiality and to expect the NHS to keep your confidential information safe and secure. 5.7 Accessible Information Standard The Accessible Information Standard applies to service providers across the NHS and directs and defines a specific, consistent approach to identifying, recording and sharing the information and communication needs of patients, service users and their carers where those needs relate to a disability or impairment. The aim of the Standard is to establish a framework for identifying, recording and sharing this information so that patients can access services appropriately and independently and remain involved in decisions around their care and treatment. Ref: SCCI1605 Accessible Information Specification Organisations must provide one or more communication or contact methods which are accessible to and useable by the patient, service user, carer or parent and staff must use this method to contact this individual. Examples of accessible communication/contact needs include , text message, and telephone and when alternative contact methods are requested, it is important to remember that patient confidentiality and information security must not be compromised and reference should be made to the appropriate policy e.g. IT User Account and Usage Policy _it_user_account_and_ _usage_policy_v4.1_rvw_july_2018_1.pdf to ensure consent is appropriately documented and the patient or service user is made aware of the risks involved. 6. MONITORING THIS POLICY Elements to be monitored Key roles and responsibilities IG training compliance Information security breaches Best practice across the Trust Conformance with Dept of Health and HSCIC requirements Monitoring method Review job description and contract Report from training programme to identify staff who are noncompliant Incident reporting system Confidentiality spot checks IG Toolkit assessment Lead Line manager and HR Information Governance Information Governance Information Governance Information Governance Frequency of monitoring Annually Regular Regular Regular Three times a year Reporting arrangements SIRO Caldicott and IG Committee Caldicott and IG Committee, SIRO Caldicott and IG Committee Caldicott and IG Committee, SIRO 10

12 7. REVIEW OF THIS POLICY This document should be subject to review when any of the following conditions are met: a. The adoption of the Code of Conduct highlights errors and omissions in its content. b. Where other standards / guidance issued by the Trust conflict with the information contained. c. Where the knowledgebase regarding interpretation of the legislation evolves to the extent that revision would bring about improvement. d. 3 years from the ratification date. 11

13 Information Governance Policy Appendix A - INFORMATION MANAGEMENT AND SECURITY FRAMEWORK Information takes many forms and includes data stored on computers, transmitted across networks, printed copy, handwritten, sent by fax, stored on tapes, diskettes, CDs, DVDs, USB memory sticks and other mobile media, or spoken in conversation and over the telephone. Data represents an extremely valuable asset and to ensure its integrity the Trust must safeguard accuracy and completeness by protecting against unauthorised use/disclosure, modification or intelligent interruption. The increasing reliance of the NHS on information technology for the processing of data and delivery of healthcare makes it necessary to ensure that these systems are developed, operated, used and maintained in a safe and secure fashion to protect from events, accidental or deliberate, that may jeopardise healthcare activities. This document is intended to reflect guidance and best practice contained in the Department of Health Information Security Management: NHS Code of Practice, April 2007 The key issues addressed by this framework are: Confidentiality Data is secure and access is confined to those with specified authority to view the data. Integrity All system assets are operating correctly according to specification and in the way the current user believes them to be operating. Availability Relevant information is delivered to the right person when it is needed. 1. Information Security Awareness Training Information security awareness training shall be included in the staff induction process. An ongoing awareness programme shall be established and maintained in order to ensure that staff awareness is refreshed and updated annually. 2. Contracts of Employment Staff security requirements shall be addressed at the recruitment stage and all contracts of employment shall contain a confidentiality clause. Information security expectations of staff shall be included within appropriate job definitions. All contract agreements with Third Party suppliers of goods, services or consultancy with access or possible access to Trust information assets shall contain a confidentiality clause and an undertaking that any information obtained during the course of performing the contract is confidential and shall only be used for the sole purpose of the execution of the contract and will provide all necessary precaution to ensure that all such information is kept secure. They also must sign up to the Trust Third Party Confidentiality Code of Conduct & Non-Disclosure agreement, IG

14 3. Security Control of Assets Each information asset, (hardware, software, IT application or data) shall have a named information asset owner who shall be responsible for the information security of that asset. A register of all computing assets and their owners will be established and maintained by the IT department. 4. Access Controls to IT secure Areas Only authorised personnel who have a justified and approved business need shall be given access to restricted areas containing information system and data storage facilities. Records of access will be maintained. 5. User Access Controls and monitoring Access to information shall be restricted to authorised users who have a bona-fide business need to access the information. Electronic audit trail shall be maintained and reviewed as necessary where the system is capable of providing these. 6. Computer Access Control Access to computer facilities shall be restricted to authorised users who have a business need to use the facilities. Access to data, system utilities and program source libraries shall be controlled and restricted to those authorised users who have a legitimate business need e.g. systems or database administrators. 7. Security of IT system In order to minimise loss or damage to all assets, equipment shall be physically protected from threats and environmental hazards. The Trust will define certain locations as IT secure areas and the equipment will be installed and sited in accordance with the manufacturer s specification. All items of computer equipment must be recorded on the Trust register of IT assets. IT equipment should be kept out of view of the general public if possible: where this is not possible computer screens should not normally be visible from public circulation areas. Wherever possible screen savers should be applied. Areas housing computer equipment should keep the doors and windows closed or locked when unattended. 8. IT System Management Responsibilities will be appropriately assigned for the management of IT systems. These will include the management, monitoring and auditing of access to IT systems and the timely management of new starters and leavers and those changing job role. In addition, the National Programme for IT (NPfIT) requires Trusts to have established appropriate confidentiality audit procedures. 13

15 9. Computer and Network Procedures Management of computer and networks shall be controlled through standard documented procedures that have been authorised by the IT Department. Network risk assessments will be developed and undertaken routinely by the IT Department. A register of both internal and external users and systems will be maintained by the IT department who will be responsible for determining and controlling access rights. The Trusts network is protected from intrusion by a series of controls implemented on Trust firewalls and these are checked on a regular basis and updated as appropriate or as required. 10. Protection from Malicious Software The Trust shall use software countermeasures and management procedures to protect itself against the threat of malicious software. The Trust will maintain an IT Virus Control Procedure. 11. User media Removable media of all types that contain software or data from external sources, or that have been used on external equipment, require the approval of the IT Security Officer before they may be used on the Trust s systems. Such media must also be fully virus checked before being used on the organisation s equipment. Users breaching this requirement may be subject to disciplinary action. Staff and contractors who are permitted to use portable media to transfer person identifiable data in the performance of their duties must apply industry standard AES256 data encryption procedures. Only the Trust approved encrypted memory/usb sticks may be used where use of these are deemed necessary. The use of port control will restrict access only to Trust permitted devices. 12. Access to the Internet and The Trust will ensure adequate provision of user training to support access to Internet and . The Trust will maintain appropriate policies covering all areas regarding access to the internet and use of System Procurement and Acceptance Trust policies on security and confidentiality must be reflected in any procurement for new or enhanced systems. All purchases of hardware, software and other related IT services e.g. IT support, maintenance or consultancy must be made through the Trust s approved purchasing arrangements using the standard NHS Terms and Conditions. Managers must ensure that the Trust policy - Policy for the Procurement or Implementation of New IT Systems, Databases, Software and Information Flows IG0025 and that acceptance criterion are agreed with the supplier and Trust IG & IT services and must be thorough and adequately documented and demonstrate conformance to data security and confidentiality specifications. 14

16 The IG0025 and the Business Case for each procurement must be presented at the IT Capital Sub-Group and be approved before the procurement can proceed. Failure to do so may result in a delay in system installation. 14. Accreditation of Information Systems The Trust shall ensure that all new information systems, applications and networks include a security plan and are risk assessed and are approved by the IT Security Officer and Information Security Officer before they commence operation. 15. System Change Control Changes to information systems, applications or networks shall be reviewed and approved by the IT Service Support Manager. 16. Intellectual Property Rights The Trust shall ensure that all information products are properly licensed and approved by the IT Department. Users shall not install software on the Trust s property without permission from the IT Department. 17. Information Risk Assessment and Management All key/critical computer systems will be subject to periodic risk assessments carried out by systems managers/administrators. In the cases of manual information processes, line managers will carry out risk assessments. The Trust will develop a procedure for carrying out IM&T systems risk assessments. The procedure will include: Roles and Responsibilities Timescales Planned and unplanned assessments Assessment of assets of the system Evaluation of potential threats/risks Assessment of likelihood of threats/risks occurring Identification of practical cost effective treatment plans Implementation programme for treatment plans Reporting Once identified, information security risks shall be managed on a formal basis. They shall be recorded within a baseline risk register and action plans shall be put in place to effectively manage those risks. The risk register and all associated actions shall be reviewed at regular intervals. Any implemented information security arrangements shall also be a regularly reviewed feature of Trust s risk management programme. 18. Business Continuity and Disaster Recovery Plans The Trust shall ensure that business impact assessment, business continuity and disaster recovery plans are produced for all mission critical information, applications, systems and networks. 15

17 Information Asset Owners (IAOs) are responsible for ensuring that business continuity plans are in place and identifying need for early review due to, for example, system or environment changes. Each plan for coping with disastrous failure must be approved by the appropriate level of authority in the Trust and be adequately resourced. 19. Data Quality and Validation The Information Asset Owners will ensure there is up to date, complete and accurate data within information system that support operational and clinical decision-making. Where possible validation of data entry and data analysis at input stage will be incorporated and maintained. 20. Information Security Incident Management All information security events and suspected weaknesses must be reported through the Trust Incident Reporting Policy & Procedures. The Information Security officer/information Governance Manager will maintain an Information Governance procedure for Reported Information Security Incidents. Information security events shall be appropriately reviewed to establish their cause and impacts with a view to avoiding similar events. 21. Disposal of IT Equipment and/or confidential/sensitive data IT equipment disposal must only be authorised by the IT Department. The IT department must ensure that, where possible, data storage devices are securely purged of sensitive data before disposal and organise any proposed secure destruction arrangements where it is not. A procedure for disposal will be documented and retained by the IT department. Unusable computer media must be destroyed (e.g. floppy disks, magnetic tapes, CD-ROMS). Where this is performed by an approved third party organisation, a certificate of disposal must be obtained. All data must be disposed off securely and in accordance with the relevant legislation and Trust policies. Contracts with the third party suppliers must have clauses relating to the safe and secure disposal of media containing data processed on behalf of the Trust. Disposal of equipment must be in accordance with the Trust Standing Orders and Standing Financial Instructions. 22. Standards of Business Conduct/Declaration of Interests All Trust staff and members of the Board must comply with the Trust Guidance on Standards of Business Conduct for Trust Staff available on the Trust intranet. 16

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin

More information

ICT Portable Devices and Portable Media Security

ICT Portable Devices and Portable Media Security ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data

More information

Information Governance Incident Reporting Procedure

Information Governance Incident Reporting Procedure Information Governance Incident Reporting Procedure : 3.0 Ratified by: NHS Bury CCG Quality and Risk Committee Date ratified: 15 th February 2016 Name of originator /author (s): Responsible Committee /

More information

Information Security Strategy

Information Security Strategy Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

INFORMATION GOVERNANCE. Caldicott Approval Procedure

INFORMATION GOVERNANCE. Caldicott Approval Procedure NHS TAYSIDE INFORMATION GOVERNANCE Caldicott Approval Procedure Author: Peter McKenzie Review Group: Information Governance Group Review Date: September 2010 Last Update: September 2009 Document : NHST-ISC-CAP

More information

Information Governance Incident Reporting Policy

Information Governance Incident Reporting Policy Information Governance Incident Reporting Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 29 th November 2017 Name of originator

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

DATA PROTECTION SELF-ASSESSMENT TOOL. Protecture:

DATA PROTECTION SELF-ASSESSMENT TOOL. Protecture: DATA PROTECTION SELF-ASSESSMENT TOOL Protecture: 0203 691 5731 Instructions for use touches many varied aspects of an organisation. Across six key areas, the self-assessment notes where a decision should

More information

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017 GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015

More information

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018 1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST INFORMATION SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality assessment

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

INFORMATION SYSTEMS SECURITY POLICY (ISSP)

INFORMATION SYSTEMS SECURITY POLICY (ISSP) INFORMATION SYSTEMS SECURITY POLICY (ISSP) Policy Number & Category IG 02 Information Governance Version Number & Date Version 3.7 February 2009 Ratifying Committee Date Approved March 2009 Next Review

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

GDPR Draft: Data Access Control and Password Policy

GDPR Draft: Data Access Control and Password Policy wea.org.uk GDPR Draft: Data Access Control and Password Policy Version Number Date of Issue Department Owner 1.2 21/01/2018 ICT Mark Latham-Hall Version 1.2 last updated 27/04/2018 Page 1 Contents GDPR

More information

Information Security Incident

Information Security Incident Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body

More information

The University of British Columbia Board of Governors

The University of British Columbia Board of Governors The University of British Columbia Board of Governors Policy No.: 118 Approval Date: February 15, 2016 Responsible Executive: University Counsel Title: Safety and Security Cameras Background and Purposes:

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Grid Security Policy

Grid Security Policy CERN-EDMS-428008 Version 5.7a Page 1 of 9 Joint Security Policy Group Grid Security Policy Date: 10 October 2007 Version: 5.7a Identifier: https://edms.cern.ch/document/428008 Status: Released Author:

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Castle View Primary School Data Protection Policy

Castle View Primary School Data Protection Policy Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff

More information

MRC Information Security Policy (IT_pg_003)

MRC Information Security Policy (IT_pg_003) () Contents Policy statement... 3 1. Key principles... 3 2. Scope... 4 3. Purpose... 5 4. General considerations... 5 5. Accessing information and information assets... 5 6. Technical aspects... 6 7. Use

More information

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ). PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our

More information

Data Protection Policy

Data Protection Policy The Worshipful Company of Framework Knitters Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act 1998 (DPA) [UK] For information on this

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Open Open INFORMATION SECURITY POLICY OF THE UNIVERSITY OF BIRMINGHAM DOCUMENT CONTROL Date Description Authors 18/09/17 Approved by UEB D.Deighton 29/06/17 Approved by ISMG with minor changes D.Deighton

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced

More information

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013 Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

Information Governance Incidents Cyber Security Incidents and Near Misses Reporting Procedure

Information Governance Incidents Cyber Security Incidents and Near Misses Reporting Procedure Information Governance Incidents Cyber Security Incidents and Near Misses Reporting Procedure Procedure Number: IG05 Version: 2.3 Approved by: Information Governance Working Group Date approved January

More information

A Homeopath Registered Homeopath

A Homeopath Registered Homeopath A Homeopath Registered Homeopath DATA PROTECTION POLICY Scope of the policy This policy applies to the work of homeopath A Homeopath (hereafter referred to as AH ). The policy sets out the requirements

More information

Use of and Instant Messaging (IM) Policy

Use of  and Instant Messaging (IM) Policy Use of Email and Instant Messaging (IM) Policy Name of Author and Job Title: Mike Cavaye, IT & Digital Consultant Name of Review/Development Body: IT Services Ratification Body: Quality and Safety Group

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

IDENTITY ASSURANCE PRINCIPLES

IDENTITY ASSURANCE PRINCIPLES IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance

More information

National Policing Community Security Policy

National Policing Community Security Policy Document Name File Name National Policing Community Security Policy Community_Security_Policy_FINAL v4_3.doc Authorisation Information Management Business Area Signed version held by National Police Information

More information

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we

More information

Data Security Standards

Data Security Standards Data Security Standards Overall guide The bigger picture of where the standards fit in 2018 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

Network Account Management Security Standard

Network Account Management Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Network Account Management Security Number: Scope of this Document: Recommending Committee: Approving Committee: SS06 All Staff/ Services Users Joint Information Governance

More information

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors

Policies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Institute of Technology, Sligo. Information Security Policy. Version 0.2

Institute of Technology, Sligo. Information Security Policy. Version 0.2 Institute of Technology, Sligo Information Security Policy Version 0.2 1 Document Location The document is held on the Institute s Staff Portal here. Revision History Date of this revision: 28.03.16 Date

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

The General Data Protection Regulation

The General Data Protection Regulation PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how

More information

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer

Data Sharing Agreement. Between Integral Occupational Health Ltd and the Customer Data Sharing Agreement Between Integral Occupational Health Ltd and the Customer 1. Definitions a. Customer means any person, organisation, group or entity accepted as a customer of IOH to access OH services

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

Information Security Incident Reporting Policy

Information Security Incident Reporting Policy Information Security Incident Reporting Policy Date Published June 2016 Version 3 Last Approved Date 23 rd May 2018 Review Cycle 1 Year Review Date May 2019 Learning together; to be the best we can be

More information

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR )

Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) May 2018 Document Classification Public Q&A for Citco Fund Services clients in relation to The General Data Protection

More information

Data Processing Amendment to Google Apps Enterprise Agreement

Data Processing Amendment to Google Apps Enterprise Agreement Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google

More information

Lakeshore Technical College Official Policy

Lakeshore Technical College Official Policy Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

Made In Hackney Data Protection Policy Last Updated:

Made In Hackney Data Protection Policy Last Updated: Made In Hackney Data Protection Policy Last Updated: 16.05.2018 Definitions Charity GDPR Responsible Person Register of Systems Made In Hackney (MIH), a registered charity. means the General Data Protection

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

Remote Working & Mobile Devices Security Standard

Remote Working & Mobile Devices Security Standard TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller

More information

ISC10D026. Report Control Information

ISC10D026. Report Control Information ISC10D026 Report Control Information Title: General Information Security Date: 28 January 2011 Version: v3.08 Reference: ICT/GISP/DRAFT/3.08 Authors: Steve Mosley Quality Assurance: ISSC Revision Date

More information

Data Protection Privacy Notice

Data Protection Privacy Notice PETA Limited Page 1 of 7 Data Protection Privacy Notice PETA Limited provides a range of services to both members of the public and to those employed within business. To enable us to provide a service,

More information

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION Introduction The IFFO RS Certification Programme is a third party, independent and accredited

More information

Blue Alligator Company Privacy Notice (Last updated 21 May 2018)

Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Who are we? Blue Alligator Company Limited (hereafter referred to as BAC ) is a company incorporated in England with company registration

More information

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected. I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

Information Governance Incident Reporting Policy and Procedure

Information Governance Incident Reporting Policy and Procedure Information Governance Incident Reporting Policy and Procedure Policy Number Target Audience Approving Committee IG007 CCG/GMSS Staff CCG Chief Officer Date Approved February 2018 Last Review Date February

More information