Information Governance Policy

Size: px
Start display at page:

Download "Information Governance Policy"

Transcription

1 2015 Information Governance Policy University of Wolverhampton Version th October 2015

2 Policy Approval Procedure Information Governance Policy Policy Author: Stephen Hill Dept.: DAS Information Governance Policy Check and Approval: Senior Information Risk Officers Information Governance Policy Check and Approval: Information Systems Committee Information Governance Policy Approval by Executive: CMT Signed Off: 23 rd September 2015 Signed Off: 7 th September 2015 Signed Off: 4 th November 2015 Approved: 06/01/2016 CMT 1

3 Contents University Information Governance Policy Introduction Information Protection Context Overview Data Definition Classified Data Applicability Requirements Applicability Classification University contractual agreements Data Storage Mobile Device Management Research Classified Data ing Classified Data Document Confidentiality Data Sharing Outside the European Economic Area Disposal of Devices Data/ Device Loss Appendix 1 University of Wolverhampton Data Classification Appendix 2 Key Controls for protecting classified information (Summary)

4 University Information Governance Policy 1. Introduction 1.1. Information Protection Context This policy sets out the steps which members of the University are required to take to protect the security of all sensitive information processed or shared by the University, a category which includes but is not limited to information which relates to or identifies living individuals personal data. ( personal data as defined by the Data Protection Act 1998 (DPA); the Data Protection Policy 2015 provides additional guidance on acceptable data processing processes and procedures for the university. This policy applies to all members of the University of Wolverhampton ( the University ). For the purposes of this policy, the term Staff means all members of University staff including permanent, fixed term, and temporary staff, governors, secondees, any third party representatives, agency workers, volunteers, interns, agents and sponsors engaged with the University in the UK or overseas. This policy also applies to all members of staff employed by any of the University s subsidiary companies All contractors and agents acting for or on behalf of the University should be made aware of this policy and the requirement to secure data confidentiality agreements prior to data transfer from the University repository or databases or outsourcing data processing responsibilities. This policy applies to all personal and sensitive personal data processed on computers and also includes information stored in manual ( paper based ) files. It is the members of Staff s responsibility when creating data, accessing a document or using media to ensure the documents, media or databases are correctly classified either at the point of creation, or where the document, data or media was created prior to implementation of this policy, at the first opportunity when processing or using the data for research or University business. The overall responsibility is for each member of staff to provide suitable data classification for their records, documents and media which enables all members of the University staff to easily process information in a safe and secure manner which complies with legal and regulatory compliance requirements. 3

5 1.2. Overview The Policy classifies sensitive information according to its perceived damage potential, this is defined as being the damage which would be sustained to an individual, physical or reputational, or damage to organisational reputation likely to be suffered by the University as a consequence of a data breach or data loss. The University has three types of classified information: Highly Confidential, Confidential and Personal. Any information that is not categorised as Highly Confidential, Confidential or Personal is Public. No particular controls apply to the disclosure of Public information and therefore this is not classed as classified data Data Definition For the purposes of this policy the Data Protection Act 1998 definition of data, information will be used: Data means information which a) is being processed by means of equipment operating automatically in response to instructions given for that purpose, b) is recorded with the intention that it should be processed by means of such equipment, c) is recorded as part of a relevant filing system or with the intention that it should form part of a relevant filing system, d) does not fall within paragraph (a), (b) or (c) but forms part of an accessible record as defined by section 68 (Data Protection Act 1998), or e) is recorded information held by a public authority and does not fall within any of paragraphs (a) to (d) Classified Data The following definitions will be used to classify all university data: Personal - Inappropriate disclosure could cause damage to the University's reputation or operations, may cause great distress to individuals, possibly pose a danger to personal safety or to life or likely impede the investigation or facilitate the commission of serious crime; substantial financial or legal penalties Confidential Inappropriate disclosure of the information to an unauthorised recipient will cause significant damage to the University s reputation or operations or will cause great distress to individuals, poses a probable danger 4

6 to personal safety or to life or likely to impede the investigation or facilitate the commission of serious crime: substantial financial or legal penalties. All information which is bound by a non-disclosure agreement will fall within this classification. Highly Confidential Inappropriate disclosure could severely adversely affect the University's reputation or operations, likelihood of causing substantial distress to individuals extremely probable or data breach will incur statutory restriction penalties for inappropriate disclosure of information; data breach has a high likelihood of financial or legal punitive penalties being imposed against the university. The term Classified Data in this policy refers to data classified as Personal, Confidential or Highly Confidential within the context of this policy. Except for information which is obviously and legitimately in the public domain (such as job titles, departments etc.), personal data (as defined by the DPA 1998) will fall within one of the above classified categories. The scale, volume and medium of storage needs to be taken into account in the assessment of the classification of any set of information. For example, information which in itself would be classified as Confidential when it relates to just one individual might need to be classified as Highly Confidential when it covers hundreds or thousands of individuals, especially (but not only) if it is held in electronic form. The potential for damage from unauthorised disclosure is very much higher in the latter case, therefore the level of control needs to be accordingly higher, and this Policy reflects this need. This Policy is a sub-policy of the University Information Security Policy and should be implemented with regard to the associated policies within the Information Security Framework and associated guidance. Appendix 1 - Provides guidance on the University of Wolverhampton data classification matrix. Appendix 2 Provides a summary of the key data handling controls. 2. Applicability Requirements The University is seeking to create and reinforce a robust data handling culture within the University. All members of the University are expected to comply with the following requirements. 5

7 2.1. Applicability This Policy is intended for use by all staff that creates, handle or processes Classified Data within the university. The Policy adopts existing guidelines relating to document retention Document Retention Schedule and the Record Management Policy; as well as the Data Protection Policy. The Policy provides guidance on handling and storage requirements for classified data which members of the University will encounter during normal teaching, business and research activities. Further guidance on data classification, information handling and data processing may be found in the accompanying Data Classification Guidance document The adoption of the Policy and associated Data Classification Guidance document is a mandatory part of the University Information Security Policy. The policy is overseen by the Office of the University Registrar and Secretary (OURS) The University recognises that there may be legitimate circumstances where it may not be possible to adhere strictly to this policy. In these cases, advice should be sought from the Office of the University Registrar and Secretary (OURS) on how best to secure your data processing requirements within the spirit of this policy which comply with UK data protection legislation Classification All information and data within the University will be designated as falling within one of four distinct control groups: i. Public, ii. Personal, iii. Confidential, iv. Highly Confidential. Only Personal, Confidential and Highly Confidential data will be termed as being Classified Data for the purposes of this policy University contractual agreements Members of the University will ensure access to or sharing of classified information will only be conducted as part of a University business requirement and necessary data processing permissions are secured prior to granting access to data or information. 6

8 Members of the University will endeavour to obtain any necessary permissions before sharing classified information with colleagues or third parties, where practicable. External partnerships will secure data confidentiality agreements where classified data is to be shared and the partner agency will be required to adopt a data security framework which attains the same level of information security as the University Where data sharing agreements are with partner agencies outside the European Economic Area (EEA) then UK legislation will take priority and the partner agency will be required to adopt data processing standards which adhere to UK legislation. Processing data outside the EEA will comply with Data Protection Act 1998 compliance requirements The University will ensure any additional third party rules, regulations or compliance requirements relating to data that has been shared with the University under a joint data sharing with the University are adhered to as far as practicable, where the additional requirements do not negate any of the information security controls under this Policy Data Storage The University Data Protection Officer must provide permission for any classified data to be stored outside the University provided servers. Classified data must only be stored on the University s servers (encryption of highly confidential data is a mandatory requirement where data is stored in unrestricted shared areas). Storage of classified data outside the approved service providers is a severe breach of this Policy and may result in disciplinary action for insecure storage of data which breaches this Policy The University will authorise and maintain a list of approved service providers that have been security-tested and approved by the University as suitable data storage options, Cloud services must not be used for storing or processing data which is either: Classified data Or Of such criticality that functions or operations would be disrupted should it be lost or become unavailable or corrupted Or Valuable intellectual property (IP) of the University (further advice on securing IP can be sought from OURS legal advice). 7

9 Classified information obtained from an external source (outside the University), for example, through the collection of research data with a partner organisation, must be kept securely, such data must be stored on University servers (registered with and approved by the Data Protection Officer) at the earliest opportunity Mobile Device Management Members of University staff must ensure access to devices and data is restricted to authorised persons, password protection will be activated on all devices used to store or access University data Mobile phones, including personal devices, used to access University must be secured with a PIN code to prevent unauthorised access. Minimum requirement will be for a four digit PIN which is changed on a regular basis Members of University staff must ensure devices or media used for the storage of Classified Data are utilising secure encryption tools for data storage Classified Data may only be stored on encrypted laptops, memory sticks and other portable devices. Data classified as Highly Confidential information must not be included within the body of an unencrypted e- mail Research Classified Data Members of University staff must comply with the University s Data Protection Policy Research data must be anonymised wherever practicable, the removal of classified research data from the University servers must be authorised by the supervising academic. Classified Data should not be kept longer than required for the conduct of University business or purposes of research and must be destroyed at the earliest opportunity in accordance with University policy ing Classified Data Members of University staff are required to use University addresses when ing classified data to other members of the University. Externally-hosted facilities will not be used for the transmission of classified data between University staff, unless the data is encrypted with an approved encryption tool validated by the University; 8

10 the Directorate of Academic Support, IT Services will maintain a list of university approved encryption technologies Members of University staff are required to use University-approved methods to access University or data when off campus. Staff should use the approved Microsoft 365 portal or OWA Exchange Server for access Document Confidentiality Only in very exceptional circumstances, and with the permission of your line manager, will highly confidential paper documents be taken outside the University. Members of staff wishing to take classified paper documents outside the University, will ensure the documents are removed for the shortest time possible and kept securely at all times The posting of classified material must use a first class envelope for confidential material, and use recorded post and a double envelope (one inside the other) for material that is highly confidential. The external envelope must not bear the classification The University will ensure disposal of classified paper documents is in accordance with the Confidential Waste Disposal Policy The University requires that members of Staff utilising home or other non-university computers to create or access classified data, ensure that the device has up-to-date security protection, and that the member of Staff ensures data confidentiality is maintained at all times. Classified Data must not be stored on privately-owned computers, mobile equipment or unencrypted removable media Data Sharing Outside the European Economic Area The university will ensure that UK data protection legislation is applied to all data processing, storing and sharing agreement between the university and partner organisations. Where data is stored, processed or shared with partner organisations outside the UK local data compliance rules may impose additional data processing requirements, these local compliance requirements will be respected where they do not negate UK data protection legislation, UK data protection legislation will remain the primary data security control in all instances. 9

11 2.10. Disposal of Devices All unwanted, damaged or obsolete computer hardware must be disposed of in accordance with the Waste Electrical and Electronic Equipment Collection Procedure (WEEE Collection Procedure). Unwanted, damaged or obsolete hardware cannot be sold or donated to members of the University or to other organisations, such as charities without prior authority of the Director of the Directorate of Academic Support Data/ Device Loss Members of Staff are required to inform their Line Manager or University central point of contact representative at the earliest opportunity of the loss of a device or data which contains or may contain Classified Data. End of document Version 1.2 Author Stephen Hill Approved date 6 th January 2016 Approved by CMT Review date 6 th January

12 Appendix 1 Data Classification Classification RISK Assessment Risk None Low Medium High Confidentiality is of no particular significance to this information Inappropriate disclosure could cause damage to the University's reputation or operations, may cause great distress to individuals, possibly pose a danger to personal safety or to life or likely impede the investigation or facilitate the commission of serious crime; substantial financial or legal penalties Inappropriate disclosure of the information to an unauthorised recipient will cause significant damage to the University s reputation or operations or will cause great distress to individuals, poses a probable danger to personal safety or to life or likely to impede the investigation or facilitate the commission of serious crime: substantial financial or legal penalties. All information which is bound by a non-disclosure agreement will fall within this classification). Inappropriate disclosure could severely adversely affect the University's reputation or operations, likelihood of causing substantial distress to individuals extremely probable or data breach will incur statutory restriction penalties for inappropriate disclosure of information; data breach has a high likelihood of financial or legal punitive penalties being imposed against the university. 11

13 Appendix 1 Data Classification Access May be viewed by anyone, anywhere in the world Available to all University of Wolverhampton members (e.g. secured behind a login screen) Available only to specified authorised University of Wolverhampton members (e.g. secured behind a login screen, requires authorisation to gain access) Access is controlled and Highly Confidential to a small number of authorised University of Wolverhampton members (e.g secured behind a login screen, requires authorisation to gain access) Appendix 1 University of Wolverhampton Data Classification 12

14 Appendix 1 Data Classification Classification PERSONAL Information PERSONAL Information Examples (nonexhaustive) As defined by the Data Protection Act 1998 (see University Data Protection Policy) Anonymised information 1 Staff Details shared publically by the University Information on individuals made public with their consent including on social media sites or departmental websites Individual s home addresses, contact details and passport or NI number. Individual s name, home addresses, contact details and age Individual s image (incl. CCTV footage) List of student or staff names and ID number. Student registration and attendance details. Financial information relating to individuals e.g. banking information, salary details, indebtedness (student fees) Information on individual s, racial or ethnic origin, political option, religious or other beliefs, physical or mental health or criminal record. 1 For these purposes anonymised information is information which cannot identify an individual either in isolation or when combined with other information (Section 1 (1) of the DPA 1998). Anonymised data may also carry other handling requirements please see below. 13

15 Appendix 1 Data Classification Classification PERSONAL Information PERSONAL Information Dates of birth (DoB) Individual s name plus DoB or national insurance number(ni) 3 References for staff or students 2 UCAS forms Individual s name plus DoB or NI number, passport details, home address and telephone number 3 2 Content dependent e.g. information relating to health, criminal record or disciplinary matters would make the reference or form Confidential 3 Adding additional combinations of data can change the overall classification (sensitivity) of the information. Increasing the volume can also increase the classification level. 14

16 Appendix 1 Data Classification Classification NON-PERSONAL Information Research proposals prior to award Information relating to supply or procurement of goods/services prior to approve publication. NON- PERSONAL Information Examples (nonexhaustive) Anything subject to disclosure under the Freedom of Information Act. Department and Course details Marketing or Press Information Factual and general organisational for public dissemination incl. annual reports or accounts. 'Trade' secrets, intellectual property intended for commercialisation. Research data which is securitysensitive or has been similarly classified by an external body (e.g. Government, commercial partner with a confidentiality agreement) Legal advice or other information relating to legal action against or by the University 15

17 Appendix 2 Key Controls for protecting Classified Data Activity Electronic Data 4 Storage of data in shared areas of University server Storage of data in HDD of University desktop/laptop Remote access to data Storage of data on University-owned laptops or other portable devices. Yes data to be stored in folders with restricted access. Yes data to be stored in folder with password protection Yes, connection to be made to document through Desktop Anywhere Only on temporary basis, taking care to avoid loss or theft. Only in backed up personal or shared network spaces with access Highly Confidential to only those with a valid right to access the information (by adding a password to the document, encrypting it or apply permissions to a folder). No Yes, data must not be stored on local hard drive or removable media. Connection to be made through Desktop Anywhere. No only accessible on campus Only on temporary basis and if encrypted/ password protected, taking care to avoid loss or theft. Storage of data on privately-owned laptops or other portable devices (including memory sticks) Sending data by Unencrypted Only addresses or other internal domains e.g. wbs.ac.uk or No Only as encrypted/password protected attachment (take care to check address of recipient(s)) Only via secure system such as NHS external account or Police PNN network. 4 See Digital Storage User Guide for additional data handling requirements. 16

18 Appendix 2 Key Controls for protecting Classified Data jobs.ac.uk (take care to check address of recipient(s)) Encrypted To external address, data not to be included in body of as clear text. (University is not a secure system) Appendix 2 Key Controls for protecting classified information (Summary) 17

19 Appendix 2 Key Controls for protecting Classified Data Activity Paper and other media Storage in University Locked filing cabinet or equivalent Locked filing cabinet or equivalent in office which is locked or attended at all times. Facsimile transmission Ensure fax number is correct and entered correctly No (unless to pre-arranged safe haven Data collection outside Kept securely on the person (and returned to the University at the earliest opportunity) machine ). Kept securely on the person, preferably in a locked case (and returned to the University at the earliest opportunity) Taking documents off campus For the shortest time possible and documents to be kept securely about the person Only permitted exceptionally and once authorised by your line manager. Posted Yes via first class post in an envelope without any classification marking Yes, via Recorded post when double enveloped, without classification marking on outer. Disposal Confidential Waste Disposal Policy 18

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Information Handling and Classification Table

Information Handling and Classification Table Information Handling and Classification Table Title: Information Classification and Handling Table Reference: IS-07a Status: Approved Version: 1.2 Date: March 2018 Classification: Non-Sensitive/Open Author(s)

More information

INFORMATION ASSET MANAGEMENT POLICY

INFORMATION ASSET MANAGEMENT POLICY INFORMATION ASSET MANAGEMENT POLICY Approved by Board of Directors Date: To be reviewed by Board of Directors March 2021 CONTENT PAGE 1. Introduction 3 2. Policy Statement 3 3. Purpose 4 4. Scope 4 5 Objectives

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Data protection policy

Data protection policy Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

INFORMATION SECURITY AND RISK POLICY

INFORMATION SECURITY AND RISK POLICY INFORMATION SECURITY AND RISK POLICY 1 of 12 POLICY REFERENCE INFORMATION SHEET Document Title Document Reference Number Information Security and Risk Policy P/096/CO/03/11 Version Number V02.00 Status:

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Information Classification and Handling Policy

Information Classification and Handling Policy Information Classification and Handling Policy Document Title: Author(s) (name, job title and Division): Version Number: Document Status: Date Approved: Approved By: Effective Date: Date of Next Review:

More information

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ). PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

Guardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY

Guardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY 1. Statement of Policy (Guardian) needs to collect and use certain types of information about the Individuals or Service Users with whom they come into contact in order to carry on our work. This personal

More information

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager. London School of Economics & Political Science IT Services Policy Remote Access Policy Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

Breach Notification Form

Breach Notification Form Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

The General Data Protection Regulation

The General Data Protection Regulation PRIVACY NOTICE INFORMATION FOR (a) APPLICANTS TO AND USERS OF CHS COMMUNITY SUPPORT SERVICES; (b) OTHER STAKEHOLDERS CHS is committed to protecting your personal data. This privacy notice sets out how

More information

Data Protection Policy

Data Protection Policy Introduction In order to; provide education, training, assessment and qualifications to its customers and clients, promote its services, maintain its own accounts and records and support and manage its

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

The Data Protection Act 1998 Clare Hall Data Protection Policy

The Data Protection Act 1998 Clare Hall Data Protection Policy The Data Protection Act 1998 Clare Hall Data Protection Policy Introduction This document is a guide to the main requirements of the new Data Protection Act (DPA) that came into force on 24th October 2001.

More information

Remote Working Policy

Remote Working Policy [Type text] [Type text] [Type text] Information Management & Policy Services (IMPS) Remote Working Policy 1 Scope and definitions 1.1 This policy applies to all staff who use or access University systems

More information

Privacy Policy Wealth Elements Pty Ltd

Privacy Policy Wealth Elements Pty Ltd Page 1 of 6 Privacy Policy Wealth Elements Pty Ltd Our Commitment to you Wealth Elements Pty Ltd is committed to providing you with the highest levels of client service. We recognise that your privacy

More information

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY INFORMATION TECHNOLOGY SECURITY POLICY Author Responsible Director Approved By Data Approved September 15 Date for Review November 17 Version 2.3 Replaces version 2.2 Mike Dench, IT Security Manager Robin

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Procedures for responding to requests for personal data to support Data Protection Policy

Procedures for responding to requests for personal data to support Data Protection Policy Procedures for responding to requests for personal data to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection Policy HERIOT-WATT

More information

Wesley House data protection statement and privacy notice (short-course delegates)

Wesley House data protection statement and privacy notice (short-course delegates) Wesley House data protection statement and privacy notice (short-course delegates) This statement explains how Wesley House handles and uses personal data we collect about delegates on short courses held

More information

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC

More information

Enviro Technology Services Ltd Data Protection Policy

Enviro Technology Services Ltd Data Protection Policy Enviro Technology Services Ltd Data Protection Policy 1. CONTEXT AND OVERVIEW 1.1 Key details Rev 1.0 Policy prepared by: Duncan Mounsor. Approved by board on: 23/03/2016 Policy became operational on:

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

These pieces of information are used to improve services for you through, for example:

These pieces of information are used to improve services for you through, for example: Eolach Accountants & Business Advisors Limited t/a McGinley & Co. Privacy Policy At Eolach Accountants & Business Advisors Limited t/a McGinley & Co. our policy is simple we understand the importance of

More information

UKIP needs to gather and use certain information about individuals.

UKIP needs to gather and use certain information about individuals. UKIP Data Protection Policy Context and overview Key details Policy Update Prepared by: D. Dennemarck / S. Turner Update approved by Management on: November 6, 2015 Policy update became operational on:

More information

DATA PROTECTION IN RESEARCH

DATA PROTECTION IN RESEARCH DATA PROTECTION IN RESEARCH Document control Applicable to: All employees and research students Date first approved February 2006 Date first amended May 2015 Date last amended May 2015 Approved by Approval

More information

Introductory guide to data sharing. lewissilkin.com

Introductory guide to data sharing. lewissilkin.com Introductory guide to data sharing lewissilkin.com Executive Summary Most organisations carry out some form of data sharing, whether it be data sharing between organisations within the group or with external

More information

INFORMATION SECURITY POLICY

INFORMATION SECURITY POLICY Open Open INFORMATION SECURITY POLICY OF THE UNIVERSITY OF BIRMINGHAM DOCUMENT CONTROL Date Description Authors 18/09/17 Approved by UEB D.Deighton 29/06/17 Approved by ISMG with minor changes D.Deighton

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller

More information

EA-ISP-009 Use of Computers Policy

EA-ISP-009 Use of Computers Policy Technology & Information Services EA-ISP-009 Use of Computers Policy Owner: Nick Sharratt Author: Paul Ferrier Date: 28/03/2018 Document Security Level: PUBLIC Document Version: 1.05 Document Ref: EA-ISP-009

More information

Privacy and Data Protection Policy

Privacy and Data Protection Policy Privacy and Data Protection Policy Introduction 1. The Ripple Pond is committed to ensuring the secure and safe management of personal data held by the Charity in relation to Beneficiaries, Staff, Trustees,

More information

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

Information Security Strategy

Information Security Strategy Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone

More information

PCA Staff guide: Information Security Code of Practice (ISCoP)

PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation

More information

Whiteinch and Scotstoun Housing Association and WS Property Management Ltd. Privacy Policy

Whiteinch and Scotstoun Housing Association and WS Property Management Ltd. Privacy Policy Whiteinch and Scotstoun Housing Association and WS Property Management Ltd. Privacy Policy We are committed to ensuring your privacy is protected and our collection and use of your personal information

More information

Healing School - A Science Academy GDPR Policy (Exams) 2018/19

Healing School - A Science Academy GDPR Policy (Exams) 2018/19 Healing School - A Science Academy GDPR Policy (Exams) 2018/19 This policy is reviewed annually to ensure compliance with current regulations Author Date adopted by MAT Directors Mrs D Barnard Review Date

More information

PRIVACY STATEMENT. The Island with Bear Grylls (the Programme ) Introduction and main purposes

PRIVACY STATEMENT. The Island with Bear Grylls (the Programme ) Introduction and main purposes PRIVACY STATEMENT The Island with Bear Grylls (the Programme ) Introduction and main purposes Shine TV Limited ("Company" or "we, us, our") is the data controller in respect of your personal data and will

More information

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk CURTIS BANKS LIMITED Privacy Information Notice curtisbanks.co.uk Contents Section Page 1 Who we are 3 2 Why we need to collect, use and process personal information 3 3 The information we may collect,

More information

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers; 65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment

More information

INNOVENT LEASING LIMITED. Privacy Notice

INNOVENT LEASING LIMITED. Privacy Notice INNOVENT LEASING LIMITED Privacy Notice Table of Contents Topic Page number KEY SUMMARY 2 ABOUT US AND THIS NOTICE 3 USEFUL WORDS AND PHRASES 4 WHAT INFORMATION DO WE COLLECT? 4 WHY DO WE PROCESS YOUR

More information

WEBSITE PRIVACY POLICY

WEBSITE PRIVACY POLICY WEBSITE PRIVACY POLICY INTRODUCTION Welcome to the Octopus Group s privacy policy ( Privacy Policy ) Octopus Group respects your privacy and is committed doing the right thing when it comes to protecting

More information

SAFE USE OF MOBILE PHONES AT WORK POLICY

SAFE USE OF MOBILE PHONES AT WORK POLICY SAFE USE OF MOBILE PHONES AT WORK POLICY Links to Lone Working Policy, Personal Safety Guidance, Lone Working Guidance, Information Governance Policy Document Type General Policy Unique Identifier GP31

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

Acceptable Usage Policy (Student)

Acceptable Usage Policy (Student) Acceptable Usage Policy (Student) Author Arthur Bogacki Date 18/10/2017 Version 1.1 (content sourced and consolidated from existing Email and Electronic Communication, and User Code of Practice policies.)

More information

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2 NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you

More information

Information Security Policy

Information Security Policy Information Security Policy Title: Information Security Reference: IS-01 Status: Approved Version: 1.1 Date: July 2017 Classification: Non-Sensitive/Open Author(s) Head of Information Assurance Approved

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

Freedom of Information and Protection of Privacy (FOIPOP)

Freedom of Information and Protection of Privacy (FOIPOP) Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

Information Security Incident Reporting Policy

Information Security Incident Reporting Policy Information Security Incident Reporting Policy Date Published June 2016 Version 3 Last Approved Date 23 rd May 2018 Review Cycle 1 Year Review Date May 2019 Learning together; to be the best we can be

More information

PS 176 Removable Media Policy

PS 176 Removable Media Policy PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Data Encryption Policy

Data Encryption Policy Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Data Loss Assessment and Reporting Procedure

Data Loss Assessment and Reporting Procedure Data Loss Assessment and Reporting Procedure Governance and Legal Services Strategy, Planning and Assurance Directorate Approved by: Data Governance & Strategy Group Approval Date: July 2016 Review Date:

More information

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Making the UK more resilient against Cybercrime Date: August 2017 Reference: 0449-CYB This Red Alert is issued by the United Kingdom

More information

Data protection legal jungle or common sense Susan Healy. Religious Archives Group 22 Mar 2010

Data protection legal jungle or common sense Susan Healy. Religious Archives Group 22 Mar 2010 Data protection legal jungle or common sense Susan Healy Religious Archives Group 22 Mar 2010 In this presentation Things you need to know Things you need to do and not do Particular issues? Things you

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017

Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Introduction The Data Protection Act 1998 (the Act) is the primary legislation in the United Kingdom, which regulates

More information

General Data Protection Regulation policy (exams) 2018/19

General Data Protection Regulation policy (exams) 2018/19 The Piggott School General Data Protection Regulation policy (exams) 2018/19 This policy is annually reviewed to ensure compliance with current regulations Approved/reviewed by 1) Reviewed by Tim Griffith

More information

1. Introduction and Overview 3

1. Introduction and Overview 3 Data Breach Policy Contents 1. Introduction and Overview 3 1.1 What is a Serious Information Governance Incident? 3 1.2 What causes a SIGI? 3 1.3 How can a SIGI be managed? 4 2. How to manage an incident

More information

Castle View Primary School Data Protection Policy

Castle View Primary School Data Protection Policy Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff

More information

Website and Marketing Privacy Policy

Website and Marketing Privacy Policy Website and Marketing Privacy Policy In this policy Endemol Shine UK and its group of companies (Company or we) informs you about how we collect, use and disclose personal data from and about you and your

More information

Data Protection Policy

Data Protection Policy The Worshipful Company of Framework Knitters Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act 1998 (DPA) [UK] For information on this

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd

Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Privacy and Spam Policy Ten Tigers Grain Marketing Pty Ltd Our Commitment Ten Tigers Grain Marketing Pty Ltd and Ten Tigers Pty Ltd are committed to providing you with the highest levels of client service.

More information

Privacy and Cookies Policy

Privacy and Cookies Policy Sohn Foundation London Privacy and Cookies Policy The Sohn Foundation London (company number: 08075575, charity number: 1148454) is a wholly owned subsidiary of The Ira Sohn Conference Foundation, Inc.

More information

Mobile Working Policy

Mobile Working Policy Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of

More information

NCG Carlisle College Privacy Statement

NCG Carlisle College Privacy Statement NCG Carlisle College Privacy Statement 1. Overview We ask that you read this privacy notice carefully as it contains important information on who we are, how and why we collect, store, use and share your

More information

DATA PROTECTION AND PRIVACY POLICY

DATA PROTECTION AND PRIVACY POLICY DATA PROTECTION AND PRIVACY POLICY Data Protection Act London Capital Group (Cyprus) Limited (LCG) may process information relating to you, including holding such information in a manual format or electronic

More information

The New Government Security Classification System -

The New Government Security Classification System - The New Government Security Classification System -? Industry The guidance in this booklet is being developed for use from April 2014. It is but is being shared with industry in order to raise awareness

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY 1 Your Data Protection Responsibilities DATA PROTECTION POLICY 1.1 Everyone has rights with regard to how their personal data is handled. Personal data is any information that a person can be identified

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of

More information

RVC DATA PROTECTION POLICY

RVC DATA PROTECTION POLICY RVC DATA PROTECTION POLICY POLICY and PROCEDURES Responsibility of Data Protection Officer Review Date July 2019 Approved by CEC Author D.Hardyman-Rice CONTENTS PAGE 1) Policy Statement 3 2) Key definitions

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Talenom Plc. Description of Data Protection and Descriptions of Registers

Talenom Plc. Description of Data Protection and Descriptions of Registers Talenom Plc. Description of Data Protection and Descriptions of Registers TALENOM DESCRIPTION OF DATA PROTECTION Last updated 14 March 2018 Scope Limitations Data protection principles Personal data Registers

More information

Information Security Policy

Information Security Policy Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Colin Sloey Implementation Date: September 2010 Version Number:

More information

About the information we collect We collect and process personal data including but not limited to:-

About the information we collect We collect and process personal data including but not limited to:- Privacy Policy About us TP Supported Accommodation is responsible for collecting, processing, storing and safe keeping of personal information as part of our business activities. We manage information

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

Information security guidance for schools

Information security guidance for schools Information security guidance for schools Guidance Guidance document no: 206/2016 Date of issue: August 2016 Replaces guidance document no: 186/2015 Information security guidance for schools Audience All

More information

Data Protection Policy

Data Protection Policy Michaelmas 2017 Data Protection Policy For the purpose of this policy school personnel includes: volunteers, self-employed persons, employed staff and governors. Introduction This Data Protection Policy

More information

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies

More information