HSCIC Audit of Data Sharing Activities:

Similar documents
HSCIC Audit of Data Sharing Activities:

Corporate Information Security Policy

INFORMATION TECHNOLOGY SECURITY POLICY

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

April Appendix 3. IA System Security. Sida 1 (8)

INFORMATION ASSET MANAGEMENT POLICY

Advent IM Ltd ISO/IEC 27001:2013 vs

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

Public Safety Canada. Audit of the Business Continuity Planning Program

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

INFORMATION SECURITY AND RISK POLICY

REPORT 2015/010 INTERNAL AUDIT DIVISION

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018

EA-7/05 - EA Guidance on the Application of ISO/IEC 17021:2006 for Combined Audits

Checklist According to ISO IEC 17065:2012 for bodies certifying products, process and services

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISACA Cincinnati Chapter March Meeting

Global Specification Protocol for Organisations Certifying to an ISO Standard related to Market, Opinion and Social Research.

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Data Encryption Policy

DATA PROCESSING TERMS

ISO/IEC INTERNATIONAL STANDARD

Information Security Strategy

ICT Portable Devices and Portable Media Security

Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013

* - Note: complete submissions are to be submitted at least two weeks before any deadline to ensure timely closure.

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Rules for LNE Certification of Management Systems

GMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017

Prohire Software Systems Limited ("Prohire")

Sparta Systems TrackWise Digital Solution

PROTERRA CERTIFICATION PROTOCOL V2.2

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Google Cloud & the General Data Protection Regulation (GDPR)

Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017

CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION

Position Description IT Auditor

REPORT 2015/149 INTERNAL AUDIT DIVISION

Data Protection and GDPR

General Data Protection Regulation

Level Access Information Security Policy

PS Mailing Services Ltd Data Protection Policy May 2018

VOLUNTARY CERTIFICATION SCHEME FOR MEDICINAL PLANT PRODUCE REQUIREMENTS FOR CERTIFICATION BODIES

SYSTEMKARAN ADVISER & INFORMATION CENTER. Information technology- security techniques information security management systems-requirement

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

Certification Description of Malaysia Sustainable Palm Oil (MSPO) Standard

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

Data Security Standards

Internet copy. EasyGo security policy. Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Cloud Security Standards Supplier Survey. Version 1

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Cloud Security Standards and Guidelines

Section Qualifications of Audit teams Qualifications of Auditors Maintenance and Improvement of Competence...

Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001

IAF Guidance on the Application of ISO / IEC Guide 65:1996

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

Memorandum of understanding guidance. Corporate services productivity programme

Checklist: Credit Union Information Security and Privacy Policies

NHS Fife. 2015/16 Audit Computer Service Review Follow Up

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

Information Technology Branch Organization of Cyber Security Technical Standard

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Information for your Certification

Information Governance Toolkit

Timber Products Inspection, Inc.

EXAM PREPARATION GUIDE

ISO/IEC INTERNATIONAL STANDARD

Site Builder Privacy and Data Protection Policy

Sparta Systems Stratas Solution

Microgeneration Installation Standard: MCS

Information Security Policy

"Energy and Ecological Transition for the Climate" Label Control and Monitoring Plan Guidelines

IDENTITY ASSURANCE PRINCIPLES

Security and Privacy Governance Program Guidelines

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Subject: Kier Group plc Data Protection Policy

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

Seven Requirements for Successfully Implementing Information Security Policies and Standards

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

Scheme Document SD 003

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6:

PEFC N 04 Requirements for certification bodies and accreditation bodies

Red Flags/Identity Theft Prevention Policy: Purpose

Audit Report. The Prince s Trust. 27 September 2017

Policy General Policy GP20

AUDIT OF ICT STRATEGY IMPLEMENTATION

EXAM PREPARATION GUIDE

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

Provider Monitoring Report. City and Guilds

LCU Privacy Breach Response Plan

Information Governance Policy (incorporating IM&T Security)

Transcription:

Directorate / Programme Data Dissemination Services Project / Work Data Sharing Audits Status Final Acting Director Chris Roebuck Version 1.0 Owner Rob Shaw Version issue date 19-Jan-2015 HSCIC Audit of Data Sharing Activities: PA Consulting Services Limited

Contents Executive Summary 3 1 About this Document 5 1.1 Introduction 5 1.2 Background 5 1.3 Purpose 6 1.4 Nonconformities and Observations 6 1.5 Audience 7 1.6 Scope 7 1.7 Audit Team 7 2 Audit Findings 8 2.1 Access Controls 8 2.2 Information Transfer 8 2.3 Disposal of Data 9 2.4 Risk Assessment and Treatments 10 2.5 Operational Planning and Control 10 2.6 Auditee Feedback 11 3 Conclusions 12 3.1 Next Steps 15 Page 2 of 15

Executive Summary This document records the key findings of a Data Sharing Audit 1 of PA Consulting Services Limited ( PA Consulting ) on 1 st September 2014 against the requirements of the Health and Social Care Information Centre (HSCIC) Data Sharing Agreements (DSAs) in relation to data sharing agreement RU1038 covering pseudonymised Hospital Episode Statistics (HES) and Office of National Statistics (ONS). This audit was conducted using approved and mature methodology based on ISO standard 19011:2011 (Guidelines for auditing management systems) and follows the same format for all audits of Data Sharing Agreements conducted by HSCIC. In total, 11 Minor Non-conformances and 2 Observations were raised 2. The current HES Security Plan does not appear to include any evidence of Management Review and sign-off (Observation) There is no evidence of a matrix for appropriately specialised training as stated in PA Consulting s Information Security Policy, section 2.3 (Minor) There is no evidence of active management of Service Level Agreements between Google BigQuery and PA Consulting (Minor) There was no evidence provided on the day of a documented procedure for the destruction of data (Minor) Only verbal assurance was given that risk management processes were in place (Minor) Limited practical application of controls within the Statement of Applicability (SOA) were demonstrated (Minor) An Information Asset Register was not evidenced (Minor) The Information Security Management System was said to be subject to periodic review and revision but this was not evidenced on the day (Minor) A Business Continuity Plan was stated as being in place but was not provided for review on the day (Minor) Outstanding incident security management items and records were stated as being in place but were not evidenced on the day (Minor) Version control on documentation is inconsistent (Observation) The status or scope of the internal audit programme was not evidenced on the day (Minor) Areas of Good Practice Access Control and associated login methodology is managed 1 An audit is defined by ISO 9000:2014 as a systematic and documented process for obtaining objective evidence and evaluating it objectively to determine the extent to which the audit criteria are fulfilled 2 Definitions found in Section 1.4 Page 3 of 15

Information passing over networks is protected from fraudulent use, modification, disclosure, misrouting and duplication Processes and security measures for access and management of data using the Cloud 3 environment In summary, it is the Audit Team s opinion that at the current time and based on evidence presented on the day, there is minimal risk of inappropriate exposure and / or access to data provided by HSCIC to PA Consulting under the terms and conditions of Data Sharing Agreement RU1038 signed by both parties. PA Consulting do not have a public-facing offering in place but use HES data to provide consultancy which informs the development of health and social care service design and it is on this basis that minimal risk has been assessed. However, a follow-up audit is required in order to provide further evidence of conformity to audit criteria. 3 A Cloud environment deploys groups of remote server and software networks for centralised data storage and online access to computer services, often through the internet; this is generally to avoid upfront infrastructure costs. Page 4 of 15

1 About this Document 1.1 Introduction The Health and Social Care Act 2012 contains a provision that health and social care bodies and those providing functions related to the provision of public health services or adult social care in England handle confidential 4 information appropriately. The Review of Data Releases by the NHS Information Centre 5 produced by HSCIC Non- Executive Director Sir Nick Partridge recommended that the HSCIC should implement a robust audit function that will enable ongoing scrutiny of how data is being used, stored and deleted by those receiving it. In August 2014, the HSCIC commenced a programme of external audits with organisations with which it holds DSAs. The established audit approach and methodology is using feedback received from the auditees to further improve our own audit function and our internal processes for data dissemination to ensure they remain relevant and well managed. Audit evidence was evaluated against a set of criteria drawn from the HSCIC s draft Code of Practice on Confidential Information 6, DSAs signed by the relevant contractual parties and the international standard for Information Security, ISO 27001:2013. 1.2 Background PA Consulting is a management consultancy operating in a wide range of industries including various levels of government; its head office is in London and its main technology centre is based in Cambridge. The organisation has been working in healthcare for over 20 years and typically has over 100 people working on assignments for health clients both within the NHS and outside. These have included NHS England, Clinical Commissioning Groups, Commissioning Support Units, Trusts, Academic Health Science Networks and regulators, such as Care Quality Commission (CQC) and Monitor. For example, PA Consulting created a tool looking at NHS England wide performance for NHS England; this tool does not use HES data. 4 Confidential information is defined by the Health and Social Care Act 2012, section 263 as data which: Identifies any person Allows the identity of anyone to be discovered, including pseudonymised information Is held under a duty of confidence 5 www.hscic.gov.uk/datareview 6 www.hscic.gov.uk/cop Page 5 of 15

Its healthcare work often involves understanding the activity within the NHS; PA Consulting helps develop a range of products utilised by healthcare organisations including radio-technology and drug delivery devices. HES data is a good source of information for understanding this activity; data receipt and use is managed through its Decision Sciences and IT Delivery practices. A maximum of 12 people have been provided with access to HES data. To date, HES data extracts have been used to inform a dashboard for children with life limiting conditions in order to conduct analysis for use on consultancy projects and to demonstrate PA s capability for analysis of multiple data items. The underlying data has not been shared with any organisation outside PA. The audit team were asked to sign a Non-Disclosure Agreement prior to any activity in order to ensure commercial confidentiality. A very small amount of documentation was provided in advance of the audit with the majority made available on the day to auditors. 1.3 Purpose This report provides an evaluation of how PA Consulting conforms to the requirements of DSA RU637, covering pseudonymised HES data. It also considered whether PA Consulting conformed to its own policies and procedures. The document provides a summary of the key findings. 1.4 Nonconformities and Observations Where a requirement of either the DSA or the audit criteria was not fulfilled, it will be classified as a Major Nonconformity, Minor Nonconformity or Observation. 1.4.1 Major Nonconformity The finding of any of the following: The absence of a required process or a procedure The total breakdown of the implementation of a process or procedure The execution of an activity which could lead to an undesirable situation Significant loss of management control A number of Minor Nonconformities against the same requirement or clause which taken together are, in the Audit Team s considered opinion, suggestive of a significant risk 1.4.2 Minor Nonconformity The finding of any of the following: An activity or practice that is an isolated deviation from a process or procedure and in the Audit Team s considered opinion is without serious risk Page 6 of 15

A weakness in the implemented management system which has neither significantly affected the capability of the management system or put the delivery of products or services at risk An activity or practice that is ineffective but not likely to be associated with a significant risk 1.4.3 Observation In the Audit Team s considered opinion, a situation where a requirement is not being breached but a possible improvement or deficiency has been identified. 1.5 Audience This document has been written for the Director of Data Dissemination Services. A copy will be made available to the HSCIC Community of Audit Practice, Assurance and Risk Committee and the Information Assurance and Cyber Security Committee for governance purposes. The report will be published in a public forum. 1.6 Scope The audit considered the fitness for purpose of the main processes of data handling at PA Consulting along with its associated documentation in relation to the DSA. Fundamentally, the audit sought to elicit whether: PA Consulting is adhering to the standards and principles of the DSA and audit criteria Data handling activities within the organisation posed any risk to patient confidentiality or HSCIC 1.7 Audit Team The Audit Team was comprised of senior certified and experienced ISO 9001:2008 (Quality management systems) and ISO 27001:2013 (Information security management systems) auditors. The audit was conducted in accordance with ISO 19011:2011 (Guidelines for auditing management systems). Page 7 of 15

2 Audit Findings This section presents the key findings arising from the audit. 2.1 Access Controls PA Consulting has established a management framework to control the implementation and use of data received from HSCIC although the current HES Security Plan does not appear to include any evidence of Management Review and sign-off. All employees involved with responsibilities for HES data management are security certified to at least the basic check level and have received in-house data management training although it is noted that staff development is largely self-validated rather than independently verified. No Information Governance Toolkit 7 tests or refresher training is currently in place. No evidence of a matrix for appropriately specialised training as stated in PA s Information Security Policy section 2.3 was presented on the day of the audit although it was noted that this information may be available and will be checked at the follow-up audit. The company s Training Management System was not demonstrated at the time. There are controlled management arrangements established which includes removal of names from the access list. However, there is a mismatch between the staff named within the DSA and those accessing Google BigQuery where data is stored. An email trail requesting users were added and removed was presented. These requests do not appear to have been reflected in the DSA. Access is through a secure login protocol. The use of Google BigQuery demonstrates PA s ability to handle large data volumes and is used for sales presentations which are not limited to the healthcare industry and to inform consultancy assignments. The audience does not have access to the HES data. Conclusion: Access Control and associated login methodology used to gain access to secure data seems adequately managed and there appears to be minimal risk of exposure to unauthorised / inappropriate access to data as there is no public facing product currently in place. 2.2 Information Transfer There is a dedicated computing environment with both logical and physical separation in place. 7 The Information Governance Toolkit (www.igt.hscic.gov.uk/) is an online system which allows NHS organisations and partners to assess themselves against Department of Health Information Governance policies and standards Page 8 of 15

All data is now held on Google BigQuery; an email exchange with HSCIC from March 2012 agreed to its use for HES data and confirmed that the email chain would act as the record of the changes, alleviating the need for a more formal amendment to the DSA. There is no active management of Service Level Agreements between Google BigQuery and PA Consulting though the latter has indicated that they are happy with the service provision. Google provides its BigQuery service to standard publicly available service levels. Google Cloud Platform is ISO/IEC 27001 compliant 8. All Small Numbers 9 which may identify an individual are manually suppressed when extracting data to inform the consultancy service, typically because this is a development activity; PA Consulting may wish to consider automation prior to further development of their products and services. To date, HES data has only been used once for the development of a customer facing product. This aggregates data across five years and under multiple conditions. In addition Small Numbers are suppressed before data is used. Conclusion: There are no standard public-facing tools currently offered. The source pseudonymised HES data is housed using Google BigQuery. The output is used to inform consultancy provision to NHS organisations. 2.3 Disposal of Data The DSA specifically refers to a requirement to provide confirmation in writing of secure disposal. DVDs were loaded onto a virtual internal machine then transferred onto Google s BigQuery product; once transferred, the data held on the virtual internal machine was deleted. It was noted that there had been two data destruction events, both recorded via an email trail: Destruction of the encrypted DVDs using a shredder Deletion of the virtual machine, which is part of a secure ISO27001 environment. There was no evidence provided of a documented procedure for the destruction of data. PA Consulting may wish to consider use of a formal certificate to record this information 8 http://googlecloudplatform.blogspot.co.uk/2014/02/google-cloud-platform-provides-support-for-hipaa-covered-entities.html 9 Up to 5 individuals Page 9 of 15

for ease of later access in order to quickly provide evidence of effective controls. Conclusion: The safe handling of information from import to disposal, including record keeping, can be improved although no risk to data has been noted due to the skills and knowledge of staff involved in this process complemented by the access controls. 2.4 Risk Assessment and Treatments A corporate risk system which includes a Risk Register and Treatment Plan was said to be in place. Risks are reviewed through various corporate mechanisms which include the High Risk Assignments Steering Committee, the Operational Security Risk Steering Committee and the Risk Management Committee. Due to unavailability of the organisation s Head of Operational Risk and associated documentation on the day of the audit, this area will be followed up at the next visit. Conclusion: Verbal assurance was given that corporate risk management processes were in place. However, this has not been evidenced and will be addressed as a priority area for follow-up at the next audit. 2.5 Operational Planning and Control A Statement of Applicability (SOA) covering the range of controls and assurance in place for ISO 27001 certification was seen. However few records of practical application of controls were provided. The Information Security Policy was provided but it was noted to be version 1.0, produced in August 2014 with no evidence of management approval or previous versions. There is no formal review process to ensure compliance with legal, contractual and / or regulatory changes affecting the DSA individually in order to disseminate any potential implications across the organisation. It was noted contracts are reviewed for compliance prior to signature and that general changes in law would be dealt with at the organisational level rather than at DSA-specific level. It was also explained that training was provided to assignment managers and other staff as part of their PA career progression. Conclusion: PA Consulting noted that as it was not provided in advance with any detailed guidance concerning documents that would be requested on the day, it was unable to evidence a number of items due to confidentiality relating to handling data from multiple clients and revealing security controls. However, copies of further documents and policies will be provided during the follow-up visit and it is expected that a number of the non-conformances around the existence of policies will be resolved once that has happened. The following areas require follow-up: Central Information Asset Register The understanding of needs and expectations of interested parties; the statements surrounding HSCIC will be followed up at the next audit Page 10 of 15

Business Continuity Plan Outstanding incident security management items, such as a service desk incident log or other evidence of the incident security management processes and records The Information Security Management System was said to be subject to periodic review and revision but was not evidenced. An overall review of documentation is required in order to ensure that version controls are consistent. 2.5.1 Internal Audit The organisation has been certified to ISO 27001:2005 globally and ISO 9001:2008 in government practice. Work is underway to update compliance to ISO 27001: 2013. PA stated they have a rolling programme of both internal and external audits. However copies of recent external audits were not made available to the Audit Team nor were the programme or results of recent internal audits appropriate to data sharing processes. At this point in time, the HSCIC Audit Team cannot confirm the status or scope of the internal audit programme as evidence was not provided that this business area was covered by the current schedule. Conclusion: Although verbal assurance and descriptions of operational processes were provided, limited evidence and documentation were made available on the day. This was insufficient to provide a degree of confidence that the operational controls stated were fit for purpose and will therefore require follow-up. 2.6 Auditee Feedback PA Consulting was provided with an opportunity to comment on any aspect of the current processes employed by HSCIC in disseminating data, the DSA or the audit itself. 2.6.1 Response PA Consulting has noted its full co-operation and assistance to the auditors and intent to work with the Audit Team to show compliance with both the generic obligations as Licensee and the specific obligation on the users who have access to the data within the Licensee s organisation to cover any concerns raised within the limits of confidentiality and the terms of the DSA. PA Consulting has taken the issues raised on board and will take appropriate steps for improvement as required. A key area to be addressed is the segregation of information in generic firm wide systems so that information that relates solely to the handling of data under the DSA is able to be presented without additional other sensitive information that is not relevant for the audit. PA Consulting has confirmed that it is reviewing and investigating the points raised in this report and will provide an update at the time of the follow-up visit. PA Consulting Management Response has been added against each item in Table 1. Page 11 of 15

3 Conclusions Table 1 identifies the Major and Minor Nonconformities and Observations (Obs) raised as part of the audit. Ref Comments ISO 27001 Clause Section in this Report Designation 1 The current HES Security Plan does not appear to include any evidence of Management Review and sign-off 9.3 2.1 Obs PA Consulting Management Response: The document will be updated to show this information 2 There is no evidence of a matrix for appropriately specialised training as stated in PA s Information Security Policy, section 2.3 7.2 2.1 Minor PA Consulting Management Response: This area is under review 3 There is no evidence of active management of Service Level Agreements between Google BigQuery and PA Consulting 9.1 2.2 Minor PA Consulting Management Response: PA will be updating its procedural documents in relation to the DSA to cover this aspect 4 There was no evidence provided on the day of a documented procedure for the destruction of data 6.1.3, 8.1 2.3 Minor PA Consulting Management Response: There is a relevant policy which will be available for inspection during the follow-up 5 Only verbal assurance was given that risk management processes were in place PA Consulting Management Response: Further evidence will be provided during the follow-up 6 Limited practical application of controls within the Statement of Applicability (SOA) were demonstrated 8.2, 8.3 2.4 Minor 6.1.3 2.5 Minor PA Consulting Management Response: Further evidence will be provided during the follow-up Page 12 of 15

Ref Comments ISO 27001 Clause Section in this Report Designation 7 There is no formal review process to ensure compliance with legal, contractual and / or regulatory changes affecting the DSA 4.2 2.5 Minor PA Consulting Management Response: PA will be updating its procedural documents in relation to the DSA to cover this aspect. 8 An Information Asset Register was not evidenced PA Consulting Management Response: This area is under review. 9 The Information Security Management System was said to be subject to periodic review and revision but this was not evidenced on the day. 8.1 2.5 Minor 4.4 2.5 Minor PA Consulting Management Response: Further evidence will be provided during the follow-up 10 A Business Continuity Plan was stated as being in place but was not provided for review on the day. 8.1 2.5 Minor PA Consulting Management Response: Evidence will be provided during the follow-up 11 Outstanding incident security management items and records were stated as being in place but were not evidenced on the day. 8.1 2.5 Minor PA Consulting Management Response: Processes are in place and we are considering how best to update and evidence them whilst maintaining regard to confidentiality and security constraints 12 Version control in documentation is inconsistent PA Consulting Management Response: We have a standard version control tracking area that is used on the majority of security policy documents; we are checking that this area is present and complete on the relevant documents 13 The status or scope of the internal audit programme was not evidenced on the day PA Consulting Management Response: Evidence will be provided during the follow-up 7.5.2 2.5 Obs 9.2 2.5.1 Minor Page 13 of 15

Ref Comments ISO 27001 Clause Section in this Report Designation Table 1: Nonconformities and Observations Page 14 of 15

Data Sharing Agreements Audit: PA Consulting 3.1 Next Steps v1.0 19-Jan-2015 PA Consulting is required to review and respond to this report, providing corrective action plans, the parties responsible for the action and the timeline, based on priority and practicalities for incorporation into existing workload. As per agreement, review of the management response will be discussed by the Audit Team and validated at a follow-up meeting with PA Consulting to confirm whether the proposed actions will satisfactorily address Non-conformities and Observations raised. Ongoing monitoring of progress against corrective actions will be conducted to a schedule agreed with PA Consulting. Page 15 of 15