Data Protection Breach Reporting Procedure
|
|
|
- Walter Whitehead
- 9 years ago
- Views:
Transcription
1 Central Bedfordshire Council Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1
2 Approval History Version No Approved by Approval Date Comments V1.0 Information Assurance (IAG) Group 20 Jan 15 New Policy V2.0 Information Assurance Group 18 Aug 15 Revision (incl addition of reporting proforma) Document Author/Owner Version Authors Role V1.0 Sean Dykes FOI & Privacy Specialist V2.0 Sean Dykes Maria Damigos FOI & Privacy Specialist Legal Officer Document Governance Next Review Date Aug 16 Publish to Web Intranet Only Circulation This framework is to be made available to all CBC staff and observed by all members of staff Information Classification NOT PROTECTED 2
3 Index Introduction 4 Incident Management 5 Outline Procedure for Incident Handling 8 Incident Review 9 Recommendations 10 Annex. Data Protection Breach Reporting Form 11 3
4 1. INTRODUCTION 1.1 Background The NHS Information Governance Tool Kit which is being adopted by Central Bedfordshire Council (CBC) requires that CBC provides assurance that appropriate procedures are in place for the handling of security incidents involving Personal Data. The Information Governance Toolkit is a performance tool produced by the Department of Health. Its purpose is to enable organisations to measure their compliance against the law and central guidance and to see whether information is handled correctly and protected from unauthorised access, loss, damage and destruction. 1.2 Purpose The purpose of an incident response is to ensure that: Data breach events are detected, reported, categorised and monitored consistently. Incidents are assessed and responded to appropriately. Action is taken to reduce the impact of disclosure Mitigation improvements are made is put in place to prevent recurrence Serious breaches can be reported to the Information Commissioner Lessons learnt are communicated to the organisation as appropriate and can work to prevent future incidents. 1.3 Intended Audience The intended audience for this document is anyone involved in responding to security incidents It is assumed that the readership has a good understanding of the key aspects of privacy legislation and best practice when managing such incidents. 1.4 Scope This procedure applies to all staff, partners, shared services, suppliers, contractors, representatives and agents of the Council who process personal data for which CBC is either the data controller or has an interest in the personal data affected All staff have a role to play to ensure a safe and secure workplace. 1.5 Terminology In line with International Organisation for Standardisation (ISO) directive on the use of terminology in standards and for the avoidance of doubt the following words have the specific meanings ascribed below when used in this document : 4
5 Shall or Must denote a mandatory requirement. Deviation from these shall constitute non conformance Shall Not or Must Not denotes something that is prohibited Should denotes a recommendation that is non mandatory Should Not denotes something that is not recommended May denotes something that is optional Definitions of the technical terms used in this document can be found in the glossary. 2. INCIDENT MANAGEMENT 2.1 Definition A Data Protection breach is the result of an event or series of events where Personally Identifiable Information (PII) is exposed to unauthorised or inappropriate processing that results in it s security being compromised The extent of damage or potential damage caused will be determined by the volume, sensitivity and exposure of the PII Breach management is concerned with detecting, reporting and containing incidents with the intention of implementing further controls to prevent the recurrence of the event Examples of common incidents are listed below: Type Technical Physical Human Resources Example Data Corruption Malware Corrupt Code Hacking Unescorted visitors in secure areas Break-ins to sites Thefts from secure sites Theft from unsecured vehicles/premises Loss in transit/post Data Input errors Non-secure disposal of hardware or paperwork Unauthorised disclosures 5
6 Inappropriate sharing The proforma at Annex A is to be used for the reporting of ALL suspected data protection breaches 2.2 Management Statement of Intent CBC shall: Put measures in place to ensure that awareness of data protection will enable breaches to be reported more easily Issue guidance on how to report PII breaches for analysis, categorisation and response Provide resource to analyse reported PII breaches to identify those that are incidents requiring a structured response Assemble breach response teams with a defined responsibility assignment matrix, as required, to contain and recover from security incidents Ensure that its contemporaneous logs of incidents are kept Hold periodic post resolution lessons learned meetings to focus on trends and improvements to reduce the likelihood and impact of recurrence, as appropriate CBC recognises that in some instances PII breaches are beyond its reasonable control and the importance of being prepared for such eventualities CBC shall ensure that it reacts appropriately to any actual or suspected PII breaches occurring either within the Council and its systems or with data processors CBC recognises that a structured response to PII breaches has a number of clear benefits to it including: Improving overall PII security Reducing adverse business impacts Strengthening the PII breach prevention focus Strengthening prioritisation Strengthening evidence collection and custody arrangements Contributing to budget and resource justifications Improving updates to information governance risk assessment and risk management Providing PII security awareness and training material Providing input to PII security policy reviews via lessons learned. 6
7 2.3 Outline Process for incidents Diagram below shows the flow of actions involved in a PII Breach Investigation LEARN Discovery/Identify/Assess/Investigate - Breaches and weaknesses need to be reported at the earliest possible stage to the FOI & Privacy Specialist in the form of Annex A. Only in urgent circumstances, can incidents be reported in other ways Following notification, the FOI & Privacy Specialist will open an incident log and make an initial assessment of the breach s severity. Once that s known, the FOI & Privacy Specialist must make the Senior Information Risk Owner (SIRO) and Caldicott Guardian (CG) and Legal aware. HR will be informed if deemed applicable. NOTE If the breach involves Adult Social Care or Public Health then the Serious Incident Requiring Investigation online tool must be used to centrally report a breach The reporting tool should capture most of the information needed to establish the scope of a breach but there will be a need to obtain additional information about the event, the assets affected, determining the type of incident, its category and priority before putting together an incident response team to manage the incident This is achieved by interviewing the key personnel involved in the breach and their line managers and collecting as much information as possible to determine how the breach occurred, what actions have been taken, whether outside agencies are involved and whether the data subjects have been notified Not all data protection breaches will result in formal action. Some will be false alarms or near miss events that do not cause immediate harm to individuals or the organisation. These should still be reported, as analysis of these will allow lessons to be learnt and continual improvement. 7
8 2.4 Reporting The objective of any breach investigation is to identify what actions the organisation needs to take to first prevent a recurrence of the incident and second to determine whether the incident needs to be reported to the Information Commissioner s Office. The purpose of the report is to document the circumstances of the breach, what actions have been taken, what recommendations have been made and whether the disciplinary action process needs to be followed. 2.5 Lessons Learned Key to preventing further incidents is ensuring the organisation learns from an incident. Regular review meetings will take place chaired by the SIRO to agree recommendations and each Breach Report will be shared with the Improvement & Corporate Services Director and the Monitoring Officer. These meetings will also be attended by key stakeholders across the Council to consider trends and identify opportunities for improvement 2.6 Review and Revision This document will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. 2.7 Key Message A culture in which data protection breaches are reported should be fostered. Although sanctions cannot be totally ruled out, the key objective is develop valuable insight into how such events occur and staff need to be assured that reporting a breach will not in itself result in disciplinary action. 3. OUTLINE PROCEDURE FOR INCIDENT HANDLING 3.1 Investigation Once a breach has been reported in the form of Annex A the following actions must be carried out by the FOI & Privacy Specialist as soon as possible: Create an entry in the Council s Personal Data Incident Log using the information provided by the reporter Create a folder under Data Breaches using the following format PB[Breach Reference Number] Start an investigation report and save it in this folder together with any s/documents relating to the breach If Adult Social Care information is affected, then the FOI & Privacy Specialist must complete the online SIRI tool as well but do not do so until the internal tool has been completed. See below for further information regarding the SIRI tool. 8
9 3.2.2 Inform the SIRO and Caldicott Guardian and prepare report for Breach Review Meeting if required If the SIRI tool indicates that a report to the ICO is required, contact the SIRO and Caldicott Guardian to seek approval for notification. An initial report for the ICO should also be prepared. The Monitoring Officer will also be notified Consideration must be given to notifying the individual(s) affected by the breach. Factors to consider include Sensitivity of Information Volume of information Likelihood of unauthorised use Impact on individual(s) Feasibility of contacting individuals Any notification must be agreed by senior managers of reporting business unit and if required, legal services and communications Begin investigation and complete report as soon as possible 3.3 Completing the SIRI Tool (to be completed by the FOI & Privacy Specialist) In partnership with the ICO, the Department of Health has developed the Serious Incident Requiring Investigation (SIRI) reporting tool. This has been designed so that any breaches of personal information affecting adult social care can be reported centrally and so that any breach that meets the minimum criteria for reporting to the ICO is automatically reported to them as well as, in some cases, the Department of Health as well The tool has been adapted for internal use and must be completed before any online submission. If the internal breach reporting form has been used then some or all the information you need will already be available Once details have been entered, the tool will generate a score from -3 upwards and depending on the overall score, the Council may have to report it to the ICO. FOI & Privacy Specialist will then contact both the SIRO & Caldicott Guardian to discuss next steps. 4 INCIDENT REVIEW 4.1 A key part of data protection breach management is a process of continual review. Every two to four weeks the SIRO, CG & FOI & Privacy Specialist meet to review current breaches. The purpose of these meetings is to provide an update on the progress of any investigation, discuss possible recommendations and consider whether specific incidents should be reported to the ICO. 9
10 4.2 In addition to these meetings, the Information Assurance Group (IAG) is held that includes the following individuals: SIRO CG FOI & Privacy Specialist 4.3 These meetings are used to review the outcome of any investigations, as appropriate, and examine the recommendations made and discuss information governance matters affecting the Authority. Invited to these meetings will also be the respective Directors and or Assistant Directors of departments across the Authority. Following on from these meetings, a monthly brief is given to CMT members giving an overview of current IG issues and breaches which are then escalated to the Chief Executive and Portfolio Holder if required. 5 RECOMMENDATIONS 5.1 Regardless of the type and severity of incident, there will always be recommendations to be made even if it is only to reinforce existing procedures. There are two categories of recommendation that can be made: Local these apply purely to the department(s) affected by the incident and will usually reflect measures that need to be taken to restrict the chances of the same type of incident occurring. Corporate some incidents will be caused by factors that are not unique to one department but can be found right across the organisation. Issues such as training, information handling and physical security affect all departments and it is essential that the organisation identifies such risks and puts in place measures to prevent the incident occurring elsewhere. Corporate recommendations may even be shared regionally especially where it relates to policies/protocols in use by a number of public bodies. 5.2 All recommendations will be assigned an owner and have a timescale by when they should be implemented which has a dual purpose. The first is to ensure that the organisation puts in place whatever measures have been identified and that there is an individual that can report back to CMT on progress. The second is that where incidents are reported to the ICO, the Council can demonstrate that the measures have either been put in place or that there is a documented plan to do so. 5.3 This is a recurrent theme of ICO enforcement and it s important that the organisation s procedures reflect this. Identifying recommendations is more than just damage control the knowledge of what has happened together with the impact is a fundamental part of learning which can then be disseminated throughout the organisation and beyond. 10
11 Annex A Data Protection Breach Reporting Form The aim of this document is to ensure that in the event of a security incident such as data loss, all information can be gathered to understand the impact of the incident and what must be done to reduce any risk to customers and/or CBC data and information and the individuals concerned. The checklist can be completed by anyone with knowledge of the incident. It will also require review by the FOI & Privacy Specialist who can determine Data Protection Act implications and assess whether changes are required to existing business processes. 1. Summary of Incident Date and Time of Incident Number of people whose data is affected Department Nature of breach e.g. theft/disclosed in error/technical problems Description of how breach occurred 11
12 2. Reporting When was breach reported? How you became aware of the breach: Has FOI & Privacy Specialist been informed (74968): 3. Personal Data Full description of personal data involved (without identifiers); Number of individuals affected: Have all affected individuals been informed: If not, state why not: Is there any evidence to date that the personal data involved in this incident has been inappropriately processed or further disclosed? If so, please provide details: 12
13 4. Data Retrieval What immediate remedial action was taken: Has the data been retrieved or deleted? If yes - date and time: 5. Impact Describe the risk of harm to the individual as a result of this incident: Describe the risk of identity fraud as a result of this incident: Have you received a formal complaint from any individual affected by this breach? If so, provide details: 6. Management Do you consider the employee(s) involved has breached information governances policies and procedures: Please inform of any disciplinary action taken in relation to the employee(s) involved: Had the employee(s) completed data protection training: As a result of this incident, do you consider whether any other personal data held may be exposed to similar vulnerabilities? If so, what steps have been 13
14 taken to address this: Has there been any media coverage of the incident? If so, please provide details What further action has been taken to minimise the possibility of a repeat of such an incident? Please provide copies of any internal correspondence regarding any changes in procedure: 14
Information Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
IP-PGN-14 Part of NTW(O)05 Incident Policy
Incident Policy Practice Guidance Note Information Governance Incident Reporting Management V01 Date Issued Planned Review PGN No: Issue 1 October 2014 October 2017 IP-PGN-14 Part of NTW(O)05 Incident
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER
INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER 3 APPLIES TO: ALL STAFF 4 COMMITTEE & DATE APPROVED: AUDIT COMMITTEE
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
Security Incident Policy
Organisation Title Author Owner Protective Marking Somerset County Council Security Incident Policy Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council will
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities
Information Governance Untoward Incident Reporting and Management Advice for Local Authorities March 2013 Contents Page 1. The Role of the NIGB.....3 2. Introduction...4 3. Background Information...6 4.
Security Incident Management Policy
Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
Information security incident reporting procedure
Information security incident reporting procedure Responsible Officer Author Date effective from 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended
INFORMATION SECURITY INCIDENT REPORTING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Information Governance Strategy
Information Governance Strategy Document Status Draft Version: V2.1 DOCUMENT CHANGE HISTORY Initiated by Date Author Information Governance Requirements September 2007 Information Governance Group Version
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Version: 3.2 Authorisation Committee: Date of Authorisation: May 2014 Ratification Committee Level 1 documents): Date of Ratification Level 1 documents): Signature of ratifying
SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures
SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
Guidance on data security breach management
Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction
Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI)
Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI) DOCUMENT CONTROL: Version: V1 Ratified by: Risk Management Sub Group Date ratified:
NHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT
NHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT 9.7 Date of the meeting 15/07/2015 Author Sponsoring Clinician Purpose of Report Recommendation J Green - Head
Information Security and Governance Policy
Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information
Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014
Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Information Governance Policy
Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date
Guidance on data security breach management
ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY
MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY Page 1 of 16 Contents Policy Information 3 Introduction 4 Responsibilities 7 Confidentiality 9 Data recording and storage 11 Subject Access 12 Transparency
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire
Information Governance Strategy :
Item 11 Strategy Strategy : Date Issued: Date To Be Reviewed: VOY xx Annually 1 Policy Title: Strategy Supersedes: All previous Strategies 18/12/13: Initial draft Description of Amendments 19/12/13: Update
THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31
THE MORAY COUNCIL Guidance on data security breach management Information Assurance Group DRAFT Based on the ICO Guidance on data security breach management under the Data Protection Act 1 Document Control
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Policy: D9 Data Quality Policy
Policy: D9 Data Quality Policy Version: D9/02 Ratified by: Trust Management Team Date ratified: 16 th October 2013 Title of Author: Head of Knowledge Management Title of responsible Director Director of
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Somerset County Council - Data Protection Policy - Final
Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council
DBC 999 Incident Reporting Procedure
DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible
NHS Information Risk Management
NHS Information Risk Management Digital Information Policy NHS Connecting for Health January 2009 Contents Introduction Roles and Responsibilities Information Assets Information Risk Policies Links with
A Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
NETWORK SECURITY POLICY
NETWORK SECURITY POLICY Policy approved by: Governance and Corporate Affairs Committee Date: December 2014 Next Review Date: August 2016 Version: 0.2 Page 1 of 14 Review and Amendment Log / Control Sheet
HOW TO; Report a Serious Incident Requiring Investigation (SIRI) or a Significant Event (SEA) to the Surrey and Sussex Area Team
HOW TO; Report a Serious Incident Requiring Investigation (SIRI) or a Significant Event (SEA) to the Surrey and Sussex Area Team Quality & Safety Team, Nursing Directorate. HOW TO. Report a serious incident
Information Governance Policy
Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise
DUUS Information Technology (IT) Incident Management Standard
DUUS Information Technology (IT) Incident Management Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-E 1.0 Purpose and Objectives Computer systems
Incident reporting procedure
Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance
JOB DESCRIPTION. Information Governance Manager
JOB DESCRIPTION POST TITLE: Information Governance Manager DIRECTORATE: ACCOUNTABLE TO: BAND: LOCATION: CSS Head of Information Governance 8a CSS Job Purpose The Information Governance Manager will ensure
All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.
Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Network Security Policy
Department / Service: IM&T Originator: Ian McGregor Deputy Director of ICT Accountable Director: Jonathan Rex Interim Director of ICT Approved by: County and Organisation IG Steering Groups and their relevant
INFORMATION GOVERNANCE HANDBOOK
INFORMATION GOVERNANCE HANDBOOK SECTION ONE Author Tracey Burrows Role Information Governance Manager (CSCSU) Date / Version February 2015 Version FINAL V1.0 Approved by IM&T Board Date 27 February 2015
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:
Health and Safety Management Standards
Health and Safety Management Standards Health and Safety Curtin University APR 2012 PAGE LEFT INTENTIONALLY BLANK Page 2 of 15 CONTENTS 1. Introduction... 4 1.1 Hierarchy of Health and Safety Documents...
Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy
Bolsover District Council North East Derbyshire District Council & Rykneld Homes Ltd Information Security Incident Management Policy September 2013 Version 1.0 Page 1 of 13 CONTROL SHEET FOR Information
Information Governance Strategy. Version No 2.1
Livewell Southwest Information Governance Strategy Version No 2.1 Notice to staff using a paper copy of this guidance. The policies and procedures page of LSW Intranet holds the most recent version of
Checklist Guidance for Reporting, Managing and Investigating Information Governance and Cyber Security Serious Incidents Requiring Investigation
Checklist Guidance for Reporting, Managing and Investigating Information Governance and Cyber Security Serious Incidents Requiring Investigation Applicable to all organisations processing Health, Public
Information Governance Policy
Information Governance Policy Reference: Information Governance Policy Date Approved: April 2013 Approving Body: Board of Trustees Implementation Date: April 2013 Version: 6 Supersedes: 5 Stakeholder groups
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy
South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG 01 Version: Version 1 Approval date 18 December 2013 Date ratified: 18 December 2013 Name of Author
Data Security Breach Incident Management Policy
Data Security Breach Incident Management Policy Contents 1. Background... 1 2. Aim... 1 3. Definition... 2 4. Scope... 2 5. Responsibilities... 2 6. Data Classification... 2 7. Data Security Breach Reporting...
Information Governance Strategy
Information Governance Strategy ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the
Incident Reporting Procedure
Incident Reporting Procedure Version: Version 1 Ratified by: HEE Board Date ratified: 20 March 2014 Name and Title of Mike Jones, Corporate Secretary originator/author(s): Name of responsible Director:
Information Circular
Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal
Corporate Policy and Strategy Committee
Corporate Policy and Strategy Committee 10am, Tuesday, 30 September 2014 Information Governance Policies Item number Report number Executive/routine Wards All Executive summary Information is a key asset
RECORDS MANAGEMENT POLICY
[Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body
Information Governance Strategy
Information Governance Strategy To whom this document applies: All Trust staff, including agency and contractors Procedural Documents Approval Committee Issue Date: January 2010 Version 1 Document reference:
Information Governance Policy
Author: Susan Hall, Information Governance Manager Owner: Fiona Jamieson, Assistant Director of Healthcare Governance Publisher: Compliance Unit Date of first issue: February 2005 Version: 5 Date of version
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
NOT PROTECTIVELY MARKED BUSINESS CONTINUITY. Specialist Operations Contingency Planning Business Continuity Manager 17.09.12
POLICY BUSINESS CONTINUITY Policy owners Policy holder Author Head of Services Specialist Operations Contingency Planning Business Continuity Manager Policy No. 132 Approved by Legal Services 17.09.12
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer
Once more unto the breach... Dealing with Personal Data Security Breaches Helen Williamson Information Governance Officer Aims of the session What are we going to look at? What is a data security breach?
DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY
DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY VERSION 1.0 ISSUED JULY 2015 CONTENTS Page CONTENTS VERSION CONTROL FOREWORD i ii iii POLICY 1 Scope 1 Aim and Objectives 1 Methods and Standards 1
Information Governance Strategy Includes Information risk & incident management methodology
Version 2.0 LOGOLOGO Information Governance Strategy Includes Information risk & incident management methodology Approved by: Quality & Governance Committee Ratification date: May 2014 Review date: May
NHS Commissioning Board: Information governance policy
NHS Commissioning Board: Information governance policy DOCUMENT STATUS: To be approved / Approved DOCUMENT RATIFIED BY: DATE ISSUED: October 2012 DATE TO BE REVIEWED: April 2013 2 AMENDMENT HISTORY: VERSION
INFORMATION GOVERNANCE POLICY & FRAMEWORK
INFORMATION GOVERNANCE POLICY & FRAMEWORK Version 1.2 Committee Approved by Audit Committee Date Approved 5 March 2015 Author: Responsible Lead: Associate IG Specialist, YHCS Corporate & Governance Manger
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
