Training for Information Asset Owners [IAO] North Dorset District Council T: +44(0)1344 636388 - T: +44(0)1344 626033©2013 - E:Dilys info@dilysjones.co.uk - www.dilysjones.co.uk Jones Associates Ltd • www.dilysjones.co.uk 1 Information Security Framework Dilys Jones Associates Ltd copyright 2013 2 Half day Information Asset Owners (9:30 – 12:30) Introduction and Welcome Background to the Information Assurance, the SIRO and the IAO Role and Responsibilities of Information Asset Owners (IAOs) Definitions and Terminology Key relationships and responsibilities Information Asset Administrators Examples of cases of Information misuse, risk and losses Information Security Why do we need it? How? ISO27001 Legal, technical and human aspects Records Management Business Continuity Planning ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Cases and Discussion Half day Information Asset Owners (9:30 – 12:30) continued Information Security Management System What is an ISMS Definitions and Terminology Information Assets Risks and Threats Completing and Information Log or Register Scenarios Risk Treatments/PDCA/Statement of Applicability Associated issues Forensic Readiness Data Mapping Privacy Impact Assessments Cases and Discussion ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Objectives Objectives and Learning Outcomes: • To understand the role of the Senior Information Risk Owner [SIRO], Information Asset Owner [IAO] and the Information Asset Administrator [IAA] • To review the strategic aspects for supporting the SIRO in relation to Information Risk Assessment, implementation of the ISMS and supervision of the IAAs. • To review Information Asset Registers • To review local processes and systems • To have the ability to identify assets, log them and risk assess them for their areas, and reporting to the SIRO • To plan for business continuity & associated processes in support of the IAO, the SIRO and the organisation ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk 5 Initial Introduction to Terminology • SIRO = Senior Information Risk Owner (responsible at Board/Executive Group for Information Risk) • IA = Information Asset (Information assets come in many shapes and forms related to information systems or business process. e.g. Databases and data files/ Paper records and reports/ System Software /PCs, Laptops, PDAs,/ removable media/ Contracts / Business continuity plans People skills and experience etc.) ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Initial Introduction to Terminology • IAO = Information Asset Owner [senior managers] (senior member of staff who is the nominated owner for one or more assets, by virtue of managerial position ) • IAA = Information Asset Administrator [currently Information Custodians] (provides supports to their IAO in their role) ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Components of IG Framework; there are risks in relation to each area • Data Protection & Confidentiality [personal data breaches and up to £500,000 fine/enforcement action/undertakings] • Freedom of Information and EIR [Decision Notices/Fines/imprisonment CEO or equivalent] • Information Security[personal data breaches etc/loss of corporate information] • Information and Records Management [information ‘lost’/time taken to find lost information= 10% of time/loss of business efficiency] • Information Governance Management [lack of consistency leads to poor co-ordination; lack of training leads to all of the above] • Information Quality Management[incidents which should never have happened/ poor data leads to poor planning and research/other mistakes] Dilys Jones Associates Ltd copyright 2013 8 What sort of information are we talking about? Staff Information Client and user Information Corporate Information Dilys Jones Associates Ltd copyright 2013 9 NHS and Social Care Information Formats • Paper • Electronic Different Media • e.g. Computer, I-Pad • ‘Phone, USB stick Many Purposes • Direct care • Employing staff, training • Secondary Purposes e.g. commissioning ,research Dilys Jones Associates Ltd copyright 2013 10 10 Information Governance/Assurance Frameworks • Information Governance Toolkit Social Care Delivery and Local Authority https://www.igt.hscic.gov.uk/ • Business Partner Toolkit for Private Sector and Third Sector organisations contracting with the NHS https://www.igt.hscic.gov.uk/ • Other organisations required to carry out IGT: Trusts, Qualified Provider Clinical and Non-clinical; Public Health; Dental, GP and many others. OFFERS OPPORTUNITY FOR CREATING LEVEL PLAYING FIELD ACROSS ORGANISATIONS Dilys Jones Associates Ltd copyright 2013 11 The challenges: many changes and much more interactive working with e.g. health, housing associations • Change • Current financial climate • IG review led by Dame Fiona Caldicott: government’s formal response September 12th 2013 • Requirements for Information Assurance ↑ • New technology e.g. RFID chips • Need to assure RBAC; pseudonymisation etc • Reputational and financial risk • More fines for data losses • Crime Dilys Jones Associates Ltd copyright 2013 12 Memorandum of Understanding • Health and Social Care Information Centre, Department of Health, Care Quality Commission; Developing Memorandum of Understanding with Information Commissioner’s Office re sharing intelligence on data breaches • See also the new Tool for Reporting Data Breaches • If you are a Council which works with health and/or which has adult social care data, you must do IGT and report data breaches at level 2 and above Corporate Governance Issues Information Governance Governance Financial Governance £ ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk KEY ISSUES FOR SIROs O’Donnell Review - SIRO/IAO/IA A Framework -Information Security Managemen t System Compliance Contract Clauses Privacy Secure with Penetration Information Impact Disposal Policies testing and Encryption and of Assessm Risk Policy Audit Trails Mandatory Equipment ent Training Dilys Jones Associates Ltd copyright 2013 15 Legal Framework • • • • • • Data Protection Act 1998 Freedom of Information Act 2000 Environmental Information Regulations 2004 Human Rights Act 1998 Computer Misuse Act 1990 …..and approximately 70 other pieces! ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Cost of the worst data breach: Price Waterhouse Coopers ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk ICO Data Incidents Dilys Jones Associates Ltd©2012 Numbers of Cases Dilys Jones Associates Ltd©2012 SIRO/IAO/IAA Framework Advisory to SIRO: Caldicott Guardian IG Manager IT and IS FOI, DPA and EIR Records Manager Chief Executive Senior Information Risk Owner Information Asset Owner Information Asset Owner Information Asset Administrator Information Asset Administrator USERS Board Level/Executive Group Information Asset Administrator USERS Information Asset Administrator USERS Information Asset Administrator USERS Information Asset Owner Information Asset Administrator USERS Dilys Jones Associates Ltd©2013 Information Asset Administrator USERS Information Asset Administrator USERS Information Asset Administrator The Senior Information Risk Owner (SIRO): The SIRO has to: • take ownership of the organisations’ information risk policy, • acts as advocate for information risk on the Board and should provide written advice to the accounting officer on the content of their Statement of Internal Control in regard to information risk. Dilys Jones Associates Ltd copyright 2013 21 The Senior Information Risk Owner: Key Responsibilities • • • • • Policy and process Incident Management Leadership Own Training See Information Asset Policy Dilys Jones Associates Ltd copyright 2013 22 What are Information Assets? • Information: databases, data files, contracts and agreements, system documentation, research information, user manuals, training materials, operational/support procedure, business continuity plans, back up plans, audit trails, archived information • Software assets • Physical assets, computer equipment, communication equipment, removable media, other equipment • Services • People: qualifications, skills, experience • Other: e.g. reputation, credibility of the organisation Dilys Jones Associates Lt©d ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Identify Information Assets Audit The Responsibilities of the SIRO/IAO/IAA Identify and Mitigate Risk Carry Out Risk assessment Includes Business Continuity, DFM Dilys Jones Associates Ltd copyright 2013 24 IAO The IAO is expected to understand the overall business goals of the organisation and how the information assets they own contribute to and affect these goals. The IAO will therefore document, understand and monitor: • • • • What information assets are held, and for what purposes; How information is created, amended or added to over time; Who has access to the information and why. The IAO shall receive training as necessary to ensure they remain effective in their role as an Information Asset Owner Dilys Jones Associates Ltd copyright 2013 25 Information Asset Owner • IAOs will work closely with any other IAOs of the organisation to ensure there is comprehensive asset ownership and clear understanding of responsibilities and accountabilities. • This is especially important where information assets are shared by multiple parts of the organisation. • IAOs will support the organisation’s SIRO in their overall information risk management function as defined in the organisation’s policy. Dilys Jones Associates Ltd copyright 2013 26 Information Asset Owner • Manage incidents • Ensure policy and procedures implemented properly • Associates Business Processes • Leadership Role • Personal Development • Working with other IAOs, IAAs and other key figures Dilys Jones Associates Ltd copyright 2013 27 Information Asset Owner • The Information Asset Owner (IAO) will be a senior member of staff who is the nominated owner for one or more identified information assets of the organisation. • It is a core IG objective that all Information Assets of the organisation are identified and that the business importance of those assets is established. • There may be several IAOs within an organisation, whose departmental roles may differ. ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Information Asset Administrators[see IAO policy] Recognises potential or actual security incidents Ensure Policies and Procedures are followed Information Asset Administrator Ensure Information Asset Registers up-to-date Consult IAO on incident management Dilys Jones Associates Ltd copyright 2013 29 Some of the focus for the SIRO/IAO/IAA ICO / Crime /£ /Law /Reputation Perimeter security, receptionist, locks, firewalls Policies, procedures, systems, risk assessment, Locums, temps, staff members, volunteers, contractors; how they manage the organisation’s information Dilys Jones Associates Ltd copyright 2013 30 Key relationships for IAOs Within the Organisation: • SIRO • Corporate Services • IG Lead • Risk Managers • Information Security Manager • Other Information Asset Owners • Records Manager • Caldicott Guardian (for assets that process patient data) • Users of the Information Assets they own • Information Asset Administrators May have contact with: • Other NHS Organisations and external business partners ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Information Asset Administrators (IAA) • Information Asset Administrators ensure that policies and procedures are followed • Recognise actual or potential security incidents • Consult their IAO on incident management • and ensure that information asset registers are accurate and up to date. ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Roles: IAA Tasks • • • • • • • • • • Maintenance of Information Asset Registers; Ensuring compliance with data sharing agreements within the local area; Ensuring information handling procedures are fit for purpose and are properly applied; Under the direction of their IAO, ensuring that personal information is not unlawfully exploited Recognising new information handling requirements (e.g. a new type of information arises) and that the relevant IAO is consulted over appropriate procedures; Recognising potential or actual security incidents and consulting the IAO; Reporting to the relevant IAO on current state of local information handling; Ensuring that local information handling constraints (e.g. limits on who can have access to the assets) are applied, referring any difficulties to the relevant IAO. Act as first port of call for local managers and staff seeking advice on the handling of information; Under the direction of their IAO, ensuring that information is securely destroyed when there is no further requirement for it ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Blagging Dilys Jones Associates Ltd copyright 2013 34 Paper to electronic to paper………………….! Need to help employees remember passwords safely-controls have to support work as well as provide security Belvoir Park Hospital from Urban Explorers UK website http://www.28dayslater.co.uk/forums/showthread.php/50910-BelvoirHospital-Belfast-June-2010 36 Impact of Organisation Change on Information Assurance • HMRC-things can go wrong more often during periods of change; two organisations merging when they lost the 2 CDs • Records management- Belfast Health and Social Care Trust case; happened as six Trusts merged into Belfast H &SC T • March 2010 Trust informed trespassers had gained access to the Belvoir Park site [disused] • Photos of patient records taken posted online. • Trust inspected the site; a large quantity of patient and staff records were discovered, back to the 1950s • Trust improved security of the site but the Irish News reported that it was still possible to access the site without authorisation. • A full inspection which revealed further records, many of which were being retained in breach of the Trust’s ‘Records Retention and Disposal’ policy. • Included 100,000 paper medical records, x-rays, microfiche records • 15,000 staff records 37 Impact of Organisation Change on Information Assurance • • • • Fined £225, 000 Pictures still on the website Need to “keep eye on the knitting” during change Records management-good guidance from TNA and DH -Dissolution of Public Bodies - click here -Privatisation of Public Bodies - click here -Records Management Code of Practice Parts 1 & 2 The Code Parts 1 and 2 set out how we should manage records; including patient records. -CfH Checklist 38 Information Security “Preservation of confidentiality, integrity and availability; in addition, other properties , such as authenticity, accountability, non-repudiation, and reliability can also be involved” ISO 27001 ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Some of the focus for the SIRO/IAO/IAA Framework ICO / Crime /£ /Law /Reputation Perimeter security,, receptionist, locks, firewalls Policies, procedures, systems, risk assessment, Locums, temps, staff members, volunteers, contractors; how they manage the organisation’s information ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Why do we need a system for managing Information Security? Provides a comprehensive and coherent approach to identify the information assets of the Organisation. Enables any threats to information assets to be calculated and managed. Enables appropriate protective measures to be put in place. Ensures the business of the Organisation continues to function. Dilys Jones Associates Ltd copyright 2013 41 Threat • Threat-a potential cause of an unwanted incident, which may result in harm to a system or organisation Some Threats • Deliberate actions by people -inside ( employee downloads PID database and sell to criminals who advertise on South American websites) -outside (hacking into IT system and stealing information) • Accidental actions by people -inside (spills coffee on a computer keyboard or laptop; mis-faxing; muddling up papers at the printer) -outside (builder drills through cable) • System problems e.g. software, hardware (server breaks down) • Other events (e.g. power cuts/fire etc) ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Threat and Risk Note the Dry Cleaners Association research showed 17,000 USB sticks found in clothes’ pockets brought in for cleaning last year. ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Estimating risk • Defines risk as “the product of the amount that may be lost (the impact) and the probability of losing it (the likelihood) Dilys Jones Associates Ltd copyright 2013 44 RISK MATRIX Impact Likelihood L Rare-1 Unlikely-2 Possible-3 Likely-4 Certainty-5 Negligible-1 1 2 3 4 5 Minor-2 2 4 6 8 10 Moderate-3 3 6 9 12 15 Major-4 4 8 12 16 20 Catastrophic-5 5 10 15 20 25 LOW (1-7) MEDIUM (8-14) Dilys Jones Associates Ltd copyright 2013 HIGH (15-25) 45 Control • Means of managing risk, including policies, procedures, guidelines, practices or organisational structures, which can be of administrative, technical, management or legal nature ISO 27001 Dilys Jones Associates Ltd copyright 2013 46 Worked Example: Unencrypted laptop with >50000 data sets SPID Threat Loss or theft Potential Impact Impact Likelihood SeriousReputation loss Data loss Likely (4) Major (4) Risk Initial Thoughts HIGH (16) -Need to encrypt laptops Controls in place Action Password protection Encrypt (identify costs) -Train staff Identify training needs Needs audit Conduct audit ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk The Clinical Recording System Server Hard Copy Database Printer PC PC ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Statement of Applicability • • • • • • • • • Identify chosen security controls Justify where not selected States why controls not chosen are not relevant Relate selection of controls and reason for selection back to risk treatment plan In practice, there is a link between selection of controls to statements in ISMS policy Bridge between general policy and detailed procedures supporting policy Details control objectives, selected controls chosen to achieve those objectives and manage risks identified Provides road map for audit Training aid for certain staff ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Information Security: ISMS ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Implementing the audit cycle ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Information Security Management System (ISMS) ISMS includes: policies, procedures, structures e.g. IG Committee, measures, controls, training, awareness raising, audit, risk assessment, business continuity, everything that is included in the safe and secure management of information. Organisations should do the following: a) Define the scope and boundaries of the ISMS in terms of the characteristics of the business, the organisation, its location, assets and technology, and including details of and justification for any exclusions from the scope b) Define an ISMS policy in terms of the characteristics of the business, the organisation, its location, assets and technology that: 1) includes a framework for setting objectives and establishes an overall sense of direction and principles for action with regard to information security; ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Information Security Management System (ISMS) - 2 2) takes into account business and legal or regulatory requirements, and contractual security obligations; 3) aligns with the organisation's strategic risk management context in which the establishment and maintenance of the ISMS will take place; 4) establishes criteria against which risk will be evaluated; and 5) has been approved by management. Development should normally be iterative, over time and reviewed regularly ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Data Flow Mapping 1. What person identifiable data goes out of your area? What is the data? What is the purpose of the transfer? Is it bulk data? Is it sensitive data? 2. Where does it go to? Which location is it going to? Which organisation / person is it going to? Destination description (optional) 3. How? By email? By fax? By post? By text message? ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Data Flow Mapping If email: Is data emailed to & from NHSmail? Do you confirm the email address before sending? Do you request receipt of email? Do you encrypt data by recommended method? If fax: Do you phone fax recipient in advance of sending fax? Is a cover sheet used? Do you receive confirmation of fax? Is data faxed to a safe haven? If post: Is data sent on removable media? Is data encrypted by recommended method? Is data sent by courier or registered post? Is receipt of post confirmed? Is data sent in tamper-proof wallet? Is data sent to a safe haven? Dilys Jones Associates Lt©d ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk London Consortium Community Outreach Workers Patient summary (fax) Fax Post Access website Email Patient Info (fax) Summons (by hand) Within BLT GP Health Protection Agency Lawyers Sophid report Outside BLT Nhs.net Infection & Immunity Outside scope Risk areas Sexual health notes Other Hospitals Referral letter (with patient) Infection & Immunity Referral letter (fax) Email PAS (HIV Patients - Named Sexual Health Patients - Anonymous) PCT Satellite Library PCI Shared drive Patient postcode only All patient details Pathology HIV patient details A&E Clinisys Preview (HIV & Sexual Health Patients) The Haven (Sexual Assault Referral Centre) Doctors Police Doctors’ home email accounts Patient Connecting for Health Information Mapping Project ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Self-referral Post Test results (text) Email Specimens (post) Fax Summons (by hand) Patient Info (fax) Patient summary (post) Patient Info (post) Hospice Research Department Email Under 16s patient info (post) Email Social Services PRIVACY IMPACT ASSESSMENT • Two stage process • 1st stage – what are we planning; what has been done before in this area; which groups are going to be affected? Then, review the screening questions • 2nd stage – consult with the affected groups - Collect views - See if project can be amended to embrace views - Write up your findings and publish the paper - Audit the project to ensure that your findings have been taken into account in the project Dilys Jones Associates Ltd copyright 2013 57 Privacy Impact Assessment Screening the proposed project or policy- any Privacy Issues e.g: - New, additional technologies? - Does it affect many people? - Does it affect a lot of information about each person? - Are you using new identifiers? - Does it involve more than one agency? Dilys Jones Associates Ltd copyright 2013 58 Privacy Impact Assessment • New approach to be added to process for establishing new projects • See: http://www.ico.gov.uk/upload/documents/libr ary/data_protection/practical_application/pia_ final.pdf Dilys Jones Associates Ltd copyright 2013 59 Forensic Readiness • Policy • Access to expert advice • ACPO guidance ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk Implementation-what you need to do • Action Plans • Working in the Accountability Framework • Follow up to today; what you must do next ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk 61 Dilys Jones Associates Ltd • Consultancy and Learning Tools • Information Governance Training: -Freedom of Information -Confidentiality and Data Protection -Information Security -Records and Information Management -Data Flow Mapping -Privacy Impact Assessments -Senior Information Risk Officer -Caldicott Guardian The Knowledge Leader in Information Governance www.dilysjones.co.uk ©2013 Dilys Jones Associates Ltd • www.dilysjones.co.uk 62