Information Security Assurance – Mental Health Trusts Knowledge base guidance Requirement 309 Does the MHT have adequate procedures in place to ensure the availability of information processing facilities, communications services and data? Application systems should contain audit trails or activity logs and should validate data entered or output. Routine procedures should be established for carrying out an agreed system back-up strategy taking back-up copies of data and rehearsing their timely restoration, logging events and faults and, where appropriate, monitoring the equipment environment. This requirement addresses ISO/IEC 17799 (revised 2005) controls ref 10.5 & 12.2 Information backup The MHT ensures that business data and software applications are regularly backedup using suitable technology. MHTs must develop a risk based back-up strategy that documents the procedures to be followed for each relevant information asset. MHTs that use the services of third parties for data backup should ensure arrangements conform to MHT information governance standards. Business data is that entered by users into systems, such as patient data, or other files created and saved by users. Networked data stored on servers should normally be backed up on minimum of a daily basis by the system administrator or through automatic process. Back-up media for the previous week (or as locally agreed) should be compiled and stored securely at a remote location to the server from which it was created. Consideration should be given to storing media in a different building or site to ensure they are protected if the location where the server is located is damaged causing disruption or unavailability. Data back-up strategy is a local decision, however, best practice indicates that a month’s worth of data should be compiled and stored securely at a different location from the server. The weekly and monthly tapes should be stored to protect them from unauthorised access and environmental threats such as heat, cold, magnetic fields and liquids i.e. in a safe that is fire and water resistant. All tapes should be clearly marked to show the date the data was captured and the origin of the data. Instructions for backup should be made available in writing and more than one person should know how to carry out the backup and restore. A log should be kept of all start and finish times of backups, failed attempts and remedial actions, who carried out the backup and who has had access to the tapes. Media should only be used for the period recommended by the manufacturer. Media should be regularly tested to ensure data can be successfully recovered. Redundant media should be securely destroyed. Page 1 of 3 Information that is not networked should be backed up on a daily basis and the media clearly labelled and stored securely. Computers get stolen and hard drives fail without warning so it is particularly important that users with data stored on individual workstations are aware of this. Where possible, data should be stored on networked servers and no critical data should be stored on stand-alone equipment. Local workstations should be configured so that the network drive is set as the default for the storage of data. Input data validation Computerised systems can be designed that allow control over what access a user has, limited fields for entering data and an audit trail showing what information was entered, by whom and when. Data can also be retrieved following system interrupts or failures if appropriate backup arrangements have been planned and put in place. Authentic data input is the direct responsibility of the person inputting the data, supported by their line manager. All systems will include validation processes at data input to check in full or in part the acceptability of the data. Systems should report all data errors together with a helpful reason for the error or rejection to facilitate its correction. Error correction should be done at source of input as soon as it is detected. Such correction is increasingly important as systems are linked and errors can be rapidly transmitted between systems. Any loss or corruption of data should be reported immediately to the relevant system manager. The reporting process should involve invoking incident recording and management mechanisms. Control of internal processing All systems should be designed to include controls that check for information corruption that has resulted from processing errors or other possibly deliberate acts. These controls should include: Functions that are used to implement changes to existing information. Procedures to prevent programs running in the wrong order or running after the failure of a prior process. Programs to recover from failures. Protection against attacks that use buffer overruns/overflows. Output data validation Within systems that process highly structured data, functions can be included to check the consistency of the data. Where a high level of integrity is essential, systems should carry out cross-checking between identical records stored in alternative repositories and/or carry out some form of checksum check to ensure continued data integrity. Integrity of data transmission can be assured by using cryptographic techniques but the validity of the data will depend upon checks carried out at input. In some instances it may be necessary to institute manual processes such as batch testing in order to provide a level of assurance as to the validity of data entering, Page 2 of 3 processed and output by a system. The responsibilities of the system users with respect to checking data validity at input and output should be considered and defined. All user training should emphasise the importance of inputting accurate data. Improvement plans Level 1 The MHT has documented an action plan to ensure appropriate procedures and controls are in place to maintain the integrity and availability of information processing facilities, communications services and data held. Level 2 The MHT is implementing planned controls to ensure appropriate procedures are in place to maintain the integrity and availability of information processing facilities, communications services and data held. Level 3 The MHT has implemented and regularly reviews its documented controls and procedures, and regularly tests its back-up and recovery arrangements. Requirement checklist IS_MHT_309_V4_Checklist 06-05-12.doc Key Guidance Document(s) BS ISO/IEC 17799:2005 & BS ISO/IEC 27001: 2005 BS7799-2:2005 Note that only NHS Information Governance Toolkit (IGT) administrators may download a copy of the standards for their organisation. The administrator must be logged on to download the standards. NHS Connecting for Health Good Practice Guidelines Destruction of Data and Media containing Sensitive Data Exemplar materials Information Backup Comprehensive 57 page document covering procedures to backup data, test that back-ups work, storage of backed-up data and restoration of lost data Operator & Fault Logs 10 page example process for recording and maintaining a faults log Secure Disposal of Equipment 4 page document with process for disposal or storage of IT equipment Page 3 of 3