Storetec's Information Security Policy

advertisement
Information Security Policy
POLICY NO
REVIEW COMMITTEE
ISP01v4.1
Neil Robson - Managing Director
Angie Hare – IG Lead
Steve Wragg – I.T. Manager
DATE RATIFIED
NEXT REVIEW DATE
29/10/2014
31/10/2015
POLICY STATEMENT:
Storetec Services Ltd recognises the vital importance of a structured, coherent
and secure Information system and associated systems used to process, store
and return clients’ sensitive Information in order to safeguard the integrity of this
data and protect against all loss, either accidental or due to malicious intent.
ACCOUNTABLE DIRECTOR: Managing Director
POLICY AUTHOR:
Information Systems Manager
KEY POLICY ISSUES



To ensure a secure and reliable system for the
transference, handling and storage of client Information
Identify and comply with national policies, laws and
legislations, in particular, The Data Protection Act 1998, PCI
DSS and Information Governance best practice
To meet the client requirements for data transfer into
externally located systems and ensure connection security
Table of Contents
Introduction ......................................................................................................... 3
Rational ........................................................................................................... 3
Scope .............................................................................................................. 3
Principles ........................................................................................................ 3
Laws legislations and guidelines ................................................................. 4
Information confidentiality ............................................................................ 4
Policy .................................................................................................................. 5
Email ............................................................................................................... 5
Personal Use ............................................................................................... 5
Housekeeping ............................................................................................. 5
Use of Email ................................................................................................ 6
Terms of use ............................................................................................... 6
Spam and Junk Email ................................................................................. 7
Virus Checking ............................................................................................ 8
Content Filtering .......................................................................................... 8
Email Investigation Requests ...................................................................... 8
Internet ............................................................................................................ 8
Internet Use ............................................................................................... 10
Personal Use ............................................................................................. 10
Internet Security ........................................................................................ 11
Monitoring.................................................................................................. 11
Reporting ................................................................................................... 11
Internet content filtering ............................................................................. 12
Internet Use Investigation Requests .......................................................... 12
Remote Working and Mobile devices ............................................................... 12
Site security .................................................................................................. 12
IT Server and Communications Rooms ..................................................... 12
Desktop Computer Security....................................................................... 13
Virus Protection ......................................................................................... 14
Network Security ....................................................................................... 14
New I.T. Systems ...................................................................................... 14
System access levels ................................................................................ 15
Disposal of I.T. Equipment and Media .......................................................... 15
Storetec Information Security Policy – ISP01v4.1 October 2014
1
Password Management ................................................................................ 15
Network Account Management ..................................................................... 16
Account creation ........................................................................................ 16
Account deletion ........................................................................................ 17
Security incident handling ............................................................................. 17
Reporting an incident ................................................................................ 17
Responding to an incident ......................................................................... 17
Business Continuity ...................................................................................... 18
Training ......................................................................................................... 18
Duties and Responsibilities ........................................................................... 18
Monitoring and Compliance. ......................................................................... 19
Development & Consultation Process .............................................................. 19
Appendices ....................................................................................................... 20
Caldicott Guidelines ...................................................................................... 20
Computer misuse Act 1990 ........................................................................... 21
Storetec Information Security Policy – ISP01v4.1 October 2014
2
Introduction
Rational
The Information Security policy has been put in place for the following reasons
 Storetec Services Ltd (from hereon known as “Storetec”) recognises the
importance of its Information systems used for the processing and
storage of client data.

Through this policy, government laws and legislations (see section 5
Reference Documents) Storetec will identify and adopt structured
security procedures for all Information systems

To ensure the availability of data: that is, ensure that client assets are
available as and when required to those with predetermined access
adhering to Storetec’s business objectives and SLAs

To preserve integrity: that is, protect assets from unauthorized or
accidental modification ensuring the accuracy and completeness of client
assets

To preserve confidentiality: that is, protecting Information from
unauthorized access and disclosure

Storetec staff are bound by the confidentiality and security policies set by
Storetec and the Information Commisioner’s Office.
Scope
All client Information that is processed, stored, transmitted or received during
the course of Storetec’s business activity is an asset that Storetec has been
entrusted to preserve and protect.
This policy applies to all Storetec employees or other persons working for
Storetec or whilst engaged on or involved in any Storetec business.
This policy must be adhered to at all times. Failure to comply with this policy
may lead to Storetec’s disciplinary policy being invoked.
Principles
The term Information can be defined as “a collection of facts or data” and for the
purpose of this policy Information includes

Information stored on computers.

Transmitted across networks.
Information that is retrieved, accessed, transmitted to/received from other
organisations using the following mediums
Storetec Information Security Policy – ISP01v4.1 October 2014
3
1. Networks (Local or Wide) (including Internet and remote access)
2. Fax machines and any other communications media.

Printed out or written on paper

Stored on disk, tape or any other electronic or optical media

Recorded on video tape
Also included are verbal communications and any other methods used to convey
knowledge and ideas relating to Storetec or its business or any client data held
within any of the media listed above.
Laws legislations and guidelines
Due to the nature of Storetec’s business, Storetec must comply with but not
limited to the following laws, legislations and guidelines

The Data Protection Act 1998

The Freedom of Information act

The Computer Misuse Act 1990

The Caldicott Guidelines

Confidentiality NHS Code of Practice

Electronic Communications Act 2000
Information confidentiality
Keep all confidential Information secure, use it only for the purposes intended
and do not disclose to any unauthorised third party.

Client data is only to be stored within designated systems
Client data must not be saved to the workstation or device’s local storage (e.g.
“C” drive), USB devices, CD/DVD/Blu-Ray, Memory Card or any other external
storage devices (even those that are encrypted), unless via an approved
methodology
Storetec Information Security Policy – ISP01v4.1 October 2014
4
Policy
This security policy covers all Storetec I.T. systems and Information
communicated and managed by these IT systems.
Email
Storetec employs the use of email to facilitate its business objectives.

Microsoft Outlook
This is used for day to day communications of non secure Information
and is set up as part of the account request process.

The use of Personal Internet email is permitted during break times and
rest periods with agreement of your service lead. Staff should be aware
that all internet activity across Storetec networks is monitored.

Internet email is only for personal use. Storetec related emails and
attachments or anything that is considered sensitive or would bring
Storetec into disrepute is prohibited. Failure to comply with this usage
the trust reserves the right to invoke the disciplinary policy.
Personal Use
Although personal use of Trust email facilities is discouraged, limited personal
use will be permitted provided that the content of messages is appropriate, i.e.
is not likely to cause offence or used for personal business for financial gain.
Employees should regard this facility as a privilege that should normally be
exercised in their own time without detriment to the job and not abused.
Inappropriate use may result in disciplinary action and/or removal of facilities.
However, staff should be aware that both private and business use of email will
be subject to monitoring.
Housekeeping
The amount of e-mail in the personal Inbox must be kept to a minimum.
Non essential work related E-mails should be deleted after reading, response,
or action. Saved e-mails must be reviewed on a monthly basis and deleted
when no longer required. It is good practice to move Emails that need to be
saved to a personal folder. The same housekeeping rules apply to Sent Items.
Care must be taken when sending file attachments as these are typically large
and may cause network congestion. File attachments must only be sent when
necessary and must be deleted as soon as is practicable. Users are
responsible for their own housekeeping. Staff should refrain from sending emails with inserted graphics or multimedia or large attachments unless
Storetec Information Security Policy – ISP01v4.1 October 2014
5
absolutely necessary as these e-mails tend to take up a lot of space on the
system.
After a period of time attachments will be archived outside the mail system and
the attachment will link to the original attachment itself. This is to conserve
working space on the mail systems.
Use of Email
Storetec uses technologies and policies to control who has access to Storetec
network. These policies also control who has access to the Email systems.

Expressly agree with the recipient that the use of e-mail is an acceptable
form of communication bearing in mind that if the material is confidential,
privileged, or sensitive, Outlook e-mail normally is un-encrypted and is
not secure unless specifically manually encrypted.

Some intended recipients may have rigorous e-mail gateway protocols
(or firewalls) which can automatically screen all incoming e-mail for
content and source. If this is the case, consider whether this means of
communication is appropriate.

All emails are checked for viruses and content
Terms of use
Storetec’s main purpose in providing IT facilities for email is to support the
approved business activities of Storetec. IT facilities provided by Storetec for
email should not be abused. An absolute definition of abuse is difficult to
achieve but certainly includes (but is not necessarily limited to):
 Creation or transmission of material that could bring Storetec into
disrepute.

Creation or transmission of material that is illegal.

The transmission of unsolicited commercial or advertising material, chain
letters, press releases or other junk-mail of any kind.

The unauthorised transmission to a third party of confidential material
concerning the activities of Storetec.

The unauthorised transmission to a third party of confidential material
concerning the activities of a client of Storetec.

The transmission of material such that this infringes the copyright of
another person, including intellectual property rights.

Activities that unreasonably waste staff effort or networked resources, or
activities that unreasonably serves to deny service to other users.
Storetec Information Security Policy – ISP01v4.1 October 2014
6

Activities that corrupt or destroy other users' data or disrupt the work of
other users.

Unreasonable or excessive personal use.

Creation or transmission of any offensive, obscene or indecent images,
data or other material.

Creation or transmission of material that is designed or likely to cause
annoyance, inconvenience or anxiety.

Creation or transmission of material that is abusive or threatening to
others, serves to harass or bully others, discriminates or encourages
discrimination on racial or ethnic grounds, or on grounds of gender,
sexual orientation, marital status and disability, political or religious
beliefs.

Creation or transmission of defamatory material or material that includes
claims of a deceptive nature.

Activities that violate the privacy of others or unfairly criticise,
misrepresent others; this includes copying distribution to other
individuals.

Creation or transmission of anonymous messages or deliberately forging
messages or email header Information, (i.e. without clear identification of
the sender)

The deliberate unauthorised access to services and facilities.

The unauthorised provision of access to Trust services and facilities by
third parties.
Spam and Junk Email
Spam can be defined as "the mass electronic distribution of unsolicited email to
individual email accounts". Junk mail is usually a result of spamming. In reality
spam and junk mail are regarded as interlinked problems.
Storetec maintains an email content management system (messagestream)
which filters junk email, any mail which has been marked as Junk mail will be
quarantined and not delivered.
Storetec is constantly striving to improve its Junk mail detection mechanisms
but unfortunately no system is 100% and occasionally Junk email will evade the
detection process and be delivered. Conversely some mail may be tagged as
junk mail but is legitimate.
Storetec Information Security Policy – ISP01v4.1 October 2014
7
Virus Checking
Computer viruses, Trojan horses and worms are collectively known as malware.
The most common method for distributing malware is via email. All email
communication passing through Storetec’s email servers is checked for
malware. Checking strategies include: refusing messages containing
executable attachments, scanning messages for known malware or a
combination of both techniques.
Messages containing malware will be retained for a limited time for
administrative reasons. The sender of such messages will be informed of the
viral content of their email. A similar message will be sent to the administrator(s)
of the email gateways.
Content Filtering
Email is filtered for both inbound and outbound mail, content filtering is in use to
stop the exchange of viruses, chain letters, spam etc. Network bandwidth is
essential for Storetec’s day to day operations. To optimise this, the message
gateway attempts to blocks messages that contain (or are likely to contain) nonbusiness attachments, movies, pictures, sound files etc.
Storetec’s content filtering system is configured to reply to internal users
informing them that their message has been blocked, detailing the reason for
the block and advising on the actions required to have the message released.
Email Investigation Requests
Two forms of email Investigations are available and should be requested via the
Information Security Manager by logging an incident with the Support desk.

A basic summary of compliance in line with Storetec’s acceptable use of
email policy statements can be requested.

A full email investigation can be requested, but will only be accepted if it
forms part of a HR investigation.

The HR investigation terms of reference would have to be compatible
with email analysis.
Internet
Storetec employs the use of the internet as a communications medium to
facilitate its business function. Access to the internet is controlled through
network security.
Any person or persons accessing the Internet via Storetec’s network will be
considered to have read, understood and accepted the Information Security
policy.
Storetec Information Security Policy – ISP01v4.1 October 2014
8
Any service user accessing the internet via Storetec network will have to
comply with this policy and the service user internet use policy.
A copy of the service user internet use policy can be requested from HR and
will be given to the employee.
The purpose of this document is to define the environment under which full or
partial access to the Internet may be granted from a workstation or device
attached to the Storetec network.

To clarify Storetec's policy regarding staff use of the Internet.

To mitigate the organisation's exposure to potential liability.

To minimise the risk of Internet borne security threats through the
promotion of staff awareness and good practice.

To encourage the most effective and positive use of the Internet as an
Information resource.
Heads of Departments will be responsible for ensuring that users are aware of
and conform to the practices laid out in this document.
The internet is a source of Information and knowledge of infinite range but
offers no guarantee of accuracy, reliability and authenticity.
Discussion, news group and blogging sites
The membership of special interest groups is not private and, the fact that a
member is employeed by Storetec could be easily apparent and could be used
to generate adverse publicity therefore the use of Storetec e-mail accounts
must not be used for registering with internet sites for personal business use
including but not limited to EBay, TESCO home shopping and holiday sites.
Storetec reserves the right to investigate any use that may bring it into
disrepute.
Social Media
It is recognised that Social Media is becoming an important channel for effective
communication and as such viewing access is permitted during break and rest
periods via agreement with your line manager.
Storetec Information Security Policy – ISP01v4.1 October 2014
9
Internet Use
When entering an internet site, always read and comply with the terms and
conditions governing its use;
Do not download any images, text or material that is copyright protected other
than for private study (see section 5 Reference Documents Copyright, Designs
& Patents Act 1988)
Do not download any images, text or material that are obscene or likely to
cause offence;
You must not download or install any software. If you want to download or
install any software, first seek permission from the Information Security Team.
If you are involved in creating, amending or deleting our web pages or content
on our web sites, such work should be consistent with your responsibilities and
be in our best interests. Always ensure that the proper vetting procedures have
been complied with and the Information is accurate and up-to-date.
Personal Use
Storetec has made arrangements for the Internet to be used for the purposes of
their business. The facility can be used for employees’ personal use at the
discretion of the user's line manager and during a time agreed by that manager.
The Internet may also be used for educational purposes if this is identified as a
necessary requirement for the development of that particular member of staff.
Any abuse of this concession or failure to adhere to the terms under which such
access is granted will be treated as a disciplinary offence.
Please ensure that your personal use of the internet:

Does not interfere with the performance of your duties;

Does not take priority over your work responsibilities;

Does not incur unwarranted expense on Storetec;

Does not have a negative impact on Storetec in any way; and is lawful
and complies with this policy.

Is conducted during official breaks and outside working hours.

Is not used for personal business or financial gain
Storetec Information Security Policy – ISP01v4.1 October 2014
10
Any user found to be using a Storetec Internet connection for conducting
personal business activities will be subject to disciplinary action under
Storetec’s disciplinary process.
Internet Security
The Internet is not a secure transport medium for Information. Under no
circumstances must client data be sent via the Internet unless advice has been
requested and permission given from the Information security manager.
Any attempt to gain unauthorised access to the Internet will be treated as a
disciplinary offence and be dealt with under Storetec’s disciplinarily procedures.
All Trust staff are responsible for the security of the workstation they accessed
the internet from. After using the workstation all staff must logout, if a breach of
security is identified, the user’s account that the offence occurred under will be
investigated.
Monitoring
All internet traffic is monitored and controlled 24 hours a day for network
bandwidth, security purposes and content control.
The systems used to monitor internet traffic are used to generate usage reports.
These reports contain the following Information

User name.

Sites accessed.

Time spent accessing the internet and individual sites.

Amount of Information accessed.
These access reports will be reviewed on regular bases for audit purposes.
Reporting
If a member of staff feels that they have accidentally accessed an inappropriate
internet site should report this matter to the Information Security Manager as
soon as possible.
All Storetec staff have a responsibility to report any security incidents or
suspected security incidents or any security vulnerabilities to Storetec’s
systems or Information to the IT systems security manager.
Storetec Information Security Policy – ISP01v4.1 October 2014
11
Internet content filtering
All internet traffic is checked for content via Storetec’s internet content
management system.
The content management system checks for illegal or immoral sites, all access
to these sites will be blocked; other sites which are blocked will include but are
not limited to

Gambling sites

Adult content

Games sites

Crime/Terrorism

Music Downloads
Internet Use Investigation Requests
Investigations summarising Internet Use can be requested via the Information
Security Manager.

The request needs to be authorised by the Investigating officer in the
case of an ongoing HR investigation.

The HR investigation terms of reference would have to be compatible
with internet usage analysis.
Remote Working and Mobile devices
The nature of Storetec’s business is such that sales staff may need to access
Information from a location that is not their normal work base. Storetec
provides a variety of mobile devices and allow the use of mobile storage where
necessary.
Site security
It is the responsibility of all Storetec staff to make their area of work as secure
as is reasonably possible. The following guidelines must be adhered to; this
includes but is not limited to
IT Server and Communications Rooms
Storetec server and communications rooms must be locked at all times. This is
for security and health and safety due to the fire prevention systems in use.
Storetec Information Security Policy – ISP01v4.1 October 2014
12
All Staff working in the server room must be trained on the fire prevention
systems in use.
All non-Storetec staff must be accompanied at all times while conducting work
in the server room.
Desktop Computer Security
Desktop security is of paramount importance to Storetec and as such the
Information Security Manager controls the following through network security.
 Network account Password protection
Network account password change will be requested every 40 days.

Screen saver password protection.
Password protected screen savers will be activated if the computer is
idle for 5 minutes.

Virus protection.
The Virus protection systems employed by Storetec will automatically
update while the computer is attached Storetec network and actively
check all open files.

Access to the local hard drive “C” drive will not be available on Storetec
computers while connected to Storetec network. This will be put in place
to stop the storage of trust Information on the local computers.

Storetec has put in place a system to stop the use of USB devices, this
system will record what devices are attached to the computer and can
also record what type of documents have been saved to any USB
device.
USB ports will be restricted to only allow printers, scanners, keyboards
and mice. All other USB devices will be blocked e.g. USB memory sticks
(see section 2.3.3.a), Web cams and cameras.
Any user that needs to connect an alternative USB device will have to
seek permission from the Information Security Manager.
Under no circumstances must Storetec staff copy any personal or multimedia
files i.e. MP3, CDA, WMA, GIF, BMP or JPEG files that are non Storetec
related to any local or network drive. If files are found on Storetec staffs
accounts or shared drives, this will be classed as computer misuse and subject
to Storetec’s disciplinary process.
Do not use the system in any way, which may damage, overload or affect the
performance of the system or the internal or external network.
Storetec will have an asset management system in place to record all IT assets
to enable it to maintain an accurate record of I.T. assets.
Storetec Information Security Policy – ISP01v4.1 October 2014
13
Virus Protection
Storetec recognises the threat to its Information assets through malicious
programs and as such has put in place a system to check and remove viruses
from its network. Each workstation that resides on Storetec’s network will have
the virus protection system installed and will be automatically updated
whenever a new virus is discovered.
Storetec will try to protect its assets against the threat of viruses to its best
endeavours and recognises the dangers that a virus could do if not detected
and removed. It is also the responsibility of all staff to be vigilant and take steps
to protect themselves against computer viruses.
Network Security
Storetec recognises the need for a secure and reliable system to transfer
Information. To facilitate the transference of Information throughout Storetec
Storetec utilises a switched based network system.
All Trust network switches must comply with but are not limited to the following
standards


All switches must be password protected.
Only the Information Security Manager and designated team members
will have access to the switch passwords

All switch passwords must be changed if a Information Security team
leaves Storetec who has had access to the switch passwords.

All switches must be located in a secure location.

All external network traffic containing client Information should be
encrypted.
New I.T. Systems
To aid business continuity Storetec will have to implement new systems or
update old systems. Any new IT based systems installed on Storetec network
or stand alone systems must be implemented as part of a recognised and
structured IT project. This will ensure that the correct procedures are
maintained for the integration of new systems regarding the location, protection
and backup of any Information produced or stored on or by the new systems.
The following are some key issues used in project planning surrounding the
integration of new IT systems.

Conformity
Storetec Information Security Policy – ISP01v4.1 October 2014
14
To keep all Storetec systems at the same or equivalent levels of
standardisation.

Continuity
To ensure that all new IT systems are available where and when they
are needed.
To ensure that all processed and system dependant Information is
backed up in case of system failure.

Security
To ensure that any new systems are located in a secure location and
under the correct environmental conditions i.e. air conditioned and with
the correct fire suppressant systems in use.
To ensure that all client data produced or processed by the new system
is stored in a secure location.
To ensure that the correct access levels to the new system are set up
and password protection is used with an audit trail of system access.

Support
To ensure that IT staff are trained on any new systems to allow an
acceptable level of support.
System access levels
Storetec employs many different systems to facilitate its business function. Most
systems will have different access levels which could allow users access to
different levels of patient / carer Information or access at an administration
level. Storetec reserves the right to add, remove or change access to
applications or systems to facilitate Storetec’s business functions.
System access will be granted on a lowest level required basis in all cases..
Disposal of I.T. Equipment and Media
Storetec disposes of its assets in a controlled and secure manner. All media
and drives are physically and manually destroyed onsite by Storetec staff. Any
data that is required to be removed from Storetec’s systems for operational
purposes will be overwritten with binary data using a software shredding
algorithm.
Password Management
Passwords are confidential Information and must be treated as such.
A password is only as secure as the person who knows it and as such the
following standards must be adhered to:

Keep your system passwords safe.
Storetec Information Security Policy – ISP01v4.1 October 2014
15

Do not disclose them to anyone.

You will be forced to change your passwords from time to time for
security purposes.

Network passwords must be a minimum of 8 characters and at least one
character should be none alphabetic.

Should be easy to remember but difficult to guess.

Should not relate to Information that is known to other members of staff.

Each user is responsible for maintaining the security of their individual
login and password.

Staff must not share their user name or password with anyone.

Must not be written down.
Each user is responsible for maintaining the security of their individual login
and password. If a breach of security is recorded under your login the
burden of proof will be on you to show that you are not responsible for the
breach.
All passwords should be changed at regular intervals when requested by the
system. This should be no less than 40 days
If a password is forgotten the following steps must be taken;

Inform Information Security Manager or a member of his team.
Network Account Management
All IT network accounts will be created and maintained by the Information Security
Manager and his team.
Regular network audits will be conducted to check account assignments and user
rights are being maintained.
User accounts must only have the minimum rights assigned to allow the users to
conduct Storetec business functions.
Account creation
All new network accounts must be requested by the user’s manager by email.
Storetec Information Security Policy – ISP01v4.1 October 2014
16
Account deletion
When a member of staff leaves Storetec, their line manager must inform the IT
service desk via an email sent from the managers e-mail account. The leavers
account must then be disabled immediately and all access rights removed.
Security incident handling
Storetec recognises the risk of an incident occurring involving Storetec systems
and as such has put in place the following IT security incident handling
procedures.
An I.T. Security Incident can be described as any situation involving Information
Technology systems or Information that is stored, manipulated or communicated
by or through these systems being affected in an adverse way either through
controlled or uncontrolled circumstances which could result in:

Loss, damage or theft of Information

Disclosure of confidential Information to unauthorised persons

The integrity of I.T. systems or Information being put at risk

Availability of I.T. systems or Information being put at risk
Storetec recognises the importance of all I.T. related security incidents being
handled using a structured, coherent and proven method, ensuring all incidents
are handled in a consistent manner.
Reporting an incident
All incidents are to be reported by email to support@storetec.net. The inclident will
then be logged and an automatically assigned reference given. The Information
Security Manager and his team will then investigate the incident.
Responding to an incident
1. The Information Security Manager will contact the line manager to discuss
the incident in relation to

How the incident occurred

How the incident will be resolved

Actions needed to stop any future reoccurrence of the incident.
2. The Support Desk will issue communications to all staff affected by an
incident causing a service interruption.
Storetec Information Security Policy – ISP01v4.1 October 2014
17
3. If it is decided that access to I.T. systems needs to be removed, a request
must come from the member of staff’s manager unless there is a direct
threat to Storetec systems, in which case the Information Security Manager
or Operations Manager will authorise the removal of I.T. resources from the
member of staff with immediate affect.
4. When an incident involving computer misuse occurs the Information
Security Manager must investigate the member of staff’s computer and / or
computer accessories to collect any evidence needed for legal
proceedings.
5. The Information Security Team has the right to disconnect and disable a
user’s account if it is suspected that they are in breach of the Information
Security policy pending an investigation.
Business Continuity
Storetec is aware that some form of disaster may occur, and as such will
implement and regularly update a business continuity management process to
counteract interruptions to normal activity and to protect critical processes from
the effects of failures or damage to vital services or facilities.
Training
Storetec will endeavor to train or supply training to all IT personnel on IT
systems in use within Storetec.
Extra training for IT staff to include security awareness relating to IT systems
will also be made available due to increasing security risks surrounding IT
systems.
Duties and Responsibilities
Managing Director
The Managing Director as the accountable officer is responsible for the
management of Information Security and for ensuring appropriate mechanisms
are in place to comply with all current legislation.
IG Lead
Storetec’s IG Lead has a particular responsibility in ensuring that a robust
framework to comply with all legislation is in place across Storetec. It is the
responsibility of the IG Lead to ensure that every member of staff within
Storetec complies with all requirements of the Information Security Policy,
which is driven by current legislation and best practise.
Storetec Information Security Policy – ISP01v4.1 October 2014
18
Senior Managers
It is the responsibility for all Senior Managers to ensure that staff work within the
boundaries of Storetec policies and procedures and are aware of their
responsibilities.
All staff
All employees of Storetec, or staff working in a voluntary capacity, independent
contractors must adhere to the current legislative framework and Trust policies.
Monitoring and Compliance.
The policy will be monitored for effectiveness by measurement of the number of
reported Information Security Incidents.
Development & Consultation Process
The Policy has been developed by the Managing Director and the IG Lead The
Policy has been reviewed and ratified by the Managing Director, IG Lead and
Board of Directors
This policy will be under continual development and consultation due to the
nature of Information technology and its constant evolvement with the
introduction of new technologies.
The policy will also be reviewed on a yearly basis.
Storetec Information Security Policy – ISP01v4.1 October 2014
19
Appendices
The Data Protection Act
The Data Protection Act controls how personal information is used by
organisations, businesses or the government.
Everyone who is responsible for using data has to follow strict rules called ‘data
protection principles’. They must make sure the information is:

used fairly and lawfully

used for limited, specifically stated purposes

used in a way that is adequate, relevant and not excessive

accurate

kept for no longer than is absolutely necessary

handled according to people’s data protection rights

kept safe and secure

not transferred outside the UK without adequate protection
There is stronger legal protection for more sensitive information, such as:

ethnic background

political opinions

religious beliefs

health

sexual health

criminal records
Storetec Information Security Policy – ISP01v4.1 October 2014
20
Caldicott Guidelines
The Caldicott Report (December 1997) was a review commissioned by the
Chief Medical Officer to make recommendations to improve the way the
National Health Service handles and protects patient Information.
The Caldicott Committee was set up to review the confidentiality and flows of
data throughout the NHS for purposes other than direct care, medical research
or where there is a statutory requirement for Information. Its recommendations
are now being put into practice throughout the NHS and in the Health Protection
Agency.
The Caldicott report identified 6 principles, similar in many respects to the
principles outlined in the Data Protection Act.
1. Justify the purpose(s) for using patient data
2. Don't use patient-identifiable Information unless it is absolutely
necessary.
3. Use the minimum necessary patient-identifiable Information
4. Access to patient-identifiable Information should be on a strict need to
know basis.
5. Everyone should be aware of their responsibilities to maintain
confidentiality.
6. Understand and comply with the law, in particular the Data Protection
Act.
Computer misuse Act 1990
For your Information, the following activities are criminal offences under the
Computer Misuse Act 1990:


Unauthorised access to computer material i.e. hacking;
Unauthorised modification of computer material; and
 Unauthorised access with intent to commit/facilitate the commission of
further offences
For further Information regarding the Computer Misuse Act 1990 see section 5
reference documents.
Storetec Information Security Policy – ISP01v4.1 October 2014
21
Information Security Policy Declaration
By signing this declaration
You agree that you have read and understood the Information security policy
and you agreed to be bound by its terms.
Print Name ______________________________________________
Signature______________________________________________
Date___/___/___ (DD/MM/YY)
Document Title
Document Number
Document owner
Production Date
Information Security Policy Declaration
form
Declaration 02
Information Security Manager
29/10/2014
Storetec Information Security Policy – ISP01v4.1 October 2014
22
Download