Using Knowledge Organisation to Manage Information Risk

Size: px
Start display at page:

Download "Using Knowledge Organisation to Manage Information Risk"

Transcription

1 Using Knowledge Organisation to Manage Information Risk Centre for Information Science David Haynes, City University London ISKO UK Meeting on Information a risky business 24 th October 2013, BDA, London Introduction When I was asked to do this talk I thought that my recent experience of working on information governance in the charities sector would provide a good illustration of some of the reasons why knowledge organisation is relevant. I also teach the Information Management and Policy module to the MSc students in Library and Information Science at City University and many of them are experienced managers who are able to bring their own insights on information risk to the course. A third reason for being interested in this topic is my own research into the role of risk in the regulation of access to personal data on social networks the topic of my PhD studies. I hope to share some of my insights from all three areas of activity and in doing so to stimulate some thought and discussion about ways in which KO contributes to information governance and the management of information risk. Defining risk What is risk? A project manager might say that it is any uncertain event that has an impact (positive or negative) on project outcomes. A common understanding of risk is of an uncertain event that has a negative impact on outcomes in other words a potential threat. A good general definition, which I will use here is: Risk refers to uncertainty about and severity of the events and consequences (or outcomes) of an activity with respect to something that humans value (Aven & Renn, 2009). It is often difficult to be objective in the assessment of risk: Within the philosophy of science, objective typically means something akin to independent of observer. That is, any individual following the same procedure should reach the same conclusion (Fischhoff, Watson, & Hope, 1984). Another researcher concluded that risk is both fact-laden and value-laden and that it contains both objective and subjective components. He suggests that: The real challenge is to identify the various types of factual and valuational components inherent in statements about risk and to understand how they are combined (Hansson, 2010). So we get the idea that risk is not a straightforward entity or phenomenon that we can easily measure. This we will see in some of the examples I describe in this session. Using Knowledge Organisation to Manage Information Risk ISKOUK 24OCT13 1

2 Risks faced by campaigning organisations I recently worked with two charities (WWF-UK and Compassion in World Farming) on information governance issues and I hope that some of their experiences will be relevant elsewhere. As campaigning organisations both charities depend on reliable, up-to-date and authoritative information. As with many charities they operate at a number of levels: influencing policy makers and legislators; via the press and media to educate the public and raise awareness; and at an individual level to get you and me involved in their campaigns fund raising, participating in events, and perhaps most importantly changing our behaviour. If we stop to think when we buy food in the supermarket about where it came from and whether any animal suffering was involved we send a message to the supermarkets. There is evidence that they respond to this. For example, following consumer demand and active lobbying M&S Food introduced free-range only eggs to all its eggbased products several years ago. Another example is the response of retailers and now legislators to the demand for less packaging for retail goods. The basis for these campaigns is information. It has to be good quality, reliable and accurate. If the wrong figures are used it undermines the campaigns and lessens their impact. Compliance issues My earlier work in the regulated sectors such as pharmaceuticals, energy, finance and central government have brought to light a number of themes: The need to hold information for an appropriate length of time. This is a general requirement that affects all organisations that hold personal data (i.e. all employers, any firm or retailer with individual customers). The fifth Data Protection Principle states that Personal information must not be kept for longer than is necessary (Data Protection Act, 1998). So an employer would hold details of job applicants sufficiently long for an appeals process (for unsuccessful candidates) but no longer than, say, 12 months. The same employer might hold pension records to retirement age at least, even if the employee left the organisation 20 or 30 years ago. The need to hold information securely (to protect privacy or to ensure integrity of data i.e. no tampering). The seventh data protection principle is that Personal information must be secure (Data Protection Act, 1998). This means restricting access so that only line managers and selected staff in the HR department have access to personal information about employees. The personal information may itself be disaggregated so that less sensitive information is more widely available e.g. work address, telephone extension, job title and photo might be made available for an internal staff directory. Details of medical conditions, familial status, home address, and salary may be restricted. The key to this is good metadata. The need to be able to rapidly identify and retrieve information (e.g. Freedom of Information). Good metadata (tagging, indexing and categorising information) facilitates rapid, comprehensive and precise retrieval of information. Using Knowledge Organisation to Manage Information Risk ISKOUK 24OCT13 2

3 Social media My own research considers personal data on social networks (Haynes, 2012). The focus has been on personal risk and the effect different modes of regulation have on this. It is difficult to come up with a single approach that will mitigate against all the risks associated with personal data. Making your personal data available to a social networking service provider (Facebook or LinkedIn for instance) allows them to trade your data with advertisers so that ads are targeted at you. How many times have you gone onto a general site to find unrelated ads popping up for that kettle you were thinking of buying from John Lewis? The consequence of passing on your personal data may be mild irritation. However what if your address and birth date are made available to anyone doing a Google search, because your Facebook profile is indexed for all to access? This could be the first step in fraud if those details fall into the hands of organised crime. Responses to risk Risk should be managed as part of an overall framework. If we accept that it is never possible to totally eliminate risk, then we need a more nuanced response. A recent article in the IRMS Bulletin gives an excellent overview of approaches used in records management for information governance and advocates a risk based approach (Staunton, 2013). If we go back to the examples I spoke about earlier we can respond to information risks in one of three main ways: 1. Accept the risk 2. Reduce the probability of the event occurring 3. Reduce the impact of the event should it occur Typically if the consequences of an event are slight or the costs of mitigating the risk are too great, it might be better to accept the risk. This can be systematised in a risk tolerance table. Rigorous checklists and signing off information for publication by a charity would fall into the second category: reducing the probability that inaccurate information is published. The impact could be reduced by making sure that a subject expert is on hand to rapidly update or correct data that is challenged after publication. Knowledge organisation is important in two ways here. Firstly, it is used to categorise documents at different stages in the publication process, and secondly it helps to organise information for effective retrieval. This includes classification, indexing and tagging with appropriate metadata such as last edit date (date updated). This metadata helps a subject expert to make judgements about the quality of the data being used in a publication. The risk of fines for non-compliance can be managed by reducing the probability of non-compliance by making one person responsible for compliance issues. Knowledge organisation plays an important role in categorising documents so that they can be managed in a compliance regimen. This may include access rights associated with the documents as well as retention periods, which may in turn be determined by a document s position in the file plan. If we look at responses to the risks posed by personal data on social networking services we can educate users about the risks associated with exposing personal data. This would reduce the incidence of identity theft for instance (reduce the probability). Another response might be for the Using Knowledge Organisation to Manage Information Risk ISKOUK 24OCT13 3

4 service provider to restrict access to certain categories of data to friends or associates of the user. That would reduce the impact of accidently releasing sensitive personal information. This is essentially a metadata issue. The metadata associated with personal data can be used by an application to control access. Categorising risk On another level knowledge organisation is relevant to information risk. We can use knowledge organisation to categorise risks and this can help us to find appropriate responses. The challenge here is to adopt an approach that allows us to group risks in a way that is relevant to our problem. For instance, a group of US academics have created 18 risk categories from a universe of over 3000 risks that they have identified over many years (Swedlow, Kall, Zhou, Hammitt, & Wiener, 2009): 1 Crime and violence 2 Alcohol, tobacco, and other drugs 3 Medication and medical treatment 4 Transportation 5 Accident risks not elsewhere classified 6 Recreation 7 War, security, and terrorism 8 Toxic substances 9 Food and agriculture 10 Pollution 11 Energy production 12 Political, social, and financial 13 Ecogeological 14 Global 15 Human disease/health 16 Occupational 17 Consumer products 18 Construction The difficulty here is applying these categories to information. Of the above categories, the following might be relevant: 1 Crime and violence: Burglary, Sabotage 6 Recreation 7 War, security, and terrorism 12 Political, social, and financial : Financial risks, Political risks, Social risks 16 Occupational: Service industry risks 17 Consumer products: Information technology risks At the other end of the spectrum, we can look at risks to employers from use of social media at work (Haynes, 2011): Using Knowledge Organisation to Manage Information Risk ISKOUK 24OCT13 4

5 Reputational risk to the organisation if, for instance employees publish defamatory or damaging information on a social networking site Accidental disclosure of information could lead to loss of intellectual property Once disclosed, personal data can be used inappropriately or could be a source of discrimination, bullying or stalking Security breaches by exposing the organisation to malware for instance Non-compliance with the Data Protection Act and other regulations Time wasting during working hours There does not seem to be any middle ground where information risks have been comprehensively identified and categorised and I would suggest that this might be fertile ground for further research. Conclusion We have seen that knowledge organisation techniques can provide effective tools for information handling in a way that mitigates risk. The responses fall into three groups: accepting the risk; reducing the probability of occurrence; and reducing the impact of any outcomes. There is a wider question of categorisation of information risks. In other words, applying knowledge organisation techniques to risk to equip us to respond systematically to information risk. References Aven, T., & Renn, O. (2009). On risk defined as an event where the outcome is uncertain. Journal of Risk Research, 12(1), doi: / Data Protection Act (1998). United Kingdom. Fischhoff, B., Watson, S. R., & Hope, C. (1984). Defining Risk. Policy Sciences, 17(2), Hansson, S. O. (2010). Risk: objective or subjective, facts or values. Journal of Risk Research, 13(2), doi: / Haynes, D. (2011). Social Networks in the workplace - some data protection issues. Free Pint, (1 December 2011). Retrieved from Haynes, D. (2012). Access to Personal Data in Social Networks : measuring the effectiveness of approaches to regulation (Transfer report). City University London. Retrieved from Staunton, R. (2013). How Records Managers and Archivists Can Make Information Governance Happen. Informaition and Records Management Bulletin, (175, September 2013), Swedlow, B., Kall, D., Zhou, Z., Hammitt, J. K., & Wiener, J. B. (2009). Theorizing and Generalizing about Risk Assessment and Regulation through Comparative Nested Analysis of Representative Cases. Law & Policy, 31(2), doi: /j x Using Knowledge Organisation to Manage Information Risk ISKOUK 24OCT13 5

ClickStaff Orientation Training. Presented to: Contingent Workers Presented by: <Supplier ABC> Version Effective Date: June 20, 2012 Version: 8FINAL

ClickStaff Orientation Training. Presented to: Contingent Workers Presented by: <Supplier ABC> Version Effective Date: June 20, 2012 Version: 8FINAL ClickStaff Orientation Training Presented to: Contingent Workers g Presented by: Version Effective Date: June 20, 2012 Version: 8FINAL Housekeeping reminders Session will take about 15-20

More information

Introduction Why is data protection important? How does it apply to volunteers? What volunteers need to do?...

Introduction Why is data protection important? How does it apply to volunteers? What volunteers need to do?... Data Protection Guidance for Volunteers Last update 26/11/17 Contents Introduction... 2 1. Why is data protection important?... 2 2. How does it apply to volunteers?... 2 3. What volunteers need to do?...

More information

Contents. 3 Introduction. 5 Our values 6 Safety 7 Teamwork 8 Respect 9 Integrity 10 Excellence

Contents. 3 Introduction. 5 Our values 6 Safety 7 Teamwork 8 Respect 9 Integrity 10 Excellence The way we work Contents 3 Introduction 5 Our values 6 Safety 7 Teamwork 8 Respect 9 Integrity 10 Excellence 13 Our code of conduct 14 Safety and health 15 Employment and inclusion 16 Human rights 17 Data

More information

CONTENTS. 03 Introduction. 04 The Code. 07 Compliance with the Code. 08 Who to Contact. 08 Whistleblowing policy. -Ensuring we do not act corruptly

CONTENTS. 03 Introduction. 04 The Code. 07 Compliance with the Code. 08 Who to Contact. 08 Whistleblowing policy. -Ensuring we do not act corruptly Code of Ethics CONTENTS 03 Introduction 04 The Code -Ensuring we do not act corruptly -Hospitality and gifts -Respecting international trade rules -Conflicts of interest -Buying and selling shares insider

More information

Overseas Travel Policy

Overseas Travel Policy Overseas Travel Policy Governance Fieldwork and Other Off-Site Activities Policy Statement 1. Policy Statement The London School of Economics and Political Science ( the School or LSE) recognises that

More information

Social Media Policy. Reference: HR th December Induction CD/ Sharepoint/ EDRMS HR Site/ Website

Social Media Policy. Reference: HR th December Induction CD/ Sharepoint/ EDRMS HR Site/ Website Social Media Policy Reference: Document Type: Status of Document: Policy Final Version: 1.2 Date Approved: 16 th December 2014 Approved By: Publication Date: Review Date Policy Owner Applies to: Document

More information

Supervisors, managers or executives, in addition to the above responsibilities, are also expected to:

Supervisors, managers or executives, in addition to the above responsibilities, are also expected to: MAIN PRINCIPLES Purpose of the Code of Conduct The aim of the Code of Conduct (Code) is to outline the standards of behaviour expected of all employees, volunteers, and contractors engaged by the PMSA.

More information

Our Volunteer Privacy Notice: protecting and respecting your information

Our Volunteer Privacy Notice: protecting and respecting your information Our Volunteer Privacy Notice: protecting and respecting your information 1. Important information and who we are This privacy notice informs you as to how The Children s Society looks after the personal

More information

GDPR P4 Privacy Policy Statement & Guidance for Employees and External Providers

GDPR P4 Privacy Policy Statement & Guidance for Employees and External Providers Once we have received notification that you have withdrawn your consent, we will no longer process your information for the purpose or purposes you originally agreed to, unless we have another legitimate

More information

Our Volunteer Privacy Notice: protecting and respecting your information

Our Volunteer Privacy Notice: protecting and respecting your information Our Volunteer Privacy Notice: protecting and respecting your information 1. Important information and who we are This privacy notice informs you as to how The Children s Society looks after the personal

More information

Baptist Union of Scotland DATA PROTECTION POLICY

Baptist Union of Scotland DATA PROTECTION POLICY Baptist Union of Scotland DATA PROTECTION POLICY Adopted: May 2018 1 1.The Baptist Union of Scotland 48, Speirs Wharf, Glasgow G4 9TH (Charity Registration SC004960) is committed to protecting all information

More information

HIV and Recruitment. Advice for job ApplicAnts living with hiv

HIV and Recruitment. Advice for job ApplicAnts living with hiv HIV and Recruitment Advice for job ApplicAnts living with hiv Introduction Most people living with HIV can lead perfectly normal working lives; getting new jobs, making contacts, completing projects and

More information

STRATEGIC CASE STUDY FEBRUARY 2018 EXAM ANSWERS. Variant 2. The February 2018 exam can be viewed at

STRATEGIC CASE STUDY FEBRUARY 2018 EXAM ANSWERS. Variant 2. The February 2018 exam can be viewed at STRATEGIC CASE STUDY FEBRUARY 2018 EXAM ANSWERS Variant 2 The February 2018 exam can be viewed at These answers have been provided by CIMA for information purposes only. The answers created are indicative

More information

(a) Candidates must be current students or graduates from one of our partner universities.

(a) Candidates must be current students or graduates from one of our partner universities. Santander Universities SME Internship Programme 201-2019 1. Eligibility 1.1 Eligibility of Universities Only universities who are recognised as a partner of Santander Universities (a division of Santander

More information

DATA PROTECTION POLICY 2018

DATA PROTECTION POLICY 2018 DATA PROTECTION POLICY 2018 Amesbury Baptist Church is committed to protecting all information that we handle about people we support and work with, and to respecting people s rights around how their information

More information

Lawnswood Campus. Social Media Policy

Lawnswood Campus. Social Media Policy Lawnswood Campus Social Media Policy Review Date: Local Agreement guidance followed for updates Please read Governors as Management Board Schools as PRUs Signed by the Chair of the Management Board:. Date:

More information

OUR CODE OF BUSINESS CONDUCT AND ETHICS

OUR CODE OF BUSINESS CONDUCT AND ETHICS OUR CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not cover every issue that may arise, but

More information

WORKPLACE MENTAL HEALTH AND WELL-BEING POLICY

WORKPLACE MENTAL HEALTH AND WELL-BEING POLICY Workplace Mental Health and Well-being Policy To be reviewed Bi-Annually. Reviewed by the Leadership Team on 5 th January 2016. To be reviewed January 2018. WORKPLACE MENTAL HEALTH AND WELL-BEING POLICY

More information

Social Media Policy POLICY TITLE: UPDATED ON: 1 st July 2015 APPROVED BY BOARD ON:

Social Media Policy POLICY TITLE: UPDATED ON: 1 st July 2015 APPROVED BY BOARD ON: POLICY TITLE: Social Media Policy UPDATED ON: 1 st July 2015 APPROVED BY BOARD ON: Purpose Social media offers the opportunity for people to gather in online communities of shared interest and create,

More information

Getting ready for the new data protection laws A guide for small businesses, charities and voluntary organisations

Getting ready for the new data protection laws A guide for small businesses, charities and voluntary organisations Getting ready for the new data protection laws A guide for small businesses, charities and voluntary organisations Page 1 of 22 Your business and the new data protection laws Data protection and privacy

More information

Scottish Charity Number SC Dingwall Baptist Church DATA PROTECTION POLICY

Scottish Charity Number SC Dingwall Baptist Church DATA PROTECTION POLICY Dingwall Baptist Church DATA PROTECTION POLICY Adopted: By Trustees Dingwall Baptist Church May 2018 1 Dingwall Baptist Church is committed to protecting all information that we handle about people we

More information

TEMP MANUAL. Vikarhåndbogen 1

TEMP MANUAL. Vikarhåndbogen 1 TEMP MANUAL Vikarhåndbogen 1 CONTENT WELCOME TO HARTMANNS... 3 About Hartmanns... 3 Temp work with Hartmanns... 3 Our temps are our ambassadors... 3 GENERAL INFORMATION... 4 What do a temporary worker

More information

EARLS HALL BAPTIST CHURCH DATA PROTECTION POLICY

EARLS HALL BAPTIST CHURCH DATA PROTECTION POLICY EARLS HALL BAPTIST CHURCH DATA PROTECTION POLICY Adopted: 5 June 2018 1 Earls Hall Baptist Church is committed to protecting all information that we handle about people we support and work with, and to

More information

Social Media Policy. To provide guidance for staff, volunteers and contractors on the appropriate use of social media. Purpose.

Social Media Policy. To provide guidance for staff, volunteers and contractors on the appropriate use of social media. Purpose. Social Media Policy Solent NHS Trust policies can only be considered to be valid and up-to-date if viewed on the intranet. Please visit the intranet for the latest version. Purpose Document Type Reference

More information

GUIDE TO POLICE CHECKS. for Employees.

GUIDE TO POLICE CHECKS. for Employees. GUIDE TO POLICE CHECKS for Employees www.mypolicecheck.com.au How Safe is your Organisation? The 2016 PwC Global Economic Crime Survey found that 33% of organisations have experienced economic crime and

More information

Section a What this Policy is for Policy Statement. 2. Why this policy is important... 3

Section a What this Policy is for Policy Statement. 2. Why this policy is important... 3 Norwich Central Baptist Church DATA PROTECTION POLICY Adopted: May.2018 Norwich Central Baptist Church (NCBC) is committed to protecting all information that we handle about people we support and work

More information

Frequently asked questions

Frequently asked questions Frequently asked questions Disclaimer: Product and pricing details are subject to change at the discretion of CW Research Ltd. 1) What is Chemical Risk Manager? Chemical Risk Manager represents the most

More information

Anti-Bribery Policy. for you for your community not for profit. Date: Head of HR. Author:

Anti-Bribery Policy. for you for your community not for profit. Date: Head of HR. Author: Anti-Bribery Policy Date: Author: 11.07.17 Head of HR for you for your community not for profit Control box : Document owner: Reviewed by: Claire Knight Claire Knight Approved by and date: Head of HR July

More information

HARVEY NASH HR SURVEY 2018 GROWTH. CHANGE. UNCERTAINTY.

HARVEY NASH HR SURVEY 2018 GROWTH. CHANGE. UNCERTAINTY. HARVEY NASH HR SURVEY 2018 GROWTH. CHANGE. UNCERTAINTY. About the survey Growth. Change. Uncertainty. Human resources professionals are used to change they see it all around them. Whether it s working

More information

Information Commissioner s Office. Consultation: GDPR DPIA guidance

Information Commissioner s Office. Consultation: GDPR DPIA guidance Information Commissioner s Office Consultation: GDPR DPIA guidance Start date: 22 March 2018 End date: 13 April 2018 ICO GDPR guidance: Contents (for web navigation bar) At a glance About this detailed

More information

Bill 168: Violence and Harassment in the Workplace

Bill 168: Violence and Harassment in the Workplace Bill 168: Violence and Harassment in the Workplace On December 15, 2009, Bill 168, an Act to amend the Occupational and Safety Act with respect to violence and harassment in the workplace (the Bill ),

More information

STAFF CODE OF CONDUCT

STAFF CODE OF CONDUCT STAFF CODE OF CONDUCT 1. INTRODUCTION Our College will only succeed in achieving our objectives where we have the respect of our stakeholders, (including our students, parents and colleagues) and the communities

More information

Problem Solving. Why have a problem solving procedure? Volunteering England Information Sheet Volunteering England Summary

Problem Solving. Why have a problem solving procedure? Volunteering England Information Sheet Volunteering England Summary Problem Solving Summary While the involvement of volunteers is by and large a positive experience for everyone involved, it is important to bear in mind that sometimes things can go wrong within a volunteer

More information

Policy for Use of Social Media

Policy for Use of Social Media Policy for Use of Social Media Ref. TP080 Policy for Use of Social Media Page 1 of 13 1 DOCUMENT PROFILE and CONTROL. Purpose of the document:. To help staff understand their responsibilities when using

More information

QUALIFI Level 2 Award in Health & Safety in the Workplace. for Catering & Hospitality (AHS2SFG2012)

QUALIFI Level 2 Award in Health & Safety in the Workplace. for Catering & Hospitality (AHS2SFG2012) QUALIFI Level 2 Award in Health & Safety in the Workplace for Catering & Hospitality (AHS2SFG2012) Award Specification May 2016 All course materials, including lecture notes and other additional materials

More information

Conducting privacy impact assessments code of practice

Conducting privacy impact assessments code of practice Conducting privacy impact assessments code of practice Data Protection Act Contents Data Protection Act... 1 Information Commissioner s foreword... 2 About this code... 3 Chapter 1 Introduction to PIAs...

More information

Institutional Social Media Accounts for Marketing and Communications Purposes University Policy

Institutional Social Media Accounts for Marketing and Communications Purposes University Policy Responsible Office Office of Advancement POLICY Issued: 04/15/2019 The creation and use of institutional social media accounts for university marketing and communications purposes are increasingly common.

More information

Our Commitments. Living our vision and values

Our Commitments. Living our vision and values Our Commitments Living our vision and values CEO Message Our vision is to excel at securing and enhancing the financial wellbeing of people, businesses and communities. It recognises the important role

More information

The Vodafone Code of Conduct. Doing what s right

The Vodafone Code of Conduct. Doing what s right The Vodafone Code of Conduct Doing what s right Trust is fundamental in everything we do. 2 Contents A message from our Chief Executive 3 Why we have a Code of Conduct 5 Our Business Principles 7 Speak

More information

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not cover every issue that

More information

WHAT DID I SIGN UP FOR? T I P S F O R B O A R D S FA C I N G A C R I S I S

WHAT DID I SIGN UP FOR? T I P S F O R B O A R D S FA C I N G A C R I S I S WHAT DID I SIGN UP FOR? T I P S F O R B O A R D S FA C I N G A C R I S I S What did I sign up for? Tips for boards facing a crisis MCN 2019 Finance and Sustainability Conference Heidi Christianson, Nilan

More information

Tools for stakeholder mapping

Tools for stakeholder mapping Institute of Risk Management IRM Charities Special Interest Group Tools for stakeholder mapping www.theirm.org/charities Developing risk professionals About the Institute of Risk Management (IRM) The IRM

More information

Quick guide to the employment practices code

Quick guide to the employment practices code Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment

More information

Collaborative Hiring. June Hiring. Profile raised through the TV series Who s the Boss. A move away from traditional hierarchical selection

Collaborative Hiring. June Hiring. Profile raised through the TV series Who s the Boss. A move away from traditional hierarchical selection Collaborative Hiring June 2016 Collaborative Hiring Profile raised through the TV series Who s the Boss A move away from traditional hierarchical selection The whole workforce has a say on the final selection

More information

Social Media in the Workplace

Social Media in the Workplace Social Media in the Workplace AUSTRALIA 1 POLICY STATEMENT William Demant Holding Pacific Region hereafter referred to as The Company recognises that the use of social media is increasingly widespread

More information

Code of Conduct. Human Resources Policies and Procedures. UCD/HRO/Conduct/048

Code of Conduct. Human Resources Policies and Procedures. UCD/HRO/Conduct/048 1NHSBT Code of Conduct UCD/HRO/Conduct/048 Version Issued: February 2013v1.1 Human Resources Policies and Procedures Code of Conduct UCD/HRO/Conduct/048 1 Policy UCD/HRO/Conduct/048 Title NHSBT Code of

More information

EMPLOYEE CODE OF CONDUCT HA ARSLE V PROCES SING TECHNOLOGY

EMPLOYEE CODE OF CONDUCT HA ARSLE V PROCES SING TECHNOLOGY EMPLOYEE CODE OF CONDUCT 2 THE CORRECT BEHAVIOUR HAARSLEV EMPLOYEE CODE OF CONDUCT CEO S INTRODUCTION This Code of Conduct is our guide to ethical business commitment. It cannot cover every situation or

More information

Subject: Kier Group plc Business Ethics Policy. Document type: Policy Authorised by: Kier General Counsel & Company Secretary.

Subject: Kier Group plc Business Ethics Policy. Document type: Policy Authorised by: Kier General Counsel & Company Secretary. Kier Group plc Business Ethics Policy Subject: Kier Group plc Business Ethics Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Depending on the circumstances, we may collect, store, and use the following categories of personal information about you:

Depending on the circumstances, we may collect, store, and use the following categories of personal information about you: Ignata Group Data Protection / Privacy Notice What is the purpose of this document? Ignata is committed to protecting the privacy and security of your personal information. This privacy notice describes

More information

DATA PROTECTION POLICY 2016

DATA PROTECTION POLICY 2016 DATA PROTECTION POLICY 2016 ADOPTED FROM BRADFORD METROPOLITAIN COUNCIL MODEL POLICY AUTUMN 2016 To be agreed by Governors on; 17/10/16 Signed by Chair of Governors: Statutory policy: Yes Frequency of

More information

The Social Media Policy was adopted by Full Council at its Meeting held on 5 May Introduction

The Social Media Policy was adopted by Full Council at its Meeting held on 5 May Introduction Hazlemere Parish Council Social Media Policy The Social Media Policy was adopted by Full Council at its Meeting held on 5 May 2015. 1. Introduction The objective of this policy is to provide Councillors

More information

Susan Hallam, Managing Director, Hallam Communications

Susan Hallam, Managing Director, Hallam Communications Susan Hallam, Managing Director, Hallam Communications A framework for your digital marketing strategy Susam Hallam is an independent internet marketing consultant, with specialist experience of working

More information

Social Media. Guide for employees

Social Media. Guide for employees Social Media Guide for employees This guide outlines the standards of behaviour expected from all employees when using social media as part of their job for Royal Mail and also for personal use where it

More information

Domestic Abuse Policy

Domestic Abuse Policy 1 Domestic Abuse Policy Last updated: 6 May, 2011 POLICY RECORD DETAILS DATE AGREED: 6 May 2011 VERSION No. 1 New Policy Policy and Diversity Manager (HR), POLICY OWNER: Employee Relations Manager (HR)

More information

The Seven Core Problems Every Organisation Must Address When Managing Mental Health in the Workplace

The Seven Core Problems Every Organisation Must Address When Managing Mental Health in the Workplace The Seven Core Problems Every Organisation Must Address When Managing Mental Health in the Workplace PROGRAM BY TESS HOWELLS A GUIDE for HR and Line Managers Mental illness has been identified by the World

More information

GDPR DATA PROCESSING NOTICE FOR FS1 RECRUITMENT UK LTD FOR APPLICANTS AND WORKERS

GDPR DATA PROCESSING NOTICE FOR FS1 RECRUITMENT UK LTD FOR APPLICANTS AND WORKERS GDPR DATA PROCESSING NOTICE FOR FS1 RECRUITMENT UK LTD FOR APPLICANTS AND WORKERS What is the purpose of this document? FS1 Recruitment UK Ltd is committed to protecting the privacy and security of your

More information

Conducting privacy impact assessments code of practice

Conducting privacy impact assessments code of practice ICO lo Conducting privacy impact assessments code of practice Data Protection Act Contents Data Protection Act... 1 About this code... 3 Chapter 1 - Introduction to PIAs... 5 What the ICO means by PIA...

More information

FEDERAL OCCUPATIONAL HEALTH. We Care, Just Call.

FEDERAL OCCUPATIONAL HEALTH. We Care, Just Call. FEDERAL OCCUPATIONAL HEALTH Employee Employee Assistance Assistance Program Program SUPERVISOR S GUIDE We Care, Just Call. I called the EAP for advice on helping an employee who was having difficulties

More information

3.1. Breach Use of social media which contravenes Ermha s Social Media Policy, any other Ermha Policy, or the law.

3.1. Breach Use of social media which contravenes Ermha s Social Media Policy, any other Ermha Policy, or the law. PURPOSE Social media is a highly accessible and scalable publishing tool that brings many benefits as well as some risks. Social media is variously defined as a professional, public and private space,

More information

Mental Health Foundation Job Description & Person Specification. Public Mental Health Programme Lead for Wales April 2017

Mental Health Foundation Job Description & Person Specification. Public Mental Health Programme Lead for Wales April 2017 ` Mental Health Foundation Job Description & Person Specification Public Mental Health Programme Lead for Wales April 2017 Dear Applicant We are a leading UK charity in the field of mental health. For

More information

Mizuho Recruitment Privacy Notice

Mizuho Recruitment Privacy Notice Mizuho Recruitment Privacy Notice 1 General 1.1 This Recruitment Privacy Notice ( Privacy Notice ) relates to the collection, storage, use and disclosure of your personal data by Mizuho Bank, Ltd. London

More information

NOT PROTECTIVELY MARKED

NOT PROTECTIVELY MARKED Meeting Audit Committee Public Session Date and Time Location Pacific Quay, Glasgow Title of Paper General Data Protection Regulation (GDPR) SPA Preparedness Item Number 9.4 Presented By Catherine Topley

More information

Nursing Student Orientation. Code of Conduct and Preventing Workplace Violence

Nursing Student Orientation. Code of Conduct and Preventing Workplace Violence Nursing Student Orientation Code of Conduct and Preventing Workplace Violence CODE OF CONDUCT: OUR COVENANT We commit to treating patients and staff in a dignified manner that conveys respect for the abilities

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT 1.0 SCOPE This Code of Ethics and Business Conduct (the Code of Conduct ) is implemented by the Board of Directors (the Board ) of Dominion Diamond Corporation and applies

More information

PRIVACY NOTICE JOB APPLICANTS

PRIVACY NOTICE JOB APPLICANTS PRIVACY NOTICE JOB APPLICANTS Introduction This privacy notice sets out how we collect and use personal information about you as a job applicant in accordance with the Data Protection (Bailiwick of Guernsey)

More information

WELL-BEING and MENTAL HEALTH

WELL-BEING and MENTAL HEALTH invest in the WELL-BEING and MENTAL HEALTH of your employees your people are the most valuable resource within your business. Respecting your employees for who they are and the diversity they bring to

More information

RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS

RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not

More information

Privacy Policy of Townsville Motor Boat & Yacht Club Limited - Liquor Licence Number 84145

Privacy Policy of Townsville Motor Boat & Yacht Club Limited - Liquor Licence Number 84145 Privacy Policy of Townsville Motor Boat & Yacht Club Limited - Liquor Licence Number 84145 Application The Privacy Policy applies to personal information collected by the club, as the club is an applicable

More information

Privacy Policy of Brothers Leagues Club Ipswich Inc. Community Club Licence No

Privacy Policy of Brothers Leagues Club Ipswich Inc. Community Club Licence No Privacy Policy of Brothers Leagues Club Ipswich Inc. Community Club Licence No. 80331. Application The Privacy Policy applies to personal information collected by the club, as the club is an applicable

More information

TCI specialises in the provision of international corporate administration and trustee services

TCI specialises in the provision of international corporate administration and trustee services Privacy Notice Job Applicants Introduction This privacy notice sets out how we collect and use personal information about you as a job applicant in accordance with the Data Protection (Bailiwick of Guernsey)

More information

Knowledge Management within ITSM

Knowledge Management within ITSM The first in a series of white papers from CIH Solutions that discuss topical issues in IT Service Management Abstract This white paper discusses how Knowledge Management (KM) can be used to manage risk

More information

Swansea University Recruitment Privacy Policy

Swansea University Recruitment Privacy Policy 1 General Information We are committed to protecting the privacy and security of your personal information. Under data protection law, we are a data controller. This means that we hold personal information

More information

CAFOD CODE OF BEHAVIOUR

CAFOD CODE OF BEHAVIOUR CAFOD CODE OF BEHAVIOUR PRINCIPLES In line with the Vision, Mission and Values, CAFOD expects all staff, volunteers, partners and consultants to conduct themselves in a manner that preserves the dignity,

More information

Dated July 2017 ALTUS STRATEGIES PLC. ( Company ) SOCIAL MEDIA POLICY

Dated July 2017 ALTUS STRATEGIES PLC. ( Company ) SOCIAL MEDIA POLICY Dated July 2017 ALTUS STRATEGIES PLC ( Company ) SOCIAL MEDIA POLICY Tel +44 (0)370 903 1000 Fax +44 (0)370 904 1099 mail@gowlingwlg.com www.gowlingwlg.com CONTENTS Clause Heading Page 1 ABOUT THIS POLICY...

More information

Social Media Guidelines: King County 1

Social Media Guidelines: King County 1 Social Media Guidelines: King County 1 1. PURPOSE The role of technology in the 21st century workplace is constantly expanding and now includes social media communication tools that facilitate interactive

More information

GUIDANCE NOTES DATA PRIVACY IMPACT ASSESSMENT

GUIDANCE NOTES DATA PRIVACY IMPACT ASSESSMENT GUIDANCE NOTES DATA PRIVACY IMPACT ASSESSMENT A Data Privacy Impact Assessment (DPIA) helps the University to assess the necessity and proportionality of processing personal data. A DPIA will enable the

More information

Young People s Guide to Interviewing

Young People s Guide to Interviewing Young People s Guide to Interviewing Finding the right person to work with children and young people is very important to us. That s why we want you to help us interview candidates... so that we recruit

More information

Data Protection Policy

Data Protection Policy Data Protection Policy General Data Protection Regulations (GDPR) Document control Version control / history Note: This policy requires to be reviewed at least annually from the publication of the last

More information

POLICY HR-01: Code of Conduct Policy. Human Resources & Staff Development

POLICY HR-01: Code of Conduct Policy. Human Resources & Staff Development Policy HR 01 Page 1 of 8 POLICY HR-01: Code of Conduct Policy Human Resources & Staff Development Approval Date: September 30, 2015 Approval Authority: Council Resolution No. 6 Effective Date: December

More information

Information for registrants. Guidance on social media

Information for registrants. Guidance on social media Information for registrants Guidance on social media Contents Introduction 3 About this document 3 About us 4 Section 1: Top tips 5 Section 2: Using social media 6 Benefits of social media 6 Communicate

More information

Stress management policy

Stress management policy Stress management policy Policy Number: CP32 Version: 2 Ratified by: Governance Committee Date Ratified: 14 December 2017 Name of originator/author Paul Balson, Head of Corporate Governance Date Issued

More information

Applicant Data Privacy Notice

Applicant Data Privacy Notice Applicant Data Privacy Notice Before we begin This notice (Privacy Notice) applies to personal data relating to your application for employment with HSBC Group held by members of the HSBC Group as data

More information

EMPLOYEE CONDUCT & DISCIPLINE

EMPLOYEE CONDUCT & DISCIPLINE EMPLOYEE CONDUCT & DISCIPLINE FIT FOR DUTY To clearly define the expectation of Craig regarding the conduct of all employees as it relates to their ability to perform their jobs in an appropriate, effective

More information

Computer Programs and Systems, Inc. Code of Business Conduct and Ethics

Computer Programs and Systems, Inc. Code of Business Conduct and Ethics (as of January 28, 2013) Introduction This sets forth the guiding principles by which we operate Computer Programs and Systems, Inc. (the Company ) and conduct our daily business with our stockholders,

More information

LIVING OUR CORE VALUES. Supplier Code of Conduct

LIVING OUR CORE VALUES. Supplier Code of Conduct LIVING OUR CORE VALUES Supplier Code of Conduct Introduction to Our Supplier Code of Conduct Chesapeake Energy is committed to living our core values of integrity and trust, respect, transparency and open

More information

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004 1. Introduction CODE OF BUSINESS CONDUCT AND ETHICS FRONTIER AIRLINES, INC. Adopted May 27, 2004 The Board of Directors adopted this Code of Business Conduct ( Code ) to establish basic legal and ethical

More information

WHAT S NEW WITH SOCIAL MEDIA TODAY? By: Susan Wind

WHAT S NEW WITH SOCIAL MEDIA TODAY? By: Susan Wind WHAT S NEW WITH SOCIAL MEDIA TODAY? By: Susan Wind OVERVIEW Types of Social Media How to Connect with Your Customers on Social Media How banks are using social media to market their products Dangers of

More information

THE PORTSMOUTH GRAMMAR SCHOOL

THE PORTSMOUTH GRAMMAR SCHOOL THE PORTSMOUTH GRAMMAR SCHOOL STAFF PRIVACY NOTICE In the course of your employment, engagement or other basis of work undertaken for the school, we will collect, use and hold ( process ) personal data

More information

CODE OF CONDUCT AUSTRALIA

CODE OF CONDUCT AUSTRALIA CODE OF CONDUCT AUSTRALIA CODE OF CONDUCT CONTENTS ENSURING INTEGRITY 1 Dishonest and Fraudulent Behaviour 1 Conflicts of Interest 2 Employment Outside the Group 2 Staff Business 2 Purchase of Goods and

More information

Inter IKEA Group code of conduct

Inter IKEA Group code of conduct Inter IKEA Group code of conduct Inter IKEA Group code of conduct overview Good business with common sense Business integrity Human rights and working environment Environmental sustainability Protection

More information

Global Supplier Code of Conduct

Global Supplier Code of Conduct Global Supplier Code of Conduct Message from our Chief Executive Officer At Rolls-Royce our strategy focuses on customer, innovation and profitable growth to ensure a sustainable business. This includes

More information

Group Policy - People

Group Policy - People Group Policy - People Page 1 (8) Page 2 (8) PEOPLE POLICY This Group Policy provides our employees with an overview of our company values and expectations in relation to people. In addition, this Policy

More information

The ageing workforce: engagement approaches for your organisation

The ageing workforce: engagement approaches for your organisation The ageing workforce: engagement approaches for your organisation Contents Did you know? 3 Why should you engage with your organisation about the ageing workforce? 3 Who should you engage with? 4 Pilot

More information

Alwoodley Golf Club. Privacy Notice for Employees, Workers, Officers and Consultants

Alwoodley Golf Club. Privacy Notice for Employees, Workers, Officers and Consultants Alwoodley Golf Club Privacy Notice for Employees, Workers, Officers and Consultants We are committed to respecting your privacy. This Notice is to explain how we may use personal information we collect

More information

LEGAL ISSUES IN SOCIAL MEDIA FOR CHARITIES

LEGAL ISSUES IN SOCIAL MEDIA FOR CHARITIES Philanthropy Forum 2016 Community Foundation of Greater Peterborough November 15, 2016 LEGAL ISSUES IN SOCIAL MEDIA FOR CHARITIES By Terrance S. Carter, B.A., LL.B., TEP, Trade-mark Agent tcarter@carters.ca

More information

Safeguarding Keeping Apprentices Safe

Safeguarding Keeping Apprentices Safe Safeguarding Keeping Apprentices Safe Keeping Apprentices Safe At Manchester Metropolitan University, we take our responsibility to ensure the safety of our students very seriously. This also extends to

More information

2017 Millennial Survey Sweden. January 2017

2017 Millennial Survey Sweden. January 2017 2017 Millennial Survey January 2017 Background 302 interviews achieved in Gender Have children Job seniority / level 42% 35% 7% 7% 6% 4% Trainee / apprentice / graduate Junior level executive Mid-level

More information

THE MOVE TO SOCIAL MOBILE AND THE CLOUD:

THE MOVE TO SOCIAL MOBILE AND THE CLOUD: THE MOVE TO SOCIAL MOBILE AND THE CLOUD: A snapshot of the privacy, security and other legal risks to be managed Presenter: David Yates Partner, Perth 9 May 2014 11009050/11 INFORMATION SECURITY All organisations

More information

SAFFRON WALDEN COMMUNITY CHURCH DATA PROTECTION POLICY. Adopted: [ ]

SAFFRON WALDEN COMMUNITY CHURCH DATA PROTECTION POLICY. Adopted: [ ] SAFFRON WALDEN COMMUNITY CHURCH DATA PROTECTION POLICY Adopted: [17-04-2018] 1 SAFFRON WALDEN COMMUNITY CHURCH is committed to protecting all information that we handle about people we support and work

More information

NIAGARA FALLS ROWING CLUB VIOLENCE IN THE WORKPLACE PREVENTION POLICY

NIAGARA FALLS ROWING CLUB VIOLENCE IN THE WORKPLACE PREVENTION POLICY NIAGARA FALLS ROWING CLUB VIOLENCE IN THE WORKPLACE PREVENTION POLICY Policy The Niagara Falls Rowing Club is committed to providing a respectful, supportive, healthy, safe, accessible and inclusive work

More information