Information Security Policy

Similar documents
Corporate policy. Business Continuity Management Policy. Issue sheet

Data protection (GDPR) policy

Information Governance Policy

IGPr002 - Information Governance Management Framework

Information Governance Policy

Data Protection Policy

POLICY. Data Breach Notification Policy. Version Version 1.0. Equality Impact Assessment Status. Date approved 23 rd May 2018

Tourettes Action Data Protection Policy

Business Continuity Policy

Health and Safety Policy

Equality and Diversity Policy

HUMAN RESOURCES POLICY

Recruiting Ex-Offenders Policy

Suspension, Exclusion or Transfer Policy

Equality and diversity policy

DIVERSITY AND INCLUSION POLICY

Job Title: Head of Retail Department: Income Generation

This Policy supersedes the following Policy, which must now be destroyed:

General Personal Data Protection Policy

INFORMATION GOVERNANCE POLICY AND FRAMEWORK

RECORDS RETENTION AND DISPOSAL POLICY

EQUALITY OF OPPORTUNITY POLICY

What personal details do we hold

Overarching Information Governance Policy

This Policy supersedes the following Policy, which must now be destroyed:

Leicester, Leicestershire, and Rutland Facilities Management Collaborative (LLR FMC) Job Description. Director of Performance, Quality & Assurance

Information Governance Assurance Framework

Recruiting Ex-Offenders Policy

Display Screen Equipment (DSE) Policy

Equality and Diversity Policy

INFORMATION GOVERNANCE STRATEGY AND STRATEGIC VISION

HCUC CORPORATION EQUALITY AND DIVERSITY POLICY

Beaver Road Primary School

EQUALITY AND DIVERSITY POLICY

Breakthrough Data Protection Policy Approved by Lead Organisation: November 2017 Next Review Date: November 2018

Information governance strategy

EQUAL OPPORTUNITIES AND DIVERSITY POLICY

Equality & Diversity Policy

Information Security Risk Management Programme and Strategy

Equality & Diversity Policy

HUMAN RESOURCES POLICY

Records Management Policy and Strategy

Information Governance Policy

HUMAN RESOURCES POLICY

RECRUITMENT AND SELECTION POLICY

Volunteers within the shop Location: Wordsley Green, Lower Gornal, Shifnal and Wombourne

Recruitment and Selection Policy and Procedure

NHS BARNSLEY CCG DATA QUALITY POLICY SEPTEMBER 2016

Disclosure & Barring Service (DBS) Check Policy

Data Protection Act Policy Statement Status/Version: 0.1 Review Information Classification: Unclassified Effective:

Information Security Roles and Responsibilities Procedure Page 1

Equal Opportunities Policy

GENDER, EQUALITY AND DIVERSITY POLICY

Recruiting Ex-Offenders Policy

Information Governance Clauses Clinical and Non Clinical Contracts

Equality and Diversity Policy 2017/2018

Data Protection Policy

Equality Policy and Procedures

Freedom of Information/Environmental Information Regulations Policy and Procedure

Data Protection Impact Assessment Policy

PRIVACY NOTICE FOR STAFF

MANUAL HANDLING POLICY

Equality Act culmination of previous legislation in England, Scotland and Wales;

Equal Opportunities (Staff) Policy

LEICESTER HIGH SCHOOL DATA PROTECTION POLICY

Equality and Diversity Policy

Equality and diversity policy

We reserve the right to update this privacy notice at any time. Please check our website from time to time for any changes we may make.

Retail Shop Manager. Head of Retail Operations

Equality & Diversity Policy

FIRST AID POLICY. Version 2.0

Date: INFORMATION GOVERNANCE POLICY

Information Governance Policy

1. The essential guide to the public sector equality duty: An overview for listed public authorities in Wales

Ensure all circumstances of each case are taken into account. Ensure that consideration is given to the staff member s past record

STAFFORD & SURROUNDS RECRUITMENT AND

UK Research and Innovation (UKRI) Data Protection Policy

Dated 26 th February 2016 DIVERSITY POLICY & PROCEDURE RV1

Information Governance Policy and Management Framework

Recruitment & Selection Policy

Copyright 2018, Tech Mahindra. All rights reserved. WORKER PRIVACY NOTICE

The Essential Guide to the Public Sector Equality Duty

Equality and Diversity Policy

It is our policy to provide employment equality to all, irrespective of:

Code of business conduct

Hanham Community Centre A Charitable Incorporated Organisation - Charity No: Equality and Diversity Policy

Equality and Diversity Policy

NHS Sunderland Clinical Commissioning Group. Information Governance Strategy 2016/17

B1 Single Equality Policy

RECRUITMENT & SELECTION POLICY

DISCIPLINARY POLICY UNIQUE REFERENCE NUMBER: RC/XX/030/V2 DOCUMENT STATUS: DATE ISSUED: 2016 DATE TO BE REVIEWED:

Global Privacy Policy

Title: Employment Equality of Opportunity Policy

Equal Opportunities and Diversity Policy

Information Governance and Records Management Policy March 2014

HUMAN RESOURCES POLICY

EQUALITY AND DIVERSITY POLICY

Equality and Diversity Policy

Humber Information Sharing Charter

Equality & Diversity Policy and Procedure

Transcription:

Information Security Policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 NHS Business Services Authority Information Security policy Head of Security and Information Assurance All NHSBSA staff For information / action Last reviewed December 2017 Review cycle Annual Date of Equality Assessment March 2018 Date of Fraud Review March 2018 Revision details Version Date Amended by Approved by Details of amendments Initial release 4.09.2007 - IGSG In 2.2 add a bullet point as follows Informing the Chief Executive to assist with the statement of internal control made by him/her. Replace the paragraph before the first bullet point in 3.3 with The IGM also carries out the duties below for all corporate directorates bar the Operations directorate, where these daily responsibilities have been delegated to each of five IS Managers, one for each division of the NHSBSA Operations directorate, whose responsibilities include:. In the second bullet point of 3.4 replace Information Governance Manager with 1

Business Manager Insert a 3.7 covering Internal Audit V1 09.01.14 G Wanless ISF Changes to Business Unit Area IS Managers V2 20.03.14 C Dunn & C ISF Gooday V3 18.02.15 C Gooday ISF Annual Review Changes to sections 3, 4 and 5 to reflect PCI DSS compliance. V4 03.12.17 ISRS Revised as part of ISMS work Information Security policy V4 12/2017 2

Contents 1. Policy Summary 2. Introduction 3. Objectives 4. Responsibilities for security 5. Legislation 6. Policy framework 7. Validity of this policy 8. Related policies, standards and procedures 9. Penalties 1 Policy Summary 1.1. This policy forms part of the NHSBSA's initiative to achieve and maintain compliance with ISO 27001 Information Security management system requirements. 2 Introduction 2.1 Information security is fundamental to the operation of all NHS bodies, including the NHS Business Services Authority (NHSBSA), due to the sensitive and confidential patient and personal data captured, along with commercially sensitive information, and the reliance on information systems to process and transmit data to NHSBSA s stakeholders. 2.2 Information security is of paramount importance to the NHSBSA to meet the NHSBSA s primary objectives. 2.3 For the purpose of this policy, information includes data stored on computers, transmitted across networks, printed out or written on paper, sent by fax, stored on removable and other electronic media or spoken in conversation or over the telephone. 2.4 All information that is created, processed, stored or transmitted (physically or electronically) during the course of NHSBSA business activity is an asset of the NHSBSA and as such is governed by this policy. 2.6 The Information security policy applies to all business functions and covers all information systems, networks, physical environment and relevant people who support those business functions. Information Security policy V4 12/2017 3

2.7 This document: sets out the NHSBSA's policy for the protection of the confidentiality, integrity and availability of its assets, that is hardware, software and information handled by information systems, networks and applications establishes responsibilities for information security. 3. Objectives, Key Outcomes, Principles 3.1 The objectives of this policy are to ensure the security of the NHSBSA assets, primarily information assets, that is: To ensure availability: That is, to ensure that assets are available as and when required hence adhering to the organisation's business objectives. To preserve integrity: That is, to protect assets from unauthorised or accidental modification ensuring the accuracy and completeness of the organisation's assets. To preserve confidentiality: That is, to protect assets against unauthorised disclosure. 3.2 The key outcome of this policy is to establish and maintain the security and confidentiality of information, information systems, applications and networks owned or held by the NHSBSA by: ensuring that all members of staff are aware of and fully comply with the relevant legislation as described in this and other policies describing the principles of security and explaining how they will be implemented in the NHSBSA ;introducing a consistent approach to security, ensuring that all members of staff fully understand their own responsibilities creating and maintaining within the NHSBSA a level of awareness of the need for information security as an integral part of the day to day business protecting information assets under the control of the NHSBSA Information Security policy V4 12/2017 4

informing the Chief Executive to assist with the Governance statement made by them. 3.3 This policy applies to all information systems (electronic or manual), networks, applications, locations and people based within the NHSBSA. 4. Responsibilities for security Overall responsibilities 4.1 Ultimate responsibility for information security (IS) rests with the NHSBSA Leadership Team, but on a day-to-day basis the Information Governance and Security Group (IGSG) and the Head of Security and Information Assurance (HOS&IA) role within the NHSBSA will be responsible for managing and implementing IS policy and procedures. Head of Security and Information Assurance (HOS&IA) 4.2 HOS&IA responsibilities include: Acting as a central point of contact on IS within the organisation, for both staff and external organisations. Ensuring that the appropriate IS policy for the NHSBSA is produced and kept up to date. Advising on the content and implementation of the IS Programme. Producing organisational standards, procedures and guidance on IS matters for approval by the IGSG. Co-ordinating IS activities particularly those related to shared information systems or IT infrastructures. Liaising with external organisations on IS matters, including representing the organisation on cross-community committees. Reporting to the IGSG on matters relating to IS. HOS&IA s responsibilities (as delegated) 4.3 The HOS&IA, assisted by the NHSBSA Information Security and Information Assurance Team also carries out the duties above for all corporate business areas Information Security policy V4 12/2017 5

Line managers responsibilities 4.5 Line managers are directly responsible for: Ensuring the security of the organisation's assets (i.e. information, hardware and software) used by staff (permanent, temporary or contractor) and, where appropriate, by third parties is consistent with legal and management requirements and obligations. Ensuring that their staff (permanent, temporary or contractor) are aware of their security responsibilities in accordance with the policies of the NHSBSA. Ensuring that their staff (permanent, temporary or contractor) have had suitable IS training. All staff 4.6 All staff (permanent, temporary or contractor) or agents acting for or on behalf of the NHSBSA have a duty to: safeguard hardware, software and information in their care prevent the introduction of malicious software on the organisation's IT systems report on any suspected or actual breaches in security be responsible for the operational security of the information systems they use comply with security procedures. Failure to do so may result in disciplinary action. Internal audit 4.7 The NHSBSA will regularly audit its information security management practices for compliance with this policy. The audit will: identify areas of operation that are covered by the NHSBSA s policies and identify which procedures and/or guidance should comply to the policy annually cover compliance with Payment Card Industry (PCI) Data Security Standard (DSS) follow a mechanism for adapting the policy to cover missing areas if these are critical to the management of information security, and use a subsidiary development plan if there are major changes to be made Information Security policy V4 12/2017 6

set and maintain standards by implementing new procedures, including obtaining feedback where the procedures do not match the desired levels of performance highlight where non-conformance to the procedures is occurring and suggest a tightening of controls and adjustment to related procedures. The results of audits will be reported to the IGSG. 5. Legislation and contractual compliance 5.1 The NHSBSA is obliged to abide by all relevant UK and European Union legislation. The requirement to comply with this legislation will be devolved to employees and agents of the NHSBSA, who may be held personally accountable for any breaches of security for which they may be held responsible. The NHSBSA will comply with the following legislation and other standards as appropriate: General Data Protection Regulation (GDPR) Access to Health Records 1990 Access to Medical Reports Act 1988 Human Rights Act 1998 Freedom of Information Act 2000 Regulation of Investigatory Powers Act 2000 Crime and Disorder Act 1998 The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 Obscene Publications Act 1959 and 1964 amendments Communications Act 2003 Protection of Children Act 1978 and 1999 amendments Copyright, Design and Patents Act 1988 Protection from Harassment Act 1997 Equalities Act 2010 Computer Misuse Act 1990 PCI DSS Information Security policy V4 12/2017 7

6. Policy framework 6.1 Information security awareness training Information security awareness training will be included in the staff induction process. An ongoing awareness programme will be established in order to ensure that staff awareness is refreshed and updated annually. 6.2 Contracts of employment Security requirements will be addressed at the recruitment stage and all contracts of employment will contain a confidentiality clause. Security requirements will be included in job definitions. 6.3 Security control of assets Every asset (hardware, software, application or data) will have a named custodian who will be responsible for the security of that asset. 6.4 Access controls Only authorised personnel who have a business need will be given access to restricted areas containing information systems. 6.5 User access controls Access to information will be restricted to authorised users who have a business need to access the information. 6.6 Computer access control Access to computer facilities will be restricted to authorised users who have a business need to use the facilities. 6.7 Application access control Access to data, system utilities and program source libraries will be controlled and restricted to authorised users who have a business need to use the applications. Authorisation to use an application will depend on the availability of a licence from the supplier. Information Security policy V4 12/2017 8

6.8 Equipment security In order to minimise loss of, or damage to, all assets, equipment will be physically protected from security threats and environmental hazards. 6.9 Computer and network procedures Management of computers and networks will be controlled by standard procedures that have been authorised by the IGSG. 6.10 Security incidents and weaknesses All security incidents and weaknesses are to be reported. All security incidents will be investigated to establish their cause, operational impact, and business outcome. 6.11 Protection from malicious software The NHSBSA will use software countermeasures and management procedures to protect itself against the threat of malicious software. All staff are expected to adhere fully with this policy. Users must not install software on the NHSBSA s computing assets. Staff breaching this requirement may be subject to disciplinary action. 6.12 Removable media Removable media containing software or data from external sources, or that have been used in external equipment, must be fully virus checked before being used on the NHSBSA s equipment. Users breaching this requirement may be subject to disciplinary action. 6.13 Monitoring system access and use An audit trail of system access and use must be maintained and reviewed on a regular basis. 6.14 Accreditation of information systems The NHSBSA will ensure that all new information systems, applications and networks include a security policy and plan and are approved by the HOS&IA before they commence operation. Information Security policy V4 12/2017 9

New information systems within the scope of PCI DSS must be penetration tested and vulnerability scanned, with issues remediated before going live. 6.15 System change control Changes to information systems, applications or networks must be reviewed and approved by the HOS&IA. 6.16 Intellectual property rights The NHSBSA will ensure that all information products are properly licensed and approved by the HOS&IA. Staff must not install software on the NHSBSA s computing assets. Staff breaching this requirement may be subject to disciplinary action. 6.17 Business continuity and disaster recovery plans The NHSBSA will ensure that business continuity and disaster recovery plans are produced for all critical information, applications, systems and networks. 6.18 Reporting The HOS&IA will keep the IGSG informed of the information security status of the NHSBSA by means of regular reports. 6.19 Policy audit This policy will be subject to audit by NHSBSA s internal auditors. 6.20 Further information Further information and advice on this policy can be obtained from the HOS&IA. Information Security policy V4 12/2017 10

7. Validity of this policy 7.1 In applying this policy, the NHSBSA will have due regard for the need to eliminate unlawful discrimination, promote equality of opportunity, and provide for good relations between people of diverse groups, in particular on the grounds of the following characteristics protected by the Equality Act (2010); age, disability, gender, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, and sexual orientation, in addition to offending background, trade union membership, or political affiliation. In accordance with our Equality Analysis Procedure, an equality analysis has been undertaken on this policy 7.2 This policy must be reviewed annually under the authority of the NHSBSA Leadership Team members. Associated IS standards should be subject to an ongoing development and review programme. 8. Related policies, standards and procedures Policy Purpose Acceptable Use Policy This policy is to ensure that staff are given the relevant support to ensure they are aware of what is acceptable use of any computer system owned or operated by the NHSBSA and therefore can apply procedures accordingly Data Protection and Confidentiality Policy This policy sets out roles and responsibilities when personal data is being processed to ensure the rights and privacy of individuals are respected, ensuring compliance with current Information Rights legislation. Records Management Policy This policy promotes the effective management and use of information, recognising its value and importance as a resource for delivering NHSBSA objectives Business Continuity / Disaster Recovery This policy: Policy ensures that all business Continuity Management (BCM) activities are conducted and implemented in an agreed and controlled manner ensures that the NHSBSA achieve a business continuity capability that meets changing business needs and is appropriate to the size, complexity and nature of the NHSBSA puts in place a clearly defined framework for the ongoing BCM capability Information Security policy V4 12/2017 11

9. Penalties Any staff that violate this policy may be subject to disciplinary action up to and including dismissal, including criminal prosecution. Information Security policy V4 12/2017 12