Information security policy

Similar documents
Bournemouth Primary MAT Risk Management Policy

INFORMATION AND CYBER SECURITY POLICY V1.1

Risk Management Policy

Anti-Money Laundering Policy and Procedure

Whistleblowing Policy & Procedures. GFH Financial Group

FRAUD & THEFT POLICY & RESPONSE PLAN

Amadeus Global Report 2016 A business, financial and sustainability overview. Corporate risk management

Introduction to ISO Key Points and Benefits

Policy 42 Anti-Fraud, Anti-Theft & Anti-Corruption

ANTI FRAUD, BRIBERY AND CORRUPTION POLICY

Fraud Control Framework

GUIDELINES FOR THE CONTRACTING OUT OF RESEARCH ACTIVITIES

Credit Card Handling Security Standards

ASTRAZENECA GLOBAL POLICY DATA PRIVACY

ANTI-FRAUD, BRIBERY AND CORRUPTION POLICY AND STRATEGY THE VIEW TRUST

RISK MANAGEMENT FRAMEWORK

FAIS Conflict of Interest (COI) Policy for the Sanlam Group

Risk Management Policy and Procedures.

Conflict of Interest Management Policy

Man and Machine - Data Protection Policy

ANTI-FRAUD POLICY. Reference No: ANTIFP-251. Policy Type: Governance. Directorate Area: All Directorates. Policy Author / Champion: Maurice Atkinson

Counter Theft, Fraud and Corruption Policy

ANTI BRIBERY FRAUD AND CORRUPTION. RES-CG-003-V02 Anti Bribary, Fraud and Corruption If printed this document is uncontrolled

Revised Ethical Standard 2016

Air Partner plc (the Company ) Terms of reference for the Audit and Risk Committee (the Committee )

Anti-fraud and Corruption Policy


Consultation Paper No. 7 of 2015 Appendix 4. Abu Dhabi Global Market Rulebook Market Infrastructure Rulebook (MIR)

RISK MANAGEMENT POLICY AND STRATEGY

ANTI-CORRUPTION POLICY

New Zealand Clearing Limited. Clearing and Settlement Procedures

This document sets out the University s position on Fraud and Bribery and its framework for addressing the Bribery Act Scope

Clearing and Settlement Procedures. New Zealand Clearing Limited. Clearing and Settlement Procedures

GOVERNANCE AND ADMINISTRATION OF CORPORATE PENSIONS.

RISK MANAGEMENT POLICY October 2015

Contractor Management Procedure

Financial Policies and Procedures Preventing Bribery, Corruption and Money Laundering (August 2018)

Enterprise Risk Management Policy Adopted by the AMP Limited Board on 2 February 2017

The University has no tolerance of bribery and fraud and will take appropriate action to prevent it in respect of its activities.

Credit Card Procedures. Section 1 - Overview. Section 2 - Scope. Section 3 - Procedures. Eligibility

Risk Management Policy (v7.0)

ANTI-BRIBERY & CORRUPTION POLICY. Anti-Bribery Anti-Bribery Policy 1

Cybersecurity and the Law Seminar

NN Group. Whistleblower. Policy. Version 2.3 Date September 2015 Department. Corporate Compliance

Policy Number: 040 Risk Management August 2018

Fraud and corruption prevention and control policy of the International Federation of Red Cross and Red Crescent Societies

Prudential Standard GOI 3 Risk Management and Internal Controls for Insurers

YMCA SOUTH AUSTRALIA Privacy Policy

Counter Fraud Framework Manual Anti-Money Laundering Policy Statement and Procedure

POLICY (OPERATIONAL) FRAUD CONTROL

2.1.3 CARDHOLDER DATA SECURITY

GLOBAL ANTI-CORRUPTION POLICY

University of Liverpool

Revised: May Fraud Prevention Policy

Last Updated: 1 February 2018 To be reviewed: Annually

All Sorts UK Limited Data Protection Policy 17 th May 2018

Simeka Conflict of Interest Management (COI) Policy (with specific reference to the FAIS General Code of Conduct)

NHS North Somerset Clinical Commissioning Group Risk Management Strategy and Framework

March 1. HIPAA Privacy Policy

ANTI BRIBERY AND CORRUPTION POLICY

University Fraud Policy

Anti-Fraud Policy Date: Version: Review Date:

ANTI-BRIBERY POLICY AND ANTI-FRAUD POLICY AND RESPONSE PLAN

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY

Financial Services Authority

Webinar: Deep Dive into Risk, High Risk and Risk Assessments in the GDPR

POLICY: FRAUD PREVENTION. October 2017

Banks Sheridan Limited Data Protection Privacy Policy 19 May 2018

Scouting Ireland Risk Management Framework

ETHICAL STANDARD FOR AUDITORS (IRELAND) APRIL 2017

CONFLICT OF INTEREST MANAGEMENT POLICY

Joint Equity. Anti-Money Laundering Compliance Manual

APPENDIX 2 CORPORATE ANTI-FRAUD AND CORRUPTION STRATEGY

Risk Management Policy

London Borough of Redbridge

M_o_R (2011) Foundation EN exam prep questions

CONFLICTS OF INTEREST MANAGEMENT POLICY

RISK MANAGEMENT FRAMEWORK

PRIME FINANCIAL POLICIES

DATA HANDLING AGREEMENT

May 2018 Legal & General Investment Management - Conflicts of Interest. Corporate Governance Conflicts of Interest Policy

MANITOBA OMBUDSMAN PRACTICE NOTE

COMMISSION DELEGATED REGULATION (EU) /... of

Policies and Procedures. Code of Ethics Policy

CODE OF BUSINESS CONDUCT

Ball State University

DOCUMENT OF THE EUROPEAN BANK FOR RECONSTRUCTION AND DEVELOPMENT PUBLIC INFORMATION POLICY

Internal Audit Incident Management Review

ANTI-BRIBERY POLICY. The Guidance sets out six principles which underpin the Company s procedures for dealing with the risk of bribery.

Group Financial Statements

Fraud, Bribery and Corruption Control Policy

RISK MANAGEMENT POLICY. Head of Corporate Development and Change. Policy owners

AWS GDPR DATA PROCESSING ADDENDUM

Risk Management Policy

REGULATION. on Internal Governance Arrangements, the Management body and the Internal Capital Adequacy Assessment Process for Banks and Savings banks

FINANCIAL REGULATIONS

CITY OF JOHANNESBURG METROPOLITAN MUNICIPALITY GROUP RISK AND ASSURANCE SERVICES GROUP RISK MANAGEMENT POLICY

STATUTORY INSTRUMENTS. S.I. No. 60 of 2017 CENTRAL BANK (SUPERVISION AND ENFORCEMENT) ACT 2013 (SECTION 48(1)) (INVESTMENT FIRMS) REGULATIONS 2017

Title: Anti-Bribery Policy

TORONTO PORT AUTHORITY CODE OF BUSINESS CONDUCT AND ETHICS. November 29, 2005

Transcription:

Information security policy Policy objectives 1 This policy is intended to establish the necessary policies, procedures and an organisational structure that will protect NMC s information assets and critical activities from all appropriate threats and to ensure regulatory, statutory, contractual and legislative requirements are met. 2 Compliance with this policy is necessary to ensure business continuity, and to minimise business damage by preventing and minimising the impact of security incidents. Scope 4. This policy applies to: 4.1. All directorates and the information processed by those directorates. 4.2. All NMC s operations run out of the offices in London, Cardiff and Edinburgh. 4.3. All information processed by NMC in pursuit of all its operational activities, regardless of whether it is processed electronically or in paper form. 4.4. All information transferred or exchanged with third parties, or held by third parties on behalf of the NMC, regardless of whether it is processed electronically or in paper form. Communication 5. This policy will be made available to all those working for or on behalf of the NMC and made available on the NMC website to NMC s suppliers, customers and stakeholders. 6. A copy of the policy is available in Welsh on request. Policy Statement 5. It is the policy of NMC to ensure that: 5.1. Information assets and information processing facilities shall be protected against unauthorised access 5.2. Information shall be protected from unauthorised disclosure

5.3. Confidentiality of information assets shall be a high priority 5.4. Integrity of information shall be maintained. 5.5. NMC s requirements, as identified by information asset owners, for the availability of information assets and information processing facilities required for operational activities shall be met. 5.6. The management of the supply chain requires those negotiating contracts to ensure appropriate information security and business continuity measures are included in contracts, where possible, so that the service provider is able to deliver acceptable levels of service. 5.7. Any supplier engaged by NMC to handle payment card data will comply with the Payment Card Industry Data Security Standard (PCI). 5.8. Business continuity plans shall be produced, maintained and tested. 5.9. Unauthorised use of information assets and information processing facilities shall be prohibited; the use of obscene or otherwise offensive statements shall be dealt with in accordance with other policies published by NMC. 6. All breaches of information security, actual or suspected, shall be reported and investigated in line with NMC s policies. 7. Controls shall be commensurate with the risks faced by NMC. 8. In support of this Information security policy, more detailed security policies and processes shall be developed for those working for or on behalf of the NMC, information assets and information processing facilities. Information security objectives 9. The objectives of the Information security management system are: 10. To provide the necessary policies, procedures and an organisational structure that will protect NMC s information assets and critical activities from all appropriate threats and to ensure regulatory, statutory, contractual and legislative requirements are met. 11. To ensure business continuity, and to minimise business damage by preventing and minimising the impact of security incidents. 12. To preserve the appropriate level of confidentiality, integrity and availability of NMC s information assets and critical activities. Page 2 of 7

13. The information security objectives of the organisation and of specific directorates are set out in Objectives, metrics and measures for the information security management system. Responsibilities 9 The NMC s Chief Executive and Registrar and NMC s directors shall be accountable for ensuring that appropriate and effective information security controls are implemented, monitored and reviewed to ensure compliance with the NMC s legal regulatory or contractual obligations. 10 NMC s directors shall be responsible for ensuring that the NMC s information security objectives are aligned with the organisation s objectives. 11 NMC s directors shall be accountable for ensuring that appropriate security, legal and regulatory controls are identified, implemented and maintained by information owners. They shall be supported in this task by all staff. 12 Information asset owners within NMC shall be responsible for the identification, implementation and maintenance of controls for the information assets they own and the risks to which they are exposed. A list of information assets and their owners is set out in the Information Asset register. 13 NMC s directors shall ensure continuous compliance monitoring within their area of jurisdiction. Compliance will be a matter for periodic review by the Information Governance and Security Board (IGSB). 14 The IGSB is responsible for setting the priorities for the information security work programme. A programme of reviews and assessments of security effectiveness will form part of this programme, and will establish an agenda for security improvements. 15 The role and responsibility for facilitating information security at an operational level shall be performed by the Information Assurance and Compliance Manager, including convening the IGSB. 16 Managers within every business areas are responsible for implementing security policies and procedures in their areas including with the third parties that they manage. As part of the formal assessment of security effectiveness, they will be required to account for security problems, breaches, and the security performance of their areas. 17 All staff whether permanent or temporary are responsible for the protection of the NMC s information assets, enabling the confidentiality, integrity and availability of these assets to be maintained. 18 All third party suppliers to the NMC are to conform to this policy. Page 3 of 7

19 Specific roles in respect of responsibility and accountability for information governance activities including information security, records management, data governance, technical security and business continuity are set out in the Information Security Roles and Responsibilities RACI chart. 20 All staff must adhere to all policies relating to Information Security. Noncompliance will be subject to investigation and may result in disciplinary action under NMC s disciplinary procedure. Disciplinary action shall be consistent with the severity of the incident, as determined by an investigation and may include, but not be limited to: 19. Loss of access privileges to information assets or information processing facilities 20. Disciplinary action including termination of employment and legal prosecution 21. Other actions as deemed appropriate by management, the Human Resources Department and legal advice. Governance 23 Information Security will be governed and the effectiveness measured by the following methods: 23.1 Internal audit 23.2 External audit, e.g. Regulator (The Professional Standards Authority), ISO 27001 International Standard for Information Security, Payment Card Industry Standard (PCI DSS) 23.3 Business continuity and service continuity exercises 23.4 Management review e.g. risk assessments, results of awareness training, lessons learnt from security incidents and identified improvement opportunities. 23.5 The results from these processes will enable the business to review the effectiveness of the controls and continually develop the Management System. 24 The IGSB will review and approve the prioritisation of information security aspects of the internal audit schedule on an annual basis, ensuring that every business process is audited at least once in a 3 year period. 25 The Information Security policy will be reviewed every 12 months or when there are significant changes to ensure it is being implemented correctly and consistently and that quality is maintained. Page 4 of 7

Security awareness and training 26 Staff with access to information assets and information processing facilities shall be educated on their information security responsibilities. Education shall be provided as part of the induction process so that new staff completely understand their responsibilities in the protection of information assets and information processing facilities. 27 Staff shall be provided with on-going security education and supporting reference materials. Human Resources and/or the Information Assurance and Compliance Manager shall provide refresher courses and other security related materials to regularly remind staff about their obligations with respect to information security. 28 The security responsibilities of third parties shall be made clear at an early stage of the contract by the person responsible for engaging the third party. Risk Management 29 A systematic approach to information security risk management has been adopted to identify business needs regarding information security requirements (including legal, contractual and regulatory) and to create an effective operational information security framework. 30 Information security risk management is not a one-off exercise with a single set of control recommendations which remain static in time but a continual process. During the operational delivery and maintenance of NMC s services there are a number of instances where risk assessment is necessary. 31 The implementation of the information risk strategy shall be based on formal methods for risk assessment, risk management and risk acceptance and independent of technology or software. Continual improvement 32 The Chief Executive and Registrar and directors shall ensure continual improvement of the information security management system. Page 5 of 7

Legislation and standards 33 The list below contains some of the legislative and regulatory requirements NMC must comply with: Data Protection Act 1998 The General Data Protection Regulation (from 25 May 2018) Freedom of Information Act 2000 Human Rights Act 1998 Computer Misuse Act 1990 Companies Act 2006 Health & Safety at Work Act Employment Legislation Bribery Act 2010 Fraud Act 2006 Regulation of Investigatory Powers Act 2000 The Payment Card Industry Data Security Standard Page 6 of 7

Glossary Asset Availability Business continuity management Confidentiality Information security Information security management system Integrity Personal information Physical security Anything of value to the organisation. There are many types of assets including information, software, hardware and intangible assets such as reputation. The property of being accessible and usable upon demand by an authorise entity. A process that identifies potential threats to an organisation and the impacts to operations that those threats, if realised, might cause. It provides a framework for building the capability for an effective response that safeguards the interests of its key stakeholders and the organisation s reputation. The property that information is not made available, or disclosed to unauthorised individuals, entities or processes. Information security is the protection of information from a wide range of threats in order to minimise business risk. Information security is the preservation of confidentiality, integrity, and availability of information. Part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve the organisation s information security. The property of protecting the accuracy and completeness of assets. Any information that relates to one specific person. It can be their name, address, or telephone number. It can also be the type of job they do, their preferences, records of attendance, qualifications, and so on. This covers the assets, and the way those assets are used, to restrict physical access and the presence of people in certain locations to stop theft of, or damage to, assets and property. This may include guards, locked doors, identity checks and movement controls. Page 7 of 7