1 / 5

Information Governance Policies

Information Governance Policies. Information Governance Policies. Data Encryption & Transportation Policy Information Access Policy Monitoring of Communications Policy. Data Encryption & Transportation Policy.

santanaj
Download Presentation

Information Governance Policies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Governance Policies

  2. Information Governance Policies • Data Encryption & Transportation Policy • Information Access Policy • Monitoring of Communications Policy

  3. Data Encryption & Transportation Policy • This policy has been developed to provide clear statements to all users on the do's and don'ts in respect of the transportation of personal data • Is designed to support and improve our handling of personal data, at a time when losses of personal data are being widely reported in the media and the Information Commissioners Office (ICO) is extending its powers to take action against organisations losses such data. • Provides clear guidance and tools to support better management of personal information • Is designed to ensure that clear standards are in place to protect personal data and reassure citizens that we are actively taking steps to ensure the security of there data • Will demonstrate to external bodies / assessors e.g. partners, ICO, Audit Commission that we are taking our responsibilities in respect of personal data seriously

  4. Information Access Policy • This policy is intended to provide a framework that will support improved access to information, both across and outside (e.g. partners and members of the public) the council whilst at the same time ensuring that information is appropriately protected. In doing so it will set out: • The different categories of information that the council holds • How information can be grouped into these categories. • The principles by which different categories of information need to be managed throughout their life-cycle, (e.g. how they should be stored, accessed, used, shared, protected and disposed of)

  5. Monitoring of Communications Policy • The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 came into force on 24th October 2000. Their purpose is to give businesses a lawful basis for the interception of business communications without the users' consent for a range of purposes. The regulations cover all types of communications including those that are Internet based, by fax, by telephone and by e-mail and allow businesses, government department, and any public authority to monitor or record communications. • Salford City Council will monitor communications in accordance with the above regulations. employees will be made aware when any monitoring is taking place and might not necessarily be asked for consent. • Managers must ensure that they adopt this policy whenever monitoring is being undertaken. Employees must be made aware when any monitoring is taking place • Proportionality, justification and transparency will need to be considered in all cases in order to comply with The Data Protection Act and The Human Rights Act. (See Appendix 1) • This policy is intended to promote awareness of the council's intention to monitor communications, undertaken by employees. • This policy is intended to inform managers of the correct procedures which are to be adopted, whenever monitoring is undertaken. It acts as an overarching policy, underneath which, bespoke monitoring policies must sit. NB this policy does NOT cover covert monitoring.  

More Related