![]() Redscan is an award-winning of provider of managed security and assessment services. Understanding how the NDG standards apply to your organisation and putting the necessary controls in place to meet them can be daunting. IT suppliers are held accountable via contracts for protecting the personal confidential data they process and meeting the National Data Guardian’s Data Security Standards. No unsupported operating systems, software or internet browsers are used within the IT estate.Ī strategy is in place for protecting IT systems from cyber threats which is based on a proven cyber security framework such as Cyber Essentials. Action is taken immediately following a data breach or a near miss, with a report made to senior management within 12 hours of detection.Ī continuity plan is in place to respond to threats to data security, including significant data breaches or near misses, and it is tested once a year as a minimum, with a report to senior management.Įnsuring technology is secure and up to date. Processes are reviewed at least annually to identify and improve processes which have caused breaches or near misses, or which force staff to use workarounds which compromise data security.Ĭyber-attacks against services are identified and resisted and CareCERT security advice is responded to. ![]() All access to personal confidential data on IT systems can be attributed to individuals. Personal confidential data is only accessible to staff who need it for their current role and access is removed as soon as it is no longer required. Personal confidential data is only shared for lawful and appropriate purposes.Īll staff understand their responsibilities under the National Data Guardian’s Data Security Standards, including their obligation to handle information responsibly and their personal accountability for deliberate or avoidable breaches.Īll staff complete appropriate annual data security training and pass a mandatory test, provided through the revised Information Governance Toolkit.Įnsuring the organisation proactively prevents data security breaches and responds appropriately to incidents or ‘near misses’. Digital Forensics and Incident ResponseĮnsuring staff are equipped to handle information respectfully and safely.Īll staff ensure that personal confidential data is handled, stored and transmitted securely, whether in electronic or paper form.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |