Information Security Policy

ST ANTONY’S COLLEGE

INFORMATION SECURITY POLICY

The following policy has been approved by the Governing Body of St Antony’s College. Any amendments to the policy require the Governing Body’s approval. Each Centre and department within St Antony’s College is required to comply with this policy. Support and guidance for Centre’s and departments is offered by the College’s IT Services which in turn is supported by the central university’s information security “InfoSec” team.

Information Security is not a new requirement, and to a large extent the policy and accompanying procedures formalise and regularise existing good practice within the College and wider university.

St Antony’s College is required to review this policy yearly to ensure any new developments are covered and protected.

1. Introduction

St Antony’s College seeks to maintain the confidentiality, integrity and availability of information about its staff, students, fellows, members, visitors, alumni, and its affairs generally. It is extremely important to the College to preserve its reputation and the reputation of Oxford University and its integral parts. Compliance with legal and regulatory requirements with respect to this Information is fundamental.

2. Objective

The objective of this Information Security Policy is, as far as reasonably practicable, to protect all sensitive information assets from all threats, whether internal or external, deliberate or accidental.

In support of this objective all users of data assets, whether they are physical or electronic, accept their roles and responsibilities in ensuring information is protected and are committed to:

Treating information security seriously;
Creating a security-positive work environment;
Implementing controls that are proportionate to risk.

Such information (for example Personnel, Payroll, Student Records) should only be stored in appropriate secure systems and locations, and is subject to legal protection. All users of the information and any ICT system are obliged, under the terms of the Data Protection Act (Data Protection Act 1998), to ensure the appropriate security measures are in place to prevent any unauthorised access to personal data, whether this is on a workstation or on paper.

This information security policy defines the framework within which information security will be managed by the College and demonstrates management direction and support for information security across the College. This policy is meant to keep information secure and highlights the risks of unauthorized access to or loss of data.

3. Scope and definitions

The scope of this Information Security Policy extends to all the information of St Antony’s College and its operational activities including but not limited to:

Records relating to students, alumni, staff, Fellows, members, visitors, conference guests and external contractors where applicable;
Operational plans, accounting records, and minutes;
Data and information generated and used in the College’s research activities;
All processing facilities used in support of the College’s operational activities to store, process and transmit information;
Any information that can identify a person, e.g. names and addresses.

This policy covers all staff where any reference to staff shall be regarded as relating to permanent, temporary and contract staff.

4. Policy

St Antony’s College aims, as far as reasonably practicable, to:

Protect the confidentiality, integrity and availability of all data it holds in its systems. This includes the protection of any device that can carry data or access data, as well as protecting physical paper copy of data wherever possible;
Meet legislative and contractual obligations;
Protect the College’s intellectual property rights;
Produce, maintain and test business continuity plans in regards to data backup and recovery;
Prohibit unauthorised use of the College’s information and systems;
Communicate this Information Security Policy to all staff;
Provide information security training to all staff appropriate to the role;
Report any breaches of information security, actual or suspected, to the Bursar and IT Department in a timely manner.

More detailed policy statements and guidance are provided in Section 7 of this Policy.

5. Risk Assessment and the Classification of Information

Risk assessment of information held

5.1         The degree of security control required depends on the sensitivity or criticality of the information. The first step in determining the appropriate level of security therefore is a process of risk assessment, in order to identify and classify the nature of the information held, the adverse consequences of security breaches and the likelihood of those consequences occurring.

5.2         The risk assessment should identify the information assets of St Antony’s College; define the ownership of those assets; and classify them, according to their sensitivity and/or criticality to the College or University as a whole. In assessing risk, the College should consider the value of the asset, the threats to that asset and its vulnerability.

5.3         Where appropriate,  information  assets  should  be  labelled  and  handled  in accordance with their criticality and sensitivity.

5.4         Rules for the acceptable use of information assets should be identified, documented and implemented. Where these are held on or accessed through a computer system, the University’s Regulations and Policies applying to all users of University ICT facilities is available from https://www.it.ox.ac.uk/rules.

5.5        Information security risk assessments should be repeated periodically and carried out as required during the operational delivery and maintenance of the College’s infrastructure, systems and processes.

Personal Data

5.6         Personal data must be handled in accordance with the Data Protection Act 1998 (DPA) and in accordance with this policy. “Personal data” means data which relate to a living individual who can be identified from those data, or together with other information which the College holds, or may hold, and includes any expression of opinion about the individual and any indication of the intentions of the College or any other person in respect of the individual.

5.7         The DPA requires that appropriate technical and organisational measures are taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

5.8         A higher level of security should be provided for ‘sensitive personal data’, which is defined in the DPA as data relating to ethnic or racial origin, religious beliefs, physical or mental health, sexual life, political opinions, trade union membership, or the commission or alleged commission of any offence.

6. Responsibilities

The Governing Body accepts responsibility for ensuring compliance with this policy and all data breaches within St Antony’s College.

The Governing Body requires the head of each department in College to be accountable for implementing an appropriate level of security control for the information processed and used by that department’s members of staff.

Each member of staff is accountable for operating an appropriate level of security control over the information and systems he/she uses to perform his/her duties.

The Bursar is responsible for coordinating the management of information security, maintaining this Information Security Policy and providing advice and guidance on its implementation.

It is noted that failure to adhere to this Policy may involve the College in serious financial loss (both by way of a fine of up to £500,000 imposed by the Information Commissioner’s Office and also by way of damages sought by an individual whose data has been inappropriately handled), embarrassment, legislative action or loss of reputation. Non-compliance by any member of staff may therefore result in disciplinary action.

7. Detailed Policies and Guidance

The following shall be complied with throughout St Antony’s College.

7.1.   Access to Information and Information systems

7.1.1.   Information assets shall be ‘owned’ by a named section within College. A list of information assets, and their owners, shall be maintained by the Bursar.

7.1.2.   Access to information shall be restricted to authorised users and shall be protected by appropriate practical physical and/or logical controls.

Physical controls for information and information processing assets shall include:

Locked storage facilities (supported by effective management of keys)
Locks on rooms which contain computer facilities
Securing of PCs and other devices to prevent theft
“Clean desk” policies
Encryption of data either transmitted or taken outside the College’s properties

 Logical controls for information and information processing assets shall include passwords for systems access.

Passwords and password management systems shall follow good practice for security and use the following techniques:

The use of strong authentication (minimum length, high complexity, non-reusable passwords)
Users to have the ability to change their passwords at any time
Passwords to be changed at regular intervals. A system to be in place to automate and enforce this process

Access privileges shall be allocated to staff based on the minimum privileges required to fulfil that member of staff’s duties. Access privileges shall be authorised by the appropriate information owner.

To allow for potential investigations, access records should be kept for a minimum of six months, or for longer, where considered appropriate.

7.1.3.     All access permissions will be granted, amended and revoked following a standard published access authorisation process.

7.1.4.     Information owners shall review access permissions on an annual basis.

7.1.5.     Access to physical information assets – for example printed paper documents, and media containing information – shall be governed as appropriate by the same principles as above.

7.1.6.     An appropriate leavers and joiners process shall be in place to ensure that all employees, contractors and third party users have information access permissions revoked and return all of the College’s assets in their possession upon termination of their employment, contract or agreement.  Heads of departments are responsible for completing a leaver’s checklist and communicating that list to appropriate departments.

7.1.7.     The circumstances under which the College may monitor use of its ICT systems, and the levels of authorisation required for this to be done, are the same as those set out in the University’s “Regulations Relating to the use of Information Technology Facilities”.

7.1.8.     Access to operating system commands and the use of system utilities – such as administrator privilege – that might be capable of overriding system and application controls, shall be restricted to those persons who are authorised to perform systems administration or management functions. Such privileges shall be authorised by the Bursar only in line with individual job roles and responsibilities.

7.2.        Visitors to the College

7.2.1      Visitors to the College should be provided with specifically assigned credentials and should be appropriately authenticated and automatically disabled at the end of their term with the College.

7.3.      Use of Personal Computer Equipment and Removable Storage

7.3.1.     St Antony’s College recognises that there may be occasions when staff need to use computing equipment not provided by the College to process information (including personal data).  The use of such equipment for these purposes must be approved by the Bursar.  Point 7.1.2 addresses this where information is to be transferred outside of the college property/ICT system. The same levels of control should be put in place for information which is held on a staff members’ own computing equipment or on equipment provided from outside the College or on removable storage.

7.3.2.     It is good practice and required that:

Computers owned by members of staff or provided from outside the College and used to process College information or connect to the College network shall have up-to-date anti-virus software installed and, if the computer is to be connected to the Internet, a firewall;
Information shall be saved with a password or some form of encryption onto the hard drive of computers owned by members of staff where that information is personal data concerning students, alumni, members, Fellows or staff (this would, for example, also include a Fellow’s reference for a student or former student);
The information on removable storage devices shall be protected from loss and/or theft;
St Antony’s College information shall not be retained on removable storage devices longer than necessary (i.e. once information that has been updated on a computer owned by a member of staff is uploaded onto College systems, it shall be deleted from the removable storage device).

7.4.      Email and Internet Use

The College’s email systems are outsourced to the University’s IT Services and is subject to their rules. Their information policy will take precedence. Access to the mail server is restricted to members of the College specified by mail list owners. Staff email is the property of the College.

The College’s policy and procedure on staff use of email and the Internet is included in the Staff Handbook.

7.5.      Mobile Computing

7.5.1.     Staff with laptop computers and other mobile computing devices shall take all sensible and reasonable steps to protect them from damage, loss or theft.  Such steps may include:

Securing laptops and removable media whether in college or while travelling.
Avoiding taking laptops into areas with a high risk of theft and locking such equipment in the boot of a vehicle when leaving it unattended

7.5.2.     Staff shall ensure that confidential information cannot be viewed by unauthorised persons when using computing equipment in public places (e.g. stations, airports, trains, etc.)

7.5.3.     Use of external wireless access points shall be permitted provided that member of staff ensures that the firewall software provided with the mobile computer is activated. Any sensitive data to be passed over an external wireless access point must be encrypted.

7.5.4.     Staff using mobile computers and smart phones are required to ensure that software controls and updates are installed and regularly updated to protect the mobile computers and smart phones from viruses, spyware and similar malicious programmes.  Regular updates of anti-malicious software files should occur automatically on connection to the Internet

7.5.5.     Use of any mobile computing device owned by the College must be in accordance with this Policy and the relevant section of the Staff Handbook.

7.5.6.     ANY MOBILE COMPUTING DEVICE OWNED BY THE COLLEGE THAT IS STOLEN OR LOST MUST BE REPORTED TO THE IT DEPARTMENT IMMEDIATELY, REGARDLESS OF DATE/TIME.  CONTACT THE LODGE OUT OF HOURS WHEN NEEDED.

7.6.      Software Compliance

7.6.1.     The College will provide legitimate copies of software to all staff users who need it, and will ensure the necessary authorisation has been obtained.

7.6.2.     Members of staff who are users of College computer equipment and software shall not copy software or load unauthorised/unapproved software onto a College computer including mobile equipment. The IT Manager is responsible for giving authority and approval for software suitable for loading on College equipment

7.6.3.     Members of staff shall not give any of the College’s software to any outsiders, including senior members/students.

7.6.4.     The IT Department shall maintain a register of authorised software, including the licence information. All licences and media shall be held securely in the IT Office.

7.6.5.     Licensed software shall be removed from any College-owned computer that is to be disposed of outside of the College.

7.6.6      Further Software Usage Policies are included in the Staff Handbook.

7.7.      Clear Desk/Clear Screen

7.7.1.     Outside normal working hours, all confidential information, whether marked up as such or not, shall be secured; this may include within a locked office or in a locked desk. During normal office hours such information shall be concealed or secured if desks are to be left unattended in unlocked/open access offices.

7.7.2.     Confidential printed information to be discarded shall be placed in an approved confidential waste container as soon as reasonably practical, or kept secure until that time.

7.7.3.     Documents shall be immediately retrieved from printers, photocopiers and fax machines.

7.7.4.     All desktop computers shall be logged off or locked automatically after a suitable period (unless required to remain on for operational purposes) to restrict access when the user is not at his or her desk.

7.7.5.     Unattended laptop computers, mobile telephones and other portable assets and keys shall be secured e.g. in a locked office, within a lockable desk, or by a lockable cable.

7.7.6.     Those in charge of meetings shall ensure that no confidential information is left in the room at the end of the meeting.

7.7.7.     The College shall ensure that members of staff have suitable storage facilities to enable them to comply with this Policy.

7.8.      Information Backup

7.8.1.     The requirements for backing-up information shall be defined based upon how often it changes and the ease with which lost data can be recovered and re-entered.

7.8.2.     The IT staff shall be responsible for ensuring that systems and information held on the College servers are backed up in accordance with the defined requirements. No systems of information should be held on local hard drives to avoid the risk of this information not being backed up.

7.8.3.     Accurate and complete records of the back-up copies shall be produced and maintained.

7.8.4.     The back-ups shall be stored in a remote location which must:

be a sufficient distance to escape any damage from a physical disaster at the College
be accessible
afford an appropriate level of protection to the back-up media in terms of its storage and transportation to and from the remote location

7.8.5.     Back-up media shall be regularly tested to ensure that they can be relied upon for emergency use when necessary.

7.8.6.     Restoration procedures shall be regularly checked and tested to ensure that they are effective and that they can be completed within the time allotted in the operational procedures for recovery.

8. Data Breach/Loss

8.1.        Data breach policies shall be in place to handle loss of data.  Such breaches shall include any breaches of this policy. Breaches include but are not limited to:

data breach/loss/theft
loss of equipment due to theft
inappropriate access controls allowing unauthorised access
equipment failure
human error
unforeseen circumstances such as fire and flood
hacking
‘blagging’ offences where data is obtained by deception.

8.2.        Any breach should be immediately reported to the Bursar, the IT department and to the appropriate head of department. All investigations should be carried out urgently and reviewed once the issue has been resolved. Responsibility for the reporting of

any data breach is up to the information owner, or the person who first notices that a breach has occurred.

9. Disposal

Policies and procedures must be in place for the secure disposal/destruction of confidential information. The College complies with the University’s policy on the disposal of old computers when disposing of computers owned by the College, which can be found at http://www.it.ox.ac.uk/policies-and-guidelines/computer-disposal.

10. Governance

This Policy will be reviewed regularly by the Data Protection Officer. Any changes will be approved by the Governing Body.

The Governing Body of St Antony’s College has approved this policy on:

DATE:  12 June 2013                            MINUTE:  8.1.1                                    

Appendix 1

Data SystemsLocation/’Owner’
PayrollAccounts Team
AccountsAccounts Team
AdmissionsRegistry
MembersRegistry
Fellows (except for Visiting Fellows)Bursar
AlumniDevelopment Office
Book Cataloguing and UsageLibraries
Archive RecordsArchivist
Research InformationResearchers
AccommodationDomestic Bursary
ConferencesDomestic Bursary
BuildingsDomestic Bursary
SecurityDomestic Bursary
TelephonesDomestic Bursary
Networks and IT systemsIT Office
PersonnelHR Manager
WebsiteVarious departments according to content and editorial responsibility
Legal agreements and DeedsBursar
Governing Body & committee minutes & agendasBursar & Registry