SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Meeting Your Information Security Obligations


                      A plain English guide to FSA Compliance




                Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

      Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                     ©Copyright Octree Limited 2012
Foreward
In April 2008 the FSA published a report titled “Data Security in Financial Services - Firms’ controls to
prevent data loss by their employees and third-party suppliers”. This was in the form of a 104 page
document describing how financial services firms in the UK are addressing the risk that their customer data
may be lost or stolen and then used to commit fraud or other financial crime. It sets out the findings of
their recent review of industry practice and standards in managing the risk of data loss or theft by
employees and third-party suppliers. I have reviewed this report and drafted the following sixteen point
“Best Practices” guide to help the principals of any firm conduct its business in accordance with the FSA’s
Principles for Business – ‘to conduct its business with due skill, care and diligence’ and ‘to take reasonable
care to organise and control its affairs responsibly and effectively, with adequate risk management
systems’. It should also be adopted by any business which has to meet legal and regulatory compliance
frameworks.

I hope it helps.

                                                                                        Tony Richardson, Security Consultant
                                                                                                             Octree Limited




“I welcome this report on the protection of customer data within the financial services industry. It includes
examples of good practice by some financial institutions which others could usefully learn from. However, I
am disappointed – but not altogether surprised – that the FSA has found that financial services firms, in
general, could significantly improve their controls to prevent data loss or theft.

The blunt truth is that all organisations need to take the protection of customer data with the utmost
seriousness. I have made clear publicly on several occasions over the past year that organisations holding
individuals’ data must in particular take steps to ensure that it is adequately protected from loss or theft.
There have been several high-profile incidents of data loss in public and private sectors during that time
which have highlighted that some organisations could do much better. The coverage of these incidents has
also raised public awareness of how lost or stolen data can be used for crimes like identity fraud. Getting
data protection wrong can bring commercial, reputational, regulatory and legal penalties. Getting it right
brings rewards in terms of customer trust and confidence.

The financial services industry needs to pay close attention to what its regulator is saying here. But this
report is also relevant to organisations outside the financial services industry which hold data about private
individuals. All organisations handling individuals’ data, in both the public and private sectors, could
benefit from the good practice advice it contains.”


                                                                 Richard Thomas – Information Commissioner (2009)


                             Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

            T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

                   Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                                 ©Copyright Octree Limited 2012
A 16 point plan to achieving compliance


   1 Risk Management
   Risk management is the cornerstone of any Information Security Management System
   (ISMS), and without it no organisation can be certain of effectively protecting their
   information assets effectively.

   Risk can be defined as “the likelihood that a threat agent will exploit a vulnerability in an
   asset, and the resulting cost to the business”. It is therefore critical to identify all
   information assets (application, systems, portable devices, USB devices, networking
   equipment, peripherals and printers) and consider the likely threats posed, from
   accidental and malicious activity internally, to external nefarious activity, to
   environmental and natural threats, such as flooding or electrical failure. A value has to
   be applied to each possibility based on the likelihood and the resulting cost to the
   business. Only then can the appropriate countermeasure be employed.
   There are a number of ways to deal with risk based on the “risk appetite” of the
   business, i.e. what they are prepared to bear. Risk can be mitigated through
   countermeasure deployment, it can be avoided, it can be transferred (e.g. through
   insurance), or it can just be accepted.



   2 Governance
   Develop a security policy document that everyone, from senior management to junior
   members of staff can “buy in to”. Everybody has to be aware of their responsibilities for
   protecting client information. Make it easy for all members of staff to report on data
   security concerns - suspicious activity or unusual behavior for example. Do not think that
   it is just an IT issue and therefore the IT department’s responsibility. It is also important
   to notify affected clients of any security breach resulting in exposure of their personal
   information.




                         Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

         T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

               Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                              ©Copyright Octree Limited 2012
3 Training and Awareness
Make everybody aware of the potential financial crime risks arising from poor data
security through innovative training programmes, and the legal and regulatory
requirements to protect client data. Why is it so important and what can be done to
comply with relevant policies put in place. Keep it simple though – it has to be
memorable and easily understood. Keep security in mind with posters, screensavers, or
whatever is considered to be effective.




4 Servers, Desktops and laptops
If customer data is stored on a Laptop, Desktop, or a File Server you need to have the
following security precautions in place to ensure compliance with FSA best practices and
ICO (Information Commissioner’s Office) guidelines.

     a. Firewall - To protect your computer or network from external security threats
     b. Antivirus and Antispyware Software - Should be installed to protect your
        computer from malware such as Key Loggers and Trojans
     c. Full Disk Encryption – will encrypt your whole hard drive using a set of keys and
        passwords. If the device is lost or stolen it would be rendered useless to any
        third party as you would need a special code to access the data.

        All computers that hold personally identifiable customer and employee data
        must be encrypted.



     d. Removable Device Encryption - All Floppy Disks, CDs, DVDs and USB flash drives
        must be encrypted if they hold customer data. They must use a minimum of 128
        Bit encryption.
     e. Encrypted Backups - When backing up data whether it is to Tape, Hard Disk or
        Online the backup media needs to be encrypted.


                      Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

      T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

            Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                           ©Copyright Octree Limited 2012
5 Password protection
Password protection of all computers is essential. You should be asked for a user name
and password every time you switch on or logon to your PC. Follow the rules below to
make sure you have the most secure password possible.

      a.   Your password should be at least 8 characters long
      b.   It should include letters, numbers, capitals and other symbols i.e. P@nD4b34R!
      c.   It should be easy to remember but hard to guess
      d.   Avoid any word in the dictionary, personal information such as a child or
           partner’s name or a football team, common names and slang.
      e.   Try playing on normal words such as England – 3nG1@Nd!
      f.   Do not write passwords down
      g.   Do not tell anyone else your passwords
      h.   Change your password every 90 days at the very least!




6 Email security
All emails containing customer data must be secure. Encrypting email means that only
the sender and intended recipient are able to read it. Some common and free email
encryption types are easy to break and are therefore not secure.




                      Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

      T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

            Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                           ©Copyright Octree Limited 2012
7 Physical Security
 Physical security is a key factor in securing your client data. Why encrypt and protect
 your data electronically when someone can break in and walk away with your file server.

        a. Your file, database and email servers should all be kept in a locked cabinet
           within a secure room to prevent casual access.
        b. External Hard Drives that contain customer data should be locked away when
           not in use.
        c. Ensure that only authorized personnel have access to your offices and
           buildings.



8 Backups
Full backups of all critical data should be a standard process within your business. The
simple rules below should help you to keep your data secure.

        a. Backup media should be locked away securely while not in use.
        b. Only authorized personnel should have access to backup media.
        c. Backup media should be held off site for disaster recovery.
        d. If the media is held off site it should be transported and stored securely i.e. a
           lock box or safe.
        e. Back up media needs to be encrypted.




                        Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

        T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

              Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                             ©Copyright Octree Limited 2012
9 Business Continuity and Disaster Recovery

Without a formal risk management process this activity will be almost futile. It refers to
the preparation, testing and updating of specific actions to protect critical business
processes from the effect of major system and network failures. Unless the critical
business systems and processes are identified and the threats assessed BC and DR cannot
possibly be established.

Analyse your business:
Identify the fullest possible understanding of the important processes inside your
organization and between you and your customers and suppliers.
Assess the risks:
How likely is the risk to happen? What effect will it have on your organization?
Develop the BC strategy:
Accept the risks – change nothing.
Accept the risks, but make a mutual arrangement with another business or a business
continuity partner to ensure you have help after an incident.
Attempt to reduce the risks.
Attempt to reduce the risks and make arrangements for help after an incident.
Reduce all risks to a point where you should not need outside help.
You attitude to risk will be partly based on the costs of delivering effective business
continuity. Remember to include both money and people’s time.
Develop the BC plan:
A good plan will be simple without being simplistic. You will never be able to plan for
every eventuality. Remember that people need to be able to react quickly in an
emergency – stopping to read lots of detail may make that more difficult.
Rehearse your plan:
The BCM plan is a living document and sometimes you only discover weaknesses in it
when you put it into action. Rehearsal helps you confirm that your plan will be connected
and robust if you ever need it. They are good ways to train staff who have BC
responsibilities.



                        Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

        T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

              Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                             ©Copyright Octree Limited 2012
10 Access Control
Access control should be an ongoing process. Where users have access to confidential
information they should only be given permissions to access the data they need to do
their job.
       a. You should review access permissions for every user at regular intervals.
             Each employee should have their own logon account.
       b. Employee’s access should be revoked as soon as they leave the company or are
           suspended.
       c. Locations where sensitive or confidential information is stored should be
           audited.



11 Data Transfer
If you need to move customer data outside of your secure environment for example; on
CD or USB memory you need to make sure you do the following

      d. Encrypt all portable media using a suitable encryption technique.
      e. Use device control software to control and detect unauthorized access to
         external media such as CDs and USB devices.
      f. Keep a record of all of these devices and which personnel are allowed to use
         them and for which purpose.



12 Asset management
Asset management is also a must to stay compliant with current regulations. You need to
keep a record of all computers, laptops, USB devices, external hard drives etc. that exist in
your business.

If you are going to take customer data outside of the business you should have a record of
that data that is copied and the business reason for doing so.



                        Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

        T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

              Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                             ©Copyright Octree Limited 2012
13 Data destruction
Data removal and destruction is an important part of keeping your clients’ information
secure. Simply deleting the data from a computer does not work as it can still be
recovered. Companies that hold personal data should only keep it for a reasonable period
of time. When you need to delete the data it should be securely shredded using special
techniques to prevent recovery by unauthorized persons. This also applies when disposing
of old equipment; hard drives should be disposed of securely ensuring all data is
destroyed.




14 Remote access
Remote access to your network needs to be secure. Remote access and VPN software
needs to be configured properly for the highest possible security level. If staff are allowed
to work from home or remote locations they need to make sure that any wireless network
that is used is encrypted to prevent eavesdropping.



15 Staff recruitment
Make sure all necessary and available vetting procedures are followed when recruiting
staff, particularly those who may have access to sensitive information, including credit
records, criminal records and the CIFAS staff fraud database. Follow up on references
given. Assess regularly in staff in higher-risk positions may be susceptible to coercion.




16 Email and internet access
Implement monitoring controls for email and internet activity to identify potential data
leakage, and remove inefficiencies through irresponsible browsing and non-work related
messaging. Filter access to content that allows web based communication such as
webmail (Hotmail, Gmail, Yahoo, MSN instant messaging), social networking sites like
Facebook and Myspace, and file sharing sites.

                        Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

        T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

              Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                             ©Copyright Octree Limited 2012
About the Author

Tony Richardson has been involved in information technology for 22 years. Originally
trained as a Management Accountant he has developed a broadline knowledge of
technology within numerous industry sectors. He founded an IT solutions provider – Octree
Limited - in 1990, and continues to provide expert technology solutions to the Small
Medium Business community (organisations up to 500 employees who have little or no in-
house expertise) with a specific focus on Information Assurance in the professional services
sectors – financial, accounting, legal, creative, and architectural.

Tony has achieved CISSP (Certified Information Systems Security Professional) certification,
the first credential in the field of information security accredited by the ANSI (American
National Standards Institute) to ISO (International Standards Organization) Standard
17024:2003. CISSP certification is not only an objective measure of excellence, but a
globally recognised standard of achievement, and is presently held by less than 70,000
professionals worldwide.

Tony holds a Certificate in Microsoft Technologies gained at Lancaster University, and is a
member of the Microsoft Partner Research Panel, a Microsoft Certified Professional, and a
consultant for the Reuters Insight Community of Experts. He is an associate of IT
Governance specializing in ISO27001 ISMS implementation. He actively pursues a program
of continuing professional development through vendor specific, and vendor neutral
training and accreditation.

Tony is currently studying for his MSc. In Cyber Security at Lancaster University.

Tony can be contacted by email at tony.richardson@octree.co.uk




                          Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

          T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

                Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                               ©Copyright Octree Limited 2012
Appendix

Principles of the Data Protection Act 1998

The eight principles require that personal information:

    Shall be processed fairly and lawfully and, in particular, shall not be processed unless
     specific conditions are met;

    Shall be obtained only for one or more specified and lawful purposes, and shall not
     be further processed in any manner incompatible with that purpose or those
     purposes;

    Shall be adequate, relevant and not excessive in relation to the purpose or purposes
     for which they are processed;

    Shall be accurate and, where necessary, kept up to date;

    Shall not be kept for longer than is necessary for the specified purpose(s);

    Shall be processed in accordance with the rights of data subjects under the Act;

    Should be subject to appropriate technical and organisational measures to prevent
     the unauthorised or unlawful processing of personal data, or the accidental loss,
     destruction, or damage to personal data;

    Shall not be transferred to a country or territory outside the European Economic Area
     unless that country or territory ensures an adequate level of protection for the rights
     and freedoms of data subjects in relation to the processing of personal data.




                           Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE

           T: +44 (0) 8456 171819 E: securapro@octree.co.uk   U: http://www.securapro.co.uk http://www.octree.co.uk

                 Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF

                                                ©Copyright Octree Limited 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
Trade Secrets and Computer Tampering
Trade Secrets and Computer TamperingTrade Secrets and Computer Tampering
Trade Secrets and Computer TamperingArmstrong Teasdale
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Dr. Ahmed Al Zaidy
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Understanding the Insider Threat to your organisation
Understanding the Insider Threat to your organisationUnderstanding the Insider Threat to your organisation
Understanding the Insider Threat to your organisationRowena Fell MA CPP FSyI
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Dr. Ahmed Al Zaidy
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyAndris Soroka
 
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...PECB
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Dr. Ahmed Al Zaidy
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3techcouncil
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Dr. Ahmed Al Zaidy
 

Was ist angesagt? (20)

Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Trade Secrets and Computer Tampering
Trade Secrets and Computer TamperingTrade Secrets and Computer Tampering
Trade Secrets and Computer Tampering
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Understanding the Insider Threat to your organisation
Understanding the Insider Threat to your organisationUnderstanding the Insider Threat to your organisation
Understanding the Insider Threat to your organisation
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
 
ACFN vISO eBook
ACFN vISO eBookACFN vISO eBook
ACFN vISO eBook
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
Funsec3e ppt ch14
Funsec3e ppt ch14Funsec3e ppt ch14
Funsec3e ppt ch14
 
Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15Fundamentals of Information Systems Security Chapter 15
Fundamentals of Information Systems Security Chapter 15
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
 

Andere mochten auch

Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guidearantxahdz
 
LKCo at Berklee College of Music
LKCo at Berklee College of MusicLKCo at Berklee College of Music
LKCo at Berklee College of Musicbilltraill
 
Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guidearantxahdz
 
banggiacapdien.com cap nhat cadivi 03 09-2013 - 0909.79.24.77
banggiacapdien.com cap nhat cadivi 03 09-2013 - 0909.79.24.77banggiacapdien.com cap nhat cadivi 03 09-2013 - 0909.79.24.77
banggiacapdien.com cap nhat cadivi 03 09-2013 - 0909.79.24.77Bảng giá Cáp điện
 
Ma01 model01
Ma01 model01Ma01 model01
Ma01 model01kripal11
 
banggiacapdien.com cap nhat Cadivi 2013 thang 9/2014 0909.79.24.77
banggiacapdien.com cap nhat Cadivi 2013 thang 9/2014 0909.79.24.77banggiacapdien.com cap nhat Cadivi 2013 thang 9/2014 0909.79.24.77
banggiacapdien.com cap nhat Cadivi 2013 thang 9/2014 0909.79.24.77Bảng giá Cáp điện
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Tony Richardson CISSP
 
banggiacapdien.com gioi thieu bang gia cap dien Cadisun
banggiacapdien.com gioi thieu bang gia cap dien Cadisun banggiacapdien.com gioi thieu bang gia cap dien Cadisun
banggiacapdien.com gioi thieu bang gia cap dien Cadisun Bảng giá Cáp điện
 

Andere mochten auch (8)

Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guide
 
LKCo at Berklee College of Music
LKCo at Berklee College of MusicLKCo at Berklee College of Music
LKCo at Berklee College of Music
 
Camtasia getting started guide
Camtasia getting started guideCamtasia getting started guide
Camtasia getting started guide
 
banggiacapdien.com cap nhat cadivi 03 09-2013 - 0909.79.24.77
banggiacapdien.com cap nhat cadivi 03 09-2013 - 0909.79.24.77banggiacapdien.com cap nhat cadivi 03 09-2013 - 0909.79.24.77
banggiacapdien.com cap nhat cadivi 03 09-2013 - 0909.79.24.77
 
Ma01 model01
Ma01 model01Ma01 model01
Ma01 model01
 
banggiacapdien.com cap nhat Cadivi 2013 thang 9/2014 0909.79.24.77
banggiacapdien.com cap nhat Cadivi 2013 thang 9/2014 0909.79.24.77banggiacapdien.com cap nhat Cadivi 2013 thang 9/2014 0909.79.24.77
banggiacapdien.com cap nhat Cadivi 2013 thang 9/2014 0909.79.24.77
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
banggiacapdien.com gioi thieu bang gia cap dien Cadisun
banggiacapdien.com gioi thieu bang gia cap dien Cadisun banggiacapdien.com gioi thieu bang gia cap dien Cadisun
banggiacapdien.com gioi thieu bang gia cap dien Cadisun
 

Ähnlich wie Meeting your information security obligations april 2012

netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealthInvest
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...RIYAJAIN179446
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxNapoleon NV
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientErin Olson
 
New Data Breach Regime, Privacy & Confidentiality
New Data Breach Regime, Privacy & ConfidentialityNew Data Breach Regime, Privacy & Confidentiality
New Data Breach Regime, Privacy & ConfidentialityColeman Greig Lawyers
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limitedoomagoolies
 

Ähnlich wie Meeting your information security obligations april 2012 (20)

netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptx
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with Axcient
 
New Data Breach Regime, Privacy & Confidentiality
New Data Breach Regime, Privacy & ConfidentialityNew Data Breach Regime, Privacy & Confidentiality
New Data Breach Regime, Privacy & Confidentiality
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 

Meeting your information security obligations april 2012

  • 1. Meeting Your Information Security Obligations A plain English guide to FSA Compliance Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 2. Foreward In April 2008 the FSA published a report titled “Data Security in Financial Services - Firms’ controls to prevent data loss by their employees and third-party suppliers”. This was in the form of a 104 page document describing how financial services firms in the UK are addressing the risk that their customer data may be lost or stolen and then used to commit fraud or other financial crime. It sets out the findings of their recent review of industry practice and standards in managing the risk of data loss or theft by employees and third-party suppliers. I have reviewed this report and drafted the following sixteen point “Best Practices” guide to help the principals of any firm conduct its business in accordance with the FSA’s Principles for Business – ‘to conduct its business with due skill, care and diligence’ and ‘to take reasonable care to organise and control its affairs responsibly and effectively, with adequate risk management systems’. It should also be adopted by any business which has to meet legal and regulatory compliance frameworks. I hope it helps. Tony Richardson, Security Consultant Octree Limited “I welcome this report on the protection of customer data within the financial services industry. It includes examples of good practice by some financial institutions which others could usefully learn from. However, I am disappointed – but not altogether surprised – that the FSA has found that financial services firms, in general, could significantly improve their controls to prevent data loss or theft. The blunt truth is that all organisations need to take the protection of customer data with the utmost seriousness. I have made clear publicly on several occasions over the past year that organisations holding individuals’ data must in particular take steps to ensure that it is adequately protected from loss or theft. There have been several high-profile incidents of data loss in public and private sectors during that time which have highlighted that some organisations could do much better. The coverage of these incidents has also raised public awareness of how lost or stolen data can be used for crimes like identity fraud. Getting data protection wrong can bring commercial, reputational, regulatory and legal penalties. Getting it right brings rewards in terms of customer trust and confidence. The financial services industry needs to pay close attention to what its regulator is saying here. But this report is also relevant to organisations outside the financial services industry which hold data about private individuals. All organisations handling individuals’ data, in both the public and private sectors, could benefit from the good practice advice it contains.” Richard Thomas – Information Commissioner (2009) Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 3. A 16 point plan to achieving compliance 1 Risk Management Risk management is the cornerstone of any Information Security Management System (ISMS), and without it no organisation can be certain of effectively protecting their information assets effectively. Risk can be defined as “the likelihood that a threat agent will exploit a vulnerability in an asset, and the resulting cost to the business”. It is therefore critical to identify all information assets (application, systems, portable devices, USB devices, networking equipment, peripherals and printers) and consider the likely threats posed, from accidental and malicious activity internally, to external nefarious activity, to environmental and natural threats, such as flooding or electrical failure. A value has to be applied to each possibility based on the likelihood and the resulting cost to the business. Only then can the appropriate countermeasure be employed. There are a number of ways to deal with risk based on the “risk appetite” of the business, i.e. what they are prepared to bear. Risk can be mitigated through countermeasure deployment, it can be avoided, it can be transferred (e.g. through insurance), or it can just be accepted. 2 Governance Develop a security policy document that everyone, from senior management to junior members of staff can “buy in to”. Everybody has to be aware of their responsibilities for protecting client information. Make it easy for all members of staff to report on data security concerns - suspicious activity or unusual behavior for example. Do not think that it is just an IT issue and therefore the IT department’s responsibility. It is also important to notify affected clients of any security breach resulting in exposure of their personal information. Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 4. 3 Training and Awareness Make everybody aware of the potential financial crime risks arising from poor data security through innovative training programmes, and the legal and regulatory requirements to protect client data. Why is it so important and what can be done to comply with relevant policies put in place. Keep it simple though – it has to be memorable and easily understood. Keep security in mind with posters, screensavers, or whatever is considered to be effective. 4 Servers, Desktops and laptops If customer data is stored on a Laptop, Desktop, or a File Server you need to have the following security precautions in place to ensure compliance with FSA best practices and ICO (Information Commissioner’s Office) guidelines. a. Firewall - To protect your computer or network from external security threats b. Antivirus and Antispyware Software - Should be installed to protect your computer from malware such as Key Loggers and Trojans c. Full Disk Encryption – will encrypt your whole hard drive using a set of keys and passwords. If the device is lost or stolen it would be rendered useless to any third party as you would need a special code to access the data. All computers that hold personally identifiable customer and employee data must be encrypted. d. Removable Device Encryption - All Floppy Disks, CDs, DVDs and USB flash drives must be encrypted if they hold customer data. They must use a minimum of 128 Bit encryption. e. Encrypted Backups - When backing up data whether it is to Tape, Hard Disk or Online the backup media needs to be encrypted. Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 5. 5 Password protection Password protection of all computers is essential. You should be asked for a user name and password every time you switch on or logon to your PC. Follow the rules below to make sure you have the most secure password possible. a. Your password should be at least 8 characters long b. It should include letters, numbers, capitals and other symbols i.e. P@nD4b34R! c. It should be easy to remember but hard to guess d. Avoid any word in the dictionary, personal information such as a child or partner’s name or a football team, common names and slang. e. Try playing on normal words such as England – 3nG1@Nd! f. Do not write passwords down g. Do not tell anyone else your passwords h. Change your password every 90 days at the very least! 6 Email security All emails containing customer data must be secure. Encrypting email means that only the sender and intended recipient are able to read it. Some common and free email encryption types are easy to break and are therefore not secure. Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 6. 7 Physical Security Physical security is a key factor in securing your client data. Why encrypt and protect your data electronically when someone can break in and walk away with your file server. a. Your file, database and email servers should all be kept in a locked cabinet within a secure room to prevent casual access. b. External Hard Drives that contain customer data should be locked away when not in use. c. Ensure that only authorized personnel have access to your offices and buildings. 8 Backups Full backups of all critical data should be a standard process within your business. The simple rules below should help you to keep your data secure. a. Backup media should be locked away securely while not in use. b. Only authorized personnel should have access to backup media. c. Backup media should be held off site for disaster recovery. d. If the media is held off site it should be transported and stored securely i.e. a lock box or safe. e. Back up media needs to be encrypted. Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 7. 9 Business Continuity and Disaster Recovery Without a formal risk management process this activity will be almost futile. It refers to the preparation, testing and updating of specific actions to protect critical business processes from the effect of major system and network failures. Unless the critical business systems and processes are identified and the threats assessed BC and DR cannot possibly be established. Analyse your business: Identify the fullest possible understanding of the important processes inside your organization and between you and your customers and suppliers. Assess the risks: How likely is the risk to happen? What effect will it have on your organization? Develop the BC strategy: Accept the risks – change nothing. Accept the risks, but make a mutual arrangement with another business or a business continuity partner to ensure you have help after an incident. Attempt to reduce the risks. Attempt to reduce the risks and make arrangements for help after an incident. Reduce all risks to a point where you should not need outside help. You attitude to risk will be partly based on the costs of delivering effective business continuity. Remember to include both money and people’s time. Develop the BC plan: A good plan will be simple without being simplistic. You will never be able to plan for every eventuality. Remember that people need to be able to react quickly in an emergency – stopping to read lots of detail may make that more difficult. Rehearse your plan: The BCM plan is a living document and sometimes you only discover weaknesses in it when you put it into action. Rehearsal helps you confirm that your plan will be connected and robust if you ever need it. They are good ways to train staff who have BC responsibilities. Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 8. 10 Access Control Access control should be an ongoing process. Where users have access to confidential information they should only be given permissions to access the data they need to do their job. a. You should review access permissions for every user at regular intervals. Each employee should have their own logon account. b. Employee’s access should be revoked as soon as they leave the company or are suspended. c. Locations where sensitive or confidential information is stored should be audited. 11 Data Transfer If you need to move customer data outside of your secure environment for example; on CD or USB memory you need to make sure you do the following d. Encrypt all portable media using a suitable encryption technique. e. Use device control software to control and detect unauthorized access to external media such as CDs and USB devices. f. Keep a record of all of these devices and which personnel are allowed to use them and for which purpose. 12 Asset management Asset management is also a must to stay compliant with current regulations. You need to keep a record of all computers, laptops, USB devices, external hard drives etc. that exist in your business. If you are going to take customer data outside of the business you should have a record of that data that is copied and the business reason for doing so. Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 9. 13 Data destruction Data removal and destruction is an important part of keeping your clients’ information secure. Simply deleting the data from a computer does not work as it can still be recovered. Companies that hold personal data should only keep it for a reasonable period of time. When you need to delete the data it should be securely shredded using special techniques to prevent recovery by unauthorized persons. This also applies when disposing of old equipment; hard drives should be disposed of securely ensuring all data is destroyed. 14 Remote access Remote access to your network needs to be secure. Remote access and VPN software needs to be configured properly for the highest possible security level. If staff are allowed to work from home or remote locations they need to make sure that any wireless network that is used is encrypted to prevent eavesdropping. 15 Staff recruitment Make sure all necessary and available vetting procedures are followed when recruiting staff, particularly those who may have access to sensitive information, including credit records, criminal records and the CIFAS staff fraud database. Follow up on references given. Assess regularly in staff in higher-risk positions may be susceptible to coercion. 16 Email and internet access Implement monitoring controls for email and internet activity to identify potential data leakage, and remove inefficiencies through irresponsible browsing and non-work related messaging. Filter access to content that allows web based communication such as webmail (Hotmail, Gmail, Yahoo, MSN instant messaging), social networking sites like Facebook and Myspace, and file sharing sites. Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 10. About the Author Tony Richardson has been involved in information technology for 22 years. Originally trained as a Management Accountant he has developed a broadline knowledge of technology within numerous industry sectors. He founded an IT solutions provider – Octree Limited - in 1990, and continues to provide expert technology solutions to the Small Medium Business community (organisations up to 500 employees who have little or no in- house expertise) with a specific focus on Information Assurance in the professional services sectors – financial, accounting, legal, creative, and architectural. Tony has achieved CISSP (Certified Information Systems Security Professional) certification, the first credential in the field of information security accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. CISSP certification is not only an objective measure of excellence, but a globally recognised standard of achievement, and is presently held by less than 70,000 professionals worldwide. Tony holds a Certificate in Microsoft Technologies gained at Lancaster University, and is a member of the Microsoft Partner Research Panel, a Microsoft Certified Professional, and a consultant for the Reuters Insight Community of Experts. He is an associate of IT Governance specializing in ISO27001 ISMS implementation. He actively pursues a program of continuing professional development through vendor specific, and vendor neutral training and accreditation. Tony is currently studying for his MSc. In Cyber Security at Lancaster University. Tony can be contacted by email at tony.richardson@octree.co.uk Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012
  • 11. Appendix Principles of the Data Protection Act 1998 The eight principles require that personal information:  Shall be processed fairly and lawfully and, in particular, shall not be processed unless specific conditions are met;  Shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes;  Shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed;  Shall be accurate and, where necessary, kept up to date;  Shall not be kept for longer than is necessary for the specified purpose(s);  Shall be processed in accordance with the rights of data subjects under the Act;  Should be subject to appropriate technical and organisational measures to prevent the unauthorised or unlawful processing of personal data, or the accidental loss, destruction, or damage to personal data;  Shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. Octree Limited The Lloyds Building Birds Hill Letchworth Herts. SG6 1JE T: +44 (0) 8456 171819 E: securapro@octree.co.uk U: http://www.securapro.co.uk http://www.octree.co.uk Company No: 6773278 Registered Office: Middlesex House, Rutherford Close, Stevenage, SG1 2EF ©Copyright Octree Limited 2012