NOT PROTECTIVELY MARKED Data Protection Information Security Information

  • Slides: 35
Download presentation
NOT PROTECTIVELY MARKED Data Protection & Information Security Information Management

NOT PROTECTIVELY MARKED Data Protection & Information Security Information Management

NOT PROTECTIVELY MARKED Data Protection? Information Security? What’s the difference? ?

NOT PROTECTIVELY MARKED Data Protection? Information Security? What’s the difference? ?

NOT PROTECTIVELY MARKED Data Protection Current Requirements n n Personal Data Processing of that

NOT PROTECTIVELY MARKED Data Protection Current Requirements n n Personal Data Processing of that data Data from which a person can be identified, e. g. name, date of birth, reference number, video image Applies to a living individual - the Act itself provides no protection after death but Force policy has an impact.

NOT PROTECTIVELY MARKED Data Protection Relevant Legislation Data Protection Act 1998 n Human Rights

NOT PROTECTIVELY MARKED Data Protection Relevant Legislation Data Protection Act 1998 n Human Rights Act 1998 n Computer Misuse Act 1990 n Copyright Designs & Patents Act 1988 n Freedom of Information (Scotland) Act 2002 n

NOT PROTECTIVELY MARKED Data - what’s that?

NOT PROTECTIVELY MARKED Data - what’s that?

NOT PROTECTIVELY MARKED Data Protection Act 1998 • Registrable Particulars – Policing The prevention

NOT PROTECTIVELY MARKED Data Protection Act 1998 • Registrable Particulars – Policing The prevention and detection of crime The apprehension and prosecution of offenders The protection of life and property The maintenance of law and order Rendering assistance to the public Vetting and Licencing Public Safety

NOT PROTECTIVELY MARKED Data Protection Act 1998 • The Act imposes strict conditions on

NOT PROTECTIVELY MARKED Data Protection Act 1998 • The Act imposes strict conditions on the PROCESSING of personal data “Processing means obtaining, recording or holding information or data or carrying out any operation or set of operations on the information or data” i. e. anything we do with the data

NOT PROTECTIVELY MARKED Data Protection Act 1998 • The Eight Data Protection principles •

NOT PROTECTIVELY MARKED Data Protection Act 1998 • The Eight Data Protection principles • • • Processed fairly and lawfully Only obtained for a specified purpose Data shall be relevant, adequate and not excessive Data shall be accurate and kept up to date Data shall not be kept longer than is necessary Data shall be processed in accordance with rights of data subjects • Appropriate measures shall be taken against unlawful or unauthorised processing and against loss, destruction or damage to data • Data shall not be transferred outside the EEA unless adequate protection exists for the rights and freedoms of individuals

NOT PROTECTIVELY MARKED Data Protection Act 1998 • Sensitive personal data Ø Ø Ø

NOT PROTECTIVELY MARKED Data Protection Act 1998 • Sensitive personal data Ø Ø Ø Ø Racial or ethnic origin Political opinions Religious beliefs or beliefs of a similar nature Membership of a Trade Union Details of physical or mental health Details of sexual life Commission or alleged commission of any offence Details of any proceedings for any offence committed or alleged to have been committed, the disposal of such proceedings or the sentence of the court in such proceedings

NOT PROTECTIVELY MARKED Disclosing Data To Others n n n In general can only

NOT PROTECTIVELY MARKED Disclosing Data To Others n n n In general can only be released for a purpose in line with Policing Ask the 3 important questions WHO wants the data? WHY do they want it? WHAT are they going to do with it? If you get it wrong there is a personal liability UNLIMITED FINE

NOT PROTECTIVELY MARKED Data Protection Individual Rights n n n Ä Any data subject

NOT PROTECTIVELY MARKED Data Protection Individual Rights n n n Ä Any data subject has the right of access to their personal data The data subject has the right to demand the correction or deletion of inaccurate data The data subject has the right to compensation if they have suffered damage or distress SUBJECT ACCESS - £ 10 fee

NOT PROTECTIVELY MARKED Data Protection DPO Responsibilities The Data Protection Department u u u

NOT PROTECTIVELY MARKED Data Protection DPO Responsibilities The Data Protection Department u u u Ensures all force systems are compliant Maintains Data Protection Notification Gives advice and assistance Liaises with other agencies Prepares information sharing protocols AUDITS EVERYONE!

NOT PROTECTIVELY MARKED Data Protection Responsibility of Users ¨ ¨ YOU MUST Have a

NOT PROTECTIVELY MARKED Data Protection Responsibility of Users ¨ ¨ YOU MUST Have a working knowledge of the Act Apply the principles as you work Take notebook entries Ensure the data you are processing is C Accurate CRelevant CUp to date CSECURE

NOT PROTECTIVELY MARKED Criminal Offences Under the Act • Knowingly or recklessly obtain, disclose

NOT PROTECTIVELY MARKED Criminal Offences Under the Act • Knowingly or recklessly obtain, disclose or procure the disclosure of personal data without the consent of the data controller • Sell or offer to sell personal data obtained in the above manner

NOT PROTECTIVELY MARKED Data Protection Questions

NOT PROTECTIVELY MARKED Data Protection Questions

NOT PROTECTIVELY MARKED Information Security Information security applies to all information, including personal data,

NOT PROTECTIVELY MARKED Information Security Information security applies to all information, including personal data, and in any format. I. T. - Force network, PCs, Laptops, PDAs, magnetic media, non-magnetic media. Paper - written & printed. Communications - radio & telephone. Conversation. Internet & e-mail.

NOT PROTECTIVELY MARKED Information Security Information is a vast resource, and a valuable asset.

NOT PROTECTIVELY MARKED Information Security Information is a vast resource, and a valuable asset. More importantly, it is the lifeblood of the Police Service. So why is information security needed? Information security is about protecting that valuable lifeblood from a wide range of threats.

NOT PROTECTIVELY MARKED Information Security Threats Deliberate - theft, denial of service, hacker. Accidental

NOT PROTECTIVELY MARKED Information Security Threats Deliberate - theft, denial of service, hacker. Accidental - coffee, power supply. Natural - fire, flood.

NOT PROTECTIVELY MARKED Information Security Sources Internal - employees. External - criminals, investigative journalists,

NOT PROTECTIVELY MARKED Information Security Sources Internal - employees. External - criminals, investigative journalists, members of the public. employees Most dangerous = employees

NOT PROTECTIVELY MARKED Information Security What do we get from information security? CIA Confidentiality

NOT PROTECTIVELY MARKED Information Security What do we get from information security? CIA Confidentiality The restriction of information and assets to authorised individuals Integrity The maintenance of information systems and physical assets in their complete and proper form Availability The continuous or timely access to information, systems or physical assets by authorised individuals

NOT PROTECTIVELY MARKED Information Security Personnel Physical Document Procedural CIA Radiation Computer Communications

NOT PROTECTIVELY MARKED Information Security Personnel Physical Document Procedural CIA Radiation Computer Communications

NOT PROTECTIVELY MARKED Information Security How do we go about protecting our sensitive assets?

NOT PROTECTIVELY MARKED Information Security How do we go about protecting our sensitive assets? GPMS Or to give it the full title, the Government Protective Marking Scheme which is designed to enhance the security and help protect the value of sensitive assets through the use of ‘protective markings’.

NOT PROTECTIVELY MARKED Information Security GPMS The six markings used are: NOT PROTECTIVELY MARKED

NOT PROTECTIVELY MARKED Information Security GPMS The six markings used are: NOT PROTECTIVELY MARKED PROTECT RESTRICTED CONFIDENTIAL SECRET TOP SECRET

NOT PROTECTIVELY MARKED Information Security GPMS Once applied these markings (and handling instructions) indicate

NOT PROTECTIVELY MARKED Information Security GPMS Once applied these markings (and handling instructions) indicate to others the value of an asset and the impact of compromise. Value and impact determine how it should be protected, and who should be given access to it. The fundamental principle of this system is to assure that protectively marked assets will be given adequate protection against accidental or deliberate compromise. Examples of impact are:

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked NOT

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked NOT PROTECTIVELY MARKED would be likely to: have no impact on the Force

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked PROTECT

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked PROTECT would be likely to have: no impact on life or safety but may cause inconvenience or discomfort to an individual no impact on crime fighting but may cause minor disruption to emergency service activities

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked RESTRICTED

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked RESTRICTED would be likely to: cause substantial distress to individuals prejudice the investigation or facilitate the commission of crime

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked CONFIDENTIAL

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked CONFIDENTIAL would be likely to: prejudice individual security or liberty impede the investigation or facilitate the commission of serious crime

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked SECRET

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked SECRET would be likely to: threaten life directly, or seriously prejudice public order, or individual security or liberty cause serious damage to the continuing effectiveness of highly valuable security or intelligence operations

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked TOP

NOT PROTECTIVELY MARKED Information Security GPMS Accidental or deliberate compromise of assets marked TOP SECRET would be likely to: lead directly to widespread loss of life cause exceptionally grave damage to the continuing effectiveness of extremely valuable security or intelligence operations

NOT PROTECTIVELY MARKED Information Security GPMS However, the most common markings you will probably

NOT PROTECTIVELY MARKED Information Security GPMS However, the most common markings you will probably see and use on a day-to-day basis are: NOT PROTECTIVELY MARKED PROTECT RESTRICTED CONFIDENTIAL

NOT PROTECTIVELY MARKED Information Security The Basics Warrant Cards/IDs. Destruction. Clear desk policy. Access

NOT PROTECTIVELY MARKED Information Security The Basics Warrant Cards/IDs. Destruction. Clear desk policy. Access control. Passwords/logging out. E-mail/Internet use. Desktop software. Viruses.

NOT PROTECTIVELY MARKED Information Security A Problem Shared Is A Problem Halved Reporting Procedure:

NOT PROTECTIVELY MARKED Information Security A Problem Shared Is A Problem Halved Reporting Procedure: E-mail. Telephone. In person. As Soon As Possible

NOT PROTECTIVELY MARKED Information Security More Information – see your copy of Police Scotland

NOT PROTECTIVELY MARKED Information Security More Information – see your copy of Police Scotland Information Security Standard Operating Procedure

NOT PROTECTIVELY MARKED Information Security Any questions? Information Governance Officer

NOT PROTECTIVELY MARKED Information Security Any questions? Information Governance Officer