You are on page 1of 11

Data Security Policy 1.

Document Status
Security Classification Version Status Approval Life Review Owner Change History 3 Years By June 2011 Secure Research Database Analyst Level 4 - PUBLIC 1.0 DRAFT

1 Version 1.3

Contents
Data Security Policy .............................................................................................................................. 1 1. 2. 3. 4. 5. 6. 7. 8. 9. Document Status .......................................................................................................................... 1 Overview ...................................................................................................................................... 3 System .......................................................................................................................................... 3 Scope ............................................................................................................................................ 3 Classification Guidance ................................................................................................................. 3 Encryption Guidance .................................................................................................................... 6 Electronic Data Retention and Deletion Guidance ........................................................................ 7 Data Security and Third Party Service Delivery ............................................................................. 8 Disposal of Media ......................................................................................................................... 8

Appendix A: Cabinet Office minimum scope of protected personal data ........................................... 10 Appendix B: Risks, ISO27001 controls and remedial actions related to this policy ............................. 11 1. 2. 3. Risks ........................................................................................................................................... 11 ISO 27001 Controls ..................................................................................................................... 11 Remedial Actions ........................................................................................................................ 11

2 Version 1.3

2. Overview
All data that the institute holds should be classified according to their sensitivity. Data should be stored, accessed and processed according to their classification. The classification of data is an important component to knowing how to use these data within the guidelines laid down by many of the Institutes data providers and project funders. Correctly classifying data and then using them only according to the appropriate stipulations is an important part of preventing data leaks, and minimising the impact of such leaks when they do occur. Inappropriate disclosure of Confidential or Restricted data, their accidental loss or deliberate theft, could all lead to the Institute being levied with a potentially unlimited fine, as well as experiencing a loss of reputation and a possible failure to win other research contracts.

3. System
All IOE systems

4. Scope
All IOE data

5. Classification Guidance
I. Classification levels The UK Cabinet Office uses 4 levels of data classification: Top Secret, Secret, Confidential and Restricted. As Top Secret and Secret concern information that would potential destabilise the UK or its allies, we are not concerned with them here. This leaves us with two data classifications, plus protected, (used to take us in line with Bectas recommendations) and a category for all data we do not need to protect. 1. 2. 3. 4. II. Confidential Restricted Protected Public

How you should decide which category your data falls into: 1. Confidential a. Highly personal data that will explicitly identify individuals

3 Version 1.3

b.

c.

These data may, if disclosed, put the individual at risk from identity theft, social or legal sanctions, targeting by marketing corporations or pressure groups, exposure to the national press, threats from criminal or vigilante individuals or organisations Data elements would include, but are not restricted to: Name, address, ethnicity, qualifications, criminal records, schools attended, place of work, income, religion, bank details, social habits

2.

Restricted a. This would include business-sensitive data such as company accounts, information on commercial contracts, and intellectual property b. Any data that, if accidentally or deliberately leaked, could be commercially damaging or otherwise affect the reputation of the Institute c. It includes data that could be combined with publically accessible data in order to identify individuals for example names with postcodes along with criminal offences. d. Any database containing details (of any sort) of more than 1000 individ uals, other than information sourced from the public domain e. Incomplete reports and other documents whose integrity may be damaged by uncontrolled/unauthorised changes, or whose leakage may cause damage to the project, the project funders or the Institute

3.

Protected a. General Institute data: original copies of public-domain reports, timesheets, internal memoranda, expenses, correspondence, instructions b. Any data that, if accidentally leaked, could cause embarrassment to an individual or the Institute Public Public data will have no significant impact on the project if they are altered or viewed in an uncontrolled fashion. No names and addresses combined with any other identifying information. Data that is already in the public domain (e.g. information that is collated into literature reviews)

4.

III.

How should data in each category be stored? 1. Confidential a. On a file server that does not have Portal access to the outside world. b. Using strict access controls: NTFS file permissions, Windows Share permissions, c. Access should only be granted to explicitly authenticated users. These access requests should be made in writing by the project director. By default, access will be blocked. d. Logically separated from other data e. Machines granted access to the files should have access to usb mass storage devices blocked, and no DVD/CD writers. 4 Version 1.3

f. g.

Users should sign a non-disclosure form before being able to access the information Upon request of the data owner, placed on a dedicated isolated system that also uses controls 1.a 1.f.

2.

Restricted a. On the Q drive b. In its own logically separate folder, with access controlled by NTFS file permissions and user groups c. Access should only be granted to explicitly authenticated users. These access requests should be made in writing by the project directors. By default, access will be blocked. d. Machines granted access to the files should have access to usb mass storage devices blocked, and no DVD/CD writers e. Accessed externally on an Institute-owned, encrypted laptop that is not used for any other purpose, that has access to usb mass storage devices blocked and access to DVD writer blocked. A non-disclosure agreement must be signed before the laptop can be taken out. Controlled by NTFS and Windows share permissions. Protected a. On the Q drive b. Access given to implicitly authenticated users c. Machines granted access to the files should have access to usb mass storage devices blocked, and no DVD/CD writers d. Accessed externally on an Institute-owned, encrypted laptop that is not used for any other purpose, that has access to usb mass storage devices blocked and access to DVD writer blocked. Controlled by NTFS and Windows share permissions. Public a. There are no conditions placed on the storage or transmission of public data b. Public data can be created or manipulated on any machine, not just IOE machines.

3.

4.

IV.

How can data in each category be used? 1. Confidential a. Must never leave the boundaries of the logical container it is stored in. b. Must ideally be accessed by rdp session, or via a network drive if the PC connecting to it is placed in a secure environment and has usb mass storage device drivers and CD/DVD drives disabled. The rdp terminal services on the host machine must have copy and paste and printer redirect functionality disabled. c. Must not be emailed, accessed remotely or placed on a usb mass storage device. d. If the data have to be moved, they must be either encrypted to FIPS 140-2 AES 256bit standard, or placed on a device that is encrypted to the same standard. If sent through the post, they must be sent recorded delivery. Ideally they should be transferred through the HTTPS SSL Portal, another organizations portal, or an sftp

5 Version 1.3

box, with careful co-ordination at both ends to guarantee transmission and reception. 2. Restricted a. Must only leave the boundaries of the logical container if they are moved and processed under very strict conditions (given below) and after a non-disclosure agreement has been signed by the end user b. Must be encrypted to 256-bit AES standard whilst in transit c. Must not be emailed d. Must never be placed on a machine that is not owned and administered by the IOE, or that is used for any purpose other than IOE-related work e. If sent through the post, they must be sent recorded delivery. Ideally they should be transferred through the HTTPS SSL Portal, another organizations portal, or an sftp box, with careful co-ordination at both ends to guarantee transmission and reception. Protected a. Must only leave the boundaries of the Institute under the control of a user who has received data protection training and signed a non-disclosure agreement b. Must never be placed on a machine that is not owned and administered by the IOE, or that is used for any purpose other than IOE-related work c. Must not be emailed d. Must be transferred through the HTTPS SSL Portal, another organizations portal, or an sftp box Public a. Public data may be used and accessed from anywhere, within the normal boundaries of acceptable use, security and malware considerations.

3.

4.

6. Encryption Guidance
1. Confidential a. If possible, the data should be encrypted at rest. This could take the form of full disk encryption, or database-level encryption. As both of these are either hardware or software specific, it is not always a currently available service. Newly purchased hardware and software will be able to meet these specifications b. The backups of these data must be encrypted to AES-256-bit standard c. The data must be encrypted to AES 256-bit standard before it is moved or removed from its place at rest d. If a case can be made using a formal risk assessment that the data must be accessed from outside the Institute, the access method must meet the following stipulations: i. be made via Remote Desktop across an https SSL connection, where the data is not transferred from the host system within the Institutes boundaries

6 Version 1.3

ii. The connecting device must have an encrypted hard drive and be accessible only via a complex username and password, and must be an IOE owned and maintained device that is not used for any other purpose iii. The remote desktop environment of the host system must be tightly controlled to prevent the access of other data, prevent the transfer or printing of data from the system, and prevent the remote desktop environment being used for anything else. 2. Restricted a. The data must be encrypted to AES 256-bit standard when in transit b. If accessed outside the Institute, the data must be accessed by and processed on an Institute laptop with a hard drive encrypted to 256-bit AES standard Protected a. If accessed outside the Institute, the data must be accessed by and processed on an Institute laptop with a hard drive encrypted to 256-bit AES standard Public a. Public data do not need to be encrypted or accessed using an encrypted device.

3.

4.

7. Electronic Data Retention and Deletion Guidance


All electronic data should be retained for the legally or contractually required minimum and maximum periods of time. This will vary depending on the type of data under consideration. Departments within the Institute may have stipulations on data retention over and above the legal minimums. Please refer to your departmental Data Retention Policy for guidance o n how data in your particular jurisdiction should be retained. Data must not be retained beyond its legal or contractual lifetime , or where to do so would otherwise break the terms of the legal contract, or break the Data Protection Act 1998, the Copyright, Designs and Patents Act 1988 or the Digital Economy Act 2010. The date at which specific data should be removed from IOE systems should be clearly marked on the data themselves. Methods of deletion of data from IOE systems at their legal or contractual point of removal must be concomitant with the datas classification: 1. Confidential a. The data and data container must be wiped using a file shredder, conforming to US DoD 7 passes standard 2. Restricted a. The data and data container must be wiped using a file shredder, conforming to US DoD 7 passes standard 7 Version 1.3

3.

Protected a. The data can be deleted using any standard deletion technique Public a. The data can be deleted using any standard deletion technique

4.

Please consult the helpdesk if you need to use a file shredder in order to delete data.

8. Data Security and Third Party Service Delivery


1. All third party service delivery must adhere to the Data Security Policy and handle IOE owned data and data held by the IOE on behalf of another organisation in accordance with its data classification Any necessary breach of the Data Classification rules must be agreed in writing by both parties, and must be risk assessed The third party should provide regular reports and records of its activitie s, including access to and use of IOE-held data The designated IOE data owner is responsible for monitoring and reviewing these reports, and initiating audits as required Changes to third party service provision will be in addition to any contractual stipulations be subject to the process of change control as outlined in the Change Control Policy

2.

3.

4.

5.

9. Disposal of Media
1. 2. 3. All media should be disposed of at the end of the life of the team or project Media should also be disposed of when no longer required All Hard Drives will be degaussed or otherwise wiped to DoD 7 passes standard during decommissioning and before disposal All tape media will be degaussed during decommissioning and before disposal All other media (usb mass storage devices, CD/DVD RW) will be wiped to DoD 7 passes during decommissioning and before disposal Non-erasable media will be destroyed during decommissioning and before disposal 8 Version 1.3

4. 5.

6.

7.

As an aggregation of non-confidential data may become confidential, all collections of media awaiting disposal must be treated as potentially confidential. Therefore, prior to erasure and/or destruction, media awaiting disposal must be stored securely. The disposal of confidential data should be logged by the data owner

8.

9 Version 1.3

Appendix A: Cabinet Office minimum scope of protected personal data


From http://www.cabinetoffice.gov.uk/media/cabinetoffice/csia/assets/dhr/cross_go v080625.pdf

Minimum scope of protected personal data


Departments must identify data they or their delivery partners hold whose release or loss could cause harm or distress to individuals. This must include as a minimum all data falling into one or both categories below. A. Any information that links one or more identifiable living person with information about them whose release would put them at significant risk of harm or distress. 1. one or more of the pieces of information which can be used along with public domain information to identify an individual combined with 2. information about that individual whose release is likely to cause harm or distress

Name / addresses (home or business or both) / postcode / email / telephone numbers / driving licence number / date of birth [Note that driving licence number is included in this list because it directly yields date of birth and first part of surname]

Sensitive personal data as defined by s2 of the Data protection Act, including records relating to the criminal justice system, and group membership DNA or finger prints / bank, financial or credit card details / mothers maiden name / National Insurance number / Tax, benefit or pension records / health records / employment record / school attendance or records / material relating to social services including child protection and housing

These are not exhaustive lists. Departments should determine whether other information they hold should be included in either category. B. Any source of information about 1000 or more identifiable individuals, other than information sourced from the public domain. This could be a database with 1000 or more entries containing facts mentioned in box 1, or an electronic folder or drive containing 1000 or more records about individuals. Again, this is a minimum standard. Information on smaller numbers of individuals may warrant protection because of the nature of the individuals, nature or source of the information, or extent of information.

10 Version 1.3

Appendix B: Risks, ISO27001 controls and remedial actions related to this policy 1. Risks
1. 2. 3. 4. 5. 6. Undocumented and unaudited access to Confidential or Restricted data Leaking of Confidential or Restricted data Financial or reputational damage to IOE due to uncontrolled data release Financial or reputational damage to project due to uncontrolled data release Lack of correct access to confidential or restricted data Confidential or Restricted data held in inappropriate locations or on inappropriate devices

2. ISO 27001 Controls


A.7.1.1 Inventory of Assets A.7.1.2 Ownership of Assets A.7.1.3 Acceptable Use of Assets A.7.2.1 Classification Guidelines A.10.2.1 Service Delivery A.10.2.2 Monitoring and Review of Third Party Services A.10.2.3 Managing Changes to Third Party Services A.10.7.2 Disposal of Media A.10.7.3 Information Handling Procedures A.11.6.2 Sensitive System Isolation A.12.3.1 Policy on the use of cryptographic controls A.12.5.4 Information Leakage

3. Remedial Actions
1. 2. 3. 4. 5. 6. 7. Classification of data to be undertaken by all research projects Data to be handled in accordance with the guidelines provided below Server and end user equipment provided to make compliance possible Encryption guidelines laid out for all classes of data Retention and classification of data laid out for all classes of data Isolated systems to be set up if requested for Confidential data Media will be disposed of safely and security

11 Version 1.3