POLICY STATEMENT
The General Data Protection Regulation (GDPR) aims to protect the rights of
individuals personal data when it is obtained, stored, processed or supplied and
requires that organisations take appropriate security measures against unauthorised
access, alteration, disclosure or destruction of personal data.
Construction Youth Trust (hereby referred to as ‘the Trust’) is dedicated to ensuring
the protection of all information assets within the keeping of the Trust.
High standards of confidentiality, integrity and availability of information will be
maintained at all times.
The Trust will demonstrate support for, and commitment to, information and cyber
security through the issue and maintenance of an information security policy
including the supporting guidance documents which are listed below.
This Policy sets out the measures taken by the Trust to achieve this, including to:
6.PHYSICAL SECURITY AND PROCEDURES
6.1 Paper records and documents containing personal information, sensitive
personal information, and confidential information shall be positioned in a way to
avoid them being viewed by people passing by as much as possible, e.g. through
windows. At the end of the working day, or when you leave your desk unoccupied, all
paper documents shall be securely locked away, or destroyed as appropriate, to
avoid unauthorised access.
6.2 Available locked filing cabinets and locked cupboards shall be used to store
paper records when not in use.
6.3 Paper documents containing confidential personal information should not be
left on office desks, on staffroom tables, or pinned to noticeboards where there is
general access unless there is legal reason to do so and/or relevant consents have
been obtained.
6.4 The physical security of buildings and storage systems shall be reviewed on a
regular basis. If you find the security to be insufficient, you must inform the Finance
& Central Resources Manager as soon as possible. Increased risks of vandalism
and or burglary shall be taken into account when assessing the level of security
required.
7. ROLES AND RESPONSIBILITIES
7.1 It is the responsibility of each member of staff to adhere to this policy,
standards and procedures. It is the Trust’s responsibility to ensure the security of
their information, ICT assets and data. All members of the Trust have a role to play
in information security.
7.2 The Data & IT Manager in conjunction with the IT Provider shall be
responsible for the following:
8. All Staff
8.1 All members of staff must comply with all relevant parts of this policy at all
times when using the IT Systems.
8.2 Computers and other electronic devices should be locked when not in use to
minimise the accidental loss or disclosure.
8.3 Staff must immediately inform the Data & IT Manager of any and all security
concerns relating to the IT Systems which could or has led to a data breach as set
out in the Security Incident and Data Breach Notification Policy.
8.4 Any other technical problems (including, but not limited to, hardware failures
and software errors) which may occur on the IT Systems shall be reported to the
Data & IT Manager immediately.
8.5 You are not entitled to install any software of your own without the approval of
the Data & IT Manager. Any software belonging to you must be approved by the
Data & IT Manager and may only be installed where that installation poses no
security risk to the IT Systems and where the installation would not breach any
licence agreements to which that software may be subject. Prior to installation of any
software onto the IT Systems, you must obtain written permission by the Data & IT
Manager. This permission must clearly state which software you may install, and
onto which computer(s) or device(s) it may be installed.
8.6 Physical media (e.g. USB memory sticks or disks of any kind) may not be
used for transferring files unless permission and device obtained from the Data & IT
team. All devices must be returned to Data & IT team immediately after use to be
wiped.
8.7 The Data & IT Managers approval must be obtained prior to transferring of
files using a new cloud storage system.
8.8 If you detect any virus this must be reported immediately to the Data & IT
Manager (this rule shall apply even where the anti-virus software automatically fixes
the problem).
8.9 Work emails and accounts must only be accessed on or via work devices and
not accessed or added to any personal accounts or devices
8.10 Work devices should not be used for personal use and should not have any
software or applications installed for non-work purposes
9. ACCESS SECURITY
9.1 All members of staff are responsible for the security of the equipment
allocated to or used by them and must not allow it to be used by anyone other than
in accordance with this policy.
9.2 The Trust has a secure firewall and anti-virus software in place. These
prevent individuals from unauthorised access and to protect the Trust’s network.
9.3 All IT Systems (in particular mobile devices) shall be protected with a secure
password or passcode, or such other form of secure log-in system as approved by
the IT Department.
9.4 All passwords must follow the Trust’s password creation guidance (see
Appendix 1)
9.5 Employees are required to store any passwords in KeePass, an encrypted
password database. All KeePass details are linked to an employee’s email and once
an employee has left the trust, the database will be deactivated.
9.6 Passwords must be kept confidential and must not be made available to
anyone else unless authorised by the Data & IT. Any member of staff who discloses
his or her credentials to another employee in the absence of express authorisation
will be liable to disciplinary action under the Disciplinary Policy and Procedure.
9.7 Any member of staff who logs on to a computer using another member of
staff’s password will be liable to disciplinary action up to and including summary
dismissal for gross misconduct.
9.8 If you forget your password, you should notify the Data & IT Manager to have
your access to the IT Systems restored. You must set up a new password
immediately upon the restoration of access to the IT Systems.
9.9 Passwords should never be left on display for others to see. Computers and
other electronical devices with displays and user input devices (e.g. mouse,
keyboard, touchscreen etc.) shall be protected with a screen lock that will activate
after a period of inactivity.
9.10 All mobile devices provided by the Trust, shall be set to lock, sleep, or similar,
after a period of inactivity, requiring a password, passcode, or other form of log-in to
unlock, wake or similar.
9.11 Staff should be aware that if they fail to log off and leave their terminals
unattended, they may be held responsible for another user’s activities on their
terminal in breach of this policy, the Data Protection Policy and/or the requirement
for confidentiality in respect of certain information.
9.12 All social media accounts will be password protected, and at least 2 members
of staff will have access to each account and password including the Marketing and
Communications Manager and Marketing and Communications Coordinator.
Passwords for each account will be unique and secure (at least 8 characters in
length containing numbers & symbols) and changed every 6 months.
10. DATA SECURITY
10.1 Personal data sent over the network will be encrypted or otherwise secured.
All members of staff are prohibited from downloading, installing or running software
from external sources without obtaining prior authorisation from the Data & IT
Manager who will consider bona fide requests for work purposes. Please note that
this includes instant messaging programs, screen savers, photos, video clips,
games, music files and opening any documents or communications from unknown
origins. Where consent is given all files and data should always be virus checked
before they are downloaded onto the Trust’s systems.
10.2 You may connect your own devices (including, but not limited to, laptops,
tablets, and smartphones) to the Trust’s Wi-Fi, provided that you follow the
requirements and instructions governing this use. All usage of your own device(s)
whilst connected to the network or any other part of the IT Systems is subject to all
relevant Policies (including, but not limited to, this policy). The Data & IT Manager
may at any time request the immediate disconnection of any such devices without
notice.
11.ELECTRONIC STORAGE OF DATA
11.1 All portable data, and in particular personal data, should be stored on
encrypted drives.
11.2 No data to be stored electronically on physical media e.g. USB sticks.
11.3 You should not store any business data on any personal device.
12.The handling, secure storage and retention of disclosure information
12.1 Reference from Gov.uk
https://www.gov.uk/government/publications/handling-of-dbs-certificateinformation/handling-of-dbs-certificate-information
As an organisation using the Disclosure and Barring Service (DBS) checking service
to help assess the suitability of applicants for positions of trust, Construction Youth
Trust complies fully with the code of practice regarding the correct handling, use,
storage, retention and disposal of certificates and certificate information.
12.2 The Trust also complies fully with its obligations under the UK General Data
Protection Regulation (UK GDPR), Data Protection Act 2018 and other relevant
legislation pertaining to the safe handling, use, storage, retention and disposal of
certificate information and has a written policy on these matters, which is available to
those who wish to see it on request.
12.3 Storage and access
The Trust keeps certificate information stored securely in digital format with access
strictly controlled and limited to those who are entitled to see it as part of their duties.
Individuals retain the physical copy of their certificate.
12.4 Handling
In accordance with section 124 of the Police Act 1997, certificate information is only
passed to those who are authorised to receive it in the course of their duties. We
maintain a record of all those to whom certificates or certificate information has been
revealed and it is a criminal offence to pass this information to anyone who is not
entitled to receive it.
In addition, organisations that require retention of certificates in order to demonstrate
‘safer recruitment’ practice for the purpose of safeguarding audits may be legally
entitled to retain the certificate. This practice will need to be compliant with the Data
Protection Act, Human Rights Act, General Data Protection Regulation (GDPR), and
incorporated within the individual organisation’s policy on the correct handling and
safekeeping of DBS certificate information.
12.5 Usage
Certificate information is only used for the specific purpose for which it was
requested and for which the applicant’s full consent has been given.
Under no circumstances will the contents of a disclosure certificate be divulged to a
person who is not authorised to have access to this information without the prior
permission of the DBS applicant themselves.
13.COMMUNICATIONS, TRANSFER, INTERNET AND EMAIL USE
13.1 When using the IT Systems, you are subject to and must comply with the
Acceptable User Policy.
13.2 Regular checks are made to ensure that filtering methods are appropriate,
effective and reasonable and that users access only appropriate material as far as
possible. This is not always possible to guarantee, and we cannot accept liability for
the material accessed or its consequence.
13.3 All personal information, and in particular sensitive personal information and
confidential information should be encrypted before being sent by email.
13.4 Postal and email addresses and numbers should be checked and verified
before you send information to them. In particular you should take extra care with
email addresses where auto-complete features may have inserted incorrect
addresses.
13.5 You should be careful about maintaining confidentiality when speaking in
public places.
13.6 You should make sure to circulate confidential information only to those who
need to know the information in the course of their work.
13.7 Personal or confidential information should not be removed from the Trust
except where the removal is temporary and necessary. When such permission is
given you must take all reasonable steps to ensure that the integrity of the
information and the confidentiality are maintained.
13.8 You must ensure that the information is: