This policy provides a framework for the management of information security throughout Assess Candidates. It applies to:
2.1 Assess Candidates recognises the role of information security in ensuring that users have access to the information they require in order to carry out their work. Computer and information systems underpin all Assess Candidates activities.
2.2 Any reduction in the confidentiality, integrity or availability of information could prevent Assess Candidates from functioning effectively and efficiently. In addition, the loss or unauthorised disclosure of information has the potential to damage Assess Candidates reputation and cause financial loss.
2.3 To mitigate these risks, information security must be an integral part of information management, whether the information is held in electronic or hard-copy form.
2.4 Assess Candidates is committed to protecting the security of its information and information systems in order to ensure that:
2.5 In order to meet these aims, Assess Candidates is committed to implementing security controls that conform to best practice, as set out in the ISO/IEC 27002:2005 Information Security Techniques – Code of practice for information security management.
2.6 Information security risk assessments should be performed for all information systems on a regular basis in order to identify key information risks and determine the controls required to keep those risks within acceptable limits.
2.7 Assess Candidates is committed to providing sufficient education and training to users to ensure they understand the importance of information security and, in particular, exercise appropriate care when handling confidential information.
2.8 Specialist advice on information security shall be made available throughout the business.
2.9 An information security personnel shall advise on best practice and coordinate the implementation of information security controls.
2.10 Assess Candidates will establish and maintain appropriate contacts with other organisations, law enforcement authorities, regulatory bodies, and network and telecommunications operators in respect of its information security policy.
2.11 Breaches of information security must be recorded and reported to appropriate bodies, who will take action and inform the relevant authorities (please refer to sections 6.13 and 9 for further information).
2.12 This Policy and all other supporting policy documents shall be communicated as necessary throughout Assess Candidates to meet its objectives and requirements.
3.1 Users of Assess Candidates information will be made aware of their own individual responsibilities for complying with Assess Candidates and departmental policies on information security.
3.2 Agreements with third parties involving accessing, processing, communicating or managing any Assess Candidates information, or information systems, should cover all relevant security requirements, and be covered in contractual arrangements.
Risk assessment of information held
4.1 The degree of security control required depends on the sensitivity or criticality of the information. The first step in determining the appropriate level of security therefore is a process of risk assessment, in order to identify and classify the nature of the information held, the adverse consequences of security breaches and the likelihood of those consequences occurring.
4.2 The risk assessment should identify information assets; define the ownership of those assets; and classify them, according to their sensitivity and/or criticality across Assess Candidates as a whole. In assessing risk, Assess Candidates should consider the value of the asset, the threats to that asset and its vulnerability.
4.3 Where appropriate, information assets should be labelled and handled in accordance with their criticality and sensitivity.
4.4 Rules for the acceptable use of information assets should be identified, documented and implemented.
4.5 Information security risk assessments should be repeated periodically and carried out as required during the operational delivery and maintenance of the Assess Candidates infrastructure, systems and processes.
4.6 Personal data must be handled in accordance with the Data Protection Act 2018 (DPA).
4.7 The DPA requires that appropriate technical and organisational measures are taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
5.1. Confidential information should be handled in accordance with the requirements set out in section 6 below.
Identifying confidential information is a matter for assessment in each individual case. Broadly, however, information will be confidential if it is of limited public availability; is confidential in its very nature; has been provided on the understanding that it is confidential; and/or its loss or unauthorised disclosure could have one or more of the following consequences:
• Financial loss – e.g. the withdrawal of a research grant or donation, a fine by the ICO, a legal claim for breach of confidence;
• Reputational damage – e.g. adverse publicity, demonstrations, complaints about breaches of privacy; and/or
• an adverse effect on the safety or well-being of members of Assess Candidates or those associated with it – e.g. increased threats to staff engaged in sensitive research, embarrassment or damage to benefactors, suppliers and staff.
6.1.1 Confidential information should be kept secure, using, where practicable, dedicated storage (e.g. file servers) rather than local hard disks, and an appropriate level of physical security.
6.1.2 File or disk encryption should be considered as an additional layer of defence, where physical security is considered insufficient.
6.2.1 Confidential information must be stored in such a way as to ensure that only authorised persons can access it.
6.2.2 All users must be authenticated. Users must follow good security practices in the selection and use of passwords.
6.2.3 Where necessary, additional forms of authentication should be considered.
6.2.4 To allow for potential investigations, access records should be kept for a minimum of six months, or for longer, where considered appropriate.
6.2.5 Users with access to confidential information should be security vetted, as appropriate, in accordance with existing policies.
6.2.6 Physical access should be monitored, and access records maintained.
6.3.1 Where remote access is required, this must be controlled via a well-defined access control policy and tight access controls provided to allow the minimum access necessary.
6.3.2 Any remote access must be controlled by secure access control protocols using appropriate levels of encryption and authentication.
6.4.2 The number of copies made of confidential information, whether on portable devices or media or in hard copy, should be the minimum required, and, where necessary, a record kept of their distribution. When no longer needed, the copy should be deleted or, in the case of hard copies, destroyed (see 6.12.5).
6.4.3 All copies should be physically secured e.g. stored in a locked cupboard drawer or filing cabinet.
Policies and procedures must be in place for the secure disposal/destruction of confidential information.
6.6.1 Procedures should be in place for the management of removable media in order to ensure that they are appropriately protected from unauthorised access.
6.6.2 The permission of the information owner should be sought before confidential information is taken off site. The owner must be satisfied that the removal is necessary and that appropriate safeguards are in place e.g. encryption. For further information, please see the Information Security website.
6.6.3 In the case of personal data, the ICO recommends that all portable devices and media should be encrypted where the loss of the data could cause damage or distress to individuals.
6.6.4 The passphrase of an encrypted device must not be stored with the device (see also section 6.8.2).
6.7.1 Controls should be implemented to ensure that electronic messaging is suitably protected.
6.7.2 Email should be appropriately protected from unauthorised use and access.
6.7.3 Email should only be used to send confidential information where the recipient is trusted, the information owner has given their permission, and appropriate safeguards have been taken e.g. encryption.
6.8.1 Procedures should be in place to support the use of cryptographic techniques and to ensure that only authorised personnel may gain access to confidential information.
A risk assessment should be carried out as part of the business case for any new ICT system that may be used to store confidential information. The risk assessment should be repeated periodically on any existing systems.
Information owners should ensure that appropriate backup and system recovery procedures are in place. Backup copies of all important information assets should be taken and tested regularly in accordance with such an appropriate backup policy.
The Information Security website provides further guidance on the matters covered in 6.1 to 6.10 above.
6.12.1 Documents containing confidential information should be marked as ‘Confidential’ or with another appropriate designation e.g. ‘sensitive’, etc, depending on the classification system adopted by the department.
Storage
6.12.2 Wherever practicable, documents with confidential information should be stored in locked cupboards, drawers or cabinets. Where this is not practicable, and the information is kept on open shelving, the room should be locked when unoccupied for any significant length of time.
Removal
6.12.4 Confidential information should not be removed from Assess Candidates unless it can be returned on the same day or stored securely overnight, as described in section 6.12.2 above.
Transmission
6.12.5 If confidential documents are sent by fax, the sender should ensure they use the correct number and that the recipient is near to the machine at the other end ready to collect the information immediately it is printed.
6.12.6 If confidential documents are sent by external post, they should ideally be sent by a form of recorded delivery. The sender must ensure that the envelope is properly secured.
6.12.7 If confidential documents are sent by internal post the documents should be placed in an envelope marked ‘Confidential’ with the addressee’s name clearly written on it.
Disposal
6.12.8 Confidential documents must be shredded in a confidential manner prior to disposal.
6.13.1 There must be a written policy in place at the local level for the handling of confidential information, whether electronic or hard copy, and a copy of the procedures must be provided to every user so that they are aware of their responsibilities.
6.13.2 Any failure to comply with the policy may result in disciplinary action.
6.13.3 Any loss or unauthorised disclosure must be promptly reported to the owner of the information.
6.13.4 Computer security incidents involving the loss or unauthorised disclosure of confidential information held in electronic form must be reported to Assess Candidates Security officer – and investigated.
6.13.5 If the loss or unauthorised disclosure involves personal data, whether electronic or hard copy, Assess Candidates Data Protection Officer must also be informed by e-mail (info@assesscandidates.com).
7.1 Assess Candidates has established this policy to promote information security and compliance with relevant legislation, including the DPA. Assess Candidates regards any breach of information security requirements as a serious matter, which may result in disciplinary action.
7.2 Compliance with this policy should form part of any contract with a third party that may involve access to network or computer systems or data.
7.3 Relevant legislation includes, but is not limited to:
Ready to start hiring? Write to us, or try for free and assess candidates in minutes.