Skip Ribbon Commands
Skip to main content
We use cookies to ensure you get the best experience on our website. For more information, read our Terms and Conditions.
Close
Help in a crisis
Data protection and ICT security policies

For all requests and enquiries regarding these standards and policies, please contact the Patient Advisory and Liaison Service (PALS)​. 

  • Policy ISMS S9 P2 Annex A ICT Forensic Readiness Plans
  • Policy ISMS S9 P2 ICT Forensic Readiness
  • IG0-1 Overarching Information Security Framework NSFT
  • IG0-1 Annex A List of ISMS Policies
  • IG1-1 Patient Internet Access Policy NSFT
  • IG1-1 Annex A PALS Computers - Risk Assessment Form
  • IG1-2 Starters Movers and Leavers Policy NSFT
  • IG2-2 Annex A Summary of Administrative Rights
  • IG2-2 Use of Network Access Accounts Policy NSFT
  • IG2-4 The Use and Management of the Internet Policy NSFT
  • IG2-5 Annex A Decision Tree
  • IG2-5 Removable Media Policy NSFT
  • IG2-6 Annex A Data Storage Options
  • IG2-6 Storing Information Electronically Policy NSFT
  • IG2-8 The Use of Social Media Policy NSFT
  • IG3-1 Use and Management of Personal Digital Assistants Policy NSFT
  • IG3-2 Use and Management of Laptop Computers Policy NSFT 2013
  • IG3-3 Annex A Remote Access Support
  • IG3-3 Remote Access Service Policy NSFT
  • IG4-1 Use and Management of Mobile Phones Policy NSFT
  • IG4-1 Annex A Private Mobile Phone Use Form IG4-1
  • IG5-3 Annex A - Systems that need an IAO
  • IG5-3 Annex B - IAO IAA Guide to Risk Management
  • IG5-3 Information Risk Management Policy NSFT
  • IG5-4 Secure Destruction of Confidential Information and ICT Assets Policy NSFT
  • IG5-5 Annex A Screening Questions Full PIA
  • IG5-5 Annex B Screening Questions Small PIA
  • IG5-5 Privacy Impact Assessment Policy NSFT
  • IG5-3 Annex C Business Case for New ICT Application Template
  • IG5-3 Annex D - Example letter appointing IAO
  • IG6-3 Third Party Access to the Trust Network Policy NSFT
  • IG6-3 Annex A - Third Party ICT Access Agreement
  • IG6-3 Annex B Third Party ICT Access List
  • IG6-3 Annex C - Process for authorising Third Party ICT Access
  • IG6-1 Network Structure, Configuration and Security Policy NSFT
  • IG6-1 Annex A Network Configuration
  • IG6-1 Annex B Physical and Environmental Security
  • IG6-1 Annex C Malicious Software and Security Patching
  • IG6-1 Annex D Data Backup Schedule
  • IG2-3 Standard Use of Email Policy NSFT
  • IG7-1 Annex A Verifying Identity for CfH National Applications
  • IG7-1 Annex B RA01 Short Form Conditions
  • IG7-1 Annex C RBAC Mapped Roles
  • IG7-1 RA and RBAC v01 Policy NSFT
  • IG0-3 Information Governance Policy NSFT
  • IG0-2 IG Framework NSFT
  • IG9-1 Investigating and Reporting NSFT
  • WinZipUserGuide
  • Email Encryption