Skip Ribbon Commands
Skip to main content
We use cookies to ensure you get the best experience on our website. For more information, read our Terms and Conditions.
Help in a crisis
Data protection and ICT security policies

For all requests and enquiries regarding these standards and policies, please contact the Patient Advisory and Liaison Service (PALS)​. 

  • Policy ISMS S9 P2 Annex A ICT Forensic Readiness Plans
  • Policy ISMS S9 P2 ICT Forensic Readiness
  • IG0-1 Overarching Information Security Framework NSFT
  • IG0-1 Annex A List of ISMS Policies
  • IG1-1 Patient Internet Access Policy NSFT
  • IG1-1 Annex A PALS Computers - Risk Assessment Form
  • IG1-2 Starters Movers and Leavers Policy NSFT
  • IG2-2 Annex A Summary of Administrative Rights
  • IG2-2 Use of Network Access Accounts Policy NSFT
  • IG2-4 The Use and Management of the Internet Policy NSFT
  • IG2-5 Annex A Decision Tree
  • IG2-5 Removable Media Policy NSFT
  • IG2-6 Annex A Data Storage Options
  • IG2-6 Storing Information Electronically Policy NSFT
  • IG2-8 The Use of Social Media Policy NSFT
  • IG3-1 Use and Management of Personal Digital Assistants Policy NSFT
  • IG3-2 Use and Management of Laptop Computers Policy NSFT 2013
  • IG3-3 Annex A Remote Access Support
  • IG3-3 Remote Access Service Policy NSFT
  • IG4-1 Use and Management of Mobile Phones Policy NSFT
  • IG4-1 Annex A Private Mobile Phone Use Form IG4-1
  • IG5-3 Annex A - Systems that need an IAO
  • IG5-3 Annex B - IAO IAA Guide to Risk Management
  • IG5-3 Information Risk Management Policy NSFT
  • IG5-4 Secure Destruction of Confidential Information and ICT Assets Policy NSFT
  • IG5-5 Annex A Screening Questions Full PIA
  • IG5-5 Annex B Screening Questions Small PIA
  • IG5-5 Privacy Impact Assessment Policy NSFT
  • IG5-3 Annex C Business Case for New ICT Application Template
  • IG5-3 Annex D - Example letter appointing IAO
  • IG6-3 Third Party Access to the Trust Network Policy NSFT
  • IG6-3 Annex A - Third Party ICT Access Agreement
  • IG6-3 Annex B Third Party ICT Access List
  • IG6-3 Annex C - Process for authorising Third Party ICT Access
  • IG6-1 Network Structure, Configuration and Security Policy NSFT
  • IG6-1 Annex A Network Configuration
  • IG6-1 Annex B Physical and Environmental Security
  • IG6-1 Annex C Malicious Software and Security Patching
  • IG6-1 Annex D Data Backup Schedule
  • IG2-3 Standard Use of Email Policy NSFT
  • IG7-1 Annex A Verifying Identity for CfH National Applications
  • IG7-1 Annex B RA01 Short Form Conditions
  • IG7-1 Annex C RBAC Mapped Roles
  • IG7-1 RA and RBAC v01 Policy NSFT
  • IG0-3 Information Governance Policy NSFT
  • IG0-2 IG Framework NSFT
  • IG9-1 Investigating and Reporting NSFT
  • WinZipUserGuide
  • Email Encryption