If users use DC’s or USB sticks to manipulate information, these should be deleted or destroyed after use. If the power failed it can cause problems when the system restarts. Our Understanding of the challenge 3 1 The Challenge 4 Section 2: This could affect confidentiality. We are committed to meeting all Information Security requirements from our customers and the provision of the necessary resources.

As ne staff will be unfamiliar with legislation, we should carefully set it out If we lost key skills such as how to encrypt or unencrypt files we would loose the information. Our financial information is sensitive so needs classifying. In the past sales staff have provided incorrect and incomplete information that has then been added to our CRM system. Our recovery solutions are professional, effective and fully supported by our proven systems, More information. Guidance on the use of cloud computing Data Protection Act Guidance on the use of cloud computing Contents Overview

Many skills and decision making authorities are restricted to a very few senior staff who know each other very well, this has led lcc a competence and documentation gap through informality.

LDCC prepares for future with Red Hat OpenStack Platform

Protective security governance guidelines Security of outsourced services and functions Approved 13 September Version 1. IT should be maintaining the equipment properly. No A5 LDCC Management Information Procedures for handling assets shall be developed and implemented in accordance with the information classification scheme adopted by the organization.


ldcc case study

Information Security Policy Author: Compliance page 6 4. Our overall strategic mission is to provide our clients with: Personal data – There is a known external demand for personal data especially financial i.

Our contracts with some key partners may have or need IS clauses. Backups of systems are very important. This could also entail poaching key members of staff and securing access to confidential information. For a full stuudy of the More information. As such, the More information. For the sake of this document Portable Computers More information.

We have had power cuts due to local power demand increases that have interrupted mains power new building and expanding businesses: The clear desk policy helps with paper records.

ldcc case study

To make this website work, we log user data and share it with processors. Appropriate procedures shall be implemented to ensure compliance with legislative, regulatory and contractual requirements related to intellectual property rights and use of proprietary software products. For the sake of this document Portable Computers.

Lake Dale Contact Centre Case Study

Cover and Quotation requirements Please indicate cae More information. Contractual relationships with our suppliers Business Continuity Management Policy.

Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Rules for the development of software and systems shall be established and applied to developments within the organization.


These policies define The University of Brighton business objectives.

HR informed the Sales Casf, before this meeting, that an increase in our staff turnover churn rate was now evident and a real concern for us.

September Contents Page 1.

ldcc case study

Environmental no particular flooding or storm damage is anticipated. As a small company, responsibilities have been retained by a small management team. This could affect confidentiality and the viability of LDCC. Please note that the documents included in this Case Study contain errors for training purposes only.

This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain More information. These Information Security Risks will then be prioritised using a number score.


Lake Dale Contact Centre Case Study – PDF

This should all be rectified now with the new access control procedure. Paper is easily seen and stolen.

Our internal information should be locked away whenever possible as it can be accessed by many staff, non disclosure agreements are valuable.

Operating procedures shall be documented and made available to all users who need them.