INFORMATION GOVERNANCE POLICY Coursework

Document Type:Coursework

Subject Area:Technology

Document 1

The scope. Roles and Responsibilities. Chief Executive Officer 4 3. Chief Information Officer (CIO) 5 3. The Information Governance Committee. Records management 11 6. Information governance training(IGT) 11 7. Policy Approval Process and Implementation. Policy distribution and issue: 12 8. Working with third parties 12 9. • Appropriately and lawfully disclosed or shared. b). To adequately protect the organization’s information resources from any possible threats by ensuring: • The integrity of information is maintained. • There will be adequate protection of information from unauthorized access. • All the regulatory and legislative requirements will be achieved. Maintaining confidentiality is key to IFD to supply a first class reliable and confidential service to its clients. IFD has a particular responsibility in ensuring a confidential, safe and secure movement of its customers' products and goods from the distributors to their clients, or from one customer location to another in an entirely a time efficient and cost-effective manner.

Sign up to view the full document!

Chief Information Officer (CIO) The CIO will be responsible for: • Ensuring that business value is created through technology. • Ensuring IFD’s computer infrastructure is properly functioning to bring the desired results in line with the set objectives. • Strategic planning for business growth in line with the set goals and objectives. Senior Information Risk Owner (SIRO) The Chief Finance Officer will carry out the role of the SIRO. The role of SIRO is to ensure that organization’s information risk is properly identified, managed and that there exists appropriate assurance mechanism. The SIRO will be responsible to: • Identify how information risks may impact the strategic business roles of IFD and how to manage those risks. • Implement and lead IFD's information governance, risk assessment, and management processes. • Own the IFD’s information security policy.

Sign up to view the full document!

It is necessary that all staff be aware of their responsibilities for confidentiality safeguard and information security preservations so as to conform with the common law obligations of confidentiality. Information security policy(ISP) ISP protects information assets and defines security measures useful by use of technology and incorporates the anticipated behavior of information managers within organization Freedom of information Policy It set out the roles and responsibilities in compliance with freedom of information Act (FIA) and Environmental Information Regulation (EIR) Information Sharing Policy In an organization, there is strong importance on the need to share information across professionals and organizational boundaries. This policy ensures fair and equal access to information can be supported by a variety of procedures. Documents and records management It promotes effective management and use of information. Identifying its value and reputation as a resource for the delivery of co-operating and service objects.

Sign up to view the full document!

• To promote effective confidentiality service to its staff, the company will implement relevant policies and procedures and do training of its staff. Openness Framework for information governance list all related procedures and policies (Klijn,. These documents are implemented and published in line with the policy for development and management of procedural documents. Information which is not confidential about the company is available to the public via media • An act is established to maintain policies and ensure submission with the freedom of information act. • The company has arrangements and defined procedures for handling queries from public and patients • Customers have ready access information relating to customer care, their options to service and rights as clients. Information governance training(IGT) • The company must establish and maintain the programs related to information governance training for effective delivery of IGT awareness and education.

Sign up to view the full document!

• All staff is required to pass a compressive statement by the company. the company also mandates information governance training to be held annually • The company provides new members of the staff information governance induction. • To assess the effectiveness of training, and future training changes the company undertake evaluation governance training. • The company provides awareness on general information regular basis through team meetings, articles, and newsletters. Third party partners cover the following: • Warehousing • Transportation • Distribution This three focus on one logistics /supply chain process and the bigger firms always handle all as it seamlessly integrates vertically or horizontally. Disaster Recovery, Contingency, and Business Continuity Disaster recovery involves a set of procedures, policies, and tools that can be used to ensure recovery of critical IT infrastructure and resources and ensure continuity of business in the event of a natural or human-induced disaster.

Sign up to view the full document!

Business continuity provides details about the planning procedures put in place to ensure that an organization continues with its operations even in the event of a disaster or any incident that may result to threats in the normal operations for a certain period of time. The organization prepares in advance for any likely incident and then plans for what can be done in such incidences. There are risks involved with business continuity and they include: • Lack of preparation: It is surprising that many business owners and organizations have a mentality that it is totally complete wastage of time to plan for something that will not happen. A plan is needed to assess the extent of the disruption and define the response procedures. • Contingency planning From Information Governance perspective, contingency planning revolves around determining the most important information needed to continue with operations and prioritizing that information that will directly need and also ensuring that information is regularly backed up and readily available from designated sources if the primary source fails.

Sign up to view the full document!

There need to be detailed contingency plans for managing the occurrence of a disruptive situation or an emergency (Lindow, 53~74). • Practice the plan. Business continuity plans should be practiced the same way fire drills are done. Governance and Media Attention: A Research Agenda About How Media Affect (Network) Governance Processes.  Perspectives on Public Management and Governance (2017). Adedoyin, Christson, and Mary S. Jackson. A Review of America’s Religious Institutions’ Utilization of Information Communication Technologies in Shaping Social Policy and Governance.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable