Business Classification Scheme and Retention Schedule - HSE
Business Classification Scheme and Retention Schedule - HSE
Business Classification Scheme and Retention Schedule - HSE
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Version 14.0<br />
Electronic /Hybrid &<br />
Paper Only 2006<br />
Onwards<br />
1 st Review to be undertaken by Directorate 7 years<br />
after folder closed. (Managed by RMU) If decision<br />
made to retain information - 2 nd Review to be<br />
undertaken by Records Management Unit 15 years<br />
after folder closed.<br />
AUTHORITY:<br />
The National Archives / <strong>HSE</strong> Senior Management Team (SMT)<br />
1.21.3 Personnel Security SP3<br />
Personnel security policy<br />
Vetting<br />
Criminal records checks <strong>and</strong> Police National Computer (PNC)<br />
Personnel security investigations<br />
Statistics <strong>and</strong> finance relating to personnel security<br />
DISPOSAL PERIOD:<br />
AUTHORITY:<br />
Paper Pre-2006<br />
Electronic /Hybrid &<br />
Paper Only 2006<br />
Onwards<br />
1 st Review to be undertaken by Directorate 9 years<br />
after file opened. (Managed by RMU) If decision<br />
made to retain information – 2 nd Review to be<br />
undertaken by Records Management Unit 25 years<br />
after file opened.<br />
1 st Review to be undertaken by Directorate 7 years<br />
after folder closed. (Managed by RMU) If decision<br />
made to retain information - 2 nd Review to be<br />
undertaken by Records Management Unit 15 years<br />
after folder closed.<br />
The National Archives / <strong>HSE</strong> Senior Management Team (SMT)<br />
1.21.4 Information Security <strong>and</strong> Assurance SP4<br />
Information assurance <strong>and</strong> security policy<br />
Technical risk assessments<br />
Risk management <strong>and</strong> accreditation document set (RMADS)<br />
System accreditation<br />
GSI codes of connection (COCO)<br />
Encryption <strong>and</strong> cryptography<br />
Remote working / mobile computing<br />
Security <strong>and</strong> information <strong>and</strong> communication technology (ICT) contracts<br />
Incident reporting <strong>and</strong> investigation<br />
Disposal <strong>and</strong> destruction of equipment<br />
31