12.07.2015 Views

Incident Management Policy and Procedure 652.0 KB - Oxleas NHS ...

Incident Management Policy and Procedure 652.0 KB - Oxleas NHS ...

Incident Management Policy and Procedure 652.0 KB - Oxleas NHS ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

System owners may also be requested to secure access to systems managed outside of IT such as:• Finance systems• Clinical systems• Local Manual <strong>and</strong> IT systemsA list of IT Systems <strong>and</strong> their owners is held as an appendix to the ICT Security <strong>Policy</strong> on the intranet.It is important to ascertain whether the employee has access to a laptop, PDA device, USB (memorystick), CDs, DAT tapes or any other media <strong>and</strong> organise their retrieval.Re-instating user access/equipment on completion of the investigationWhere the incident has proven the subject to be innocent or where no further action is to be taken, thesubject’s access to systems <strong>and</strong> services should be resumed. However, a review of access rights maybe necessary if they contributed to the incident.Where action has been taken against the subject the equipment may need to be retained as evidencepending a court case or possible appeal. For fraud cases, it is recommended that the counter-fraudservices take responsibility for secure storage. For other types of incidents (eg misuse of Trust ITequipment for accessing <strong>and</strong> storing information from the internet) the investigating department willneed to ensure that arrangements are made for secure storage of equipment, either or site, or externalto the Trust. If the police or Crown Prosecution Service (CPS) are involved, then it is likely that theywill take responsibility for secure storage of equipment51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!