13.07.2015 Views

FCA Employee Handbook - Financial Conduct Authority

FCA Employee Handbook - Financial Conduct Authority

FCA Employee Handbook - Financial Conduct Authority

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

We expects you to take all reasonable steps to protect, at all times, sensitive information,and valuable IT equipment (such as laptops, and other mobile devices and BlackBerryhandhelds) from loss or theft.You must report any actual or suspected breaches of security to either your line manager,or <strong>FCA</strong> Security Control, as soon as you can. Loss or theft of IT equipment must bereported to the IS Service Desk as soon as you can.We expect you to use the information and information systems and services to which youhave been given access in a reasonable and acceptable way at all times.We may monitor use of our information systems – by making use of them, you agree tothis taking place and accept that any private information you process on or transmit viaour systems may also be monitored.Line Managers’ responsibilitiesDirectors, HoDs and Managers are responsible for ensuring that:Staff are aware of and comply with the security policies and standards that apply to theirduties;Any additional local security arrangements necessary for the employees, offices,information or systems under their management are developed, maintained,communicated and enforced;Staff have the training necessary to be able to comply with the security policies andstandards that apply to their duties;Performance targets include, where appropriate, specific objectives that enhance thesecurity of the <strong>FCA</strong>;All staff are aware of the consequences of breaching the policy;Concerns about possible excessive or inappropriate use of information, or informationsystems and services, are raised informally with the employee in the first instance;Potential policy breaches are investigated promptly, and dealt with under the <strong>FCA</strong>’sDisciplinary Procedure where policies or standards have been violated without priorauthorisation.Monitoring of <strong>FCA</strong> Information SystemsGeneralWe may monitor use of any of our information systems as required by law, or for otherregulatory or business purposes. Information gathered through monitoring may be used, butis not limited to, measurement and enforcement of the requirements detailed within thisManual and other <strong>FCA</strong> policies. Breaches of the requirements defined in this Manual, will bedealt with in line with the <strong>FCA</strong>’s Disciplinary Procedure.EmailMonitoring of emails is conducted in adherence to the guidelines set out by the InformationCommissioner’s Office.All email sent from <strong>FCA</strong> accounts to external (including Internet) accounts are automaticallymonitored for sensitive business information. Where there is reasonable justification to do so,your internal email may be monitored.<strong>FCA</strong> <strong>Employee</strong> <strong>Handbook</strong> 2013 194

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!