Holding and Hosting Form

Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
BBC Data Holding and Hosting Request Form
Status
Approved
Content
Authority
Head of Information Security, Governance & Compliance - David Jones
Description
This form is to be completed, whenever BBC information is to be hosted away from
BBC infrastructure and covers requests, to hold/host both personal and nonpersonal data, held on an external ISP, or other data processor.
Template Control
Location
Template
Version
Request Form
Date
Last Reviewed
5.0
21/04/2014
April 2014
Internal:
IS Approval Forms page [explore.gateway.bbc.co.uk]
External:
DQ Third Party Policies page [bbc.co.uk]
Document history
Sys Review ID
(Syyyy/nnnnn/rr)
Division & Dept
BBC ISGC Owner
BBC PM
(BBC Project Manager Name)
BBC Data Owner
Document Name
BBC ISGC Holding and Hosting form – Project Name Vver.docx
Project
Supplier
Go Live Date
(Planned or actual go live date)
Date
Version
Author
0.1
Date Approved
V5.0 ©BBC 2014
Version
Change / Comments
Initial draft version
ISGC Approver
Comments
Confidential When Complete
Page i
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
Contents
1.
Purpose of this document .............................................................................. 1
1.1.
Background ............................................................................................. 1
1.2.
About this form ....................................................................................... 1
1.3.
Completing and submitting this form....................................................... 1
2.
Summary Information ................................................................................... 2
3.
High Level Details ......................................................................................... 2
3.1.
To be completed by BBC staff responsible for this project. ....................... 2
3.2.
To be completed by supplier .................................................................... 3
4.
Support Responsibilities Matrix ....................................................................... 4
5.
Information Security Policy ............................................................................ 4
6.
Organisation of Information Security ............................................................... 5
7.
Human Resource Security .............................................................................. 5
8.
Asset Management ....................................................................................... 5
9.
Logical Security ............................................................................................ 6
10.
Cryptography ............................................................................................... 6
11.
Physical and Environmental Security ................................................................ 7
12.
Operations Security ...................................................................................... 7
13.
Monitoring and Logging ................................................................................. 8
14.
Access and Control ....................................................................................... 8
15.
Acquisition, development and maintenance ...................................................... 8
16.
Supplier relationships .................................................................................... 8
17.
Incident Management ................................................................................. 10
18.
Business Continuity ..................................................................................... 10
19.
Compliance................................................................................................ 10
20.
Appendix A - Personal Data Processing Activities ............................................. 12
20.1. Third Party Data Processing – Data Lifecycle Questionnaire ..................... 12
20.2. Eight Data Protection Principles (set out in the Data Protection Act 1998)
13
V5.0 ©BBC 2014
Confidential When Complete
Page ii
Holding and Hosting Form
21.
Technology, Distribution & ArchiveError! Unknown document
Appendix B - Approvals ............................................................................... 15
21.1. BBC Information Security, Governance & Compliance .............................. 15
21.2. BBC Information Policy & Compliance (if required) .................................. 15
22.
Appendix C – Contact and help Information .................................................... 16
22.1. BBC Information Security, Governance & Compliance .............................. 16
22.2. BBC Information Policy Compliance ........................................................ 16
23.
Appendix D – Template Version Control ......................................................... 16
V5.0 ©BBC 2014
Confidential When Complete
Page iii
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
1.
Purpose of this document
1.1.
Background
BBC Information Security, is required to assess the adequacy of security controls, for all
systems/projects/services that host BBC data, prior to those systems going live. Increasingly,
those systems are hosted by third party organisations, away from BBC Infrastructure.
Before you start – please be aware, that when looking at a new 3rd party hosted system, or
service, you must have first considered, whether existing BBC in-house capabilities, are able to
deliver what you need.
1.2.
About this form
You’ve been asked to fill in this form, because you are involved in planning a new system, which
will process/host BBC data outside of the BBC network, or, are intending to make changes to one
that already exists. Where technical expertise is required, we expect relevant technicians to be
consulted, to provide accurate answers.
The answers should be provided, by a combination of staff from the third parties involved and the
internal BBC team responsible for the project, depending on where the necessary understanding
resides.
Where the system is not affected by questions in this form, you are at liberty to mark these N/A,
but please detail why you believe these are not applicable.
This document, is used to assess your security capabilities in the context of the system/service
being delivered, and in particular, the sensitivity of the data being hosted. Small organisations are
not precluded and a single person may be responsible, for many roles that appear to be defined
within these questions.
There are 2 parts to this form.
Part 1 – Information Security Review – Sections 2-19
Part 2 – BBC IP&C Review – Section 20 (to be completed where personal data is stored)
Once you have completed the form, please submit it to BBC Information Security
([email protected]), who will review the form, distribute to BBC IP&C/BBC
PR&C(where required) and ask further questions as required, to complete their review. Based on
this review, BBC Information Security may require additional controls/mitigations to be
implemented, as a condition for signoff.
1.3.
Completing and submitting this form
The BBC Staff managing this project, should fill in the following sections:
 Section 2
 Section 3.1
The supplier should complete sections 3.2 to 19. If any form of personal data is to be hosted on
the solution, section 20 should also be completed by the supplier.
The completed form, should only be emailed to the BBC within an encrypted zip file, with the key
being sent by sms, to the intended recipient of the email.
V5.0 ©BBC 2014
Confidential When Complete
Page 1
Holding and Hosting Form
2.
Technology, Distribution & ArchiveError! Unknown document
Summary Information
Summary information about system/project under review
To be completed by BBC staff responsible for this project.
2.1
Please enter your name, contact details and your role
with this project or system
(Details, must include email address and mobile number)
2.2
Please detail the name of the third party supplier contact
and their details.
(Details)
2.3
If the system, solution, project, or development has a
name, please indicate it here.
(Details)
We sometimes encounter systems that have previously
been known as something else; if this is the case, please
let us know any previous names:
(Details)
If your submission is part of a larger system or project,
please give the name of the “parent” system or project.
If you have already submitted one of these forms for
the parent system, please indicate this here and only
answer the rest of the questionnaire, if there is a
difference between this child system and its parent.
(Details)
If the submission is replacing an older system – please
explain here, how the data / crypto keys on this system,
will be securely destroyed/migrated.
(Description)
2.5
Please give an indication of how urgent the Information
Security approval is –indicate any critical decision dates
or project milestones:
(Description)
2.6
If the system were to become non-operationa, as a
result of a security event that affected it, (or dependent
systems), would this impact broadcast output, or the
ability of the BBC to perform its normal business
functions? Please explain how:
(Description)
Similarly, if information were to become stolen from the
system, or modified/deleted as a result of a security
event, would this impact broadcast output, or the ability
of the BBC to perform its normal business functions?
Please explain how:
(Description)
2.4
3.
High Level Details
3.1.
To be completed by BBC staff responsible for this project.
3.1.1
Please give a very brief description, of what the system
will be for and how it will work
(Description)
3.1.2
Please describe the information/data that will be
stored/processed by the system.
(Description)
(If you are collecting ,or processing ,any personal data
(including name, email, address, telephone numbers,
DOB, age, bank details, staff number, salary, NI
number, next of kin, images, nationality, race, gender,
criminal record, religion, sex life, political
opinion/affiliations, IP addresses) you must fill out the
Data Lifecycle Questionnaire in Section 20)
V5.0 ©BBC 2014
Confidential When Complete
Page 2
Holding and Hosting Form
3.1.3
Technology, Distribution & ArchiveError! Unknown document
Is your requirement likely to need a name registered on
the Internet?
(Description)
If yes – you must contact [email protected]
[Domain Manager in the GAL] to manage this process.
3.1.4
Has any funding been allocated to secure the solution,
including Penetration Testing?
(Description)
3.1.5
Who in the BBC, will be responsible for controlling
access to the data after go-live? (e.g. who is the data
(Description)
Most systems need to be operated, supported,
maintained and repaired. What plans are in place to
perform these functions?
(Description)
Which group(s) or suppliers will be responsible?
(Name)
3.1.7
What is the contract period for each 3rd party?
(Description)
3.1.8
What audit rights will the BBC have, in the contract with
the supplier?
(Description)
3.1.9
Will the data be shared with any other third parties? If
so, a separate Holding and Hosting forms will be
required.
(Description)
3.1.10
If the system were to be affected by an external event,
how long could it be unavailable before it causes
significant disruption to BBC operations?
(Description)
owner)
3.1.6
3.2.
To be completed by supplier
3.2.1
Please enter your name, contact details and your role
with this project or system
(Details)
3.2.2
Please give a very brief description of what the system
will be for and how it will work
(Description)
3.2.3
Please describe the information/data that can be
stored/processed by the system.
(Description)
(If you are collecting or processing any personal data
(including name, email, address, telephone numbers,
DOB, age, bank details, staff number, salary, NI
number, next of kin, images, nationality, race, gender,
criminal record, religion, sex life, political
opinion/affiliations, IP addresses) you must fill out the
Data Lifecycle Questionnaire in Section 20)
3.2.4
Please supply us, with a detailed diagram of the
information flows within the system and between it and
other systems?
(Attached File)
3.2.5
Please supply us, with a high-level system or
architectural diagram, showing what equipment will be
used, where it will be located, how it will be interconnected and what Operating, Database and main
software components run on each? This should also
include Firewalls and any IDS/IPS installed. (This can be
(Attached File)
the same diagram as above if it covers both clearly.)
V5.0 ©BBC 2014
Confidential When Complete
Page 3
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
3.2.6
Please supply us,with the high-level System Design
Documentation, including details of all Information
Security requirements and planned implemented
InfoSec functionality?
(Attached File)
3.2.7
Will the system accept data from another system and if
so, what?
(Yes/No and Description)
Will the system send data to another system and if so,
what?
(Yes/No and Description)
What will be the principle methods of transporting
information?
(Description)
Most systems need to be operated, supported,
maintained and repaired. What plans are in place to
perform these functions?
(Description)
Which group(s) or suppliers will be responsible?
(Name)
Where are your corporate headquarters based?
(Location)
Do you have any subsidiaries, affiliates or parent
companies based in the United States of America? (If
yes please give details).
(Yes/No & Location)
Please indicate whether any vulnerability scanning or
penetration testing have been, or are scheduled to be,
carried out on the application?
(Description)
If so – please indicate any critical, or significant findings
from such reviews and how you have addressed them.
(Yes/No and Description)
3.2.8
Examples include (but are not limited to): HTTP “get”;
SFTP over SSH; HTTPS; email etc.
3.2.9
3.2.10
3.2.11
4.
Support Responsibilities Matrix
INFRASTRUCTURE SUPPORT LAYER
NAME OF RESPONSIBLE
ORGANISATION/INDIVIDUAL (or N/A)
4.1
Physical Hardware/Data Centre (Computers, Network
infrastructure, Power and Cooling)
(Name)
4.2
Virtualisation Layer Support (where applicable)
(Name)
4.3
Operating System Support
(Name)
4.4
Database Support (DBAs)
(Name)
4.5
Application / Web Application Support (Code)
(Name)
4.6
Application / Web Application Support (User Admin)
(Name)
5.
Information Security Policy
5.1
Does your organisation have in place, a set of
Information Security Policies? If so, please provide
copies of the policies.
(Yes/No and Attachments)
5.2
Are these policies, approved by the senior management
within your organisation, regularly reviewed and
communicated to all your staff?
(Yes/No)
V5.0 ©BBC 2014
Confidential When Complete
Page 4
Holding and Hosting Form
5.3
6.
Technology, Distribution & ArchiveError! Unknown document
If the organisation who will hold the BBC data, is a
subcontractor to your organisation, how will you ensure
that their Information Security meets required
standards?
(Description)
Organisation of Information Security
6.1
Who has been appointed to take ultimate responsibility,
for Information Security within your organisation?
(Name & Role)
6.2
Has all information security responsibilities within your
organisation, been defined and allocated, including
maintaining appropriate contacts with relevant
authorities and groups, ensuring that Information
security is addressed in project management and
ensuring that conflicting duties and areas of
responsibility are segregated?
(Yes/No)
7.
Human Resource Security
7.1
Are background checks, Disclosure and Barring Service
(DBS, previously CRB) checks, or similar, carried out on
staff that will be accessing BBC data or systems?
(Yes/No)
7.2
Have staff members agreed to and signed, the BBC's
Acceptable Use Policy?
(Yes/No)
7.3
When a person working with BBC data, no longer
performs that role, are their permissions to BBC data
revoked?
(Yes/No)
8.
Asset Management
8.1
Will an asset register be completed, to log all assets
holding BBC data and who is responsible for updating it?
(Yes/No and Description)
8.2
Will all BBC Data held on removable media, including
Back-ups, be encrypted?
(Description)
8.3
Describe how and when, media containing BBC Data,
would be securely destroyed?
(Description)
8.4
Will any physical media containing BBC Data, be
transferred outside your organisation (e.g. Back-ups)
and if so, what procedures will be in place to protect the
media from loss?
(Yes/No and Description)
V5.0 ©BBC 2014
Confidential When Complete
Page 5
Holding and Hosting Form
9.
Technology, Distribution & ArchiveError! Unknown document
Logical Security
9.1
How will you decide, which of your staff (support,
development etc.) need access to the BBC system and
data? How will you manage that access and what
controls are in place, to ensure that privileged access
rights, will be restricted and controlled?
(Description)
9.2
Will the User/Privileged access rights for your staff, be
regularly reviewed?
(Yes/No)
9.3
What system functionality will be in place, to enable
BBC staff to manage access to the BBC system and
data, including, what controls are in place, to ensure
that privileged access rights can be restricted and
controlled?
(Description)
9.4
Please state what system enforced password settings
are active for:
(Description)

Password Minimum Length/Complexity

Password Change Interval

Lockout (after incorrect password entries)

Password aging/history
Can you confirm all default passwords have been
changed?
10.1
10.3
10.4
10.5
(Description)
(Yes/No)
Cryptography
Will any, or all BBC data,be encrypted at rest within the
system?
If yes, provide details of what data will be encrypted
and of the strength and type of encryption used.
10.2
(Description)
(Description)
Can you also state, what additional measures will be in
place, to secure administrator accounts. (e.g. stronger
passwords, 2FA or crypto keys required to access
systems)?
10.
(Description)
(Yes/No)
(Description)
Will password hashing be used within the system; if so
where, to what standard and will any salting be used?
(Yes/No)
Will BBC data be encrypted whilst in transit?
(Yes/No)
If yes, provide details of when data will be encrypted
and of the strength and type of encryption used.
(Description)
In the case of web based applications, will users of the
application be required to login?
(Yes/No)
Will this login be over a secure link – e.g. HTTPS?
(Description)
Please describe any other planned data transfers /
connections, between the users' browsers and the web
application?
(Description)
e.g. Cookies, Form submissions etc
Please explain how these data transfers will be secured
V5.0 ©BBC 2014
(Description)
(Description)
Confidential When Complete
Page 6
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
in transit (e.g. HTTPS - SSL/TLS etc)?
11.
11.1
Physical and Environmental Security
What physical measures will be in place, to protect BBC
data that is stored:

At your offices/location?

At the data centre?
(Description)
(Description)
E.g. CCTV, Coded Locks, Guards.
11.2
12.
How will these controls be managed and monitored?
(Description)
Where will the servers be located, which will hold the
BBC data?
(Description)

All in the UK

Some in the UK (where are the rest?)

None in the UK (where are they?)
Will the servers be held in secure Server Rooms?
(Description)
Will any hardware be stored outside of locked server
rooms?
(Description)
Operations Security
12.1
Is there a documented standard procedure followed, for
building and hardening host machines?
(Yes/No and Description)
12.2
Are these procedures periodically reviewed and kept in
line with current best practice?
(Yes/No)
12.3
Please outline your planned approach, to security
patching of operating systems and applications that form
part of the system.
(Description)
Please confirm, that critical and important security
patches will be up to date.
(Yes/No)
12.4
Please outline any anti-malware (antivirus, etc.) tools,
that will be used to protect the system.
(Description)
12.5
What firewalls and network/host protection measures,
(e.g. IDS or IPS) will be in place to protect BBC data?
(Description)
Describe how you will configure, maintain the above and
monitor alerts generated.
12.6
(Description)
Will the application collect, and/or host, any User
Generated Content (UGC)?
(Yes/No)
If so – describe the UGC in detail and explain what
moderation approach will be applied?
(Description)
V5.0 ©BBC 2014
Confidential When Complete
Page 7
Holding and Hosting Form
13.
Technology, Distribution & ArchiveError! Unknown document
Monitoring and Logging
13.1
Will event logging/audit mechanisms, be turned on at all
times for the system.
(Yes/No)
13.2
What information will be contained within logs?
(Description)
13.3
Will logs be regularly reviewed?
(Yes/No and Description)
13.4
How long will logs be retained?
(Description)
14.
Access and Control
14.1
Will any form of Remote Access technology be required,
if so what? Does this include two factor authentication?
(Yes/No and Description)
14.2
Please describe, how BBC data will be kept logically
and/or physically separated from other users’ data?
(Description)
15.
Acquisition, development and maintenance
15.1
Please provide an overview, on your formal
methodology for software development and security
testing. Including, on how you engineer secure systems.
(Description)
15.2
Is there a formal change control procedure for any
application or solution changes, will BBC services be
tested and reviewed to ensure there are no adverse
impacts on operations and security?
(Yes/No and Description)
How will these changes be communicated to the BBC?
15.3
Will a pen test of the full system be completed? Were
there any identified vulnerabilities, if so, what?
(Yes/No and Description)
15.4
Will a separate test environment be used? Will this
include the use of dummy or live BBC data? If Live
Data, how will that data be secured?
(Description)
16.
Supplier relationships
V5.0 ©BBC 2014
Confidential When Complete
Page 8
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
16.1
Are you planning to use any third parties, to help
develop the system, or host or process any BBC data?
(Yes/No and Description)
16.2
Are you planning to share BBC data with any other third
parties?
(Yes/No and Description)
V5.0 ©BBC 2014
Confidential When Complete
Page 9
Holding and Hosting Form
16.3
17.
Technology, Distribution & ArchiveError! Unknown document
If yes to either of the above, have you audited the third
parties, to determine whether they have implemented
appropriate security measures?
(Description)
Incident Management
17.1
Have management responsibilities and procedures been
established, to ensure a quick, effective and orderly
response, to information security incidents?
(Yes/No)
17.2
How will security incidents relating to BBC data, be
reported to the BBC?
(Yes/No)
18.
Business Continuity
18.1
Is there a proven, documented, secure Disaster
Recovery process, which will be used for BBC data?
Please provide an overview, i.e. DR facility site location,
testing of restore processes, etc.
(Description)
18.2
What processes and methods will be put in place, to
securely back-up the system?
(Description)
18.3
How will the system be restored (i.e. From backup or a
rebuild from scratch) to a known working state?
(Description)
18.4
Where will the Back-up data be stored?
(Description)
18.5
If the contract with the BBC requires a high availability
level, (95% availability or above), how will you meet
these requirements? Namely, Power outage, Single
points of failure, Unavailability of critical staff,
Unsatisfactory maintenance of equipment, Failure of
equipment/software.
(Description)
19.
Compliance
19.1
Is your organisation ISO/IEC 270001 certified or
compliant? Please provide details.
(Certified/Compliant/No & Details)
19.2
Is your organisation’s Information Security Management
System (i.e. control objectives, controls, policies,
processes and procedures for information security)
reviewed and inspected for compliance, independently
at planned intervals, or when significant changes to the
security implementation occurs?
(Yes/No and Description)
V5.0 ©BBC 2014
Confidential When Complete
Page 10
Holding and Hosting Form
19.3
Technology, Distribution & ArchiveError! Unknown document
Have all relevant statutory, regulatory, contractual
requirements, (including: intellectual property rights,
protection of records, protection of personally
identifiable information and cryptographic controls) and
the organisation’s approach to meet these
requirements, been explicitly identified, documented
and kept up to date, for the/each BBC information
system and the organisation as a whole?
V5.0 ©BBC 2014
(Yes/No)
Confidential When Complete
Page 11
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
20.
Appendix A - Personal Data Processing Activities
20.1.
Third Party Data Processing – Data Lifecycle Questionnaire
The below questionnaire, will help the BBC to assess this activity’s compliance with the Data
Protection Act 1998 and the BBC’s own internal DP policies.
Please over-write the guidance text in the right-hand column, with your responses (the easiest way
to do this is by navigating with the TAB key). It is important to complete as much of this as
possible. Questions marked with ** indicate areas of increased risk.
A separate map should be completed by the BBC, to show the data flow within the BBC.
*Please ensure a contract is in place before any personal data is transferred to a third party supplier*
Supplier :
Activity :
[ summary of Personal Data processing activity ]
Key Contact :
[ person who ‘owns’ this process - usually person completing this form ]
BBC Contact :
[ insert team & division ]
1.
Preliminaries
1.1
Is a contract with DP clauses in place?
(Yes/No)
(if yes, please attach a copy)
(Yes/No)
1.2
Has a BBC Holding & Hosting form previously been
completed?
2.
Data collected
2.1
What BBC data is being processed?
(List all personal data fields)
2.2
Is any sensitive personal data being processed?
(Yes/No and Description)
(Defined as: race, criminal record, religion, sex life, political
opinion/affiliations, trade union membership, health status)
2.3
Why do you need to collect the personal data or
sensitive personal data?
3.
Collection process - consent
3.1
How is the data collected?
(Description)
(Description)
(e.g. shared by the BBC or collected via webform, application
form )
If data is collected by the supplier:
3.2
Have you provided a Privacy Notice?
(Yes/No)
(If yes, please attach a copy)
3.3
If collecting under-16s data, have you obtained parental
consent? **
(Yes/No)
(If yes, specify mechanism used – e.g. tick box or verified
parental email)
3.4
Did you obtain consent, for the collection of any
sensitive personal data?
(Yes/No and Description)
4.
Cookies
4.1
4.2
Does this process utilise cookies?
(Yes/No)
(If yes, specify name of cookie(s))
What data is stored in the cookie?
(Description)
V5.0 ©BBC 2014
Confidential When Complete
Page 12
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
(Description)
4.3
Who sets the cookie – supplier or BBC?
5.
5.1
5.2
5.3
6.
Data storage
(Description)
(e.g. shared drive, external server)
Where is the data stored?
(Yes/No)
Are hard copies taken off-site? **
(If yes, provide details of where and why)
Does the data ever leave your network? (for example,
the use of third party clouds, and archiving)
(job title, team (and company, if relevant) for each person
with access)
What access controls are in place for electronic records?
6.3
Do you keep an electronic, auditable record of who has
accessed data?
7.
Sharing
7.1
Is data shared with another supplier? **
7.3
(If yes, please provide details of where and why)
(Description)
Who has access to the data?
7.2
(Yes/No)
Access
6.1
6.2
(If set by supplier, please specify how consent is obtained, if
appropriate)
Is there a contract in place with the supplier?
(Description)
(e.g. individual login, password protection )
(Yes/No and Description)
(Yes/No and Description)
(Yes/No)
(if yes, please attach a copy)
(Description)
(e.g. by encrypted email)
How is the data transferred?
(Yes/No)
(if yes, specify country)
7.4
Is data sent out of the UK? **
(if US, is the company ‘Safe Harbor’ registered?)
8.
Retention & Deletion
8.1
What is the retention policy for this processing?
(Description)
8.2
How will you ensure this policy is adhered to?
(Description)
8.3
If hard copies are kept, how are hard copies disposed
of?
(Description)
(e.g. normal waste or shredded)
8.4
8.5
20.2.
(Description)
How are electronic records deleted?
(e.g. overwritten or secure erasure)
Do you keep a log of what data is deleted, and when?
(Yes/No and Description)
Eight Data Protection Principles (set out in the Data Protection Act 1998)
1.
2.
3.
4.
5.
6.
Process fairly and lawfully
Obtained for specified and lawful purposes
Adequate, relevant and not excessive
Accurate and up to date
Not kept any longer than necessary
Process in line with the individual’s rights
V5.0 ©BBC 2014
Confidential When Complete
Page 13
Holding and Hosting Form
7.
8.
Technology, Distribution & ArchiveError! Unknown document
Process securely
Not transferred outside EU without adequate protection
V5.0 ©BBC 2014
Confidential When Complete
Page 14
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
21.
Appendix B - Approvals
21.1.
BBC Information Security, Governance & Compliance
Approval
System Review ID
Syyyy/nnnnn/rr
ISGC Contact
Details
Name:
Role: Information Security & Governance Specialist
Address:
Telephone:
Email:
ISGC Approval
Name – Date
Linked Dispensations
Dispensation ID 1
Dispensation ID 2
Dispensation ID 3
Dispensation ID 4
High Level Risk
Assessment
Very Low / Low / Medium / High / Very High
Information
Classification
Next Review Date
Date
Approval Condition(s)
Details
Comments
Comments
21.2.
BBC Information Policy & Compliance (if required)
Approval
IP&C Contact
Details
IP&C Approval
Name – Date
Approval Condition(s)
Details
V5.0 ©BBC 2014
Confidential When Complete
Page 15
Holding and Hosting Form
Technology, Distribution & ArchiveError! Unknown document
Comments
Comments
22.
Appendix C – Contact and help Information
22.1.
BBC Information Security, Governance & Compliance
Contact
BBC ISGC Team
Email:
[email protected]
BBC InfoSec Incident Reporting
Email:
[email protected]
Daryl Pilgrim (Information Security
& Governance Manager)
Email:
[email protected]
22.2.
BBC Information Policy Compliance
Contact
BBC IP&C Team
23.
Email:
[email protected]
Appendix D – Template Version Control
Date
Version
Author
Change / Comments
01 Aug 14
4.1
Bruno Garrancho
Initial draft version
04 Apr 14
4.2
Paul Finn
Review by Team
10 Apr 14
4.3
Paul Finn
IP&C Section Updated
14 Apr 14
4.4
Paul Finn
Completed Draft
21 Apr
5.0
Daryl Pilgrim
Fully approved version
V5.0 ©BBC 2014
Confidential When Complete
Page 16