Key Point:
Effective management of information security must be led at board level and reflected in your organisation's policies.
Overview:
To ensure strong governance in data protection, the board must play an active role in overseeing cyber security and information governance (IG) initiatives. Their guidance should influence the organisation's policies, procedures, and projects.
How to Meet the Requirement:
Ensure that your board or senior management are actively engaged in your cyber security and IG efforts. They are responsible for setting the strategic direction, managing risks, and ensuring security practices are embedded throughout the organisation.
In health and social care organisations, these board-level activities are primarily led by the Senior Information Risk Owner (SIRO), who ensures that information risks are communicated and managed at board level.
Evidence to Provide:
To demonstrate compliance, consider submitting:
Ensure that your documentation clearly references the board's role in overseeing and directing information security and governance.
Indicators of Good Practice:
Key Point:
Clearly defined roles are essential for the effective management of information security and governance.
Overview:
To ensure that your organisation's cyber security and IG activities are well-managed, roles and responsibilities must be assigned to a knowledgeable team. These roles should be well-defined and understood across all levels to ensure effective risk communication and management.
How to Meet the Requirement:
Your organisation must establish and document roles related to cyber security and IG. This could include role descriptions, policies, processes, and appropriate training. All staff should understand their roles, and any resource gaps should be addressed promptly.
Key Roles to Include:
These roles should be supported through contracts, policies, and regular training programmes.
Evidence to Provide:
Indicators of Good Practice:
Key Point:
Senior management must ensure that decisions related to cyber security risks are made appropriately and align with organisational priorities.
Overview:
Decision-making regarding cyber security and IG risks should involve the appropriate staff, guided by senior management. Risk management decisions should align with your organisation's risk appetite, which defines acceptable and unacceptable levels of risk.
How to Meet the Requirement:
Risk decisions should involve staff from relevant departments, based on guidance from senior leadership. The risk appetite, approved by the board, should steer decision-making processes. Teams should regularly review risks and adapt to changes in the threat landscape.
Evidence to Provide:
Indicators of Good Practice:
Ensure your organisation meets the NHS DSPT standards by implementing these best practices. If you need help with cyber security assessments, data protection, or compliance support, Periculo can assist you in navigating the complexities of the DSPT framework. Get in touch with us today to strengthen your organisation’s data security and governance!
Contact Periculo for expert cyber security solutions tailored to the digital health industry.