Data on the move
Many data security breaches arise from the theft or loss of laptops, mobile phones or USBs. The same level of security should, therefore, be applied to devices being used away from the office as those used in the office.
Personally identifiable, sensitive and confidential data must not be stored on mobile devices unless by exceptional circumstance and has been authorised by your organisation with a business case to do so. In any event, any data held on a mobile device must be secured by using data encryption (minimum AES-256) so that it cannot be accessed by unauthorised persons and must only be held temporarily on the device. We would advocate the implementation of remote wiping technologies.
You should also consider the security of data if being sent by email or post.
Protection
To ensure data can only be accessed by authorised users, encryption should be implemented. As a minimum, all files and disks must be encrypted using the ‘AES-256’ standard. Further information regarding Data Security is available from the NCSC website.
Passwords should be required to access the data, a strong password would typically include a mix of upper- and lower-case characters, numbers as well as special characters. Guidance regarding what makes a good password.
If you have an approved business case to transfer personal data to mobile devices, this must be done on a temporary basis and the data removed when no longer required. It is preferable to use corporate managed mobile devices that can be remotely erased or disabled.
Security software
All devices on your corporate network should be frequently identified then scanned for software imperfections (known as vulnerabilities) that could be exploited by attackers to access systems or data. This is known as vulnerability scanning. A process called patching aims to resolve these vulnerabilities once they are discovered.
Penetration testing can verify that the patches are effective in stopping attackers, devices not meeting the required standards should be temporarily removed from your network (‘quarantined’) until their issues are resolved.
It is also important to regularly check system or control logs or for any important messages, often these can all be fed into a central reporting system (known as a ‘SIEM’). This system allows organisations to have an overall view of their corporate security position.
Review, update, mitigate
Make sure you're correctly using your security systems and that people can spot when there is a problem. Make sure users and/or employees are aware of their roles and responsibilities and clear when action needs to be taken. You should also put in place plans for a data breach.
To help make sure you're using your security correctly, you should:
- review what personally identifiable data or patient identifiable data you currently have and what protection you have in place
- make sure you are compliant with any industry guidance and legal requirements
- document the controls you have in place and identify where you need to make improvements
- (once any improvements are in place) continue to monitor the controls and update them where necessary
- consider the risks for each type of personal data you hold and how you would manage a data breach, so you can reduce the impact
- have an acceptable-use policy and training materials in place for staff so they know their data protection and data handling responsibilities - this should also cover for non-personal data handling where the data protection act does not apply
- get a security expert to review your systems so that they can highlight where your security vulnerabilities are and how best to address them
- make regular encrypted back-ups, keep them secure and delete them properly when no longer required, in line with your disposals policy
Third parties
Outsourced IT systems should conform to the same levels of security as in-house ones. All contracts must be made in writing, comply with all relevant legislation, and require the supplier to act only on your instructions.
Unless by specific agreement, data and processes must kept inside the United Kingdom. This covers all aspects including storage, administration, processing, as well as backup.
Suppliers should provide up-to-date copies of security assessments covering their systems. These assessments must have set review dates and address any vulnerabilities found.
There must be clear process in place for the secure deletion of NHS data when it is no-longer required. The DARS Data Destruction Form should be used to provide certification of destruction.