Information Transfer
Policy
Document History
Author Ian Grice Ref and Document Information
Version Transfer Policy
V3_IG230923
Reviewed by Ian Grice Reviewed Date 23/09/2023
Approval Board of Trustees Approval Date 02/10/2023
Next Review 20/07/2024 Policy Number P57
Date
Publication Intranet; Reception
R:/Policies/Information Transfer Policy.pdf
1
P57
1 Policy Statement
1.1 This control procedure defines Greenbank’s approach to information transfer, and
directly supports the following policy statement from the Information Security Policy:
Greenbank will ensure the correct and secure operations of information processing
systems.
This will include documented operating procedures; the use of formal change and
capacity management; controls against malware; defined use of logging;
vulnerability management.
2 Audience
2.1 This procedure is intended to be read and understood by all staff responsible for
ensuring the security of information and software when they are exchanged within
or outside the organisation.
3 Risk Assessment
3.1 With each information transfer there is a risk that the information may be lost,
misappropriated, or accidentally released. It is the responsibility of the sender to
assess all risks and ensure that adequate controls are in compliance with this policy.
3.2 It is incumbent on the sender to ensure that the request is from an authorised source
and they are legally entitled to have the information. If you are in doubt, then you
should check with your line manager.
3.3 Once you are sure that the transfer is legal and necessary, then you must decide
what kind of information you are dealing with. This will determine what level of
security is appropriate.
4 Types of Information
4.1 Personal information is about a living, identifiable individual. If it contains details of
racial or ethnic origin, political opinions, religious beliefs, trade union membership,
physical or mental health, sexual life commission of offences, court appearances and
sentences it is further classified as sensitive personal information.
4.2 Anything which relates to personal information must comply with the Data
Protection Act 1998. Basic requirements of the Act are listed in Appendix 1.
Before you make any information transfer you must:
2
Obtain and document the approval of the Information Owner for transfer.
Ensure the transfer is legal.
Ensure the transfer is necessary (is there a less intrusive way).
Remove or redact anything not essential for the recipient’s purpose.
Ensure there is a documented procedure in place to ensure the recipient
understands the responsibilities under the law, particularly what to do with
the transfer file after they have extracted the information to their system.
4.3 Greenbank has a duty of confidentiality when handling confidential information. This
may include information that affects the business interests of a third party, or for
which the sender does not hold copyright, e.g. bank details, salary details, contract
details. Unauthorised release of confidential information can leave Greenbank open
to legal sanctions or litigation. It can also erode the trust of the public, partners and
stakeholders.
Before instigating a transfer of information staff must:
Obtain and document the approval of the Information Owner for transfer.
Ensure you are not breaching a Duty of Confidentiality.
Ensure the transfer is necessary (is there a less intrusive way).
Remove or redact anything not essential for the recipient’s purpose.
Ensure there is a documented procedure in place to ensure the recipient
understands the responsibilities under the law, particularly what to do with
the transfer file after they have extracted the information to their system.
4.4 Public information is any information that is freely available and present minimal risk
to Greenbank in terms of content, quality or timeliness, e.g. promotional brochures.
There are no special security requirements for transfer of public information because
their release represents no special risk. Public information will be transferred in the
most cost-effective method available.
However, before you transfer you must still seek the permission of the Department
that produced or owns the information before making any transfer, even if the
transfer seems harmless.
5 Requirements for Transferring Personal or
Confidential Information
5.1 Having established what kind of information you possess, and prepared it for
transfer, the sender must determine the most appropriate method of transfer. This
section lists the main methods and sets out any restrictions and requirements for
secure transfer of personal or confidential information.
5.2 Electronic Mail
Information must be enclosed in an attachment and encrypted using a product
approved by the Information Security Team. Minimum standard for encryption is
3
AES (245-bit). WinZip 11.1 and above offers this.
Passwords must comply with organisation standard. 7 characters and a mix
of alpha and numeric. Further details of the password policy can be found
in the Password Management Policy.
Any password to open the attached file must be transferred to the
recipient using a different method than email, e.g. a telephone number to
an agreed telephone number.
Email messages must contain clear instructions on the recipient’s
responsibilities and instructions on what to do if they are not the correct
recipient.
Check with recipient that their system will not filter out or quarantine
the transferred file.
The sender must check at an appropriate time that the transfer has
been successful and report any issues to their line manager.
5.3 Electronic Data Transfer (FTP, Secure FTP, BACS)
Standard FTP without encryption is inherently insecure and should not be used for
transmitting personal or confidential information.
SFTP file transfers are acceptable, but such transfers must be set up
and administered by the Technical Support Team.
External secure transmission systems such as BACS or DCSF’s COLLECT system
are designed to be secure provided they are implemented, configured, and
used correctly. However, it tis the responsibility of the sender to ensure that
the use of such systems is appropriate. if in doubt, advice should be sought
from the Information Asset Manager.
5.4 Electronic Memory (CD, DVD, USB drive, Memory Card)
Information must be enclosed in a file and encrypted using a product approved by
the Information Security Team set at an appropriate strength. Minimum strength for
encryption is AES (256-bit). WinZip 11.1 and above offers this.
Passwords must comply with organisation standard. 7 characters and a mix of
alpha and numeric. Further details of the password policy can be found in
the Password Management Policy.
Any password to open the attached file must be transferred to the
recipient using a different method than email, e.g. a telephone number to
an agreed telephone number.
An accompanying message should obtain clear instructions regarding the
recipient’s responsibilities, and instructions on what to do if they are not
the correct recipient.
An accompanying message and the filename must not reveal the contents of
the encrypted file.
The sender must check at an appropriate time that the transfer has
been successful and report any issues to their line manager.
5.5 Fax Transmission
4
FAX is inherently insecure and is not recommended for transfer of sensitive
information. However, it is acknowledged that certain circumstances demand it.
Sender must check that the Fax number is correct, and that the receiver
is awaiting transmission.
For highly sensitive information the number must be double-checked by
a colleague before transmission, and telephone contact must be
maintained throughout transmission,
Both sender and receiver must have an agreed process to avoid their copy
being left on the Fax machine, and a clear requirement to securely destroy the
message when no longer required.
The message should contain clear instructions on the recipient’s
responsibilities and instructions on what to do if they are not the correct
recipient.
The sender must check at an appropriate time that the transfer has
been successful and report any issues to their line manager.
5.6 Delivery by Post or by Hand
It is essential that the file, whether electronic or paper is kept secure in transit,
tracked under transit, and delivered to the correct individual.
An appropriate delivery mechanism must be used.
Package must be securely and appropriately packed, clearly labelled and have
a seal, which must be broken to open the package.
Package must have a return address and contact details.
The label must not indicate the nature or value of the contents.
Package must be received and signed for by addressee.
The sender must check at an appropriate time that the transfer has
been successful and report any issues to their line manager.
5.7 Telephone or Mobile Phone
As phone calls may be monitored, overheard or intercepted either deliberately or
accidently, care must be taken as follows:
Transferred information must be kept to a minimum.
Personal or confidential information must not be transferred over the
telephone unless the identity and authorisation of the receiver has bene
deliberately confirmed.
5.8 Internet Based Collaborative Sites
Must not be used to transfer personal or confidential information.
5.9 Text Messaging (SMS), Instant Messaging (IM)
Must not be used to transfer personal or confidential information.
5
6 Compliance
6.1 Compliance with the controls in this policy will be monitored by the Information
Security Team and reported to the Information Governance Board.
7 Related Documents
7.1 This control procedure needs to be understood in the context of other policies and
procedures constituting Greenbank’s Information Security Management System.
8 Review
8.1 A review of this policy will be undertaken by the Information Security Team annually
or more frequently as required and will be approved by the Information Governance
Board.
Author: Ian Grice Document version: V3_IG230923
Agreed by Greenbank Board of Trustees
Dr Alan Irving, Chairman