COMPLIANCE MANAGEMENT POLICY
Document Identification |
HSNZ/POL/08 |
|
Document Name |
Compliance Management Policy |
|
Master Copy |
CISO |
|
Version Number |
1.4 |
|
Date Of Release |
15 Aug 2023 |
|
Prepared By |
Eparama Tuibenau |
CISO |
Approved by |
Kevin McAfee |
Managing Director |
VERSION HISTORY
Sl No |
Version No. |
Prepared by |
Approved by |
Description of Version |
Date |
Reason for Version Change |
|
From |
To |
||||||
1 |
1.0 |
- |
CISO |
MD |
First Release |
14 Apr 2020 |
No changes made |
1 |
1.0 |
1.1 |
CISO |
MD |
Updated |
31 Jul 2020 |
Format update |
1 |
1.1 |
1.2 |
CISO |
MD |
Updated |
21 Jun 2021 |
Modifications due to changes in HealthSafe |
1 |
1.2 |
1.3 |
CISO |
MD |
Reviewed |
27 Jul 2022 |
Annual review |
1 |
1.3 |
1.4 |
CISO |
MD |
Reviewed |
15 Aug 2023 |
Annual review |
DOCUMENT STATUS
Date |
Document Status |
14 Apr 2020 |
Modified |
31 Jul 2020 |
Modified |
21 Jun 2021 |
Reviewed |
27 Jul 2022 |
Current |
15 Aug 2023 |
Current |
Table of Contents
1 Purpose
2 Scope
3 Input
4 Output
5 Interacting Process
6 Abbreviations, Acronyms and Definitions
7 Procedure
8 Monitoring the Process
9 Records
1 PURPOSE
To facilitate the documented procedure for all relevant laws, statutory, regulatory, and contractual requirements for HealthSafe NZ.
2 SCOPE
All the processes in HealthSafe NZ include designs, operations, use, and management of information systems subjected to legal, statutory, regulatory, and contractual security requirements.
3 INPUT
Regulatory requirements for business operations
4 OUTPUT
Use of applicable legal and statutory requirements
5 INTERACTING PROCESS
Finance, Functional Head, Employee, Vendors
6 ABBREVIATIONS, ACRONYMS AND DEFINITIONS
Abbreviation |
Description |
FH |
Functional Head |
IT |
Information Technology Department |
TL |
Team Lead |
CISO |
Chief Information Security Officer |
7 PROCEDURE
Identification of Applicable Legislation
The relevant asset owners as mentioned in the Compliance Checklist hereunder will keep up to date all relevant statutory, regulatory and contractual requirements and HealthSafe NZ’s approach to meet these requirements for each information system and the organisation.
Intellectual Property Rights
The relevant asset owners as mentioned in the annexure hereunder will ensure compliance with legislative, regulatory and contractual requirements on the use of the material in respect of which there may be intellectual property rights and on the use of proprietary software products.
HealthSafe NZ ensures that only original licensed software products are used and all such subscription licenses are kept and monitored appropriate employees.
Protection of Organisational Rights
The relevant asset owners as mentioned in the annexe hereunder will ensure that all documents and records are protected from loss, destruction and falsification, in accordance with statutory, regulatory, contractual, and business requirements and retained for a minimum period of years or as required by the law.
Data Protection and Personal Information
The relevant asset owners as mentioned in the Compliance Checklist hereunder will ensure that personal data and privacy are protected as required in relevant legislation, regulations, and if applicable, contractual clauses.
Prevention of misuse of processing facility
All the Employees, contractors, and third-party users will be advised that no access will be permitted except that which is authorised.
The Management will ensure that employees are deterred from using information processing facilities for unauthorized purposes by implementing management authorisation procedures, acceptable usage policy, access control procedures and disciplinary action procedures.
Compliance with Security Policies and Standards
The relevant asset owners as mentioned in the Compliance Checklist hereunder will ensure all security procedures within their area of responsibility are carried out correctly to achieve compliance with security policies and standards.
CISO will supervise and take necessary action in case of any deviation observed.
HealthSafe NZ management will ensure that all the employees, Third Party contractors are adequately knowledgeable and aware of information security management system policies and procedures through their induction/onboarding process and deterred from deviation of ISMS Policies by implementing Disciplinary Action Procedure.
Technical Compliance Checking
Technical Compliance Assessment will be conducted for all the information systems of HealthSafe NZ once in 12 months or whenever new systems are introduced or as required by the Management.
An experienced Information Security Consultancy Agency or a qualified external vulnerability assessor (under proper NDA and contract terms) or a qualified independent Manager/ HealthSafe NZ Security Division / Administrator of HealthSafe under the supervision of or TL will conduct technical compliance checking.
Technical Compliance Checking will be conducted either manually or with the assistance of automated tools, which generate a technical report for subsequent interpretation by a technical specialist. (Including vulnerability assessment and penetration testing)
The TL will initiate a regular check and inform of any vulnerabilities to CISO.
Based on the results of the findings, the CISO will identify or modify and implement new controls and get it approved by the Management.
The TL will maintain checks.
Information System Audit Controls
CISO will carefully plan any audit to minimise the risk of disruptions to business processes by following the procedures laid down in Internal Audit Procedure.
Protection of Information System Audit Tools
CISO will carefully plan that access to information systems audit tools is protected to prevent any possible misuse or compromise by following the procedures laid down in Internal Audit Procedures.
Client Data Handling Guidelines
HealthSafe NZ works extensively with clients in New Zealand and Australia. The applications developed by HealthSafe NZ deal with confidential client data. According to Government laws, this confidential data is not supposed to leave the country under any circumstances unless authorised which NZ clients are notified and accept that HealthSafe's data centre is situated in Sydney Australia.
HealthSafe NZ being a product development and support organisation, has the necessity to deal with client data which might include confidential data. The following are the guidelines/policy to be followed by the employees when viewing, modifying or obtaining clients’ data.
The scenarios in which HealthSafe employees interact with clients’ data are;
- Customer Support Desk staff viewing customer data in the event of a complaint.
- Development and testing staff viewing or modifying client’s data for debugging or fixing an issue.
- Data conversion team obtaining clients' databases for migration or conversion purposes.
- Integrate with third-party technology partners who also hold confidential client information.
Guidelines and Process - Customer Support Desk
- Inform the client that the conversation is being recorded (if required)
- Inform and get the client's approval before showing their data
- Inform and get the approval before modifying anything in the client's environment. Take all necessary precautions to create backups at each stage to ensure actions can be reverted.
- Inform and get approval before performing irrevocable changes or modifications (when applicable).
Guidelines and Process - Development, Data Conversion and Testing Teams:
- Data should not be taken out of the respective countries and any activity should be performed only on machines located in that country/region without approval
- Inform and get the client's consent on data acquisition when necessary
COMPLIANCE CHECKLIST
Process Owners |
Compliance Requirement |
Procedure Defined |
Records/ Formats |
Retention Period |
CISO |
Information Security Management System |
Annual Review |
ISMS Manual |
7 Years |
CISO |
Security Incident management |
Security Incident Management Procedure |
Incident Management Reporting Forms |
7 Years |
FH |
Disciplinary proceedings |
Disciplinary Action procedure |
Disciplinary Proceedings Records |
7 Years or as required by Law |
FH |
Background Verification |
Background verification procedure |
Background Verification Records |
7 Years or as required by Law |
FH |
Confidentiality Agreement/NDA Background Screening Process |
Enter with Employees, Trainees & Contractors |
NDA Format Screening Form |
7 yrs |
8 MONITORING THE PROCESS
- License usage, timely removal of unused license from the systems/operations
9 RECORDS
- Compliance Register