RISM02 Roles and Responsibilities

UCL Research Data Information Security Management System Roles and Responsibilities #

Document Name: RISM02-Roles_and_Responsibilities

Classification: Public

Author: Tim Machin

version: 5.1

Last Review: 04/04/2025

Last Reviewed by: Preeti Matharu

Approved by: OMG

Approved date: 12/03/2025

Review Period: 3 years

Sources: SLMS-IG05, SLMS-IG07, SLMS-IG16, SLMS-IG32

1. Document Overview #

This document establishes the framework for defining roles, responsibilities, and authorities within the UCL Research Data Information Security Management System (’the ISMS’). It also outlines our approach to providing those roles with appropriate resources, ensuring the competence of the persons assigned to those roles, and promoting awareness of information security throughout the organisation.

This document also outlines the framework for identifying the necessary resources and competencies required for each of the above groups, ensuring they have the capability to establish, implement, maintain and continuously improve the ISMS.

This document covers:

This document addresses the following requirements in the ISO 27001:2022 standard:

  • Clause 5.3
  • Clause 7.1
  • Clause 7.2

2. Scope of the roles and responsibility #

This document applies to all groups and group members within the scope detailed in the Research Data ISMS Scope including researchers, governance groups, IT service delivery teams and UCL wide functions.

This document also covers the framework for determining the appropriate resources and competence which are to be available to, or possessed by, the members of each of the above groups, such that they are able to establish, implement, maintain and continually improve the ISMS.

3. The Information Governance Framework #

The high-level structure of the ISMS’s Information Governance Framework is represented in the diagram below.

Information Governance Framework

3.1 Top Management #

The ISMS Top Management consists of UCL’s Senior Information Risk Owner (SIRO) and the Information Risk Governance Committee (IRGC), chaired by the SIRO. The SIRO is a UCL executive and member of the University Management Committee (UMC) with overall accountability for UCL’s information risk framework. The SIRO receives assurance that relevant processes, procedures and policies are in place to protect UCL’s information assets. The IRGC receives reports from the Operational Management Group (OMG), holds them to account, and in turn provides advice and assurances to the SIRO.

3.2 Operational Management Group (OMG) #

The OMG reports to the IRGC to provide assurance that the ISMS is operating effectively, delivering information security objectives and managing information risks within tolerance. While the OMG is responsible for ISMS policies, it may escalate risks to IRGC that cannot be resolved directly by the OMG. Risk decisions are therefore ultimately owned by IRGC.

The OMG is composed of members of the ISMS’s governance, technical, and service teams. Full details of membership and responsibilities of individual roles can be found in the OMG Terms of Reference.

The Trusted Research Environments (TREs) (as defined in the classification and tiering policy) that form part of the scope and are managed by the UCL Information Services Division (ISD) and the centre for Advanced Research Computing (ARC). They are represented at the OMG to ensure these Environments are operating safely.

4. Resources #

Funding for ISMS and all technical environments (TREs) is provided by the UCL Change and Digital Committee structure. Top management request funding from the Change and Digital Committee in the form of business cases. Top Management ensures sufficient resources are available. Where resource constraints pose risks to the organisation, top management escalate to UMC.

5. Competence #

UCL determines the necessary competence of persons doing work under its control that affect its information security performance, including staff, suppliers, and researchers, and ensures they are competent to perform this work.

Staff competence and suitability is determined as part of the recruitment and selection procedure.

All users must complete suitable information governance training. This training must be kept current, failure to do so may result in losing access to the Trusted Research Environments. A list of acceptable training courses can be found in Annex A and the required competence for each role is detailed in the roles catalogue.

The training listed in the roles catalogue below are determined through a training needs analysis. Approved researcher training ensures it meets the requirements of our key data providers such as the NHS. UCL wide training is mandatory and designed by the UCL Information Security Group to meet the requirements of UCL’s obligations to data subjects.

6. Shared Responsibility Model #

Security and Compliance is a shared responsibility between infrastructure providers, environment providers, research teams and data stewards. The model below provides an overview of how these responsibilities are allocated.

Shared Responsibility Model

7. Approved Researcher, Study and Project Roles #

Users of the TREs are authorised through the following structure and in accordance with the Access Control Policy

TermDefinition
StudyA study is an Information Governance construct and exists to manage the risk and ownership of specific data.Each study has an Information Asset Owner that owns that study. The Information Asset Owner can create one or more project spaces attached to that study.
ProjectA Project is a permissions boundary within a technical environment. This is where the whole or a subset of the parent study’s data is stored and processed by members of the research team.Access to data within a project is managed through permissions determined by the Information Asset Owner or the Information Asset Administrator.

7.1. Approved Researcher Role #

Approved researcher roles have no access to data within any project by default. Approved researchers can apply to create Studies (see below) or access projects. An approved researcher must provide evidence that they have up to date approved information governance training and sign an approved researcher agreement.

An approved researcher must be covered by a legal agreement for example a staff contract (for UCL staff) or a research contract (for external collaborators).

7.2. Study Roles #

Study roles have no access to data within projects by default.

At the study level, users can be assigned the role of an Information Asset Owner, who is responsible for owning a ‘study’.

The Information Asset Owner is accountable for any confidential information processed by project users and is accountable for the safe use of that information. An Information Asset Owner must sign and comply with the responsibilities detailed in the Study Agreement.

An Information Asset Owner may delegate responsibility (while retaining overall accountability) for the day-to-day management of users and projects to an Information Asset Administrator. Information Asset Administrator responsibilities as detailed in the roles catalogue.

Information Asset Owners and Information Asset Administrators must be both a substantive (full) member of UCL staff and an approved researcher.

7.3. Project Roles #

Project roles have access to data within projects as approved by the Information Asset Owner or Information Asset Administrator.

A project is a permissions boundary inside which data is stored and processed. All project users must be provided access to that specific project by the Information Asset Owner or Information Asset Administrator.

Users of a TRE will only be granted access once they have been designated an “Approved Researcher” and can be members of UCL staff, students, visitors or external collaborators.

Users may have different permissions within a project assigned by the Information Asset Owner or the Information Asset Administrator. For example, some users will have write access to data, while others may be limited to read only access.

All study and project users are encouraged to participate as members of the research community who may raise issues and request improvements to the environments.

8. Roles Catalogue #

User Roles
RoleResponsibilitiesCompetency and Awareness Requirement
Approved ResearcherA “safe” person. Defined by contracts, attestations and competency (training).Must complete training and sign an approved researcher agreement which sets out responsibilitiesApproved researcher trainingComplete approved researcher agreementRead and understand relevant policies and procedures.
Information Asset OwnerThe Information Asset Owner is accountable for any confidential information processed by project users (see below), and is accountable for the safe use of that information. An Information Asset Owner must sign a study agreement.Be an approved researcherComplete study agreement.
Information Asset AdministratorBe responsible for the day-to-day management of users and act with delegated authority from an Information Asset Owner.Information Asset Administrator responsibilities can be found here.Be an approved researcher. Read and understand Information Asset Administrator responsibilities
Project UserProject users have access to some or all data within the boundaries of a project within an environment. Responsibilities for all project users are set out in the approved researcher agreement and any specific requirements of that project related to handling of the data within that project as set out by the Information Asset Owner. Project users can be further subdivided to provide different access within a project. Some examples below:+ Project writer - Can read and write data to a shared resources within a specific project+ Project read only - Can read data from shared resources within a specific project+ Project egresser - Can egress “safe” outputs data from a specific TRE projectBe an approved researcher
Project Ingress UserA person approved to ingress data to a specific TRE project. This role does not require approved researcher role and does not have access to any data within the environment, and ingress access can be approved by any project user (via Invite).None
Management
RoleResponsibilitiesCompetency and Awareness Requirement
University Management Committee (UMC)Oversight of UCL and responsible for setting risk appetite/tolerance. Terms of Reference:Terms of ReferenceNA
UCL Senior Information Risk Owner (SIRO)As part of the Information Risk and Governance Committee the SIRO understands how the strategic academic goals of the organisation may be impacted by information risks and take ownership of the Research Information Governance Policy. The responsibilities of the SIRO are detailed hereSIRO Training
Information Risk Governance Committee (IRGC)Receives reports from the Operational Management Group, provides advice and assurances to the SIRO and serves as “Top Management” for the Research Data ISMS.Terms of ReferenceMembers must read and understand ToR
Operational Management Group (OMG)Ensures that effective and informed decisions are made in relation to the operation of the UCL’s Research Data ISMS and that evidence of this is reported to the IRGC. OMG may also escalate risks to IRGC that cannot be resolved by the Group.Terms of ReferenceMembers must read and understand ToR
Governance
RoleResponsibilitiesCompetency and Awareness Requirement
Research Information Governance (IG) LeadResponsibility for the managerial operation of the UCL Research Data ISMS, Information Governance (IG) Framework, compliance with the NHS Data Security & Protection (DSP) Toolkit. Provides expertise to and liaises between the SIRO and research teams. Acts as the primary IG contact for all external parties and as a point of escalation for IG matters within UCL.IG Lead Role DescriptionAs detailed as part of recruitment in Job Description, Advert and Interview
Information Governance Officer (IG Service Operations Manager)Operational responsibility for the Research Data ISMS including but not limited to the maintenance of associated records and the provision of IG training.IG Officer role DescriptionAs detailed as part of recruitment in Job Description, Advert and Interview
Internal AuditorThe UCL’s ISMS internal auditor is independent of the ISMS team and is responsible for assessing and reporting on all controls and parts of the standard within the 3-year certification cycle. Internal audits also extend to research teams’ compliance with the standard.Suitable ISO27001 auditor training
Technical and Service
RoleResponsibilitiesCompetency and Awareness Requirement
Environment OwnerEnvironment owner must:+ Be accountable for the safe development and operation of the trusted research environment they own.+ Describe and maintain the definition of the trusted research environment they own + Be accountable for maintaining the technical controls of the environment + Ensure changes to the technical environment are made safely + Lead on root cause analysis and incident response + Represent the environment during audit + Act in accordance with the responsibilities of a standard product/platform/service owner in ISD/ARC + Approve access to infrastructure management for all environment IT AdministratorsApproved Researcher Training
Environment AdministratorAn environment administrator must: + Be responsible for the safe development and operation of the trusted research environment they administer. + Maintain design and operational documentation around the environment + Be responsible for maintaining the technical controls of the environment + Participate in root cause analysis and incident response + Review and approve contributions from developersApproved Researcher Training
Environment DeveloperAn environment developer must: + Contribute to the safe development and operation of the trusted research environment they develop. + Implement safe coding practicesNone
Supporting Service OwnerWhere the environment relies on supporting services. The supporting service owner is accountable for the safe running of any supporting component service such as physical hosting. These will be detailed within the Environment Definition Document.None
UCL Wide Roles
RoleResponsibilities
Chief Information Security Officer (CISO)Responsible for UCL’s corporate information security agenda. Advises and guides the SIRO on information security matters. Head of the Information Security Group
Information Security GroupResponsible for UCL’s overall stance on information security, including the information security policies, security incident management, including liaison with the police via Estates.
Human Resources (HR)HR are responsible for UCL’s policies and processes covering recruitment, screening, disciplinary and termination of employment.
Change and Digital CommitteeProvides resources to maintain and develop the UCL Research Data ISMS and the trusted research environments and information systems.
External Roles to UCL
RoleResponsibilities
External platform providersResponsible for provision of storage compute and any associated software as a service, as defined in the environment definition of a trusted research environment.Comply with controls committed to in contract or through written agreement.
Technical equipment suppliersResponsible for providing updates to software / firmware and for complying with contractual requirements.

Annex A - Suitable Training Resources #

RoleTrainingLink
Approved ResearcherNHS Digital Data Security Awarenesshttps://portal.e-lfh.org.uk