RISM07 Information Security Policy

UCL Research Data Information Security Management System Information Security Policy #

Document Name: RISM07-Research_Data_ISMS_Information_Security_Policy

Author: Tim Machin

Classification: Public

Version: 1.1

Last Review Date: 11/04/2025

Last Reviewed by: Angharad Green

Approved by: OMG

Approved date: 12/03/2025

Review Period: 3 Years

Sources: SLMS-IG03

1. Document Overview #

Information is a vital asset, both in terms of the world-leading clinical research undertaken by UCL and in terms of the efficient management of services and resources.

It is therefore of paramount importance to ensure that information is efficiently managed, and that appropriate policies, procedures, management accountability and structures are in place to provide a robust governance framework for information management, which is covered, in general, by the UCL Data Protection Policy and the UCL Information Security Policy.

Research projects frequently receive information from third parties including the NHS, which is restricted by specific regulation or contracts. As a result, UCL is subject to additional responsibilities in satisfying information governance requirements and in safeguarding highly confidential information.

This document addresses the following requirements in the ISO 27001:2022 standard:

  • Clause 5.2
  • Clause 6.2
  • Clause 9.1

2. Scope #

The Research Data ISMS Information Security Policy covers people, processes, applications, infrastructure and data that fall within the scope of the research data ISMS.

This policy augments the UCL Data Protection Policy and UCL Information Security Policy and applies to all users in scope of the research data ISMS. It relates to their use of any Trusted Research Environment, associated data, applications and code.

For the avoidance of doubt where this policy differs from UCL’s information security policy or data protection policy, the more restrictive policy applies.

3. Conventions used in this Document #

TermMeaning
ShallA Mandatory requirement of this policy
ShouldA Recommended requirement of this policy
MayAn Optional requirement

4. Information Security Objectives #

The Information Security Objectives of the organisation are owned by the Senior Information Risk Owner (SIRO).

The objective of the organisation is to enable research to be carried out on confidential information while managing information risk within tolerance. Details of the issues the organisation seeks to address can be found in the Scope.

To ensure this objective is being achieved, the following metrics are in place to measure performance.

MeasureTarget
The proportion of applicable studies using UCL’s Trusted Research Environments100% of studies currently registered with the Information Governance Advisory service use a trusted research environment
The ISMS is operating in compliance with the ISO 27001 standard and UCL’s objectives as measured by auditThe standard and all controls are audited within each 3 year certification period
The level of risk within the organisation, as measured in the UCL Research Data ISMS Risk Assessment, is deemed to be ‘manageable’All risks are ‘green’ (within UCL’s risk appetite)
Non-conformities dealt with in line with the Audit Procedure100% of non-conformity actions actioned in a timely manner
Incidents are dealt with in line with the Incident Management Procedure100% of severe incidents are actioned in a timely manner
The proportion of Approved Researchers with suitable up-to-date training.95% up-to-date completion for users in scope

4.1. Review and monitoring of compliance with objectives #

  • The implementation and compliance with this Policy shall be monitored by the Information Risk Governance Committee.
  • The above objectives should be measured through quality data (such as training records), incident reports, risk assessments and audit.
  • Compliance with this policy shall be monitored during the investigation of information security incidents.

4.2. Continual improvement #

  • Opportunities for improvement identified through audit, incident or near misses should be recorded and acted upon.

5. Access Control #

All access to physical infrastructure and digital systems shall be managed in accordance with the Access Control Policy.

6. User Responsibilities #

Users shall comply with the Approved Researcher Agreement and the TRE Study.

Any breach of the terms of these agreements may result in removal of access to an environment or data and disciplinary procedures.