Skip to content

Commit e2ea59e

Browse files
committed
Merge branch 'master' of github.com:DataMigrators/datamigrators.github.io
2 parents afabf9c + 9b34698 commit e2ea59e

14 files changed

+506
-137
lines changed

.github/workflows/publish-to-github-pages.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,17 @@ on:
99
- master
1010

1111
jobs:
12-
build:
12+
Build_And_Publish:
1313
runs-on: ubuntu-latest
1414
steps:
1515
- uses: actions/checkout@v3
1616
- uses: actions/setup-node@v3
1717
with:
1818
node-version: 16
19-
- run: yarn install && yarn run deploy
19+
- name: Build Gatsby Pages
20+
run: yarn install && yarn run build
21+
- name: Publish
22+
run: git remote set-url origin https://git:${GITHUB_TOKEN}@github.com/DataMigrators/datamigrators.github.io.git && npx gh-pages -d public -u "github-actions-bot <support+actions@github.com>" -b main
23+
env:
24+
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
25+

.travis.yml

Lines changed: 0 additions & 14 deletions
This file was deleted.

CNAME

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
docs.datamigrators.com

package.json

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,7 @@
99
"build": "gatsby build",
1010
"build:clean": "yarn clean && gatsby build",
1111
"serve": "gatsby serve",
12-
"clean": "gatsby clean",
13-
"deploy": "gatsby build && gh-pages -d public -b main"
12+
"clean": "gatsby clean"
1413
},
1514
"dependencies": {
1615
"gatsby": "^4.20.0",

src/data/nav-items.yaml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,6 @@
1616
path: /licenses/license-WTFPL
1717
- title: Policies
1818
pages:
19-
- title: John Test
20-
path: /john_test
2119
- title: Acceptable Encryption Policy
2220
path: /policies/acceptable_encryption_policy
2321
- title: Acceptable Use Policy
@@ -56,6 +54,8 @@
5654
path: /policies/end_user_encryption_key_protection_policy
5755
- title: Ethics Policy
5856
path: /policies/ethics_policy
57+
- title: Information Governance Policy
58+
path: /policies/information_governance_policy
5959
- title: Information Lifecycle Management Policy
6060
path: /policies/information_lifecycle_management_policy
6161
- title: Internet Usage Policy
@@ -82,6 +82,8 @@
8282
path: /policies/removable_media_policy
8383
- title: Risk Assessment Policy
8484
path: /policies/risk_assessment_policy
85+
- title: Risk Management Policy
86+
path: /policies/risk_management_policy
8587
- title: Secure Software Delivery Lifecycle
8688
path: /policies/secure_software_delivery_lifecycle
8789
- title: Security Response Plan Policy
@@ -98,5 +100,7 @@
98100
path: /policies/software_installation_policy
99101
- title: Technology Equipment Disposal Policy
100102
path: /policies/technology_equipment_disposal_policy
103+
- title: Vendor Management Policy
104+
path: /policies/vendor_management_policy
101105
- title: Workstation Security for HIPPA Policy
102106
path: /policies/workstation_security_for_hipaa_policy

src/pages/john_test.md

Lines changed: 0 additions & 98 deletions
This file was deleted.

src/pages/policies/cybersecurity_executive_summary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The Cyber Security Policy is structured as a set of related documents covering e
3434
- [Cloud Computing Policy](cloud_computing_policy)
3535
- [Code Of Conduct Policy](code_of_conduct_policy)
3636
- [Communications Equipment Policy](communications_equipment_policy)
37-
- [Cybersecurity Executive Summary](cybersecurity_executive_summary.md)
37+
- [Cybersecurity Executive Summary](cybersecurity_executive_summary)
3838
- [Data Breach Response](data_breach_response)
3939
- [Database Credentials Policy](database_credentials_policy)
4040
- [Data Protection Policy](data_protection_policy)

src/pages/policies/employee_off_boarding_policy.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -78,16 +78,16 @@ Remove the user's access to the following platforms and services:
7878
- Delete account pending review
7979
- Delete accounts from SaaS ALM systems
8080
- GitHub
81-
- Azure DevOps (covered previously)
82-
- Delete accounts from self-hosted ALM systems (dm-demo-alm.*)
83-
- Azure Server (if relevant)
84-
- GitHub Server :question_mark:
85-
- GitLab
86-
- Jenkins
81+
- Azure DevOps
82+
- Delete accounts from self-hosted ALM systems (`dm-demo-alm.*`)
83+
- Azure Server (self-hosted)
84+
- GitHub Server (self-hosted)
85+
- GitLab (self-hosted)
86+
- Jenkins (self-hosted)
8787
- Verify then remove user’s objects on the AWS dm-sandbox account
88-
- Remove any user-specific accounts on dm-demo-alm and dm-demo-datastage environments
89-
- Do whatever we have to do in Xero :question_mark:
90-
- Do whatever we have to do in Harvest :question_mark:
88+
- Remove any user-specific accounts on `dm-demo-alm` and `dm-demo-datastage` environments
89+
- Offboard in Xero
90+
- Offboard in Harvest
9191
Remove any relevant account from the following services:
9292
- Bitdefender
9393
- Box
Lines changed: 140 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,140 @@
1+
---
2+
title: Information Governance Policy
3+
description: Data Migrators; Information Governance Policy
4+
keywords: 'information,data,governance,retention,policy'
5+
---
6+
7+
<PageDescription>
8+
9+
This page describes Data Migrators’ policy on information governance.
10+
11+
</PageDescription>
12+
13+
<AnchorLinks>
14+
<AnchorLink>Overview</AnchorLink>
15+
<AnchorLink>Purpose</AnchorLink>
16+
<AnchorLink>Scope</AnchorLink>
17+
<AnchorLink>Policy</AnchorLink>
18+
<AnchorLink>Compliance</AnchorLink>
19+
<AnchorLink>Exceptions</AnchorLink>
20+
<AnchorLink>Non-compliance</AnchorLink>
21+
<AnchorLink>Related Documents</AnchorLink>
22+
<AnchorLink>Definitions and Terms</AnchorLink>
23+
</AnchorLinks>
24+
25+
## Overview
26+
27+
Data Migrators is committed to managing Information as an organisational asset that is created, used and shared effectively while meeting legislative requirements.
28+
29+
Information governance provides the framework, strategic objectives, policies and standards to manage Information as an asset. This policy, supporting procedures and associated resources support effective Information governance to optimise the integrity, security, availability and quality of DM Information.
30+
31+
## Purpose
32+
33+
This policy establishes the framework and principles for effective data and information (Information) governance which supports the functions and activities of DM.
34+
35+
36+
## Scope
37+
38+
This policy applies to all individuals who manage, handle or process DM Information, including DM staff, contractors, visitors and partners. This also includes third parties (suppliers) and agents of the organisation who are bound to DM policy where their contract of engagement with the organisation specifically provides for this.
39+
40+
This policy applies to the creation, storage, management, control, access, transfer and destruction of Information throughout its lifecycle in all its forms: both in digital and non-electronic formats.
41+
42+
## Policy
43+
44+
### Principles
45+
46+
Data Quality from creation - DM implements procedures and practices to ensure that Information is captured accurately and completely, and that the quality of Information is monitored, managed and continuously improved throughout its lifecycle.
47+
48+
**Information is discoverable** - DM Information classification is applied to enable appropriate management of Information, to ensure Information is easy to find and to promote its re-use.
49+
50+
**DM supports openness and collaboration** - DM Information is accessible and transparent. Access to Information should only be restricted when required by legislation, policy or contract.
51+
52+
**Information is protected from unauthorised access, use and disclosure** - DM Information is managed in accordance with procedures and resources established by this policy, the Privacy Policy, and the Information Technology and Security Policy.
53+
54+
**Information is retained, managed and disposed of lawfully and ethically** – DM Information collection, creation, use, re-use and exchange is performed according to ethical practices, applicable laws and with due consideration for individual privacy.
55+
56+
**DM is a digital organisation** - Information is created and retained in a digital format unless otherwise required by legislation.
57+
58+
**A data-literate workforce** - DM is committed to ensuring that staff have the knowledge, competencies and ability to interact with Information in their roles.
59+
60+
### Information Governance Framework
61+
62+
The Information Governance Board provides advice and recommendations for strategy, policy and risk-related matters impacting DM's Information.
63+
64+
Information Governance priorities are guided by the value of Information to DM, government and the community over time, considering the risks of improper management of Information.
65+
66+
DM is the custodian of all Information managed by DM. No individual function or group own any part of Information.
67+
68+
An individual assumes the role of Information Custodian when DM Information is in their possession.
69+
70+
Information Governance controls are defined in consultation with Information Stewards. The Information Stewards Group is established to provide operational support and recommendations to the Information Governance Board.
71+
72+
### Responsibilities
73+
74+
All individuals who manage, handle or process DM Group Information as set out in the scope of this policy are responsible for:
75+
76+
- ensuring that they understand and adhere to the framework and principles established by this policy
77+
- managing DM’s Information in accordance with procedures and resources under this policy, the Privacy Policy and Information Technology and Security Policy
78+
- supporting a culture that promotes good Information governance practices and reporting any identified compliance breaches or incidents.
79+
80+
Information Custodians are:
81+
82+
- responsible for ensuring that appropriate controls and processes are in place for the protection of Information under their custodianship in accordance with all applicable policies, legislation and contractual agreements
83+
- accountable for decisions and implications of access to Information under their custodianship. This includes Information sharing and access, movement of Information, physical protection and integration between systems.
84+
85+
The Information Governance Board and its members are responsible for:
86+
87+
- providing strategic direction and advocating for Information governance in the best interests of DM.
88+
89+
Information Trustees are:
90+
91+
- accountable for Information governance decisions that impact how Information is managed in their Information Domain
92+
- responsible for nominating Information Stewards for their Information Domain.
93+
94+
Information Stewards are responsible for:
95+
96+
- providing operational support to Information Trustees and relevant stakeholders for Information within their respective domains as set out in the Information Domain Register
97+
- taking steps to improve the quality and compliance of Information identified as high-priority to DM.
98+
99+
The Chief Data and Analytics Officer is responsible for:
100+
101+
- overseeing Information governance at DM to ensure effectiveness and fitness for purpose
102+
- establishing an Information Governance Network comprised of Information Stewards and Information Trustees
103+
- promoting a data-driven culture and encouraging DM staff to develop capability, competency and knowledge to interact with Information in their roles.
104+
105+
The Chief Information Officer is responsible for:
106+
107+
- providing Information Technology services for storage, processing, safekeeping and the integrity of Information in digital formats under the custodianship of DM
108+
- implementing appropriate safeguards without creating unjustified obstacles to the conduct of DM operations and the provision of services, as specified in the Information Technology and Security Policy.
109+
110+
The Chief Information Security Officer is responsible for:
111+
112+
- implementing appropriate Information and Information security controls, processes and technologies to protect DM from cybersecurity threats
113+
monitoring and improving the effectiveness of security controls for Information in digital formats under the custodianship of DM.
114+
115+
The Privacy Office is the first point of contact for privacy matters within DM and is responsible for:
116+
117+
- overseeing responsible handling of personal, sensitive and health information in all its forms, consistent with relevant legislation, as specified in the DM Privacy Policy.
118+
119+
## Exceptions
120+
121+
Any exception to the policy must be approved by the DM directors in advance.
122+
123+
## Non-Compliance
124+
125+
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
126+
127+
## Related Documents
128+
129+
This policy is to be read in conjunction with existing University policy documents which include but are not limited to the following:
130+
131+
- Research Policy
132+
- Privacy Policy
133+
- Information Technology and Security Policy
134+
- Intellectual Property Policy
135+
136+
137+
## Definitions and Terms
138+
139+
n/a
140+

src/pages/policies/information_lifecycle_management_policy.md

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -134,16 +134,9 @@ An employee found to have violated this policy may be subject to disciplinary ac
134134
## Related Documents
135135

136136
- [Encryption Policy](acceptable_encryption_policy)
137-
138-
- Information Governance Policy
139-
- Confidentiality & Data Protection Act Policy
140-
- Information Sharing Policy
137+
- [Information Governance Policy](information_governance_policy)
138+
- [Data Protection Policy](data_protection_policy)
141139
- [Security Response Plan Policy](security_response_plan_policy)
142-
- Information Security Policy
143-
 Subject Access Request Policy & Procedure
144-
 Information Risk Policy
145-
 Freedom of Information Policy
146-
147140

148141

149142
## Definitions and Terms

0 commit comments

Comments
 (0)