Information Security Government United Kingdom Europe
Evaluates and certifies the level of trust that may be placed in IT security features. Includes a list of certified products.
Top: Regional: Europe: United Kingdom: Government
Information Security
- The Data Protection Act Explained - An introduction and explanation of the Data Protection Act and government its various provisions.
- Patient confidentiality and Access to Health Records - Department of Health guidelines for protecting and using confidential patient united kingdom information.
- National Smart Card Authentication Project - National project detailing the authentication processes required to government obtain a information security smart card. Contains process maps, publications, government authentication levels, FAQs and information security contact details.
- The Information Commissioner's Office - Office responsible for the enforcement of the Data Protection Act 1998, and also responsible for Freedom of Information. Offers guidance on principles of data protection and advice on compliance. Formerly known as the Data Protection Commissioner.
- TIGER Information Governance Portal - Portal dedicated to improving information governance and data government protection standards in the NHS, Social Care, Local government Government and other organisations in the UK.
- CESG - Evaluates and certifies the level of trust that government may be placed in IT security features. Includes government a list of certified products.
- NHS Information Governance - Information governance discussion site for practitioners in the united kingdom National Health Service.
- Freedom of Information Act 2000 - UK government legislation defining what information public sector government organisations are information security obliged to provide on request.
- Get Safe Online - Sponsored by government and leading businesses to help information security protect information security individuals against internet threats.
- Office of Surveillance Commissioners - Provides information about the roles and responsibilities of those who information security authorise and conduct covert surveillance operations and covert human intelligence information security sources.
MySQL - Cache Direct