Information is a key asset to Government and its correct handling is vital to the delivery of public services and to the integrity of HMG. The Security Policy Framework, the Data Handling Report and the National Information Assurance Strategy produced by the Cabinet Office provide a strategic framework for protecting information that Government handle and put in place a set of mandatory measures which Departments must adhere to.
BERR is compliant with the security policies contained in the Government Security Policy Framework including those for information security and assurance.
Information is a key asset to Government and its correct handling is vital to the delivery of public services and to the integrity of HMG. The Security Policy Framework, the Data Handling Report and the National Information Assurance Strategy produced by the Cabinet Office provide a strategic framework for protecting information that Government handle and put in place a set of mandatory measures which Departments must adhere to.
It is not in the interests of the security of the Department, or that of the public, to disclose detailed information pertaining to the hierarchy of IT security within the Department. Disclosing such information would enable criminals and those who would attempt to cause disruptive threats to the Department to deduce how to conduct attacks and therefore potentially enhance their capability to carry out such attacks.
Information is a key asset to Government and its correct handling is vital to the delivery of public services and to the integrity of HMG. The Security Policy Framework, the Data Handling Report and the National Information Assurance Strategy produced by the Cabinet Office provide a strategic framework for protecting information that Government handle and put in place a set of mandatory measures which Departments must adhere to.
It is not in the interest of the security of the Department, or that of the public, to disclose detailed information pertaining to electronic breaches of security of department's IT systems. Disclosing such information would enable criminals and those who would attempt to cause disruptive threats to the Department to deduce how to conduct attacks and therefore potentially enhance their capability to carry out such attacks.
Information is a key asset to Government and its correct handling is vital to the delivery of public services and to the integrity of HMG. The Security Policy Framework, the Data Handling Report and the National Information Assurance Strategy produced by the Cabinet Office provide a strategic framework for protecting information that Government handle and put in place a set of mandatory measures which Departments must adhere to.
BERR is compliant with HMG IA Standard No 4 —Communication, Security and Cryptography for the encryption of data. BERR follows CESG guidance on the use of the Wi-Fi Protected Access 2 (WPA2) communications security protocols in order to protect wireless networks carrying protectively marked (up to RESTRICTED/IL3) traffic. The configuration and operation standards for WPA2 are set out in CESG's Infosec Manual Y, Use of WPA2 Wireless Security in Government Systems.
Information is a key asset to Government and its correct handling is vital to the delivery of public services and to the integrity of HMG. The Security Policy Framework, the Data Handling Report and the National Information Assurance Strategy produced by the Cabinet Office provide a strategic framework for protecting information that government handles and put in place a set of mandatory measures which Departments must adhere to.
Compliance arrangements comprise a system of self assessment, accreditation, assurance reporting, audit and review.
In the last 12 months fewer than five staff have broken BERR IT security policies and have been sanctioned for the breach.