JCAD core system downtime
The JCAD core risk management system will be unavailable between 5pm on Friday 22 November and midnight on Thursday 28 November whilst a system upgrade takes place.
Policies outlining best practice for maintaining technology security at Essex County Council.
The technology security policies shown below must be followed by all Technology Services staff, contractors and any third parties working on their behalf when providing services to customers.
Access Control Policy (PDF, 312KB) - management of access to information, premises and resources.
Backup Policy (PDF, 244KB) - policy on the best practice for backing up information.
Business Continuity Management Policy (PDF, 240KB) - policy on business continuity management.
Cloud Security Policy (PDF, 308KB) - ensuring secure implementation of Cloud services.
Cryptography Policy (PDF, 213KB) - the use of cryptography to protect information.
IT Disaster Recovery Policy (PDF, 281KB) - ensuring plans are in place to recover IT infrastructure following a disaster, should one occur.
Logging and Monitoring Policy (PDF, 271KB) - how activities should be logged and monitored.
Malware Protection Policy (PDF, 257KB) - ensuring protection from malware, such as viruses and worms.
Network security policy (PDF, 238KB) – Securing network communications.
Operations Security Policy (PDF, 249KB) - ensuring secure operation of information processing facilities.
Secure Asset Management Policy (PDF, 273KB) - how to manage assets securely.
Secure Configuration Policy (PDF, 249KB) – Configuring devices, systems, and services securely to prevent them being compromised.
Secure Design, Development and Testing Policy (PDF, 231KB) – designing and developing systems and services securely, and confirming this through appropriate security testing.
Security Incident Management Policy (PDF, 260KB) - the controls that must be applied to effectively handle information security incidents, should they occur.
Security Organisation and Compliance Policy (PDF, 271KB) - ensuring security organisation and compliance.
Supplier Security Management and Assurance (PDF, 251KB) – making sure there is appropriate assurance of the services suppliers provide being securely delivered, operated and maintained.
Technical Vulnerability Management Policy (PDF, 265KB) - best practice for ensuring that technical vulnerabilities are managed appropriately.