Purpose
The following Telecommunication Policy has been created to ensure the Trust is able to deploy Telecommunication Services throughout the Trust in a controlled and agreed manner that has been endorsed by the Trust Board.
It will cover areas such as responsibilities for overall strategy and direction of the Trust Telecommunications Services, management and staff responsibilities and methods of, financial control to include procurement of services and equipment and means of monitoring usage.
The policy is also designed with the intent to provide guidance and help to all Trust Staff, Third Parties and Visitors alike in connection with the Telecommunication Services.
The objective is for all Trust Staff and suppliers to the Trust to be able to identify the person(s) responsible for day-to-day management of telecommunications as well as corporate responsibility.
The purpose of this policy is to ensure that there is a consistent approach in the provision and use of telecommunication devices and that internal controls are in place and adhered to in respect of the ordering, issue, use and recovery of costs associated with these devices.
The policy sets out the criteria that must be satisfied before staff will be issued with mobile telecommunication devices, details the procedures that must be followed to obtain these devices, and lists the responsibilities of users and managers.
Policy Details
Download: | PDF version |
Compiled by: | Paul Neumann, Telecommunications and Technical Service Manager |
Ratified by: | Information Governance Steering Group |
Date Ratified: | November 2022 |
Date Issued: | December 2022 |
Review Date: | October 2023 |
Target Audience: | All those employed by Ashford and St. Peter’s Hospitals NHS Foundation Trust in whatever capacity assigned and/or using the Trust’s IT equipment. |
Contact name: | Paul Neumann, Telecommunications and Technical Service Manager |
See also:
- Information Risk Management
- Subject Access Request
- Information Governance
- ICT Equipment Security
- Communications and Information Security
- Social Media
- Information Handling and Classification
- Physical Environment - Information Security
- Records Retention and Destruction
- Data Protection Regulations