Supplier corporate IT
The Ministry of Justice (MoJ) does not by default prohibit the use of supplier organisation corporate IT for processing MoJ data. The expectation is that the supplier corporate IT environment is well designed, maintained, governed, and defended, in line with large scale commercial threat models.
Subject to the requirements described in this document, the MoJ does not require suppliers to create or maintain dedicated or segregated IT solutions for processing MoJ data classified at Official.
For MoJ data classified at Official-Sensitive, additional comprehensive security assurance is required. The assurance shall include controls and governance processes. The assurance shall be appropriate to the information sensitivity. Contact the Security team for assistance regarding acceptable security assurance for Official-Sensitive MoJ data.
Supplier corporate IT systems are expected to maintain appropriate levels of technical security defences. These defences shall protect appropriately all types of MoJ data. This includes MoJ data processed or stored in any way by supplier corporate IT systems.
Examples of appropriate defences include, but are not limited to:
- Use of current Transport Layer Security or IPSec for in-transit encryption.
- Hashing and cryptography mechanisms for data stored at-rest.
The defences shall scale from individual data items in a database, up to entire storage facilities.
Supplier systems shall be proportionally resilient to malware. This might be achieved by ensuring segregation between systems, users, and data. Other industry standard best practices, such as email attachment scanning or filtering, might also be suitable.
Supplier corporate email systems processing MoJ data shall align to the UK government secure email policy, thereby following widely accepted best practices.
Supplier corporate email systems are not required to integrate to the Public Services Network (PSN).
Supplier’s may process MoJ data, including Personal Data for which the MoJ is responsible, outside of the United Kingdom, subject to the maintenance of acceptable information controls and governance.
MoJ data shall not be processed within a legal framework that is incompatible with that of the United Kingdom.
Supplier staff are not prohibited from working overseas while processing Official MoJ data, subject to implementing and maintaining acceptable information controls and governance. In particular, the controls and governance shall align and comply with MoJ policy on remote working and working overseas.
When working overseas, it might be necessary to limit access to information while the user travels. Alternatively, it might be appropriate to use secondary, temporary accounts, to avoid primary account compromise. Contact the Security team for assistance regarding acceptable security assurance when working overseas.
Supplier corporate IT systems may backup data for extended retention times. An example would be keeping archived or deleted emails for an additional few months. Backup systems may also exist in such a way that individual backup items cannot be individually deleted, but instead are subject to a system-wide backup rotation or retention schedule.
Suppliers shall discuss and agree these cases with the MoJ.
Local end-user device data
The MoJ acknowledges that corporate users typically “download” files, for example from local email client caching to file downloads using a web browser. These files might remain within
Downloads folders, until explicitly deleted by the user.
Suppliers shall include and address these types of data locations in data governance regimes.
For any further questions or advice relating to security, contact: firstname.lastname@example.org.
If you have any questions or comments about this guidance, such as suggestions for improvements, please contact: email@example.com.