Information Governance Policy
Policy Statement
The School is committed to governing information as a strategic institutional asset that enables academic excellence, innovative delivery (including responsible use of artificial intelligence in learning), and outstanding student outcomes. We will ensure information is captured once in the right place, protected by design, accurate and auditable, and used responsibly to support decision-making, regulatory compliance and continuous improvement. This includes ensuring regulated and statutory submissions are reproducible and defensible through traceability to systems-of-record, documented checks and reconciliations, and an evidenced sign-off chain. This policy is the School’s overarching Information Governance policy and it is supported by the Data Protection Policy, Data Retention Schedule and Policy, and relevant information security and technology policies.
Principles
- Student‑centred outcomes: We use data to improve the student experience, progression, achievement, and employability.
- Integrity and accountability: Clear roles ensure that data has accountable owners and that decisions about meaning and use are transparent.
- Capture once, use many times: Data is collected once in an authoritative source and reused through controlled processes and approved reports.
- Single source of truth: For each domain, the School identifies one authoritative system and prevents parallel “shadow” datasets becoming the source.
- Auditability by design: Records are time‑stamped, history‑preserving, and evidenced so that decisions and submissions can be traced.
- Privacy and ethics by design: Personal data is minimised, lawful, secure, and transparent; learning analytics and artificial intelligence are governed.
- Security and resilience: Controls protect confidentiality, integrity, and availability proportionate to the School’s size, risk profile and delivery model.
- Quality as a managed practice: Quality is monitored continuously with clear checks, accountable owners, and timely correction.
- Proportionate assurance: The School focuses effort on material risks, regulated submissions, and high‑impact decisions.
- Continuous improvement: Lessons learned from issues, audits and submissions are used to improve definitions, controls, training and systems.
Regulatory Context
This Policy has been developed in line with the applicable laws, regulations, regulatory advice, and sector best practices, including the following:
| Authority | Name | Url |
|---|---|---|
| UK Government |
Data Protection Act 2018
Legislation aimed at controlling the processing of personal data, laying down principles with respect to the processing of personal data, and the rights of data subjects |
Redirect |
| Office for Students (OfS) |
Regulatory framework for higher education in England
This framework outlines OfS' primary aim to ensure positive outcomes for students, including access, success, and progress in higher education. It covers quality academic experience, progress into employment, and value for money. |
Redirect |
| Office for Students |
Prevent duty: Framework for monitoring in higher education in England
The Prevent Duty: Framework for Monitoring in Higher Education in England sets out how the Office for Students ensures universities comply with their legal duty to prevent individuals being drawn into terrorism. It outlines expectations for governance, risk assessment, staff training, welfare support, and external speaker management, ensuring a proportionate, safeguarding-led approach across all registered higher education providers. |
Redirect |
| ICO |
Guide to Accountability and Governance
Explains practical accountability measures, governance expectations, documentation, and how organisations demonstrate compliance with UK GDPR obligations. |
Redirect |
| ICO |
Personal Data Breaches: A Guide
Sets expectations for detecting, assessing, documenting and reporting breaches, including timeliness and notification requirements where risk is significant. |
Redirect |
| Office for Students (OfS) |
Regulatory Advice 14: Guidance for providers for the Annual Financial Return
Defines what financial information must be submitted, how it should be prepared, and the assurance approach expected from governance bodies. |
Redirect |
| HESA |
Data Dictionary
Defines collected data items, valid values, and reporting concepts that underpin annual returns and sector benchmarking. |
Redirect |
| JISC (Joint Information Systems Committee) |
Cyber Security
Provides sector guidance on cyber resilience, governance, incident management and security controls relevant to education organisations. |
Redirect |
Framework at a Glance
This policy applies to the information the School creates and uses to operate the institution and evidence compliance. It sets the overarching Information Governance framework, including accountability for information assets, systems-of-record, records management, retention and disposal, information security controls, and assurance and auditability expectations. It covers student lifecycle information (from admissions through to outcomes), assessment outcomes, financial records used for statutory and regulatory reporting, and governance evidence (for example approvals, minutes and assurance packs). This includes regulated reporting and returns activity (for example Office for Students and designated data body/HESA returns) where the School must evidence sources, checks, and approvals. Sets clear boundaries for the information governed by the School, ensuring data supporting student delivery, academic quality, financial integrity and governance assurance is consistently managed, evidenced and defensible. |
The School designates one authoritative system for each core domain so that staff and governors can rely on a single “official” record:
Regulated submissions and governance decisions must be traceable to authoritative records. Where extracts, spreadsheets, or working papers are used to support checks (for example reconciliations between student records and the finance ledger), they must remain supporting evidence and must not become alternative sources of truth. Explains the School’s authoritative sources and why they matter, enabling staff and governors to trace decisions and submissions to official records and preventing uncontrolled parallel datasets. |
The School’s governance structure provides clear decision rights and assurance routes:
Aligns data governance to formal decision‑making so regulated submissions and material changes are scrutinised through Academic Board and QCAC, under presidential accountability and Board oversight. |
The following terms are defined and underpin this policy
These stable definitions underpin and support the application of this policy. |
Roles and Accountability
The School places accountability for information meaning, quality expectations, lawful basis (where personal data is involved), retention expectations, and appropriate use with the leaders who run the underlying processes. These Data Owners hold decision rights over definitions, rules and lawful processing requirements for their domains, and ensure the required controls operate:
Data Owners ensure that staff follow agreed standards, that lawful basis and transparency requirements are met for personal data in their domains, that issues are corrected promptly, and that evidence is retained so decisions, submissions, and privacy compliance can be defended. Places accountability for data meaning and quality with leaders responsible for the underlying processes, ensuring business ownership, clear decision rights, and defensible evidence for governance scrutiny. |
The School appoints the Director of Technology as the Data Governance Lead and Senior Information Risk Owner (SIRO). The Data Governance Lead operates the governance ‘machinery’ (standards, controls, reporting and change control), while Data Owners remain accountable for meaning, lawful basis and appropriate use. This role exists to make governance work in practice by operating the governance “machinery”, while Data Owners remain accountable for meaning and use. The Data Governance Lead:
Confirms a single operational lead for running governance controls, reporting and change control, ensuring consistency across systems while preserving business ownership of data meaning and use. |
The School meets its data protection obligations through clearly defined roles that separate operational processing from independent oversight.
This model ensures that privacy is actively managed day‑to‑day and that independent challenge exists, without placing the formal privacy oversight role in a conflicting executive position. Provides practical day‑to‑day privacy capacity and independent governance challenge, ensuring data protection is operationalised through logs, assessments and escalation routes without conflicts of interest. |
Data Standards and Operating Controls
To ensure records can be traced and joined across systems, the School maintains a canonical set of core objects (for example: Student, Enrolment/Engagement, Course Session, Module Instance and Award/Outcome). Each object is linked by persistent identifiers, meaning stable reference numbers that do not change when circumstances change (for example a student changes name or contact details). Persistent identifiers are essential because they enable the School to show a clear audit trail from learning activity and assessment outcomes through to student records, financial records and regulated submissions. Defines the School’s core data objects and stable identifiers so records link across systems over time, enabling traceability from submissions and accounts back to operational evidence. |
The School maintains agreed definitions for material concepts (for example student status categories, engagement states, award dates, fee rules and reporting groupings). When a definition or rule must change, the School uses a controlled change process:
This prevents “definition drift” and ensures that reports remain comparable over time. Ensures changes to definitions and reporting rules are assessed, approved, effective‑dated and evidenced, preventing uncontrolled drift that could undermine quality, compliance and comparability over time. |
The School uses a governed reporting layer, meaning the approved set of reports and calculations used for management information and regulated submissions. “Governed” means:
Spreadsheets may be used to support reconciliation checks or to provide evidence, but they must not become alternative sources of truth. Ensures reporting logic is consistent, documented and approved, so management information and regulated submissions are repeatable, traceable and defensible without creating competing “shadow” datasets. |
Data Quality and Assurance Cycle
Data quality is maintained through a regular operating cycle. In practice, this means:
A set of quality measures is reported to the Executive Committee and summarised for QCAC as part of assurance reporting. Explains how quality is monitored and improved through recurring checks, reconciliations and exception management, so assurance is continuous and not limited to year‑end or submission deadlines. |
When data issues arise, the School records them in a managed issues log on the AGS. Each logged issue includes: what happened, which data was affected, who owns resolution, the required completion date, and the root cause. Where a regulated submission might be affected, the School records how the issue will be handled. Some issues are corrected prospectively (a “fix forward” approach), while others require the School to correct historical records and resubmit where required. Ensures issues are recorded, prioritised and resolved transparently, with clear accountability and documented decisions on whether historical correction or prospective correction is appropriate for regulated submissions. |
Regulated submissions are produced from systems of record and then submitted through the relevant external portals (for example, the Higher Education Statistics Agency collection service for annual higher education returns and the Office for Students portal for financial and compliance returns). The School’s internal processes ensure that what is uploaded is traceable, checked, and properly approved. For each submission, the School prepares an assurance pack that includes:
Defines a complete, evidenced assurance process for regulated submissions, including portal upload context, reconciliations and sign‑offs, so the School can demonstrate traceability and governance scrutiny. |
Information Governance and Data Protection Operating Controls
The School maintains a Record of Processing Activities (RoPA), which is an inventory of the main ways the School uses personal data. The RoPA records the purpose of processing, categories of personal data, lawful basis, retention expectations, key recipients/processors, and the controls used to protect the data. Alongside the RoPA, the School maintains a lawful basis map for key processing areas such as student administration, learning delivery and support, assessment, marketing and admissions, and payments. Makes privacy compliance operational by documenting why and how personal data is processed, supporting transparency, consistent decision‑making, and rapid response to audits, complaints, DSARs or regulatory queries. |
A Data Protection Impact Assessment (DPIA) is completed before a new activity begins where processing is likely to result in high risk to individuals. At the School, DPIA triggers include:
Provides clear triggers for when privacy impact assessment is required, ensuring risks are identified early and mitigated, enabling innovation while protecting individuals’ rights and maintaining lawful processing. |
A Data Subject Access Request (DSAR) is a request by an individual to access their personal data. The School maintains a DSAR process that includes: verifying identity where necessary, logging the request, managing deadlines, gathering records from systems of record, applying any lawful exemptions, and providing a complete response. A personal data breach is an incident that results in accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. The School maintains a breach process that includes: immediate containment steps, logging, risk assessment, decision‑making on whether notification is required, and lessons learned. Material incidents are escalated to the President and, where appropriate, reviewed through QCAC and the Board of Governors. Explains the School’s practical processes for DSARs and breaches, including logging, deadlines, escalation and evidence retention, ensuring timely response, defensible decisions and continual improvement of controls. |
The School uses suppliers and partners to deliver services (for example learning resources and assessment platforms). The School maintains a data sharing and processor register that records: who the supplier is, what data is shared, why it is shared, the lawful basis, retention expectations, security measures required, and whether any international data transfers occur. Contracts and onboarding processes are used to ensure suppliers provide appropriate security and privacy safeguards. The register is reviewed at least annually and whenever a new supplier or significant change is introduced. Controls third‑party risk through a maintained register and contractual safeguards, ensuring the School can demonstrate what is shared, why, how it is protected, and how supplier changes are governed. |
The School maintains an Information Asset Register that records the School’s key information assets and systems-of-record, the accountable Information Asset Owner (Data Owner) for each asset, the purpose and key uses, the classification, and the key risks and controls. The register supports assurance, auditability, and consistent decision-making and is reviewed at least annually and when material changes occur. |
Records Management, Classification, and Retention
The School classifies information so staff know how it should be handled:
Classification determines access permissions, storage expectations, sharing restrictions and the level of scrutiny applied before disclosure. Provides clear, practical handling expectations for different information types so staff understand what can be shared, what must be restricted, and what requires additional safeguards to protect individuals and the School. |
The School maintains a Data Retention Schedule that sets how long information is kept and how it is securely disposed of. As a minimum, the schedule covers student records, assessment evidence, complaints and appeals, finance and audit records, safeguarding/Prevent evidence, and governance minutes and policy versions. Secure disposal is completed using approved methods (for example secure deletion for digital records and confidential waste processes for paper). Where required, the School retains evidence that disposal occurred. Ensures information is retained only as long as required for legal, regulatory and operational purposes, while providing auditable disposal practices that reduce risk exposure and support defensible records management. |
Security, Resilience, and Access Controls
The School protects personal and sensitive information by controlling who can access systems and data.
The School keeps evidence of access grants, removals and reviews so that governance bodies can have confidence that access is appropriately controlled. Information classified as Confidential or Special category / high-risk must not be stored or processed in unmanaged personal storage locations, personal cloud services, or informal repositories that bypass role-based access control, auditability, and retention controls. Explains how access is controlled in practice through roles, user lifecycle processes and privileged access review, ensuring people only access what they need and evidence exists for audit and governance. |
The School maintains backups for systems of record so that information can be restored after accidental deletion, system failure or cyber incident. Please see the Information Technology (IT) Infrastructure Management Policy. As a minimum expectation:
Sets clear expectations for backup, monitoring and restoration testing so the School can recover from incidents, demonstrate resilience controls operate, and provide governors and auditors with defensible evidence. |
The School maintains an incident response process for security incidents and personal data breaches, aligned to the breach reporting and notification requirements set out in the Data Protection Policy. Incidents are logged, assessed for impact, and managed through containment and remediation steps. Where an incident is material (for example it affects many individuals, involves sensitive data, disrupts critical services, or may require regulatory notification), it is escalated to the President. QCAC receives reporting on material incidents and the School’s response, and the Board of Governors is informed where required by the scheme of delegation or where the incident is significant to the School’s risk profile. Ensures incidents are managed consistently with escalation, evidence and governance reporting, enabling timely decisions and appropriate oversight by QCAC and the Board where impacts are material. |
Monitoring, Metrics, and Review
The Executive Committee monitors performance against data governance metrics and reports termly to the Quality, Compliance and Audit Committee (QCAC). QCAC provides assurance to the Board of Governors, including: trends in data quality, significant issues and remediation, privacy and security incidents, and progress against improvement actions. This reporting supports the Board’s oversight responsibilities and ensures that data governance remains aligned to the School’s values, delivery model and regulatory expectations. Provides a regular, evidence‑based view of performance, risks and improvements so QCAC can challenge and assure, and governors can oversee the integrity of information used for decisions and submissions. |
This policy is reviewed annually or sooner following material changes to systems, regulatory requirements, the School’s risk profile, major changes to processing activities (including new learning analytics or artificial intelligence features), or significant incidents or audit findings. Changes are version‑controlled, approved in line with delegation arrangements, and archived so the School can evidence what applied at any point in time. Maintains relevance and defensibility by ensuring changes are controlled, approved and archived, enabling the School to demonstrate consistent governance standards over time and during audits or regulatory engagement. |
All staff must complete information governance, data protection, and information security training appropriate to their role. Targeted training must be provided for staff with elevated responsibilities, including Information Asset Owners (Data Owners), staff handling special category data, staff responding to DSARs, staff managing incidents, and staff responsible for regulated submissions. Training completion is monitored and reported through governance routes as part of assurance. |
The following metrics will be measured and regularly reviewed as key performance indicators for the School to ensure the effectiveness of this policy and associated operations.
Annual financial return reconciliation assurance100% reconciliations completed with 0 unresolved breaks at sign off Demonstrates financial integrity and audit ready traceability. |
Data Subject Access Request timeliness100% DSARs completed within one month (or formally extended) Demonstrates operational data protection compliance. |
Higher education data return readinessSubmission ready checkpoint with 0 critical validation errors and ≤5 non critical issues Demonstrates data quality and reduces compliance risk and rework. |
Incident logging and triage100% incidents logged within 24 hours; triage within 48 hours Improves responsiveness and governance escalation. |
Issue resolution performance≥90% of material data issues resolved within agreed timelines; repeat root causes reduce term on term Demonstrates continuous improvement. |
Privileged access review completion100% semesterly privileged access reviews completed and evidenced Prevents inappropriate access and supports confidentiality. |