ICT Systems policies, procedures and risk

Return to index

IT Systems Policies and Risk

1. Introduction

The IT systems policies are designed to achieve the best value and to reduce risk. They need to be considered in the context of the Awarding Organisation's functional context rather than as separate isolated provisions. There are two key sites relevant to the Awarding Organisation function, the certification site and the community learning site.  The certification site is the most significant as this is where awards are made and the assessment data related to those awards are stored. The community learning site is used as an optional facility for managing evidence and tracking progress adding value through support for assessment for learning. It can be used to input data to the certification site but it is not mandatory. Dependency on it would be a problem in some environments eg the prison service.

The following two strategies underpin these aims

  1. Diverse Operating Systems: We have transitioned from an exclusive use of Linux-based and open-source systems to a more diverse approach that includes Windows 10 on our laptops. This shift aims to maintain flexibility, reduce costs, and mitigate risks associated with dependencies on single points of supply.
  2. Use of the cloud and out-source data hosting to reduce the risk associated with physical threats to buildings and benefit from the economies of scale of using the web.

2. Operational Strategy

2.1. Security

All critical systems are patched regularly by the hosting company, Hosting UK. There is a dedicated server hosting the systems and these are backed up 4 times per day. Internal systems are patched as soon as security updates are notified as being available.  Hosting UK hosts over 70,000 sites and has a good reputation for reliability and security.   TLM's dedicated server with Hosting UK is the location of theingots.org domain containing the main data associated with the awarding function. Transactions with the server are done through encrypted HTTPS requests.

This leaves the main potential risk from a security vulnerability as the password. Password strength is metered and only secure passwords are allowed. These require the use of letters, numerals, characters, upper and lower case and reasonable length. Users who have insufficiently strong passwords will not be able to set up accounts. The most significant risk is in user error either leaving themselves logged in and leaving the system unattended or allowing others to find their password. The risk assessment shows that this is almost certain to happen at some time and is by far the greatest security vulnerability. The following actions have been taken to reduce possible damage.

  • Timed automatic log out so that the system will auto-log out if inactive for longer than a set period.
  • Permissions that limit most users to editing a single account.
  • Facilities for data recovery should an account be compromised.
  • Education through training and aspects inherent to TLM qualifications.

Example scenarios/use cases

  • If an intruder gets into the system and deletes records in the certification site they are not deleted, rather they are simply rendered invisible. The system manager can restore such damage very quickly.
  • An intruder awarding grades to their own or someone else's account is likely to be noticed by the assessor. Data stamping of records enables us to determine when such an intervention took place.
  • No awards can be made without authorisation by the Account Manager so while additional marks could be inserted it would not be possible to make an award without communication between the Account Manager and the legitimate assessor owning the account.
  • On the community site, a learner or assessor leaving themselves logged is could have their pages deleted or altered. However, there is a versioning system so all new pages are date stamped and the system can be reverted to earlier versions of pages. Should this be ineffective backups are available from which to retrieve work. This is certainly a better situation than a candidate losing a paper-based file which would have no backup and no possible way of being restored.

Security testing

  • Periodically we will test the security of the hosted systems with typical attacks such as dictionary for passwords.

Service outage

  • Hosting UK servers have an average of 99.99+% uptime, based on an independent review service (HyperSpin)
  • Outages have occurred but none has caused serious disruption
  • If an outage does cause a significant disruption we will ensure that any assessment affected is reviewed to ensure fairness to candidates

In any case, short outages tend to be inconvenient rather than catastrophic and the worst-case scenario of losing the Hosting UK service entirely and permanently is to be back online within 24 hours. Currently, none of TLM's qualifications is tied to a specific time point therefore there are no key deadlines that if missed by 24 hours would lead a candidate to miss the opportunity to get the qualification.   In terms of risk assessment, the fundamental risk to delivering a qualification is having a specific critical time where the candidate has to participate.

In 2015 TLM implemented online testing as part of a level 2 qualification that is eligible for headline performance points.  This has been field-tested with a non-accredited football qualification based in Singapore. The security in delivering the test is designed to have minimum points of failure. (More details on this below) There is a trade-off in risk between allowing centres flexibility over the times that different groups sit the online exams and the consequent possibility of content leaks and the chance that even a small outage disrupts a timed test for all. If all candidates do the test at a specific time all at the same time, the risk of a serious failure is unacceptably high. There will be maximum pressure on the system and concurrent use means insufficient personnel available to support many simultaneous requests for help should they occur. Since all Centres must sign agreements to uphold professional standards before using the systems it is less likely that there will be malicious intent but it would be possible for those attending an earlier exam to give information about the content to a candidate taking a later paper. Having more than one version of the exam, such that candidates taking it at the same site at different times get at least a proportion of different questions mitigates the risk. By staggering the exam times we also make it easier for centres to manage their IT facilities since a smaller number of terminals is needed and it is less disruptive to timetabling. In considering risk, all of these factors need to be taken into account so that the cost-benefit is sensible in the actions taken. This is both on the supply side, and the centre side in terms of the administrative overhead locally, beyond any qualifications fees paid.

Design of online tests and associated security

Delivering a test through a computer can be done in three principal ways

  1. Download test software to each computer and run each instance of the application separately.
  2. Download a test to a local network server and deliver the test software from it.
  3. Deliver the test directly from the internet.

In most cases to this point, delivery of online tests has required the installation of some proprietary software application(s) locally, either on the server or deployed to workstations. The advantage of this is that it enables control to be exercised over local machines with specific ways of, for example, using the technology to block access to local resources or internet access. The disadvantage of these methods is that they incur two types of costs. The first is a license cost for any proprietary software not owned by the company delivering the test and the second is in the administrative overhead associated with installing the software. This can be more involved than it first appears since there are many possible systems configurations that could conflict with the software settings. A further disadvantage is that it tends to confine delivery to a single platform, MS Windows at a time when it is actually now a minority computing platform taking into account mobile technologies. There is also the issue of data transfer from the Centre to the Awarding Organisation and the more complex the system the greater the risk of data losses. Risk is again complicated with associated costs.

We have based TLM's solution to these issues on four basic principles

  1. All online exams will be supervised in the same way as paper-based exams making the risks comparable.
  2. All exams should be deliverable on any platform that has a reasonably up-to-date standards-compliant web browser.
  3. There should be no need to download and install software.
  4. All centres can opt to take the exam on paper but it will be more expensive reflecting the higher costs of delivery.

What are the risks associated with delivering an examination through a standard web browser?

The most obvious is internet access and searches. It is very difficult to use a software solution to this because if it was easy to install software directly from a browser on a local machine there would be nothing to stop malware being deployed in exactly the same way. There is a more elegant solution. Restrict the user to a specific area of the screen while taking the test and disable keyboard shortcuts that enable the user interface to be bypassed. The user only needs the alphanumeric keys in a test and we can detect any movement of the mouse. Restricting the operating area on the screen it makes it impossible for users to access other resources and with supervision, it reduces the risk to the same level as in a conventional paper-based exam. The system is designed to control the release of the test questions to specific times and only to enable access to particular tests authorised for the particular candidate at a particular time. Results are transferred directly to the server so the risk of data loss through a local machine crash is minimised. Some types of questions can be marked automatically eg multiple choice and that reduces the risk of transcription errors as well as costs associated with stationery and mark readers employed in more conventional settings.  Extended and open-ended answers are linked to mark schemes and systems management to make marking tests more efficient, again lowering costs and mitigating human error.

Evidence management and submission

The evidence management system on the community learning site is optional.  It supports self-assessment, peer assessment, independent local assessment and verification and external verification and moderation. Centres can use as much or as little of this system as they want.  The most significant risks with these systems are more related to human factors than technology. If a learner submits work as evidence the assessor must be confident that it is the student's own work and that it supports the assessment criteria appropriately. All assessors sign an agreement to uphold these standards and this is part of the initial training as well as handbook documentation. The evidence uploaded on the Evidence management needs to comply with TLM Plagiarism – policy and procedures  and TLM Malpractice and Maladministration Policy. The evidence management system also provides a record and audit trail of coursework and since it is always available online, any of it can be externally checked at any time by moderators and at low cost. This again reduces risk by making it less expensive and easier to make checks.

3. Choice of platforms

Diverse Operating Systems: We have transitioned from an exclusive use of Linux-based and open-source systems to a more diverse approach that includes Windows 10 on our laptops. This shift aims to maintain flexibility, reduce costs, and mitigate risks associated with dependencies on single points of supply.

There are two aspects to consider. 

1. The fundamental infrastructure; is the provision of servers, server-side software, TLM-specific systems such as the online Centre Management Site and the Community Site

The company has adopted the Ubuntu GNU/Linux platform and open-source systems to reduce costs and risk associated with dependencies on single points of supply.

2. Desktops

Choosing a platform, such as Windows, for IT security involves considering various factors. While Windows has historically faced more security challenges than some other operating systems like Linux, Microsoft has made significant strides in enhancing the security of its platform. 

1. Security Improvements:

Microsoft has continuously invested in improving the security features of Windows. Recent versions, such as Windows 10 and Windows Server 2019, include enhanced security measures to protect against modern threats.

2. Security Patching and Updates:

Windows provides regular security updates and patches to address vulnerabilities. These updates can be crucial for mitigating emerging threats and keeping the system secure.

3. Security Tools and Features:

Windows comes with built-in security tools such as Windows Defender (antivirus and anti-malware) and BitLocker (disk encryption). These tools contribute to a more secure computing environment.

4. Active Directory Security:

Active Directory, a Windows feature, is widely used for identity and access management. It provides robust tools for managing user accounts, permissions, and group policies, enhancing overall security.

5. Application Compatibility:

Many organizations use software applications that are specifically designed for Windows. Choosing a platform with high application compatibility reduces the risk of compatibility issues that could lead to security vulnerabilities.

6. Security Awareness Training:

Windows environments often benefit from a user-friendly interface, which can make it easier to implement security awareness training for end-users. Educated users are less likely to fall victim to social engineering attacks.

7. Ecosystem Integration:

Windows integrates well with other Microsoft products and services, creating a cohesive ecosystem that can be managed centrally. This integration can streamline security management processes.

8. Support and Documentation:

Windows has extensive support and documentation resources. In the event of security incidents or issues, the availability of resources can aid administrators in resolving problems and implementing best practices.

9. Regulatory Compliance:

Windows environments can be configured to comply with various regulatory requirements, and Microsoft often provides guidance and tools to assist organizations in meeting compliance standards.

10. Multi-Factor Authentication (MFA):

Windows supports multi-factor authentication, adding an extra layer of security to user logins and access control.

The economies of scale mean that outsourcing the infrastructural provision has significant cost-benefit. Control of the development is, however, maintained in-house with specific elements contracted out to low-risk suppliers with whom we have long-term established relationships. We are confident that the current systems can scale to any requirements without too much difficulty. The main issue is in having the volume of business to justify the increased costs.

4. Maintenance

There are two aspects to maintenance. The fundamental infrastructure maintenance; is the provision of servers, server-side software and its maintenance and the maintenance of TLM-specific systems such as the online Centre Management Site and the Community Site.

The online Centre Management Site is maintained and developed using a LAMP stack approach and the code is managed using GIT. The community site is maintained through a combination of administrators and users since the whole point of the community is to encourage user-generated learning resources. This site currently has over 33,000 pages many of them user-generated.

5. Monitoring

The Open Source principle "Many eyes make bugs shallow" is employed with user feedback encouraged to enable improvements, fault finding and bug fixes. All TLM members monitor the use of systems and discussions related to improvements are discussed regularly both informally and in formal evaluation reports. Monitoring of mailing lists and forums will alert technical support staff to any need to review the malware policy. Local systems are patched routinely from monitoring alerts for security updates. At present this together with training in sound user practice reduces any need for for anti-virus and anti-spyware software. This results in further savings.

6. The certification site

The certification site is managed using software applications provided by Hosting UK.  The code developed by TLM is managed through the GIT distributed revision control system.  Any changes resulting in code development that will affect end users must be agreed upon with the Chief Assessor or Senior Account Manager before implementation. Test and development sites are used for prototyping that are completely separate from the active site. The password systems built into the certification site mean that weak user passwords are not allowed. The Technical Support Manager is responsible for the configuration and general technical management of the Certification Site including issues of security and ensuring software is appropriately updated.

7. The community site

The community site is an optional resource made freely available to the community. It is not as critical as the certification site but it does contain learner work. (They are advised to keep their own backups of important files)  The software environment of the community site is Drupal. When a significant upgrade is to be performed, it will take place during the summer vacation period when there is the lowest usage. The procedure is to check that the current modules needed for the current operation are available. If they are, a test site is created to test migrating current data to the new version. Testing of the data migrated to the new environment is then undertaken over a two-week period with TLM staff performing typical user operations. Any problems are rectified. Once the test period is ended a meeting is held of all staff to confirm that the migration should be continued. If there are any objections these must be resolved before implementing the change.

Minor changes to the configuration of the community site eg to the Primary Links menu, must be notified to the Chief Assessor before implementation. Changes to news items and general information can be made by the Office Administration team as appropriate. The Director of Administration and Finance vets all account applications for the community learning site to prevent spammers and advertising pests from setting up accounts. This is in addition to the normal captcha facilities.

8. Workstations and mobile technologies

The configuration of individual workstations and mobile technologies is left to the individual but must as a minimum include the default firewall settings. Windows systems must be protected by up-to-date anti-malware software.

9. General information strategy

Some information needs to be secure, other information is intended to be spread widely. The strategy is to provide systems that treat information appropriately for its intended use and are not bound by proprietary and closed technologies. This is an inherent part of the TLM qualifications development. There is a collection of policies related to these issues from the Creative Common Share Alike licensing of much of the information on the community site to secure private web pages for management meeting minutes to the complete separation of the certification site from general use. TLM is registered with the Data Protection registrar and provides information to educate users about the safe and secure use of digital information. There is an inevitable balance to be struck between making information available to promote learning and sharing and restricting information for privacy and safety.  Achieving this balance is a significant feature in the overall information strategy. In the world of global digital communications, we are trying to move away from business practices based on file attachments and technologies that were designed for a world where digital information systems rely on replicating and moving information rather than holding information centrally and making it available to relevant parties on demand. This does depend on the business processes of other people since communicating information is bi-directional. It is in the interest of all who want to reduce the costs associated with the awarding process to maximise the use of internet-based technologies and move away from proprietary desktop applications. In the World of HTML 5 and beyond, the standards-compliant web browser can replace most expensive and cumbersome desktop office applications.

10. Procedures for dealing with technical issues

Technical issues fall into 2 categories

  1. Urgent
  2. Important

Any issue that affects users' ability to log in and use the system should be treated as Urgent and important and reported in the first instance to the CEO. The DoA will assess the situation and take such action as is necessary to resolve the issue as soon as possible. Progress should be made public by posting a message on the front page of the website explaining the situation and estimated time of resolution.

If notified by the DoA the Technical Manager will make resolution of the problem the first priority and will draw up on such support from other members of the team or externally as deemed appropriate.

Issues that are important but do not have an immediate effect on users will be triaged by notifying the DoA. She will decide on the urgency of the issue and allocate time and expertise to it determining the priority against other issues and the general business of the organisation.

11. Disaster recovery policy

A disaster is a specific case of technical, human or physical failures that if unaddressed will halt or seriously impair the function of the business.  The key risks are:


Incapacity of key personnel. No single person is so critical that the general business could not operate. However, if all personnel were to be incapacitated at the same time there would be a significant problem. Since there are no times when all are in the same place at the same time this is not very likely but it is the most serious risk to cessation of the business. The only way to recover from such an extreme disaster would be to cooperate with another Awarding Organisation to maintain continuity. There is sufficient documentation to enable a professional to take over and manage the TLM business and we have appropriate relationships with colleagues in other awarding organisations.

Loss of IT systems

Should there be a total loss of all IT systems and data, (unlikely given the hosting backup strategies, Hosting UK process with daily backups) the policy is to contact the regulator and proceed with data recovery.

In the matter of loosing a day worth of data all customers would be notified should the customers have their own data backups. To mitigate the risk, system are in the progress to be implemented for hosting services providing three times per day backups.

12. Disposal of assets and data security

Any computer hardware which has hosted sensitive or confidential data will be treated appropriately to make the data inaccessible to third parties. As a minimum, drives will be low-level formatted and filled with new random data before disposal. In cases where the hardware is to be scrapped, or in cases where the data is judged to be critically confidential the hard drives will be physically destroyed to make data retrieval impossible. To dispose of sensitive data assets held online, a file of the same size and name as the original, filled with random data will be uploaded to replace the file containing the sensitive data thus destroying the sensitive data. Backups are recycled every 2 weeks and therefore backup data will be destroyed on a 2-week cycle. In general, sensitive data should not be stored or transferred on USB keys, CDs, discs and other removable media. Using a secure network connection and strong passwords is generally a more appropriate approach than copying data as the policy is to keep copies of sensitive media to a  minimum.

Audit and review

Systems will be under constant scrutiny and review with evidence gathered from customers and the community as well as staff. The great majority of staff are IT literate at graduate level or above. Nevertheless, systems and methods are discussed with independent external colleagues to ensure that good and affordable practice is in place. A formal independent audit will be invoked if there is evidence of need.

13. Cookie Policy

The cookie policy is designed to meet the new PECR act derived from EU e-privacy directive 2009. up dated on 26 May 2011.


Return to index