ENISA s ten security awareness good practices July 09
|
|
|
- Felicia Martin
- 9 years ago
- Views:
Transcription
1 July 09
2 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European Member States and European institutions in network and information security, giving advice and recommendations and acting as a switchboard of information for good practices. Moreover, the agency facilitates contacts between the European institutions, the Member States and private business and industry actors. Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Isabella Santa, Senior Expert Awareness Raising [email protected] Internet: Legal notice Notice must be taken that this publication represents the views and interpretations of the authors and editors, unless stated otherwise. This publication should not be construed to be an action of ENISA or the ENISA bodies unless adopted pursuant to the ENISA regulation ((EC) No 460/2004). This publication does not necessarily represent the state of the art and it might be updated from time to time. Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sources including external websites referenced in this publication. This publication is intended for educational and information purposes only. Neither ENISA nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication. Reproduction is authorised provided the source is acknowledged. European Network and Information Security Agency (ENISA), 2009.
3 June ENISA s ten security awareness good practices July 2009
4 4 Contents ABOUT ENISA... 2 EXECUTIVE SUMMARY... 5 ENISA S TEN SECURITY AWARENESS GOOD PRACTICES... 6 USE OF PASSWORD... 6 Use a strong password... 6 Change your password regularly... 6 Keep your password secret... 7 Use different passwords... 7 PROTECT YOUR COMPUTER... 7 USE AND THE INTERNET WITH CARE... 7 USE OF PORTABLE CORPORATE DEVICES: LAPTOPS, USB DRIVES, MOBILE PHONES AND BLACKBERRYS... 8 Laptops... 8 USB drives... 8 Mobile phones and BlackBerrys... 8 HANDLE INFORMATION WITH CARE... 9 VISITORS... 9 REPORT LOSS AND/OR DAMAGE TO PORTABLE CORPORATE DEVICES AND INCIDENTS... 9 PROTECT INFORMATION OUTSIDE YOUR ORGANISATION... 9 COMPLY WITH THE CORPORATE SECURITY POLICIES AND PROCEDURES PROVIDE FEEDBACK TO FURTHER FINE-TUNE ENFORCED SOLUTIONS AND SECURITY POLICIES CONCLUSIONS REFERENCES... 12
5 5 Executive summary This booklet touches upon crucial and important issues of awareness of information and communication technologies (ICT) for organisations. It does so by providing security good practices to focus employees attention on information security and allow them to recognise IT security concerns and respond accordingly. Good practices can be used as guidance for the main steps to undertake when promoting information security awareness. ENISA has produced this booklet to sensitise employees to information security risks and remind them of the basic golden rules. It is available for use in any information security training programme, awareness activity and company website. The ENISA s ten security good practices are part of the set of tools developed in line with the information security awareness campaign that the Agency has launched across Europe.
6 6 Recent high-profile data breaches have raised concerns, leading private and public organisations to understand that policies and technologies must be put in place to secure sensitive corporate information. These controls have to ensure the ability to secure information on the network as well as the opportunity to manage data which enter and leave the company. While policies and technology are certainly a critical part of any information security programme, these measures alone cannot deliver sufficient information security in practice. Awareness of the related risks and available safeguards is the first line of defence for security. Employees are the real perimeter of the organisation s network and their behaviour is a vital aspect of the total security picture. Protecting organisations begins with making sure employees understand their roles and responsibilities in safeguarding sensitive data and protecting company resources and assist the organisation in keeping computers and network safe. To this end, ENISA is engaged in positively influencing employees behaviour towards information security, changing the mindset of the human element in order to achieve greater information security self-awareness. Thus, the Agency has produced this booklet containing ten security good practices. These good practices are a great tool which will sensitise employees to information security risks and remind them of the basic golden rules. This document is intended to be used by any organisations which are tasked to run initiatives which help employees learn how to protect corporate information and assets proactively. 1. Use of password Your password is the equivalent of the lock and key to your house on the Internet. Passwords are a major defence, and developing good password practices will help keep your sensitive personal information and identity more secure. Use a strong password The password of your computer is the key to access all information both corporate and personal you have stored on your computer and online accounts. Use a strong password to protect your data: use at least eight characters; combine letters (capital and lowercase), numbers and symbols. The greater variety of characters that you have in your password, the harder it is to guess. Don t use personal information name, child s name, birthdates, etc. that someone might already know or easily obtain and try to avoid common words: some hackers use programs that try every word in the dictionary. Change your password regularly If you believe your system has been compromised change passwords immediately.
7 7 Keep your password secret Your password is unique and must not be shared with anybody. Whenever possible, try to commit your passwords to memory. Have a strategy to memorize them. If you write your passwords down, be careful where you store them. Do not leave these records of your passwords anywhere that you would not leave the information that they protect. Use different passwords Use different passwords for each online account you access (or at least a variety of passwords). If you use the same passwords on multiple accounts, an attacker who gains the access to one account will be able to access to all of your accounts. 2. Protect 3. Use your computer Lock your desktop when you leave your desk to go for a meeting, a break and/or lunch. Do not allow other people to plug their USB drive into your computer, especially personal non-secure drives. Don't install or use illegal and/or unauthorised software as you are compromising your data security and breaking the law. Unknown outside programs can open security vulnerabilities in your organisation s network. Don t connect any personal disk, music player and/or USB drive to your computer. Don t connect your personal laptop to the network of your organisation as it may contain viruses or malware. and the Internet with care Don t open unknown s and attachments. Don t click on any hyperlinks contained in a suspicious . Forward whether it is appropriate. Consider deleting the history of the message before doing so. Share documents in PDF format to ensure that the files cannot easily be changed. Confidential information should be encrypted when sent by . Surf the Internet carefully. Do not share information about your organisation and duties on social networking sites. Avoid participating in blogs in which your views and opinions may be interpreted as those of your organisation. Don t download documents and material from untrusted parties. Do not access, download, store or send any illegal or offensive material. Remember that what you surf on the Internet using your workstation can be traced back.
8 8 4. Use of portable corporate devices: laptops, USB drives, mobile phones and BlackBerrys Laptops Don't install or use illegal and/or unauthorised software as you are compromising your data security and breaking the law. Switch off wireless connections when not required. Connect your laptop to the network of your organisation regularly to update your security checks. Back up the information stored in your laptop. Lock your laptop when you leave your desk to go for a meeting, a break and/or lunch. Do not allow other people to plug their USB drive into your laptop, especially personal non-secure drives. Don t leave your laptop unattended. Don t leave your laptop on view in the car. USB drives Use an encrypted USB drive. Limit the number of corporate data which you store on your USB drive, especially on personal non-secure drives. Attach USB drives to key chains/lanyards to avoid loss of media: the reduced size of USB flash drives makes these devices easier to lose or be stolen. Furthermore, the higher storage capacity increases the potential amount of data at risk for unauthorised access. USB flash drives are usually put in bags, backpacks, laptop cases, jackets, trouser pockets or are left on unattended workstations. The number of incidents has increased recently as USB drives get lost, misplaced, borrowed without permission or stolen. Invite users to put the USB flash drive in read-only mode using the physical switch to avoid virus transmission: some USB flash drives include a physical switch to put the drive in a read-only mode to avoid the host computer from writing or modifying the data on the drive. Scan USB flash drive after copying files from an untrusted and/or unauthorised machine to avoid virus transmission. Before plugging your USB drive into someone else s computer, delete all files which are not relevant for the purpose of that action. Backup information: be able to recover data residing on USB flash drives. Mobile phones and BlackBerrys Switch off wireless connections (i.e. Bluetooth and WLAN) when not in use. Bluetooth technology enables electronic devices to communicate with each other by using a short-range radio link. Some Bluetooth mobile handsets suffer from software bugs which lead to the practice of Bluejacking and Bluesnarfing. Bluejacking is when someone sends an anonymous text by creating a message and then sending it to another Bluetooth activated mobile. Bluejacking can be used to send unwanted messages. Bluesnarfing is used to copy personal information such as the contacts list from a handset to another. Don t leave your mobile and BlackBerrys unattended. Otherwise, it could lead
9 9 to data loss. 5. Handle 6. Visitors 7. Report 8. Protect information with care Mark any document with the appropriate classification code. Protect sensitive content with a password to help prevent someone from changing or deleting it. Clean desk policy: don t leave sensitive data lying around. Carefully dispose documents. Don t leave sensitive information in shared conference facilities or meeting rooms in order to prevent their exposition to anyone using the room after you. Secure printing: print, copy and scan information only if necessary. Remember to collect the document from the printer s output-tray. Always shred documents containing sensitive information and/or marked confidential. Don t store any information on your local drive. Ensure that any third party working with you has signed a non-disclosure agreement before providing any sensitive information. All visitors should be registered and signed in when they arrive and out when they depart. All visitors should be provided with a visitor identity badge that needs to be worn at all times while they are visiting the corporate building. Escort visitors around the corporate building at all times. Letting visitors roam around the office is not secure. loss and/or damage to portable corporate devices and incidents Report loss and/or damage to portable corporate devices (i.e. mobile, PDA or USB drive) to the IT department of your organisation. Report any found portable corporate device to the IT department of your organisation. Report any security breaches and/or incidents, even if you are unsure. Report any suspicious activities on your workstation and unexpected unavailability of an application if not warned in advance by your IT department. information outside your organisation When you are outside your organisation, ensure you keep sensitive information and equipment secure at all times to prevent theft or loss. In particular when you are in public places handle information with care. Be aware that someone can overhear your conversation. Don t make your organisation s confidential information available to everyone. When travelling or working from a remote place protect yourself against shoulder surfing.
10 10 9. Comply 10. Provide with the corporate security policies and procedures Comply with implemented corporate security policies and procedures. Ensure the confidentiality, integrity and availability of data. Respect legal requirements such as copyright restrictions, intellectual property, privacy and software licences. If you see colleagues acting in breach of corporate security policies and procedures, report it immediately. feedback to further fine-tune enforced solutions and security policies Provide feedback to further fine-tune enforced solutions and security policies. Suggest the purchase of any additional software if necessary to carry out your tasks. Ask questions or make suggestions for improving solutions and security policies.
11 11 Conclusions Information must be protected from unauthorised access and employees should understand their roles and responsibilities in safeguarding sensitive data and protecting company assets. Employees should know what they can and can't take home (company laptops, etc.), what they can and can't do with company resources, and what, if any, role they have in making backups and using security technology. To this end, ENISA is engaged in positively influencing employees behaviour towards information security, changing the mindset of the human element in order to achieve greater information security self-awareness. By keeping these security awareness good practices in mind, employees will focus their attention on information security and allow them to recognise the most common IT security risks and respond accordingly.
12 12 References ENISA, Secure USB flash drives, June 2008, available at ENISA, Secure printing, April 2008, available at
13 13 ISBN-13: Doi: /12769 Catalogue number: TP EN-C
14 TP EN-C 14 ISBN
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
IT Security DO s and DON Ts
For more advice contact: IT Service Centre T: (01332) 59 1234 E: [email protected] Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Data and Information Security Policy
St. Giles School Inspire and achieve through creativity School Policy for: Date: February 2014 Data and Information Security Policy Legislation: Policy lead(s) The Data Protection Act 1998 (with consideration
Preventing identity theft
Preventing identity theft About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
Working Practices for Protecting Electronic Information
Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that
School Information Security Policy
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
BSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
CYBERSECURITY POLICY
* CYBERSECURITY POLICY THE CYBERSECURITY POLICY DEFINES THE DUTIES EMPLOYEES AND CONTRACTORS OF CU*ANSWERS MUST FULFILL IN SECURING SENSITIVE INFORMATION. THE CYBERSECURITY POLICY IS PART OF AND INCORPORATED
NETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Employee Teleworking Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Introduction... 2 2. Teleworking Risks... 3 3. Safeguards for College
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Information Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
HELPFUL TIPS: MOBILE DEVICE SECURITY
HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information
HIPAA and Health Information Privacy and Security
HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient
Computer Security at Columbia College. Barak Zahavy April 2010
Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a
Policy Document. IT Infrastructure Security Policy
Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT
NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0
NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security
Angard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
How To Ensure Your School Is Safe Online
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
ICT Security Policy for Schools
WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of
SCRIPT: Security Training
SCRIPT: Security Training Slide Name Introduction Overview 1 Overview 2 Overview 3 Text Welcome to the MN WIC Program Security Training Module for all MN WIC Program staff provided by the MN Department
Security Awareness Quiz Questions
Category Question Awareness Quiz Questions Answer 1. Why is backing up data files important? Backups ensure that the information you need is there when you need it If the information is damaged it can
General Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
Network Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Guidelines for smart phones, tablets and other mobile devices
Guidelines for smart phones, tablets and other mobile devices Summary Smart phones, tablets and other similar mobile devices are being used increasingly both privately and in organisations. Another emerging
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING
ROYAL BOROUGH OF WINDSOR AND MAIDENHEAD SECURITY POLICY INFORMATION HANDLING Introduction and Policy Aim The Royal Borough of Windsor and Maidenhead (the Council) recognises the need to protect Council
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness
IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives
Information Security Guide for Students
Information Security Guide for Students August 2009 Contents The purpose of information security and data protection...1 Access rights and passwords...2 Internet and e-mail...3 Privacy protection...5 University
Secure Your Information and Communication Technology Devices
You should pay attention to the following items bef the Internet: Secure Your Information and Communication Technology Devices Install proper anti-virus software P.3 Log on as a user and not as an administrator
Guidance on the Use of Portable Storage Devices 1
Guidance on the Use of Portable Storage Devices Introduction Portable storage devices ( PSDs ) such as USB flash memories or drives, notebook computers or backup tapes provide a convenient means to store
Summary Electronic Information Security Policy
University of Chichester Summary Electronic Information Security Policy 2015 Summary Electronic Information Security Policy Date of Issue 24 December 2015 Policy Owner Head of ICT, Strategy and Architecture
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
Appendix A Cyber Security 1 Copyright 2012, Oracle and/or its affiliates. All rights Overview This lesson covers the following topics: Define cyber security. List the risks of cyber security. Identify
2.2 Access to ICT resources at the Belfast Metropolitan College is a privilege, not a right, and all users must act honestly and responsibly.
1 Purpose The purpose of this document is to set out the College's policy and provide guidance relating to the responsible use of the College's ICT resources and systems. 2 General 2.1 Belfast Metropolitan
This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.
FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should
MOBILE DEVICE SECURITY POLICY
State of Illinois Department of Central Management Services MOBILE DEVICE SECURITY Effective: October 01, 2009 State of Illinois Department of Central Management Services Bureau of Communication and Computer
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Data Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
ONE-2-ONE LEARNING LAPTOP PROGRAM 2011
GLENUNGA INTERNATIONAL HIGH SCHOOL ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 Department of Education and Children s Services T/A South Australian Government Schools CRICOS Provider No. 00018A 1. VISION and
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
