Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology



Similar documents
Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Policy. London School of Economics & Political Science. Application Control. Jethro Perkins Information Security Manager IMT

INFORMATION SECURITY MANAGEMENT POLICY

Remote Access and Mobile Working Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.1. Approval. Review By June 2012

Standard. Information Security - Information Classification. Jethro Perkins. Information Security Manager. Page 1 of 12

Policy. London School of Economics & Political Science. PCI DSS Compliance. Jethro Perkins IMT. Information Security Manager. Version Release 1.

Encryption Policy (ISP03)

Newcastle University Information Security Procedures Version 3

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

Information Security Incident Management Policy September 2013

INFORMATION SECURITY PROCEDURES

Network Security & Connection Policy

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Ixion Group Policy & Procedure. Remote Working

Remote Access and Home Working Policy London Borough of Barnet

Information Security It s Everyone s Responsibility

Policy. London School of Economics & Political Science. Encrypted Authentication IMT. Jethro Perkins. Information Security Manager. Version 1.

St Hugh s School. Remote Access Policy

Conditions of Use. Communications and IT Facilities

Bring Your Own Device Policy

Mobile Security Standard

Mobile Devices Policy

BARNSLEY CLINICAL COMMISSIONING GROUP S REMOTE WORKING AND PORTABLE DEVICES POLICY

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Third Party Security Requirements Policy

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Summary Electronic Information Security Policy

Data and Information Security Policy

INFORMATION TECHNOLOGY SECURITY STANDARDS

ISO27001 Controls and Objectives

TELEFÓNICA UK LTD. Introduction to Security Policy

Research Information Security Guideline

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Cyber and Data Security. Proposal form

HP Laptop & Apple ipads

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Encryption Policy Version 3.0

Information Governance Strategy & Policy

Information Security Policies. Version 6.1

INFORMATION SECURITY POLICY

PS177 Remote Working Policy

How To Protect Decd Information From Harm

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

EXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader

Portable Devices and Removable Media Acceptable Use Policy v1.0

Remote Access and Network Security Statement For Apple

Information Services. The University of Kent Information Technology Security Policy

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_ Effective of 7 Title: Corporate Information Technology Usage Policy

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device)

Information Security Policy for Associates and Contractors

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Information security controls. Briefing for clients on Experian information security controls

ISO Controls and Objectives

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Proactive controls to mitigate IT security risk

DHHS Information Technology (IT) Access Control Standard

Remote Working and Portable Devices Policy

The potential legal consequences of a personal data breach

USE OF PERSONAL MOBILE DEVICES POLICY

Data Security Policy. 1. Document Status. Version 1.0. Approval. Review By June Secure Research Database Analyst. Change History. 1 Version 1.

Information Security It s Everyone s Responsibility

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

Corporate Information Security Policy

ABERDARE COMMUNITY SCHOOL

CCG LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

NHS Business Services Authority Information Security Policy

STRONGER ONLINE SECURITY

HIPAA Compliance and the Protection of Patient Health Information

Copyright 2013, 3CX Ltd.

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training

Small businesses: What you need to know about cyber security

Originator: Chris Parkin Date: 4 March 2015 Approved by: Senior Management Team Type: Policy. Computer Security Policy

BYOD Policy for [AGENCY]

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

Guideline on Safe BYOD Management

Corporate Information Security Management Policy

Information Governance Framework. June 2015

ISSA-UK Information Security for Small and Medium Sized Enterprises

Computer Use Regulations

Keeping Data Safe When Using Mobile Devices

LSE PCI-DSS Cardholder Data Environments Information Security Policy

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

How are we keeping Hackers away from our UCD networks and computer systems?

EndUser Protection. Peter Skondro. Sophos

How-To Guide: Cyber Security. Content Provided by

[BRING YOUR OWN DEVICE POLICY]

Harper Adams University College. Information Security Policy

INFORMATION SECURITY POLICY

How To Protect Research Data From Being Compromised

Electronic Information Security Policy

Small businesses: What you need to know about cyber security

Acceptable Use of ICT Policy. Staff Policy

Information Technology Security Review April 16, 2012

Transcription:

London School of Economics & Political Science Information Management and Technology Guidelines Remote Access and Mobile Working Guidelines Jethro Perkins Information Security Manager Summary This document outlines the controls from ISO27002 that relate to the LSE's Information Security Policy and Infrastructure that apply to the LSE, across all departments. Version Release 1.1 Date Library reference dd month yyyy IMT-GD-101

Table of contents 1 Introduction... 3 1.1 Purpose... 3 1.2 Scope... 3 1.3 Definitions... 3 2 Responsibilities... 4 3 Guidelines... 5 3.1 Principles guiding use of remote services and mobile devices... 5 3.2 Information Assessment... 5 3.3 Remote and mobile working with Confidential information... 5 3.4 Remote and mobile working with Restricted information... 6 3.5 Remote and mobile working with Internal Use information... 6 3.6 Remote and Mobile working with Public information... 6 3.7 Device Theft and information Breaches... 6 3.8 Policy Awareness and Disciplinary Procedures... 6 3.9 Further Policies, Codes of Practice, Procedures and Guidelines... 7 3.10 Review and Development... 7 IT Services reference: ISM-PY-001 Page 2 of 7

1 Introduction Mobile working and remote access form an increasingly normal and accepted part of working life and study. It can provide benefits to LSE, its employees and students by enhancing communication; supporting flexible working practices; enabling new modes of study, scholarship and research; and facilitating the more efficient and effective use of time. However the proliferation of mobile computing devices and remote access methods, and the increasing threats from malware and hackers, mean that information is increasingly at risk of being stolen, lost, leaked, inappropriately copied, or corrupted. This combination of factors puts LSE, users of LSE systems and stakeholders dependent on LSE systems at risk of breaching ethical, legislative, regulatory and contractual requirements. The Department of Information and Management Technology (IMT) aims to provide the opportunities for secure, safe, accessible and available remote access and mobile working through its systems and policies, through the provision of technical controls on information access and through raising user awareness and encouraging good working practices. These guidelines aim to outline user responsibility with regards to any remote access systems provided by LSE, and when working with LSE information using mobile devices. 1.1 Purpose The primary purposes of these guidelines are to: 1. Ensure all users are aware of their responsibilities when working remotely or on mobile devices, and understand the associated risks. 2. Provide Remote Access and Mobile Working Guidelines in line with LSE s Information Security Policy and Information Classification Standard. 3. Ensure that all users understand their own responsibilities for protecting the confidentiality, integrity and availability of the data that they handle remotely. 4. Protect LSE from liability or damage through the misuse of its IT facilities. 1.2 Scope These guidelines apply to all authorised users and the data/ information held, processed or controlled by or on behalf of LSE. They concern the end use of information used remotely and / or on mobile devices and does not cover the technical security provision of the systems that provide access to information. LSE does not make provision for all its IT systems and services to be made available remotely. Where the need for confidentiality or integrity of data is extremely high, such as when handling data classified as Confidential, remote access will be explicitly denied on request of the data owner, or as contractually demanded. Users should be aware that the availability and speed of remote access is subject to a number of external factors beyond LSE s control, such as the effectiveness of any Internet Service Provider leased line, or any third party supplied router, firewall, or anti-virus software in being able to create and maintain a connection to LSE systems and services. 1.3 Definitions Remote Access: accessing LSE systems from outside of LSE premises with an LSE owned, privately owned or publicly accessible computer, laptop, smart phone or other device. The information accessed and processed continues to reside on LSE systems. Mobile Working - carrying out work (i.e. the creation, storage, processing and transport or transfer of data/ information) as an employee of LSE from outside of LSE premises. IT Services reference: ISM-PY-001 Page 3 of 7

2 Responsibilities Members of LSE: All members of LSE, LSE associates, agency staff working for LSE, third parties and collaborators on LSE projects will be users of LSE information, and, may therefore be able to use information remotely or using mobile devices. This carries with it the responsibility to abide by the Information Security Policy, and its principles and any relevant legislation, supporting policies, procedures and guidance. It also carries the responsibility to assess the risk to information and handle it appropriately. Any access to LSE information is also governed by LSE s Conditions of Use of IT Facilities at LSE. Data Owners / Guardians: Data owners and guardians have responsibility for ensuring that appropriate information can be accessed remotely and that, if necessary, additional safeguards to the access of data are requested from Information Management and Technology. Data owners and guardians include: Principal Investigators, Heads of Department, Heads of Research Centres, Line managers Records Managers / School Secretary Responsible for LSE compliance with the Data Protection Act Department of Information Management and Technology, Library IT and STICERD IT Staff: Responsible for ensuring that the provision of LSE s IT infrastructure is consistent with the demands of the Information Security Policy, and current good practice. Information Security Manager: Responsible for these guidelines and subsequent information security policies and will provide specialist advice throughout the School on information security issues. Information Security Advisory Board Responsible for the advising on and recommending information security guidelines, and recommending policies to the Information Technology Committee, assessing information security risks, identifying and implementing controls to risks. IT Services reference: ISM-PY-001 Page 4 of 7

3 Guidelines 3.1 Principles guiding use of remote services and mobile devices The following principles underpin all considerations of remote and mobile working, and should be considered by all users prior to accessing data remotely: 1. Confidentiality how will access to your information be restricted to the appropriate people? 2. Integrity how will information be kept in such a way as to ensure its accuracy, and that it is only changed by the appropriate people? 3. Availability how will information be available to all who need to access it? 3.2 Information Assessment The primary considerations for all members of the LSE community when either using remote access services, or working from a mobile device, are: 1. Know what data / information you are using 2. Consider what level of data classification should or does apply to it (for more information please refer to LSE s Information Classification Standard) 3. Understand and act upon any particular contractual, ethical or other requirement attached to the information 4. Consider how the mobile devices and the information you are processing can be managed in accordance with their information classification, or if they can t, how you can explicitly accept and manage the risk. If, after you assess your information, you are not comfortable with the conditions your information is held in, or how it can be accessed remotely, please talk to IMT about any steps that can be taken to improve the situation. 3.3 Remote and mobile working with Confidential information It is important that people accessing Confidential data remotely or on mobile devices clearly assess the risks they are exposing these data and the systems storing them to, and consider appropriate steps to keep these secure. We advise that when using remote or mobile devices to process or access data classed as Confidential under LSE s Information Classification Standard, the following minimum standards are applied: 1. All appropriate system updates have been applied to the device (e.g. Windows updates, ios updates, application updates) 2. Where appropriate to the device, Anti-Virus and anti-spyware tools are installed and regularly updated (LSE offers Sophos for free to all LSE staff and students; free anti-virus tools are available for Windows, Apple Mac and Android devices, but are not currently available for iphones and ipads) 3. Access to the device is controlled by username / password, or in the case of tablets / smartphones, a complex passphrase that meets the requirements of an LSE user account password (see the web page on LSE s password requirements) 4. The screens of any devices should regularly lock after periods of inactivity, requiring password authentication to re-enter them 5. These data are not accessed from, processed on or stored on public machines (e.g. machines in internet cafes or other public spaces) Additionally, if you are processing Confidential data on a mobile device (rather than just accessing it remotely) we recommend the following steps: 1. The hard drive or storage area of the device is encrypted (see LSE s Encryption Guidelines for further information) 2. Any external storage devices are also encrypted (see LSE s Encryption Guidelines for further information) IT Services reference: ISM-PY-001 Page 5 of 7

3. If the data are going to be sent to / from the device, they are encrypted before transit (see LSE s Encryption Guidelines for further information) 4. Important data is regularly backed up Please be aware that if you are travelling abroad with a laptop that has an encrypted drive or that contains encrypted data, you may be required by the authorities of that country to decrypt the data or hand over the encryption keys. Additionally, if the encryption software you are using is not a mass market product freely available to the public, you may need to obtain a Cryptography Open General Export Licence (OGEL) before travelling abroad with it. This will not be the case if you are using any of the products included in our Encryption Guidelines. See the UK Government s note on the export of Cryptographic items at https://www.gov.uk/export-of-cryptographic-items and for more information about OGEL rules https://www.gov.uk/dual-use-open-general-export-licences-explained. 3.4 Remote and mobile working with Restricted information Restricted information would not expose LSE to significant censure or reputational damage were it lost, hacked or leaked. It may however, lead to negative publicity and censure. A series of measures are therefore still recommended in order to mitigate the risks: 1. All appropriate system updates have been applied to the device (e.g. Windows updates, ios updates, application updates) 2. Where appropriate to the device, Anti-Virus and anti-spyware tools are installed and regularly updated (LSE offers Sophos for free to all LSE staff and students; free anti-virus tools are available for Windows, Apple Mac and Android devices, but are not currently available for iphones and ipads) 3. Access to the device is controlled by username / password, or in the case of tablets / smartphones, a complex passphrase that meets the requirements of an LSE user account password (see the web page on LSE s password requirements) 4. The screens of any devices should regularly lock after periods of inactivity, requiring password authentication to re-enter them 5. These data are not accessed from, processed on or stored on public machines (e.g. machines in internet cafes or other public spaces) 3.5 Remote and mobile working with Internal Use information 1. All appropriate system updates have been applied to the device (e.g. Windows updates, ios updates, application updates) 2. Where appropriate to the device, Anti-Virus and anti-spyware tools are installed and regularly updated (LSE offers Sophos for free to all LSE staff and students; free anti-virus tools are available for Windows, Apple Mac and Android devices, but are not currently available for iphones and ipads) 3. Access to the device is controlled by username / password, or in the case of tablets / smartphones, a passphrase or PIN 3.6 Remote and Mobile working with Public information There are no restrictions on working with Public information. 3.7 Device Theft and information Breaches Please report the theft of any device holding Confidential or Restricted information, or any loss of or suspected inappropriate access to Confidential or Restricted information, to the Information Security Manager or the Records Manager. 3.8 Policy Awareness and Disciplinary Procedures IT Services reference: ISM-PY-001 Page 6 of 7

The loss or breach of confidentiality of personal data is an infringement of the Data Protection Act 1998 and may result in criminal or civil action against LSE. The loss or breach of confidentiality of contractually assured information may result in the loss of business, financial penalties or criminal or civil action against LSE. Therefore it is crucial that all users of the School s information systems adhere to the Information Security Policy and its supporting policies as well as the Information Classification Standard and the Data Protection Policy. Any security breach will be handled in accordance with all relevant School policies, including the Conditions of Use of IT Facilities at the LSE. 3.9 Further Policies, Codes of Practice, Procedures and Guidelines These guidelines sit beneath LSE s overarching Information Security Policy. Other supporting policies have been developed to strengthen and reinforce these guidelines. These, along with associated codes of practice, procedures and guidelines are published together and are available for viewing on LSE s website. All staff, students and any third parties authorised to access LSE s network or computing facilities are required to familiarise themselves with these supporting documents and to adhere to them in the working environment. The below list of current policies is in no way authoritative and new policies will be published on the LSE website as they become available. Associated polices: Conditions of Use of IT Facilities at LSE Policy on the use of mobile telephony equipment Policy on the use of school-funded iphones Conditions of use of the residences network Password Policy Asset Management Policy Data Protection Policy Standards and Guidelines: Information Classification Standard Encryption Guidelines Guidelines on the use of Cloud storage 3.10 Review and Development These guidelines shall be reviewed and updated regularly to ensure that they remain appropriate in the light of any relevant changes to the law, organisational policies or contractual obligations by the Information Security Advisory Board (ISAB) and an auditor external to IT Services as appropriate. Additional regulations may be created to cover specific areas. ISAB comprises representatives from all relevant parts of the organisation. It shall oversee the creation of information security and subsidiary policies. The Information Security Manager will determine the appropriate levels of security measures applied to all new information systems. IT Services reference: ISM-PY-001 Page 7 of 7