Policy: Laptop Security: Difference between revisions

From Future Worlds Center Wiki
Jump to navigationJump to search
no edit summary
No edit summary
No edit summary
 
Line 16: Line 16:
* Keep the laptop in your possession and within sight whenever possible, especially in public places such as airports, railway stations or restaurants.
* Keep the laptop in your possession and within sight whenever possible, especially in public places such as airports, railway stations or restaurants.


<P Align="justify">* If you have to leave the laptop temporarily unattended in the office, meeting room or hotel room, even for a short period of time, use a laptop security cable or similar device to attach it firmly to a desk or other heavy furniture in order to prevent easy escape of the thieve.</p>
* <P Align="justify">If you have to leave the laptop temporarily unattended in the office, meeting room or hotel room, even for a short period of time, use a laptop security cable or similar device to attach it firmly to a desk or other heavy furniture in order to prevent easy escape of the thieve.</p>


<P Align="justify">* Lock the laptop away out of sight when you are not using it (at home, in the office or in a hotel).  Never leave a laptop visibly unattended in a vehicle, it is much safer to take it with you.</p>
* <P Align="justify">Lock the laptop away out of sight when you are not using it (at home, in the office or in a hotel).  Never leave a laptop visibly unattended in a vehicle, it is much safer to take it with you.</p>


<P Align="justify">* Carry and store the laptop in a padded laptop bag or strong briefcase to reduce the chance of accidental damage.  Don’t drop it or knock it about. An ordinary-looking briefcase is less likely to attract thieves than an obvious laptop bag.</p>
* <P Align="justify">Carry and store the laptop in a padded laptop bag or strong briefcase to reduce the chance of accidental damage.  Don’t drop it or knock it about. An ordinary-looking briefcase is less likely to attract thieves than an obvious laptop bag.</p>


<P Align="justify">* If the laptop is lost or stolen, notify the Police immediately and inform the Organization as well as submit the police report to the Organization (within 48 hours). The police report should include the serial number for the lost/stolen computer.Failure to secure and submit a police report may result in personal liability for replacement cost.</p>
* <P Align="justify">If the laptop is lost or stolen, notify the Police immediately and inform the Organization as well as submit the police report to the Organization (within 48 hours). The police report should include the serial number for the lost/stolen computer.Failure to secure and submit a police report may result in personal liability for replacement cost.</p>




Line 28: Line 28:
== Virus protection ==
== Virus protection ==


<P Align="justify">* Users must take responsibility for ensuring that security updates take place on laptops in their care. The associate is obliged to take all necessary measures for the security and integrity of all date on the laptop.</p>
* <P Align="justify">Users must take responsibility for ensuring that security updates take place on laptops in their care. The associate is obliged to take all necessary measures for the security and integrity of all date on the laptop.</p>


* The anti-virus software MUST be updated at least monthly.
* The anti-virus software MUST be updated at least monthly.


<P Align="justify">* Email attachments are one of biggest sources of computer viruses.  Therefore, avoid opening any email attachment unless you were expecting to receive it from that person.</p>
* <P Align="justify">Email attachments are one of biggest sources of computer viruses.  Therefore, avoid opening any email attachment unless you were expecting to receive it from that person.</p>
   
   
<P Align="justify">* Always virus-scan the files downloaded to your laptop from any source (CD/DVD, USB hard disks, memory sticks, network files, email attachments, files from the Internet). Virus scans normally happen automatically but the IT responsible of the Organization  can tell you how to initiate manual scans if you consider necessary.</p>
* <P Align="justify">Always virus-scan the files downloaded to your laptop from any source (CD/DVD, USB hard disks, memory sticks, network files, email attachments, files from the Internet). Virus scans normally happen automatically but the IT responsible of the Organization  can tell you how to initiate manual scans if you consider necessary.</p>


* Report any security incidents (such as virus infections) promptly to the IT responsible of the Organization  in order to minimize the damage.
* Report any security incidents (such as virus infections) promptly to the IT responsible of the Organization  in order to minimize the damage.


<P Align="justify">* Respond immediately to any virus warning message on your laptop, or if you suspect a virus (e.g. by experiencing unusual file activity) by contacting the IT responsible of the Organization.  Do not forward any files or upload data onto the network if you suspect your laptop might be infected in order to avoid the spread of the virus.</p>
* <P Align="justify">Respond immediately to any virus warning message on your laptop, or if you suspect a virus (e.g. by experiencing unusual file activity) by contacting the IT responsible of the Organization.  Do not forward any files or upload data onto the network if you suspect your laptop might be infected in order to avoid the spread of the virus.</p>


* Be especially careful to virus-scan your system before you send any files outside the Organization including email attachments and CD-ROMs created by you.
* Be especially careful to virus-scan your system before you send any files outside the Organization including email attachments and CD-ROMs created by you.
Line 46: Line 46:
== Controls against unauthorized access to data ==
== Controls against unauthorized access to data ==


<P Align="justify">* You must use approved encryption software on all organization-owned laptops. Choose a long, strong encryption password/phrase and keep it secure.  You can contact to the IT responsible of the Organization for further information on laptop encryption. (If your laptop is lost or stolen, encryption provides strong protection against unauthorized access to the data.)</p>
* <P Align="justify">You must use approved encryption software on all organization-owned laptops. Choose a long, strong encryption password/phrase and keep it secure.  You can contact to the IT responsible of the Organization for further information on laptop encryption. (If your laptop is lost or stolen, encryption provides strong protection against unauthorized access to the data.)</p>


<P Align="justify">* You are personally accountable for all network and systems access under your user ID, so keep your password safe.  Do not share it with anyone including members of your family, friends or IT responsible of the Organization.</p>
* <P Align="justify">You are personally accountable for all network and systems access under your user ID, so keep your password safe.  Do not share it with anyone including members of your family, friends or IT responsible of the Organization.</p>


<P Align="justify">* Organization-owned laptops are provided for official use by authorized Associates.  Do not allow it to be used by others such as family members and friends. </p>
* <P Align="justify">Organization-owned laptops are provided for official use by authorized Associates.  Do not allow it to be used by others such as family members and friends. </p>


<P Align="justify">* Do not leave your laptop unattended and logged-on.  Before walking away from the laptop, always shut down, log off or activate a password-protected screensaver.</p>
* <P Align="justify">Do not leave your laptop unattended and logged-on.  Before walking away from the laptop, always shut down, log off or activate a password-protected screensaver.</p>




536

edits

Navigation menu