Storage of TCP & CO data on computers, and its transfer across the network eases use and expands functionality. Commensurate with that expansion is the need for the appropriate security measures. Security is not distinct from the functionality.
This Policy is written to incorporate current technological advances. The technology installed at some units may limit immediate compliance with the Policy. Instances of non-compliance must be reviewed and approved by the Chief Security Officer.
Throughout this document the term must and should are used carefully. “Musts” are not negotiable; “shoulds” are goals for the company. The terms data and information are used interchangeably in this document.
The terms system and network administrator are used in this document. These terms are generic and pertain to any person who performs those duties, not just those with that title or primary job duty. Many staff members are the system administrators for their own machines.
PURPOSE OF THIS POLICY
By information security we mean protection of TCP & CO’s data, applications, networks, mobile devices, and computer systems from unauthorized access, alteration, or destruction.
The purpose of the information security policy is:
● To establish a company-wide approach to information security.
● To prescribe mechanisms that help identify and prevent the compromise of information security and the misuse of company data, applications, networks and computer systems.
● To define mechanisms that protect the reputation of the company and allow the company to satisfy its legal and ethical responsibilities with regard to its networks’ and computer systems’ connectivity to worldwide networks.
● To prescribe an effective mechanism for responding to external complaints and queries about real or perceived non-compliance with this policy.
The company will use a layered approach of overlapping controls, monitoring and authentication to ensure overall security of the company’s data, network and system resources.
Security reviews of servers, firewalls, routers and monitoring platforms must be conducted on a regular basis. These reviews must include monitoring access logs and results of intrusion detection software, where it has been installed.
Vulnerability and risk assessment tests of external network connections should be conducted on a regular basis. At a minimum, testing should be performed semi-annually, but the sensitivity of the information secured may require that these tests be done more often.
Education should be implemented to ensure that users understand data sensitivity issues, levels of confidentiality, and the mechanisms to protect the data.
Violation of the Information Security Policy may result in disciplinary actions as authorized.
DATA CLASSIFICATION POLICY
It is essential that all company data be protected. There are, however, gradations that require different levels of security. All data should be reviewed on a periodic basis and classified according to its use, sensitivity, and importance. We have specified four classes below:
High-Risk: Information assets for which there are legal requirements for preventing disclosure or financial penalties for disclosure. Data covered by federal and state legislation, such as the Health Insurance Portability and Accountability Act (HIPAA) or the Data Protection Act, are in this class. Payroll, personnel, and financial information are also in this class because of privacy requirements.
This policy recognizes that other data may need to be treated as high-risk because it would cause damage or loss to the company if disclosed or modified. The data owner and an authorized Information Security Agent should make this determination. It is the data owner’s and the Information Security Agent’s responsibility to implement the necessary security requirements.
Confidential: Data that would not expose the company to loss if disclosed, but that the data owner and/or the Information Security Agent feels should be protected to prevent unauthorized disclosure. It is the data owner’s and the Information Security Agent’s responsibility to implement the necessary security requirements.
Personal: Data created by individuals in the course of their work for the company. This may include emails, spreadsheets, word processing documents, and other such files normally stored in an individual’s personal storage space, such as a computer’s hard drive, flash drive, or shared drive.
Public: Information that is freely available.
All information resources should be categorized and protected according to the requirements set for each classification. The data classification and its corresponding level of protection should be consistent when the data is replicated and as it flows through the company.
Data owners must determine the data classification and must ensure that the data custodian is protecting the data in a manner appropriate to its classification.
No company-owned system or network subnet can have a connection to the Internet without the means to protect the information on those systems consistent with its confidentiality classification.
High-risk data must be encrypted during transmission over insecure channels.
Confidential data should be encrypted during transmission over insecure channels.
All appropriate data should be backed up, and the backups tested periodically, as part of a documented, regular process.
Backups of data must be handled with the same security precautions as the data itself. If/When systems are disposed of, or repurposed, data must be certified deleted or disks destroyed consistent with industry best practices for the security level of the data.
ACCESS CONTROL POLICY
Data access controls must have sufficient granularity to allow the appropriate authorized access. There is a delicate balance between protecting the data and permitting access to those who need to use the data for authorized purposes. This balance should be recognized.
Where possible and financially feasible, more than one person must have full rights to any company owned server storing or transmitting high-risk data. The company must have a standard policy that applies to user access rights. This will suffice for most instances. Data owners or custodians may enact more restrictive policies for end-user access to their data.
Access to the network and servers and systems should be achieved by individual and unique logins, and require authentication. Authentication includes the use of passwords, smart cards, biometrics, or other recognized forms of authentication.
All users of systems that contain high-risk or confidential data must have a strong password – the definition of which will be established and documented by Information Technology Services (ITS). Empowered accounts, such as administrator, root or supervisor accounts, must be changed frequently, consistent with guidelines established by ITS.
Passwords must not be placed in emails unless they have been encrypted.
Default passwords on all systems must be changed after installation. All administrator or root accounts must be given a password that conforms to the password selection criteria when a system is installed, rebuilt, or reconfigured.
Logins and passwords should not be coded into programs or queries unless they are encrypted or otherwise secure.
Terminated employees should have their accounts disabled upon transfer or termination. Since there could be delays in reporting changes in user responsibilities, periodic user access reviews should be conducted by an Information Security Agent.
Transferred employee access must be reviewed and adjusted as found necessary.
Monitoring must be implemented on all systems including recording logon attempts and failures, successful logins and date and time of login and logoff.
Activities performed as administrator or super-user must be logged where it is feasible to do so.
Personnel who have administrative system access should use other less powerful accounts for performing non-administrative tasks. There should be a documented procedure for reviewing system logs.
VIRUS PREVENTION POLICY
The willful introduction of computer viruses or disruptive/destructive programs into the company environment is prohibited, and violators may be subject to prosecution.
All desktop systems that connect to the network must be protected with an approved, licensed anti-virus software product that is kept updated according to the vendor’s recommendations.
All servers and workstations that connect to the network and that are vulnerable to virus or worm attack must be protected with an approved, licensed anti-virus software product that is kept updated according to the vendor’s recommendations.
All incoming data, including electronic mail, must be scanned for viruses by the email server. Outgoing electronic mail should be scanned where such capabilities exist.
Where feasible, system or network administrators should inform users when a virus has been detected.
Virus scanning logs must be maintained whenever email is centrally scanned for viruses.
INTRUSION DETECTION POLICY
Intruder detection must be implemented on all servers and workstations containing data classified as high-risk or confidential.
Operating system and application software logging processes must be enabled on all host and server systems. Where possible, alarm and alert functions, as well as logging and monitoring systems must be enabled.
Server, firewall, and critical system logs should be reviewed frequently. Where possible, automated review should be enabled and alerts should be transmitted to the administrator when a serious security intrusion is detected.
Intrusion tools should be installed where appropriate and checked on a regular basis.
INTERNET SECURITY POLICY
All connections to the Internet must go through a properly secured connection point to ensure the network is protected when the data is classified high-risk and/or confidential.
SYSTEM SECURITY POLICY
All systems connected to the Internet should have a supported version of the operating system installed.
All systems connected to the Internet must be current with security patches.
System integrity checks of host and server systems housing high-risk company data should be performed.
ACCEPTABLE USE POLICY
Company computer resources must be used in a manner that complies with company policies. It is against company policy to install or run software requiring a license on any company computer without a valid license.
Use of the company’s computing and networking infrastructure by company employees unrelated to their company positions must be limited in both time and resources and must not interfere in any way with company functions or the employee’s duties. It is the responsibility of employees to consult their supervisors, if they have any questions in this respect.
Uses that interfere with the proper functioning or the ability of others to make use of the company’s networks, computer systems, applications and data resources are not permitted.
Use of company computer resources for personal profit is not permitted except as addressed under other company policies.
Decryption of passwords is not permitted, except by authorized staff performing security reviews or investigations. Use of network sniffers must be restricted to system administrators who must use such tools to solve network problems. Auditors or security officers in the performance of their duties may also use them. They must not be used to monitor or track any individual’s network activity except under special authorization as defined by campus policy that protects the privacy of information in electronic form.
MOBILE DEVICE POLICY
This policy applies to all electronic computing and storage devices that are considered high likelihood risk factors for loss or theft (examples include laptop computers, smartphones, and tablet computers) and used by the TCP & CO staff in the performance of their duties, and to all company data classified as high risk and confidential (see Data Classification Policy section in this document) when accessed through electronic computing, storage devices, or mobile devices, regardless of the device’s ownership. company data classified as high risk and confidential may not be released for access by devices that do not meet these requirements and should not be stored on these devices without approved justification.
All electronic computing, storage devices, and mobile devices considered a high likelihood risk factor for loss or theft that access the company’s network and are possibly exposed high risk and confidential data must be compliant with the company’s Information Security Policies and Standards. All electronic computing, storage devices, and mobile devices considered a high likelihood risk factor for loss or theft that are exposed to company data classified as high risk and confidential must be protected using encryption or with approved compensating controls to include but not limited to a passcode and a timeout to ensure that if the device is stolen or lost, no company data classified as high risk or confidential can be accessed by an unauthorized user.
TECHNOLOGY (HARDWARE AND SOFTWARE) PURCHASES/ACQUISITIONS
All technology acquisitions (whether purchases or obtained by other means) must be reviewed and approved by an authorized Information Security Agent.