to protect information assets of the institute policy
play

To protect information assets of the Institute Policy approved by - PowerPoint PPT Presentation

To protect information assets of the Institute Policy approved by the Institute in Mar 2009 Information Security Organisation VP(ADM): Overall in-charge Information Security Officer (Director of ITS, aka Head of ITS): policy


  1.  To protect information assets of the Institute  Policy approved by the Institute in Mar 2009  Information Security Organisation ◦ VP(ADM): Overall in-charge ◦ Information Security Officer (Director of ITS, aka Head of ITS): policy implementation ◦ VP / Dean: oversees the implementation of the respective departments ◦ Heads of Department: departmental plan and procedure; develop BCP

  2.  Information Classification  Labeling  Storage  Copy and Transmission of Information  Disclosure  Disposal  Incident Report

  3. Highly Confidential Internal Public Confidential • HKID no. • Staff & • Departmental • Information student data meeting intended to • Appraisal notes be released • Budget • Salary info. to the public • Internal • Tender • Exam paper policy & document before procedure release Notes: Data owners to determine the classification.

  4.  Highly confidential & confidential information are required to marked with its classification ◦ Use chops for paper document ◦ For digital document, use filename like Confidential - xxx ◦ Use watermark or mark “Confidential” in PDF, Word or Excel documents ◦ For storage media such as DVD, thumb drive, marking should be made clearly on the media itself  Internal information does not require explicit labeling

  5.  Should be stored and processed by Institute- owned equipment within the campus  Should be stored in a secure manner (central IS system, DMS system with access control & password protection)  Not recommended to store in portable media, like notebook computers, PDAs, etc.  Portable storage media containing confidential information must be encrypted

  6.  Proper authorization is required  Should copy the minimal amount that is needed, and destroy the copies after use.  Classification and protection same as the original information  Transmission via email ◦ Make sure recipient’s email address is correct ◦ The confidential information sent as an attachment with password protection.

  7.  Only be disclosed with authorization ◦ ensure the people receiving the information aware of the classification ◦ third party to sign non-disclosure agreement  Highly confidential information ◦ only be disclosed by the data owner or the data custodian ◦ Keep the record of who have access to the information

  8.  Paper & CD/DVDs should be shredded  Use hard disk wiping tools for hard disk, thumb drives, etc.  Magnetic tapes and floppy disk should be degaussed or physically destroyed

  9.  Report information security incidents through normal management channels ASAP and ISO must also be informed.  Examples of incidents ◦ Loss of highly confidential data stored in thumb drive ◦ Computer account compromised which could potentially expose any confidential information

  10.  HKIEd Information Security - www.ied.edu.hk/infosec/  HKSAR Infosec website – www.infosec.gov.hk  Personal Data (Privacy) Ordinance - www.pcpd.org.hk/english/ordinance/ordfull. html

  11.  Access your awareness of the Infosec Policy  Read the http://www.ied.edu.hk/infosec and the policies documents  Do the 10-questions self-review test  Answers will be revealed to you if you failed  Refer to the web site or policies if needed  URL for the online self-review test ◦ http://tgweb.ied.edu.hk:8080/tester/  There is no pass or fail!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend