PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY

Similar documents
Enabling Safe Multi-Computer Usage with Flash Memory. Flash Memory Summit Session 101 Consumer Applications Panelist: Jay Elliot

Talk IN THIS EDITION. Fall 2017

Teleworking and access to ECHA IT systems

Security Risk Analysis

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse

(1) COMNAVRESFOR Telework Information Technology Strategy

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

VCU Health System PatientKeeper Connect. Request Instructions

Emergency Medical Services Division Policies Procedures Protocols

Guide to Enterprise Telework and Remote Access Security (Draft)

Advanced HIPAA Communications and University Relations

The Application and Use of Telepresence Robots. April 2011

Android Guide January 2017

STEP BY STEP SCHOOL. Data Protection Policy and Privacy Notice

6G Invigilation of Exams: Procedure

10/24/2012. ebenefits. ebenefits Briefing Objectives. Provide ebenefits overview. How to obtain a Premium account

INCOMPLETE APPLICATIONS WILL NOT BE PROCESSED

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

Helping healthcare: How Clinical Desktop can enrich patient care

Glossary for the Information Society Questionnaire Definitions and methods of calculation

NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015

LAKE COUNTY COMMON PLEAS COURT GENERAL DIVISION

Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS)

U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy

The future of patient care. 6 ways workflow automation will transform the healthcare experience

Looking Ahead The Future of Health Information and Informatics

Report No. DODIG March 26, Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES

VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM

MedCheck Frequently Asked Questions (FAQ) (Physician, AHP) GETTING STARTED


Mobile Device Use: Increasing Privacy and Security Awareness for Nurse Practitioners

Rialto Police Department Policy Manual

ONESOURCE FRINGE BENEFITS TAX ONESOURCE FBT INSTALLATION GUIDE 2017 STAND-ALONE INSTALLATION AND UPGRADE GUIDE. Thomson Reuters ONESOURCE Support

work without walls Best Business Practices to Enable Remote Working By Rieva Lesonsky

GLOBALMEET RELEASE 4.0

DOCUMENT CONTROL Title: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy. Version: Reference Number: CL062

HIPAA Training

Precedence Privacy Policy

ethesis Submission Guide: PGR Students

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Edith Cowan University Research Management System. Reviewing Research Proposals in ECURMS: A guide for Associate Deans (Research)

Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK

HIPAA Privacy and Security Training for Researchers

Security Risk Analysis and 365 Days of Meaningful Use. Rodney Gauna & Val Tuerk, Object Health

DATA PROTECTION POLICY

Instructions to apply for fellowships

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation

Diabetes Eye Screener / Photographer Job Description

Performance Centre Hirer s Handbook (Schools) 2018

Downloading Application Viewer

ACCME Data Request Form 792_ Page 1 of 8

!"#$%&'"()!&*+,'#-).!/)*0() 1."+2. Kevin Glinski Lead Developer Evangelist

Facility scheduler hca medcity login

GLOBALMEET GLOBALMEET WEB & AUDIO USER GUIDE

Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008)

a health care puzzle 911 System

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Deadline for bid submissions: 9:00 a.m. CST, Monday, September 10, INTRODUCTION

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

I. PURPOSE DEFINITIONS. Page 1 of 5

Personal Electronic Devices Acceptable Use Policy

CONTINUOUS IMPROVEMENT INITIATIVE GUIDELINES OCTOBER 2017

East Carolina University 2010 Annual HIPAA Privacy Training

MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET. Here are a few important pointers to help you fill out the Worksheet:

1:1 Computer RFP School Year Harrison School District Two

AIM Alberta Online Measurement Tool Manual. Instructions for Use Part 1: Set Up and Data Collection

Grants emanagement System (GeMS)

eprint MOBILE DRIVER User Guide

SM-PGN 01- Security Management Practice Guidance Note Closed Circuit Television (CCTV)-V03

Find & Apply. User Guide

DEFCON Authenticator. with Dual USB Port Hub

Sample Privacy Impact Assessment Report Project: Outsourcing clinical audit to an external company in St. Anywhere s hospital

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

A protocol for using electronic notes in psychological therapies (talking treatments)

Performance Centre Hirer s Handbook 2018

Allworx Reach and Reach Link

Genesis Touch Video Conferencing Customer Training. Honeywell HomMed

GDPR Records Management Policy

One Size Doesn t Fit All

Netrust SSL Web Server Certificate Renewal Application Enrolment Guide

Soarian Clinicals View Only

HIMSS Security Survey

Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

Request for Proposal OGL Information Technology Security Audit

Tenet ICD-10 Training Information AFFILIATED PHYSICIANS

Trillium Health Grant Management Requirements Document. Version: Draft Prepared by: Matthew Metcalf 10/6/2014

Information Privacy and Security

ASSESSMENT REGULATIONS

GROW AFRICA INVESTMENT FORUM

Technical Considerations of Telecommuting

REQUEST FOR PROPOSALS (RFP) Information Technology Services

CENTRAL TEXAS MEDICAL CENTER

GEMSD Clinical and Anatomical Skills Guide

HIPAA Privacy Training for Non-Clinical Workforce

Privacy and Security Training for Connecting Ontario. PACE Cardiology April, 2017

Strengthening Regulations Governing Use of Portable Media. Captain Stuart C. Smith Jr. Major Amy B. Irvin

The Impact of New Technology in Health Care on Privacy

Transcription:

CLASSIFICATION Internal DOCUMENT NO: DOCUMENT TITLE: OIL-IS-PRO-MDTP PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY VERSION NO 1.0 RELEASE DATE 28/02/2015 LAST REVIEW DATE 31.03.2017 PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY Prepared by Reviewed by : Information Security Manager : CISO

Owner : CISO Document Control Document Owner Classification Publication Date CISO Internal 23/03/2015 Revision History Version Date Summary of Changes 1.0 28/02/2015 Initial Release

Contents 1 Objective...... 4 2 Scope...... 4 3 Responsibilities... 4 4 Procedure Statement... 4

1. Objective The objective of this procedure is to ensure that security of information and systems, accessed through teleworking and mobile working are given due importance. It is essential that employees have the knowledge that security procedures and policies exist and they are understood and adhered to. 2. Scope The scope of these procedures includes all persons/parties who have access to information and information systems belonging to or under the control of. Processing devices that can be used as part of teleworking or mobile working include: PCs (home based, touchdown centres etc.), laptops and notebooks, tablet PCs, smart phones, personal digital assistants (PDAs), digital cameras, mobile phones and any other mobile device that record and/or process information. Removable media is anything that data can be copied, saved and/or written on to which can then be taken away and restored onto another computer (e.g. CD, DVD, flash drives, USB data sticks, portable hard drives). 3. Responsibilities ISC is responsible for ensuring that all employees and managers are aware of security policies and that they are observed. Managers need to be aware they have a responsibility to ensure employees have sufficient, relevant knowledge concerning the security of information and systems. Designated owners of systems, who have responsibility for the management of the information systems and information, need to ensure that staff are aware of their responsibilities towards security. Designated owners of systems and information need to ensure they uphold the security policies and procedures. 4. Procedure Statement 1. For teleworking and mobile working, access to IT information, networks and applications (including email) can be attained via the ADSL link provided to selected people in OIL or by secure VPN (Virtual Private Network) connection, on the desktop of IT commissioned devices, wherever OIL network is not or cannot be provided. 2. It is possible to access OIL email from a remote location (such as home) using non-wireless or wireless technology. This should only be attempted using a web browser via https://oilmail.oilindia.in/owa/. Employees should ensure they pick the tick box stating if they are using a private or shared computer according to the rules given on the entry web page. Employees must ensure when using this service that https is displayed at the start of the address line and the padlock symbol is displayed on the browser window. At the end of using this email service employees must logoff OIL webmail and close the browser window. Failure to do so can leave the account accessible to hackers. 3. Connection to the OIL network, for accessing SAP and other applications, through VPN should only be attempted using the domain logon and password credentials which employees are issued with.

4. Extra care should be taken to properly close all applications, network connections and web browsers when using PCs, mobile devices and software not officially provided by OIL. Passwords, logon credentials and sensitive files can be left behind on un-trusted devices, making them readily available to subsequent users. 5. Pursuing a connection via Wi-Fi to the OIL Network should not be attempted unless connection can be assured through the known OIL user ID/password based authentication. Free Wi-Fi provided in malls, airports or hotels should not be used to connect to OIL network to access OIL information resources. 6. Users conducting teleworking/mobile working should not allow or give permission for unauthorised users (including family and friends) to use that PC/mobile device. 7. Any information concerning passwords, usernames, network credentials or requirements/ability used to access OIL s information and systems by teleworking/mobile working must not be shared with other staff, unauthorised users, third party vendors, family, friends or members of the public. 8. Teleworking and/or mobile devices provided by OIL should only be used by authorized parties for authorized OIL business or purposes in accordance with OIL s Acceptable Use Policy and associated security policies. 9. A password should be set up and used on all mobile equipment that can be locked by use of a password. For example android devices can be set locked using a password and this facility should not be disabled by the user. 10. In the event that a user becomes aware of an information or data breach or accidental disclosure, this matter must be reported immediately via the OIL s Incident Reporting Procedures. In such an event, password for the user ID of the affected user will be reset immediately to minimise the risk.