preview

Information Systems Security

Good Essays

NT2580 – Introduction to Information Systems Security | Project Part 2 Student SSCP® Domain Research Paper | Michael RyanNov. 27, 12Oyvind “OJ” Boulter | Mobile devices such as smartphones and tablets have allowed major productivity in the field and in the office and are starting to become an integral part of the business lifestyle. Although their intelligence allows greater productivity, it also makes them vulnerable to attack. A network is only as secure as its weakest link. Personal Communication Devices and Voicemail Policy 1.0 Purpose This document describes Information Security 's requirements for Personal Communication Devices and Voicemail for Richman. 2.0 Scope This policy applies to any use of Personal …show more content…

2.0 Scope This policy applies to any mobile device issued by Richman or used for Richman business which contains stored data owned by Richman. 3.0 Policy All mobile devices containing stored data owned by Richman must use an approved method of encryption to protect data at rest. Mobile devices are defined to include laptops, PDAs, and cell phones. Users are expressly forbidden from storing Richman data on devices that are not issued by Richman, such as storing Richman email on a personal cell phone or PDA. 3.1 Laptops Laptops must employ full disk encryption with an approved software encryption package. No Richman data may exist on a laptop in cleartext. 3.2 PDAs and Cell phones Any Richman data stored on a cell phone or PDA must be saved to an encrypted file system using Richman-approved software. Richman shall also employ remote wipe technology to remotely disable and delete any data stored on a Richman PDA or cell phone which is reported lost or stolen. 3.3 Keys All keys used for encryption and decryption must meet complexity requirements described in Richman’s Password Protection Policy. 3.4 Loss and Theft The loss or theft of any mobile device containing Richman data must be reported immediately.

Get Access