Mobile Computing And Work At Home

From Bloomex Wiki
Revision as of 19:10, 2 September 2024 by Admin (talk | contribs) (→‎Location Independence)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Approval for Remote Access

  • Business Need: Remote access to Bloomex computers is granted only to users with a demonstrated business need. Permission for such access is provided by and annually reviewed by the user’s manager.
  • Training Requirement: All remote users must complete a specialized training class before remote access privileges are granted or renewed annually.

Location Independence

  • Security Compliance: Security requirements apply equally at remote locations as they do at Bloomex offices. Sensitive information stored on computing devices or on paper must be kept secure.

Access Control Packages

  • Protection Measures: All portable and remote computers used to process Bloomex business information must be protected with a IT-approved access control package. This package must:
    • Prevent unauthorized use of the machines.
    • Prevent unauthorized access to Bloomex information.
    • Guard against virus infections and other types of malicious software.

Handling of Sensitive Information

  • Encryption Requirements: Sensitive (Confidential or Restricted) information must not be removed from Bloomex offices. If removal is necessary, the information must be protected with encryption facilities provided by IT and approved by Information Security.
    • Transmission Security: Sensitive information transmitted over public networks, such as the Internet, must use encryption facilities approved by Information Security.
    • Hard Disk Encryption: All portable and remote systems storing sensitive Bloomex information must employ hard disk encryption.

Theft of Equipment

  • Anti-Theft Measures: If Bloomex information systems equipment is not stored in a locked area, users must use anti-theft measures, such as locking cables, to secure the equipment.
  • Information Security: Passwords, user IDs, and other access information must not be stored on portable or remote systems.

Travel Considerations

  • Security Practices: When traveling, users should employ anti-theft techniques:
    • Store equipment in a secure location, such as a locked room or vehicle trunk.
    • Use locking cables if a secure area is not available.
    • Avoid discussing sensitive information in public places, including hotel lobbies, restaurants, and elevators.
    • Refrain from viewing or discussing sensitive information on a computer screen or hardcopy report in public areas, such as airplanes.
    • Avoid providing sensitive information in voice mail or pager messages.

This policy is designed to ensure that Bloomex’s sensitive information remains secure, regardless of the location or method of access, and to mitigate risks associated with mobile computing and working from home.