References

Report
Appendix A – Document Destruction
•
“Company shall retain records for the period of their immediate or current use, unless longer
retention is required by law or to comply with contractual requirements. Such records outlined in this
policy include, but are not limited to: paper, electronic files, and voicemail records regardless of
where the document is stored, including network servers, desktop or laptop computers and
handheld computers and other wireless devices or telephones with text messaging and/or instant
messaging capabilities. Hardcopy documents will be destroyed by shredding according to the
document retention schedule. Electronic copies will be destroyed by proven means to destroy such
data according to the document retention schedule.”
•
Helpful resources
-
FTC Disposal Rule: http://www.ftc.gov/os/2004/11/041118disposalfrn.pdf
FTC: http://business.ftc.gov/documents/alt152-disposing-consumer-report-information-newrule-tells-how
The Watershed Institute:
http://www.thewatershedinstitute.org/resources/publications/FinalDocPolicy.pdf
FIPP 1, 2 and 4
Appendix B – Security
•
Helpful resources
-
SANS Institute – www.sans.org
- This website contains a number of sample security policies, including for computers,
emails, HIPAA, mobile and wireless.
- View a primer on developing security policies: http://www.sans.org/securityresources/policies/Policy_Primer.pdf
InfoSec Reading Room:
http://www.sans.org/reading_room/whitepapers/awareness/ultimate-defense-depthsecurity-awareness-company_395
FIPP 1 and 4
Appendix C – BYOD Policy Considerations
•
•
•
It is important for your company to create a BYOD policy before allowing any employee to BYOD.
For more information: http://www.citrix.com/site/resources/dynamic/additional/byod_best_practices.pdf.
Policies should include:
-
•
Employee responsibilities for devices;
Eligibility requirements and limitations for devices;
Limiting applications and/or data access;
Reservation of the right to wipe company data and/or the entire device;
A disclaimer of any liability of loss of personal applications or data;
Any other restrictions including but not limited to the use of browsers, wireless or other services;
Payment for the devices.
Security policy considerations include:
-
Require use of whole device password and/or requirements for when passwords must be changed;
The process for handling lost/stolen devices;
Timeline requirements for reporting lost/stolen devices;
Enforcement of password and other security measures;
Repair and/or upgrade of devices;
Requirement to install software.
FIPP 1, 2 and 4
Appendix D – Privacy
•
Helpful resources
-
-
FTC:
- http://www.ftc.gov/opa/2012/03/privacyframework.shtm
- http://www.ftc.gov/privacy/coppafaqs.shtm
- http://business.ftc.gov/documents/bus55-getting-noticed-writing-effective-financial-privacynotices
For mobile app developers visit: https://www.cdt.org/report/best-practices-mobile-applicationsdevelopers
FIPP 1, 2 and 4

similar documents