{"id":369,"date":"2016-08-02T19:26:55","date_gmt":"2016-08-02T23:26:55","guid":{"rendered":"https:\/\/blissbook.com\/blog\/?p=369"},"modified":"2016-08-02T19:31:18","modified_gmt":"2016-08-02T23:31:18","slug":"creating-an-information-and-data-security-policy","status":"publish","type":"post","link":"https:\/\/blissbook.com\/blog\/creating-an-information-and-data-security-policy\/","title":{"rendered":"Creating an Information and Data Security Policy"},"content":{"rendered":"<p>The importance of safeguarding your company\u2019s and your company\u2019s customers\u2019 data is obvious. Since I wrote about data breaches a year ago in regards to <a href=\"https:\/\/blissbook.com\/blog\/how-to-place-a-security-freeze-to-prevent-identity-theft\/\">how to place a security freeze to prevent identity theft<\/a>, the list of prominent organizations who\u2019ve suffered from data breaches is long. <a title=\"Disney Data Breach\" href=\"http:\/\/www.tripwire.com\/state-of-security\/latest-security-news\/disney-confirms-data-breach-of-playdom-forums-servers\/\" target=\"_blank\">Disney<\/a>, <a title=\"Hillary Data Breach\" href=\"http:\/\/www.reuters.com\/article\/us-usa-cyber-democrats-investigation-exc-idUSKCN1092HK\" target=\"_blank\">Hillary Clinton\u2019s campaign<\/a>, the <a title=\"DNC Data Breach\" href=\"http:\/\/www.reuters.com\/article\/us-usa-election-wikileaks-idUSKCN108011\" target=\"_blank\">Democratic National Committee<\/a>, the <a title=\"UCONN Data Breach\" href=\"http:\/\/today.uconn.edu\/2015\/07\/uconn-responds-to-data-breach-at-school-of-engineering\/\" target=\"_blank\">University of Connecticut<\/a>, <a title=\"Omni Data Breach\" href=\"http:\/\/oag.ca.gov\/system\/files\/NoticeofDataBreach070816_0.pdf?\" target=\"_blank\">hotel<\/a>(<a title=\"Kimpton Data Breach\" href=\"http:\/\/krebsonsecurity.com\/2016\/07\/kimpton-hotels-probes-card-breach-claims\/\" target=\"_blank\">s<\/a>)&#8230; the list goes on \u2013 and that\u2019s just in the last 45 days!<\/p>\n<p>Your company can reduce the risk of a data breach by having strong data safeguards in place. A great way to disseminate these data safeguards with an Information and Data Security Policy in your <a title=\"Digital Employee Handbook\" href=\"https:\/\/blissbook.com\" target=\"_blank\">employee handbook<\/a>. This article covers an overview of all the different information that you may want to include in your data security policy.<\/p>\n<p><!--more--><\/p>\n<h2>Passwords<\/h2>\n<p>Most data breaches do not happen <a title=\"Movie Hacking\" href=\"https:\/\/www.youtube.com\/watch?v=u1Ds9CeG-VY\" target=\"_blank\">as depicted in the movies<\/a>. They typically start with access to one person\u2019s account via <a title=\"Social Engineering\" href=\"https:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)\" target=\"_blank\">social engineering<\/a> and spread from there. That\u2019s why it\u2019s important that every employee puts in the effort to keep their accounts secure.<\/p>\n<p>Your IT staff should decide how passwords are created, stored, shared, and communicated. Many companies use services like <a title=\"1Password\" href=\"https:\/\/1password.com\" target=\"_blank\">1Password<\/a>, <a title=\"Dashlane\" href=\"https:\/\/www.dashlane.com\" target=\"_blank\">Dashlane<\/a>, or <a title=\"LastPass\" href=\"https:\/\/lastpass.com\/\" target=\"_blank\">LastPass<\/a> to accomplish these tasks. If you do use those services, make sure employees know how to set them up and use them.<\/p>\n<h2>Other Secret Information<\/h2>\n<p>Provide guidance on how employees can securely communicate sensitive information, such as credit card numbers, social security numbers, license keys, and so on. This information should never be written down on paper that can be misplaced or stolen, and it should not be recorded in any software that stores it forever (like email).<\/p>\n<h2>IT Infrastructure<\/h2>\n<p>There are many things to consider for how to handle security for your IT infrastructure. Your IT staff will likely have a list of things to communicate. In general, here\u2019s what should be covered.<\/p>\n<h4>General Info<\/h4>\n<p>How to use IT infrastructure. You probably want to mention things like:<\/p>\n<ul>\n<li>No malevolent hacking.<\/li>\n<li>No illegal activity.<\/li>\n<li>Keep confidential information safe.<\/li>\n<li>Respect copyright laws.<\/li>\n<li>Keep your web browsing PG-13.<\/li>\n<\/ul>\n<h4>Privacy<\/h4>\n<p>Be clear that your company owns all IT infrastructure (hardware and software) distributed to employees and that you have the right to access and\/or monitor it at any time.<\/p>\n<h4>Personal Use<\/h4>\n<p>Most company devices are used for some amount of non-work related activity. Employees should be informed of any requirements around this use. If there\u2019s a lot to say, consider creating a separate \u201cCommunication Systems and Acceptable Use\u201d policy. Stand-alone BYOD (Bring Your Own Device) policies are fairly common nowadays as well.<\/p>\n<h3>Operational Security<\/h3>\n<p>If your company, like ours, stores confidential information on software or hardware you\u2019ve created, you should outline how that data is secured. Describe rules\/guidelines around:<\/p>\n<ul>\n<li>Password management for your servers and databases<\/li>\n<li>Software updates (how and when)<\/li>\n<li>Database backups<\/li>\n<li>Application security best practices<\/li>\n<li>API keys<\/li>\n<li>Access control to the databases, code, servers, and physical hardware<\/li>\n<li>How activity is logged and who can access that data<\/li>\n<li>Intrusion detection<\/li>\n<\/ul>\n<h2>Network Security<\/h2>\n<p>Tell employees about a VPN, the company\u2019s WiFi, or any requirements when using public WiFi.<\/p>\n<p>&#8212;-<\/p>\n<p>That about wraps it up. A good Data Security Policy will go a long way towards helping your employees keep confidential information secure. Every employee handbook should have one! For that reason, we\u2019ve added a basic one to the starter handbook that every new Blissbook customer gets when they <a title=\"Sign Up for Blissbook\" href=\"https:\/\/blissbook.com\/sign-up\" target=\"_blank\">sign up<\/a>.<\/p>\n<p>If you want to see a specific example policy, take a look at our <a title=\"Sample Information &amp; Data Security Policy\" href=\"http:\/\/flightmanual.rocketwhale.com\/#section-57a10601a03934fa050d06a6\" target=\"_blank\">Information and Data Security Policy<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The importance of safeguarding your company\u2019s and your company\u2019s customers\u2019 data is obvious. Since I wrote about data breaches a year ago in regards to how to place a security freeze to prevent identity theft, the list of prominent organizations who\u2019ve suffered from data breaches is long. Disney, Hillary Clinton\u2019s campaign, the Democratic National Committee, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25,47,22,26],"tags":[53,52],"class_list":["post-369","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cya","category-employee-handbooks","category-handbook-content","category-inspiration-2","category-policy-management","tag-data-security","tag-information-security"],"_links":{"self":[{"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/posts\/369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":4,"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/posts\/369\/revisions"}],"predecessor-version":[{"id":374,"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/posts\/369\/revisions\/374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/media\/370"}],"wp:attachment":[{"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/media?parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/categories?post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blissbook.com\/blog\/wp-json\/wp\/v2\/tags?post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}