Page 23 - Information_Security_Program
P. 23

WORKSTATIONS, LAPTOPS, AND DEVICES [DP270]
        Back to Table of Contents

        Scope: Enterprise
        Distribution: All employees with computer access to privacy‐restricted information
        Purpose: To comply with the Security Rule; To restrict access to e‐PHI to authorized users.
        External Regulation or Standard: 45 CFR 164.310(b) ‐‐ Workstation Use; 45 CFR 164.310(c) ‐ Workstation
        Security; PCI DSS 4.3; 45 CFR 164.310(d)(2)(iv) ‐ Device and Media Controls PCI DSS 2.1, 3.2, 3.3, 4.1, 5.1, 6.145 CFR 164.312(a)(2)(iii)
        ‐ Access Control

        Who is Responsible     Statement     Policy, Standard, or Procedure Statement
                                Number
         Employees with          DP270.1     When transporting a laptop, the laptop must be locked in a trunk or hidden from plain
         Laptops                             view in a locked vehicle if a trunk is not available.
         IT Staff                DP270.2     All workstationsconnecting to the organizationnetwork will maintain the
                                             organization's standard desktop image.
         Directors and           DP270.3     All staff laptops and all Services and Programs Division staff desktops located at non‐
        Managers to request                  St. Paul Campus sites will be issued with hard‐disk encryption enabled, and employees
        when laptop is                       will not disable the hard‐disk encryption.
        assigned; Chief Officers
         or Director of
         Information
         Technology, Privacy
         and Data Security to
         approve; IT Staff to do
        and document with
         approvals
         Directors and           DP270.4     All software downloaded onto an organizationworkstation must complete the
        Managers to request,                 organization's software‐approval process. Employees can request downloads of
        Chief Officers approve,              approved software, if no cost. The approved software list is maintained by IT Staff.
        order and document,                  Approved software that includes licensing or other purchase costs must be approved
        IT Staff to do                       by the division Chief Officer and ordered through IT Staff.   Software not on the
                                             approved list must be reviewed and approved by the Director of Information
                                             Technology, Privacy and Data Security and IT Staff (for  potential security and
                                             technology risks), prior to ordering. If approved, Directors must request approval
                                             through the division Chief Officer prior to IT Staff allowing the software download.
         Employees               DP270.5     Users will lock their computer screens when unattended, and shut their computer
                                             down when leaving the building or before transporting an encrypted device.

         Employees               DP270.6     Employees will not open or store Privacy Restricted data on mobile data devices such
                                             as, laptops, handheld devices, or jump drives not approved and encrypted according
                                             to organizational standards.
         Employees               DP270.7     Mobile devicescontaining PrivacyRestricteddata, when delivered outside the
                                             organization, must be delivered in a trackable manner and hand‐ delivered to the
                                             intended recipient or an approved staff member.
         IT Staff                DP270.8     Electronic media will be destroyed beyond recovery by using a military wipe
                                             program to delete files, or via degaussing or otherwise physically destroying the
                                             media. If use of a third‐party vendor is needed, the IT Staff will first gain approval
                                             from GESM.







                                                                                                         22 | P a g e
        GES CONFIDENTIAL
   18   19   20   21   22   23   24   25   26   27   28