Page 703 - StudyBook.pdf
P. 703

Operational and Organizational Security: Policies and Disaster Recovery• Chapter 12  687

                    The methods of practicing due care can be found through the recommended
                 or “best” practices offered by manufacturers of equipment, operating systems
                 (OSes), and other software. For example, pushing the power button on a computer
                 will shut it down, but may also corrupt data on the machine. OS manufacturers
                 recommend that users shut down their OS in a specific way (such as by clicking
                 Shut Down on the Windows Start menu). For users to follow best practices for
                 using hardware and software, they must be educated in how to practice due care.

                 Privacy

                 Privacy has become a major issue over the last few years, as the people who use
                 technology are increasingly fearful of unauthorized persons or employers viewing
                 personal information transmitted across networks, saved on machines, or stored in
                 databases. People often have an expectation of privacy when using various tech-
                 nologies, and are unaware that actual privacy may not exist. Privacy policies spell
                 out the level of privacy that employees and clients can expect, and an organization’s
                 perspective of what is considered private information.Areas typically covered in a
                 privacy policy are:

                      ■  Unauthorized software
                      ■  E-mail
                      ■  Web site data

                    While companies may voluntarily incorporate a privacy policy, some industries
                 are required by law to maintain specific levels of privacy for client information.The
                 Health Insurance Portability and Accountability Act (HIPPA) mandates hospitals,
                 insurance companies, and other organizations in the health field to comply with
                 security standards that protect patient information.The Gramm-Leach-Bliley
                 (GLB) Act is another piece of legislation that mandates banks, credit unions, bro-
                 kers, and other financial institutions to protect information relating to their clients.
                 The GLB Act requires these institutions to inform clients of their policies regarding
                 the information collected about them, and what will be shared with other organi-
                 zations. If organizations that require privacy policies fail to comply with the legisla-
                 tion, they are in violation of federal or state laws.
                    Privacy policies commonly state that an organization has the right to inspect the
                 data stored on company equipment.This allows an organization to perform audits
                 on the data stored on hard disks of workstations, laptops, network servers, and so
                 forth. By performing these audits on a regular basis, an organization can determine
                 if employee resources are wasted on non-work-related activities, or if network



                                                                              www.syngress.com
   698   699   700   701   702   703   704   705   706   707   708