Portable Devices - Healthcare Financial Management Association

Sample Policy
Mobile Data Protection; Portable Devices
This sample policy was shared by an anonymous hospital leader for posting on HFMA’s Legal & Regulatory
Forum. The name of the hospital has been removed from the policy. The Forum does not endorse any
particular policy and recommends that you adapt any policy or tool to the needs of your particular
organization.
A. Applicability
This policy is applicable to all NAME OF HOSPITAL workforce members, agents and subcontractors
that administer, support or use portable computing devices that create, receive, maintain of transmit or
electronic NAME OF HOSPITAL proprietary information, personal identification information or
protected health information.
B. Policy
It is the policy of NAME OF HOSPITAL to implement reasonable and appropriate safeguards to
protect against the risks and vulnerabilities unique to mobile data and portable data devices.
C. Background and Purpose
Portable computing and storage devices are susceptible to loss, theft and other hazards to a greater
degree than stationary desktop equipment or equipment situated in a hardened data center. The
purpose of this policy is describe the administrative, physical, and technical safeguards that managers
and system administrators should consider before permitting workforce members to utilize a mobile
data devices for work purposes.
D. Definitions
Laptop computer is a small portable computer that is light enough to carry comfortably, with a flat
screen and keyboard that fold together. A laptop has most, if not all, of the features and functionalities
of a desktop computer.
Portable computing device includes any mobile, portable or handheld device that creates, receives,
transmits or maintains electronic protected health information, or information designated by
management to be similarly protected. They include lapbook computers and personal digital assistants.
They may also include certain types of cellular phones with advance computing or data storage
capabilities beyond those associated with traditional voice communications, e.g., built-in cameras, text
message stores, networking features and the like.
Tablet computer is a computer that is about the size of a paper tablet and that emables one to now
write with a digital pen or stylus directly on its screen. There are three types:
Convertible Tablet PC—is most similar to the familiar notebook, although one very important
difference exists: its screen pivots 180 degrees and then folds down on top of the keyboard, creating
a special writing surface. This feature enables users to write directly on the surface using a digital
pen.
Slate Tablet PC—is Tablet only, with no attached keyboard. Most have an option of using a wired or
wireless keyboard if preferred.
Hybrid Tablet PC—can be used with a keyboard or detached for use as a slate only.
IM-24
Mobile Data Protection; Portable Devices
Page 2 of 19
Portable Electronic Devices (PEDs) consist of small electronic items used for storing, processing, or
transmitting information. These devices provide several benefits: convenience of sharing information,
potential to increase productivity, reduction in communication costs, and improvement in information
flow. PEDs usually have less powerful central processing unit (CPU), storage capacity, memory
allocation, and number of interfaces compared with standard desktops or laptops. PEDs are limited in
the types and amount of applications for the OS; therefore, they would occupy less bandwidth
consumption.
Personal Digital Assistants (PDAs): A PDA is a handheld computer that provides numerous
organizational capabilities (e.g., calendar, address list, to-do list, notepad). A PDA or handheld computer
is small enough to fit into a person’s hand. Some manufacturers solve the small keyboard problem by
replacing the keyboard with an electronic pen. PDAs have many of the same functionalities of a laptop.
The differences lie in the size, OS, applications, and hardware components. PDAs can be categorized
based on the OS that is used. Two main OS platforms are available: the Palm OS by Palm and Windows
Mobile (formerly, Windows CE) by Microsoft. Another less common platform is Symbian OS
(originally called EPOC) by Symbian, which is a joint venture between Ericsson, Motorola, Nokia, and
Psion. Java and Linux platforms are also available for PDAs. Most PDA OSs provide security
application programming interfaces (API) that application developers can use to enhance the security of
their applications.
Wireless Keyboards and Mice: A wireless mouse transmits telemetry data (right, left, up, and down).
Wireless keyboards, on the other hand, transmit users’ keystrokes that can be easily read by a nearby
receiver, thereby posing significant security risk. Interest in using wireless keyboards and mice is
increasing, and their use may be beneficial in some settings. These systems use numerous wireless
technologies for transmitting data to the computer (e.g., WLAN, Bluetooth, and infrared).
USB Flash Drive: a memory data storage device integrated with a USB (universal serial bus) interface.
They are typically small, lightweight, removable and rewritable. While originally sold with capacities
starting at 32 megabytes, capacities of 1 gigabyte and up are now common. Also referred to as “jump
drive” or “thumb drive”.
Mobile Phone: The mobile phone or mobile, also called a wireless, cellular phone, cell phone, cell
speaker box, or hand phone, is a long-range, portable electronic device for wireless mobile talking. It
uses a network of specialized base stations known as cell sites. In addition to the standard voice
function of a telephone, current mobile phones may support many additional services, and accessories,
such as text messaging, digital camera, email, packet switching for access to the Internet, and sending
and receiving photos and video. Most current mobile phones connect to a cellular network of base
stations (cell sites), which is in turn interconnected to the public switched telephone network (the
exception is satellite phones).
ITSS: Information Technology Security Services
CISO: Corporate Information Security Officer
Protected Health Information: information regulated by the Health Insurance Portability and
Accountability Act of 1996 and applicable regulations.
Personal Identification information: information as defined in § ______,STATE. Stat. (an
individual’s name together with Social Security number, drivers’ license number, or certain bank or
credit account information.).
IM-24
Mobile Data Protection; Portable Devices
Page 3 of 19
E. Standards
1. Addressability
These standards are addressable, not required. Each standard should be implemented if reasonable
and appropriate. If not implemented, the rationale for not implementing it must be documented, or
an alternative safeguard that meets the same objective must be implemented. The rationale for
rejection of a standard should be documented in the risk assessment, risk management plan, or
technical evaluation for the system.
2. Configuration Standards for Mobile Devices Required
NAME OF HOSPITAL -supported portable devices shall be configured according to written
configuration standards approved by the IT Risk Manager.
3. Mobile Data Safeguards
Mobile data should be protected through a combination of administrative, physical and technical
safeguards.
a. Administrative Safeguards
(1)
Identify the data that is risk. This involves compiling a description of the anticipated
uses of the device, and types of information that will be created or maintained on it, or
transmitted to or from the device.
(2)
End user education. Users of portable devices and mobile data should receive education
on the security safeguards associated with such devices and data.
(3)
Configuration standards. Standards can be set and maintained at vendor or hardware,
tools or platform level. This should be a priority when implementing device allocation
plans. Standardization will help to maximize stability and predictability of the
mobile/handheld environment. In this way, devices can be better supported and,
consequently, will be more secure. Guidelines on different levels of restrictions for
application installations and other changes in settings should be established to limit, or
avoid, potential vulnerabilities.
(4)
Track and monitor devices through inventory and asset management. Where
applicable, these tools will give critical information on diversity of device types deployed,
how they are being used and their status. This should lead to better visibility and control of
the devices used to access data and usage patterns, which can help in anticipating security
exposures. At the same time, software distribution tools should be considered to control
and standardize software images as much as possible.
(5)
Eliminate the risk, if feasible. Do not store individually identifiable information of any
kind or other sensitive information on a laptop or PDA unless, 1) there are compelling
business reasons to do so, 2) it is with the explicit approval of an appropriate level of
management, and 3) appropriate safeguards are implemented, such as those described in
this document.
(6)
Workforce termination procedures. Workforce termination procedures should include
steps to ensure the return and/or proper wiping of data on portable media and devices.
(7)
Inventory mobile data. Maintain an up-to-date inventory of portable computers,
personal digital devices and media containing information relating to work at NAME OF
HOSPITAL.
IM-24
Mobile Data Protection; Portable Devices
Page 4 of 19
(8)
Account authorization, establishment and modification: There should be written
procedures for authorizing workforce members to use a mobile device for NAME OF
HOSPITAL business, establish accounts with mobile device access privileges, modifying
access upon a change in role, and for terminating access upon a period of inactivity.
(9)
Education and training of mobile device users should cover the following topics:
(a)
Care and use of the device in accordance with manufacturer's instructions and
NAME OF HOSPITAL standards;
(b)
Instructions for connecting to and using wireless networks;
(c)
Instructions for using encryption features, if equipped;
(d)
Instructions for backing up data;
(e)
The organization’s policies for removal of ePHI and other sensitive data from the
work place;
(f)
Procedures for backup data and restoring it in case of loss or other calamity;
(g)
Procedures for reporting loss or theft
(10) Management oversight. NAME OF HOSPITAL team members should not be
permitted to remove sensitive information offsite without management's knowledge and
express permission.
b. Physical Safeguards
(1)
Promptly remove unneeded data. Without routine housekeeping, the amount of data
on a laptop's hard drive will quickly grow. By regularly removing unneeded data, you will
reduce the risk that sensitive data will fall into the wrong hands.
(2)
Label and Tag the Laptop and PDA and All Accessories (if feasible). Make sure that
everything that can be labeled is labeled with the name of the individual or organization
that owns it, and ensure that these labels are conspicuous. The potential theft value of a
laptop or peripheral is reduced greatly when additional work is required to remove the
identifying marks. Conspicuous identity labels also significantly increase the risk of a
potential thief being caught in the act of theft.
Keep your laptop or PDA with you at all times. When traveling, keep your lapto/PDA
with you. Do not pack mobile data devices with checked baggage. Meal times are
optimum times for thieves to check hotel rooms for unattended laptops. If you are
attending a conference or trade show, be especially wary—these venues offer thieves a
wider selection of devices that are likely to contain sensitive information, and the
conference sessions offer more opportunities for thieves to access guest rooms. Most
laptops are stolen from automobiles, college campuses and hotel rooms. If stowage in a
unattended vehicle is necessary, keep it in a locked trunk, and only for a very short period
of time (never overnight).
Airplane travel restrictions may prevent you from keeping your laptop with you. If so,
encryption and timely backup of all data should be considered mandatory.
(3)
Downplay or disguise your laptop or PDA. There is no need to advertise to thieves
that you have a laptop or PDA. Avoid using your portable device in public areas, and
consider non-traditional bags for carrying your laptop.
IM-24
Mobile Data Protection; Portable Devices
Page 5 of 19
(4)
Watch out for "shoulder surfers". Be on the lookout for over-the-shoulder snoops
who may attempt to discover your password.
(5)
Consider an alarm or lock. Many companies sell alarms or locks that you can use to
protect or secure a laptop. If you travel often or will be in a heavily populated area, you
may want to consider investing in an alarm for your laptop bag or a lock to secure your
laptop to a piece of furniture.
(6)
Consider storing important data separately. There are many forms of storage media,
including floppy disks, zip disks, CDs, DVDs, and removable flash drives (also known as
USB drives or thumb drives). By saving your data on removable media and keeping it in a
different location (e.g., in your suitcase instead of your laptop bag), you can recover your
data even if your laptop or PDA is stolen. You should secure the location where you keep
your data to prevent easy access.
(7)
Back up your data. Maintain an exact copy of the data that is on the portable device,
especially if it includes individually identifiable information of any kind. Back up the data
onto a USB-drive, CD-ROM, DVD-ROM, or network. If your portable device is stolen,
it's bad enough that someone else may be able to access your information. To avoid losing
all of the information, make backups of important information and store the backups in a
separate location. Not only will you still be able to access the information, but you'll be
able to identify and report exactly what information is at risk. Also, with a backup on
hand, you may be able to take measures to reduce the amount of damage that the exposure
could cause.
(8)
Set up procedures for frequent backup. These should be mandatory for all mobile
device users, and should not be left for users to implement at their convenience.
Voluntary backups are usually not sufficient. Backup procedures should be aligned as
much as possible with the common corporate policies to ensure they are regular and
adequate. Once the data is backed up, infrequently used data can be removed from the
device via automated tools, thereby limiting exposure through loss.
Routine backups of mobile data can be waived if the data is transient in nature, it is a
duplicate copy of data held elsewhere, if can easily and quickly be recreated from another
source, or it is of nominal value with little impact if lost.
In the case of ePHI or other personal identification information, if routine backup is
waived for a reason listed above, there must be an alternative method for identifying the
individuals whose information is on the device in the event the device is lost or stolen.
(9)
Protect small devices from accidental loss: Attach a conspicuous tag or lanyard to the
device that contains the owner’s name address and telephone number. The tag or lanyard
will prevent the loss of a small device such as a flash drive. If is lost, the finder will be able
to return it to the owner. For especially small digital devices such as SD memory cards,
keep them in an appropriately labeled storage case when not inserted in the card
read/write slot of the PDA, laptop, phone or other device.
c. Technical Controls
(1)
Password-protect the device. Make sure that you have to enter a password to log in to
your device. NAME OF HOSPITAL issued laptops should have password protection
enabled by default. This setting should not be disabled. Password-protect your PDA or
IM-24
Mobile Data Protection; Portable Devices
Page 6 of 19
cell phone as well. Evaluate and implement, if feasible, alternative stronger authentication
methods such as:
(a)
Graphical passwords: Authentication based on icon or image selection can overcome
the usability problems associated with passwords on PDAs.
(b)
Tokens: A hardware-based token, such as a smartcard or USB key fob coupled with
a personal identification number.
(c)
Biometrics: Finger-print scanners are available for laptops and PDAs, and signature
verification software is available for PDAs.
(2)
Use passwords correctly. Don't choose options that allow your device to remember
passwords and don't choose passwords that thieves could easily guess or crack. Even
though passwords as short as eight (8) characters are permitted within NAME OF
HOSPITAL, consider a longer password or pass-phrase for portable device access.
(3)
Supplement passwords with hardware-based authentication. Special smartcards or
tokens (which look just like a USB stick) store key information that is used in combination
with a user password to unlock the computer. Only someone who has the token and
knows the password can access the system and the data saved on it. Alternatively, the
user’s biometric data can be stored on a smartcard. For authentication, the user’s
fingerprint is checked directly on the card, instead of the password.
(4)
Secure hibernation and standby modes with a password. Configure the device to
prompt for the password again when it switches from screensaver or hibernation mode
back to normal working mode. This will keep the information secure while the device is
unattended.
(5)
Encrypt data. By encrypting files or media, you ensure that unauthorized people can't
view data even if they can physically access it. You may also want to consider options for
full disk encryption, which prevents a thief from even starting your laptop without a passphrase. When you use encryption, it is important to remember your passwords and passphrases; if you forget or lose them, you may lose your data, unless recovery procedures are
in place.
Any data containing “personal identification information”1 or protected health information
should be encrypted.
Recommended interim solution for encryption on Windows-desktops and laptops, and
flash drives:
If your laptop has Windows XP installed and the hard drive of your laptop is formatted as
'"NTFS", you may be able to encrypt files and folders yourself, using the Windows
Encrypted File System (EFS). The procedures are documented in Windows XP Help. If
you do use Windows EFS, you must understand the procedures for recovering encrypted
data if the person that encrypted it has left the organization or is unavailable. These
Personal identification information (PII) refers to information that, when accessed by an unauthorized person as a result of security breach, may trigger a state
law requirement to notify the individuals whose information was accessed. PII means an individual's first name, first initial and last name, or any middle name
and last name, in combination with any one or more of the following data elements when the data elements are not encrypted:
(a) Social security number.
(b) Driver's license number or STATE Identification Card number.
(c) Account number, credit card number, or debit card number, in combination with any required security code, access code, or password that would permit
access to an individual's financial account.
1
IM-24
Mobile Data Protection; Portable Devices
Page 7 of 19
procedures are also documented in XP Help.
Some USB drives are bundled with encryption software. If so, it should be used to
encrypt sensitive information on these devices. The U3 software bundled with SanDisk
USB flash drives is a reasonable interim solution. See also Exhibit 6 Protection Options
for USB Flash Drives.
Note: EFS and U3 are vulnerable to attack or compromise and should only be used as
short-term solutions until a more robust solution can be implemented.
Long-term solution:
Full disk encryption with pre-boot authentication using NAME OF HOSPITAL approved encryption software is recommended over less secure strategies such as partial or
virtual disk encryption, or file/folder encryption using EFS. Encryption keys should be
centrally managed using secure methods for obtaining, distributing and managing
encryption keys. Encryption keys should be stored separate form the device holding the
encrypted data, e.g., on a USB token or smart card that must be use in conjunction with
the device before access to unencrypted data is granted. See also IM-13.40 Access Control;
Encryption and Decryption and NIST SP 800-111 Guide to Storage Encryption Technologies for
End User Devices.
(6)
Install, enable and maintain anti-virus software. Protect laptops and PDAs from
malicious code with anti-virus software and keep virus definitions up to date.
(7)
Install and enable a firewall. While always important for restricting traffic coming into
and leaving your computer, firewalls are especially important if you are traveling and
utilizing different networks. Firewalls can help prevent outsiders from gaining unwanted
access. The firewall that comes with Windows XP is documented in the XP Help files.
Note: check with the IT Service Desk before changing firewall settings on NAME OF
HOSPITAL managed computers.
(8)
Disable unneeded network services. Limit and/or set up firewalls for networking
services that are not needed, or which should not run at default permissions. This would
include Bluetooth, IrDA and WLANs, such as Wi-Fi. If a network service is not needed, it
should be disallowed in the default configuration.
(9)
Boot protection and BIOS hardening. The Basic Input Output System (BIOS) of a
computer is the part of the operating system that enables an operating system such as
Windows to communicate with the computer's hardware components. Certain BIOS
settings can be set to strengthen security. For example, a BIOS password can be set so that
the computer will not boot until the BIOS password is correctly entered. Modifying the
BIOS requires some technical expertise and should not be attempted with NAME OF
HOSPITAL owned or leased computers, except with the assistance of IT.
BIOS settings that can be configured vary by make model, and may include:
(a)
Boot device sequence (can prevent booting from a USB flash drive, CD-ROM or
diskette)
(b)
System password (can require entry of a password before booting)
IM-24
Mobile Data Protection; Portable Devices
Page 8 of 19
(c)
System setup password (can require entry of a password before BIOS settings can be
changed)
(d)
Power management settings (enable/disable computer to go into sleep or stand-by
mode; if computers are allowed to go into sleep/standby mode, a thief can more
easily gain access to sensitive information);
(e)
Chassis intrusion detection (can detect if internal hardware components have been
accessed and security controls circumvented);
(10) Network access controls.
As noted below under wireless network issues, mobile devices are likely to be used on
networks outside the NAME OF HOSPITAL network unless they are disabled from
access with a technical control. The security of device that is connected to a foreign
network could be compromised through the introduction of malicious code. The device
could then compromise the NAME OF HOSPITAL network. Therefore, IT may restrict
NAME OF HOSPITAL network access by a mobile device until it has been re-certified
for use on the NAME OF HOSPITAL network.
(11) Operating system hardening. Because of their elevated security risk, portable devices
that are defined in Active Directory may be assigned to a more secure Group Policy
Object. This will have the effect of hardening the operating system by enabling security
certain controls and disabling features that place the device at risk of compromise.
(12) Restrict plug and play. Plug and play makes it convenient to attach devices and have
them instantly recognized. Memory devices other than NAME OF HOSPITAL
authorized devices should not be permitted to be accessed by NAME OF HOSPITAL
portable computers and PDAs.
(13) Remote kill/disk wipe utility. Often bundled as part of another software package, a
remote kill/wipe disk utility renders data unrecoverable if the device is lost or stolen.
Wipe disk functions should meet Department of Defense standards for rendering data
unrecoverable. See IM-12.60 Devices and Media; Disposal; Media Reuse.
Secure file deletion. File deletion under Windows does not remove data from a disk or
flash drive. It only removes the pointers to the files in the file allocation table for the
drive. Deleted data must be cleared using approved methods, such as file shredder
software, to ensure that it cannot be accessed by an adversary. Methods of file deletion
or media wiping must be in conformance with NIST SP 800-88, Guidelines for Media
Sanitization.
Media clearing is not needed when residual data is encrypted using approved methods.
Full disk encryption that encrypts residual data makes file shredding unnecessary.
Disable Autorun. The autorun feature causes Windows to automatically run code from a
CD-ROM or other removable media. Disabling the feature can prevent malicious code
from being installed from a CD-ROM or USB flash drive. In Windows XP the value for
Autorun in registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CDRom must be set
to zero (0).
IM-24
Mobile Data Protection; Portable Devices
Page 9 of 19
4. Do not disable or modify IT-installed safeguards.
The NAME OF HOSPITAL IT Department has configured NAME OF HOSPITAL devices with
certain safeguards and security settings. Do not interfere with, remove or disable any IT-installed
safeguards, even if you are able to do so.
5. Responding to a lost or stolen device
a. Immediately report the loss or theft to a supervisor the NAME OF HOSPITAL Security
Department and the IT Service Desk. The Security Department, in turn, will notify the
appropriate NAME OF HOSPITAL privacy and security officials, and, if necessary, law
enforcement officials.
b. If individually identifiable information was on the device, we may be required to notify the
individuals whose information is at risk. The decision to notify will be made by the chief
executive at the NAME OF HOSPITAL affiliate where the breach occurred, in consultation
with General Counsel and the NAME OF HOSPITAL Compliance Department. See
compliance policy PV-45.1 – Breach of Personal Identification Information; Notification
Requirements.
6. Wireless Networking Issues in Mobile Devices
Wireless network connections for mobile devices are similar to other types of network connections,
but have important differences that should be considered in the risk assessment:
a. Certain built-in networking protocols in mobile devices are immature and have known
weaknesses, e.g., Blue Tooth, Wi-Fi and infrared. These protocols are not approved for
transmission of NAME OF HOSPITAL business or clinical information.
b. Use of non- NAME OF HOSPITAL wireless networks (e.g., Internet cafes, hotels, airports) can
compromise the device and data transmissions to/from the device. Do not use such networks
for NAME OF HOSPITAL business unless the device has been approved for such use and the
transmissions are encrypted.
c. Transmissions containing ePHI or information designated by management to be similarly
protected must be encrypted in accordance with IM-13.90 Transmission Security; Encryption,
FIPS 140-2 Security Requirements for Cryptographic Modules, NIST SP 800-52 Guidelines for
the Selection and Use of Transport Layer Security (TLS) Implementations, NIST SP 800-77
Guide to IPsec VPNs, and/or NIST SP 800-113 Guide To SLS VPNs, as applicable.
d. Reliance on wireless networks can result in information not being backed-up because of limited
network bandwidth and/or because mobile equipment may not be connected at the times when
back-ups are scheduled.
7. Mobile Phone Issues
Risks related to mobile phones use include malicious software infection2 and data loss, data leakage
or theft. In the health care setting, camera phones may be used photograph patients, and transmit
them wirelessly along with sensitive text. Mobile phone safeguards to consider include:
Mobile phone malware is rare in North America but prevalent in Japan and Europe according to a consultant to WatchGuard technologies. It is expected that
U.S. mobile phone infections malware will become more prevalent within 2 years.
2
IM-24
Mobile Data Protection; Portable Devices
Page 10 of 19
a. Educate users that mobile phones are vulnerable and they should not install anything on them
unless it's from an authorized source.
b. Secure and control phones. Use mobile versions of firewalls and antivirus protection.
(Examples come from F-Secure, which offers both, and TrendMicro, which offers an antivirus
product.)
c. Secure phone ports. Many phones have USB ports. USB control software, which allows an
administrator to regulate which devices (including mobile phones) are allowed on a computer's
USB ports, should be considered.
d. Secure Bluetooth. If the user does not need Bluetooth, it should be disabled. If the service is
needed, the user should not accept connections from unknown parties. Class 3 devices (limited
to 1 meter) combined with physical security over the area where it will be used is generally
permitted. Examples A hands-free ear-piece for use with a cell phone; connection between a
PDA and printer at a user’s workstation.
e. Establish policies. The CISO and ITSS should develop policies and standards for mobile
phone use and configuration by workforce members and agents while in the NAME OF
HOSPITAL facilities or conducting NAME OF HOSPITAL business. The same appropriate
use policies that apply to Internet use should be applied to mobile phone use such as:
(1)
downloading or opening files only from trusted sources,
(2)
do not open or accept unexpected attachments;
(3)
verify a known party's intent to send an attachment.
(4)
Blocking access to malicious web sites or vulnerable services; and
(5)
Prohibit the use of camera phones unless explicitly approved and the requirements of
NAME OF HOSPITAL policy on photographic and video and audio recordings are
followed.
f. Other Technical Safeguards
(1)
As with laptops, use encryption to secure company data while in transmission to and from
the device and in storage in the device (required for PHI and PII).
(2)
Employ remote wipe technology to erase company data in the event of loss or theft of the
devise
8. USB Flash Drives
NAME OF HOSPITAL team members that use USB flash drives to store sensitive company data
should be required to use a FIPS-certified device such as Ironkey Model S200 (www.ironkey.com) or
an equivalent device.
9. Signed Agreements for Users of Portable Devices
Users of portable devices should be required to sign an agreement in which they acknowledge the
special risks associated with portable device use, and any special requirements for the maintenance
of safeguards.
IM-24
Mobile Data Protection; Portable Devices
Page 11 of 19
10. Training and Education
a. The It Risk Manager and the Compliance Department are responsible for maintaining and
disseminating information on mobile data safeguards.
b. Managers are responsible for ensuring that team members that use portable devices or mobile
data have been appropriately trained in NAME OF HOSPITAL Health policies and procedures
for the protection of such devices and data.
11. Documentation
a. Procedures for mobile data protection must be in writing.
b. Policies and procedures and evidence of compliance must be retained for six (6) years.
F. Implementation Guidance
1. Impact on Risk Assessment
The analysis and management of risk usually has to be modified if a system is installed in a vehicle or
is portable, such as a laptop computer. The system in a vehicle will share the risks of the vehicle,
including accidents and theft, as well as regional and local risks.
Encryption of data files on stored media may also be a cost-effective precaution against disclosure of
confidential information if a laptop computer is lost or stolen.
Portable and mobile share an increased risk of theft and physical damage. In addition , portable
systems can be "misplaced" or left unattended by careless users. Secure storage of laptop computers
is often required when they are not in use.
If a mobile or portable system uses particularly valuable or important data, it may be appropriate to
either store its data on a medium that can be removed from the system when it is unattended or to
encrypt the data. In any case, the issue of how custody of mobile and portable computers are to be
controlled should be addressed. Depending on the sensitivity of the system and its application, it
may be appropriate to require briefings of users and signed briefing acknowledgments.
2. Asset Recovery Versus Data Protection
Data protection should take precedence over protection of the asset on which it resides. Therefore,
data encryption should be considered before automatic disk wipe or asset recovery technology.
IM-24
Mobile Data Protection; Portable Devices
Page 12 of 19
G. Exhibits
1. Portable computing/communication device user agreement (separate document)
2. Sample request, approval and agreement for use of personal digital device (separate document)
3. Protection Options for Laptops
4. Typical Wireless Network Options for Mobile Computers
5. Examples of Mobile Phone Malware Threats
6. Protection Options for USB Flash Drives
H. References
Mobile and Wireless Device Addendum to the Wireless Security Technical Implementation Guide, Version 1 release 1,
U.S> Department of Defense, October 2005.
Scalet, Sarah D. How to Keep Portable Data From Escaping, CSO, May 2006.
Jansen, Wayne. Authenticating Users on Handheld Devices, National Institute for Standards and Technology
Jansen, Wayne. Authenticating Mobile Device Users Through Image Selection, National Institute for Standards
and Technology.
SP 800-72, Guidelines on PDA Forensics, National Institute for Standards and Technology.
IM-24
Mobile Data Protection; Portable Devices
Exhibit 1
Sample Portable Computer/PDA User Agreement
This exhibit has been made a separate document.
Page 13 of 19
IM-24
Mobile Data Protection; Portable Devices
Page 14 of 19
Exhibit 2
Sample request, approval and agreement for us of personal digital device (separate document
This is a separate document maintained on the NAME OF HOSPITAL intranet.
IM-24
Portable Computing Devices
Page 15 of 19
Exhibit 3 - Protection Options for Laptops
IM-24
Portable Computing Devices
Page 16 of 19
Exhibit 4
Typical Wireless Network Options for Mobile Computers
IEEE 802.11
The 802.11 standard developed by the Institute of Electrical and Electronics Engineers (IEEE) provides a specification for
wireless transmission of information in Wireless Local Area Networks (WLAN). Currently, a variety of 802.11 specifications exist.
The most widely used is 802.11b. IEEE 802.11a and 802.11g are other popular types using the Ethernet protocol and carrier
sense multiple access with collision avoidance (CSMA/CA) for path sharing. The most recently ratified 802.11i standard
(approved June 2004) provides an improvement to security in terms of encryption and authentication requirements.
Bluetooth
There are numerous ways devices can be connected to one another using a cable, including the following:
• Personal digital assistant (PDA) and a docking cradle
• Printer and a laptop
• Headphones and a portable compact disk (CD) player.
Bluetooth (not to be confused with Wireless Fidelity [Wi-Fi]) is a cable replacement technology that uses a short-range radio link
to communicate information that typically is sent over a wire. This information may include voice or data.
Bluetooth uses the modified SAFER+ algorithm to encrypt its payload. This algorithm is not Federal Information Processing
Standard (FIPS) 140-2 compliant. Unlike Wi-Fi, Bluetooth is not FIPS 140-2 compliant, nor is it permissible to use Bluetooth to
transmit or receive classified information (e.g., Secret, Top Secret) unless approval by the Designated Approving Authority
(DAA) is granted.
Security flaws do exist in the latest Bluetooth 1.2 standard, the most important of which is the pairing security flaw. During
pairing, a personal identification number (PIN) must be entered. In many commercial off-the-shelf (COTS) Bluetooth devices,
PINs are only four digits long, which may be insufficient. When possible, PINs should be made as long as possible. A four-digit
pin can be cracked in <1 second and a six-digit PIN in 10 seconds; however; according to a recent publication from @Stake, Inc.,
a 16-digit PIN will take 1 million days to crack. An additional flaw in the latest 1.2 Bluetooth standard regards impersonation. The
device hardware address (Media Access Control [MAC] address) can also be spoofed if mutual authentication does not occur. The
MAC address is used in key creation, but this is not as much a concern as using no mutual authentication. MAC address spoofing
is not specific to Bluetooth; it can also occur with devices using wireless 802.11 or wired Ethernet standards. As a result of these
insecurities and flaws, the use of Bluetooth is prohibited in all cases for transmitting or receiving unclassified or classified
information.
Infrared Radiation
Infrared (IR), which operates a frequency between microwaves and visible light, is used in various wireless devices for
transmitting information, monitoring services, and controlling applications. The most commonly incorporated IR component is in
laptops computers and PDAs. Many wireless device manufacturers have turned on IR functionality in their default settings,
leaving these devices vulnerable to device infiltration and information hijacking.
Cellular Transmission
Cellular transmission is a form of wireless transmission defined as a type of short-wave analog or digital connection to a local
cellular tower. Communication is between a mobile device (typically a mobile phone with cellular—digital or analog, Global
System for Mobile Communications [GSM], Code Division Multiple Access [CDMA], or Evolution-Data Only [EV-DO]
capability) and a service tower.
IM-24
Mobile Data Protection; Portable Devices
Page 17 of 19
Exhibit 5
Examples of Mobile Phone Malware Threats
Source: How to Keep Those Handsets Clean, www.csoonline.com, October 2006, accessed 11/29/06.
The Doomboot trojan perpetrates denial-of-service attacks by billing itself as "Warez"—premium
games that have been compromised to allow free use. Devices work until they are rebooted. Doomboot
enters via Bluetooth's discovery mode, the Web and e-mail.
Cardtrap spreads to phone memory cards—which can be inserted in computers to sync up a music
download, picture or ringtone—where it can infect again.
Redbrowser is a Russian wireless application protocol browser that offers itself to users who don't have
one. It offers to send free SMS messages but actually charges the user $5 to $6 per message.
Crossover detects and infects devices via an ActiveSync connection for Windows PCs. It can spread
from phones to computers. Crossover has not been detected in public yet; in concept it fills up phone
memory with useless data and exhausts phone resources
Buffer overflow vulnerabilities exist in the Windows Mobile software, according to Fogie, in cases
where an application has not been programmed to properly check the format of incoming data. Such
attacks will become more prevalent as the platform grows, Fogie says.
IM-24
Portable Computing Devices
Page 18 of 19
Exhibit 6
Protection Options for USB Flash Drives
Product
DeviceWall
Sanctuary Device Control
EndPoint Security
Protector
Company
Centennial
Lumension
Gfi
Safend
Website
www.centennial-software.com
www.lumension.com
www.gfi.com
www.safend.com
Price
Varies from approximately $25 per
user for 250 seats
Varies from approximately $45 per
seat
Varies from approximately $700 for
25 computers to $4,000 for 500
computers
Varies from $32 per seat scaled for
volume depending on size of
implementation.
Overview
DeviceWall secures network
endpoints against the risk of
accidental or deliberate security
breaches and locks down the
unauthorized use of removable
media devices, such as USB
drives, MP3 players, PDAs and
even CDs.
Device Control can secure against
many I/O devices such as USB
drives, firewire, Wi-Fi and Bluetooth
as well as securing ports
EndPoint Security actively manages
user access and logs the activity of
media players including iPods, USB
drives, CompactFlash, memory
cards, CDs and other portable
storage devices, PDAs, BlackBerry
handhelds, mobile phones, smart
phones, network cards and laptops
Protector detects and allows
restriction of devices by device
type, model or even specific device
serial number. For storage devices,
Protector either blocks all storage
devices completely, permit readonly, encrypt all data on devices as
well as monitoring, blocking and
logging files that are downloaded to
or read from these devices. WiFi
controls are based on MAC
address, SSID, or network security
level.
Functionality
Features that focus on USB
security include the ability to give
permission to certain USB devices
and blocking only the use of USB
thumb drives. Device Wall provides
encryption to USB drives and a rule
can be set that the drive must be
encrypted in order to be used.
Device Control can block USB
devices based on policy set-up for
either a single user, group or users
or a computer. This product works
on the basis of whitelisting devices
and can also provide encryption to
removable media.
EndPoint Security has the ability to
control specific ports on client
machines via Active Directory.
Policy can be put in place to grant
or deny users or groups of users
access to USB ports, as well as
other ports such as firewire and
other removable storage media.
Features provide USB security both
at the interface and removable
media levels. At the media level,
this product can provide encryption
to removable USB keys and also
forensic reporting of all data moving
in and out of the organization. At
the interface or port level, it can
restrict based on existing Active
Directory users or computers.
Devices can also be restricted
based on type, model or a specific
serial number.
Installation
The installation consists of putting
in the CD and starting the
installation wizard.
The installation process is guided
by an HTML document that
provides a step-by-step deployment
process with links to executables
and installers needed.
The installation consists of a fully
automated installation wizard.
There are many useful wizards that
help create policy and add users to
the policy.
The set-up wizard makes
installation straighforward.
SafeGuard Removable Media
Utimaco
www.utimaco.com
Varies from $52 per seat plus
maintenance
Sole purpose is to ensure that no
data leaves the computer on a USB
drive without being encrypted first.
In addition to using encryption, the
key-ring feature allows multiple
users to share the same data. Both
encrypted and unencrytped data
can be stored on the same USB
device. Operation is transparent to
the user.
Installation is simple.
IM-24
Mobile Data Protection; Portable Devices
Page 19 of 19
Product
DeviceWall
Sanctuary Device Control
EndPoint Security
Protector
Company
Centennial
Lumension
Gfi
Safend
Website
www.centennial-software.com
www.lumension.com
www.gfi.com
www.safend.com
Integration
Integrates with a current Active
Directory structure.
Integrates with either an Active
Directory domain or Novell
Network. Device Control can work
directly with groups already created
or users/computers currently in the
domain providing permissions
based on drives or ports.
Integrates with Active Directory and
offers control over other devices
beyond USB such as media players
and PDAs.
Integrates with Active Directory to
control both removable media and
the actual ports on specific
machines. Also, detail is provided
for policy granularity and total
control of the environment.
Documentation
Documentation is available on the
vendor website as a PDF file. It
provides step-by-step instructions
on configuring and managing
DeviceWall.
Device Control has useful
documentation, including setup/deployment guides and
architecture layouts.
Documentation for the user manual
and installation guide contain plenty
of detail and sets of instruction,
labeled screenshots and charts.
Documentation consists of user and
installation guides.
Support
Support is limited to customers with
full versions of the software.
Support content is web-based and
a license key is needed to get
access to the site.
Product support and maintenance
are included as part of the product
purchase. Professional services
are available for policy assessment
and development and product
implementation.
A software maintenance agreement
is required. Their website includes
a support area with product
documentation, forums, knowledge
base along with phone and email
support.
Web-based email support is offered
as part of the product's one year
maintenance agreement.
Maintenance is included in term
licenses.
Comments
This is the recommended product
for its simple deployment, easy
manageability, features and great
value for any size environment.
This product is a possible
consideration for its flexibility and
strong features.
SafeGuard Removable Media
Utimaco
www.utimaco.com
It can use Active Directory.
Documentation is provided with the
product in a PDF file.
Support is by subscription. There is
a public area of FAQs and a
knowledge database.