5.06 Computer Use - Government of PEI

SECTION 5
TERMS AND CONDITIONS OF EMPLOYMENT
5.06 IT SECURITY AND COMPUTER USE
AUTHORITY:
TREASURY BOARD MINUTE # 714/90
MANAGEMENT BOARD MINUTE # 278/95
TREASURY BOARD MINUTE # 74/98
ADMINISTRATION:
GOVERNMENT DEPARTMENTS / AGENCIES
Sub-Section 5.06
IT Security and Computer Use
1.
4.
1 of 18
The purpose of this policy is to provide information on government’s
security policies and practices.
APPLICATION
2.01
3.
Page
01 October 2002
PURPOSE
1.01
2.
Date
This policy applies to all employees, anyone under contract to the
government or anyone having access to the computer network(s).
POLICY
3.01
Computer Resources (including those transported and/or used outside the
office) contain client and personal information whose confidentiality,
integrity and availability must be preserved and protected at all times.
3.02
All employees who have been granted access to these resources must
read and understand the IT Security Handbook and Acceptable Use Policy
for Computer Systems (Attachment 4.01).
3.03
All employees must also sign the Acceptable Use Policy for Computer
Systems at the time they receive access to these resources. This signed
document is then given to the Human Resource Manager for their
Department (or designate) and kept on file.
ATTACHMENT
4.01
Attachment - Information Technology Security Handbook and Acceptable
Use Policy for Computer Systems.
Information Technology
Security Handbook
and
Acceptable Use Policy
for Computer Systems
January 2001
Attachment 4.01
Maintaining Trust and Confidence
Islanders entrust the Government of Prince Edward Island with their sensitive and
private information and rely on us as employees to adequately safe-guard this
information from unauthorized use. As employees, we must accept that security is
an important responsibility as we conduct the day-to-day business of government. The
measures contained in this handbook specify what protections should be taken to fulfil
this trust.
This handbook summarizes the main provisions of the government’s information
security policies and practices. It contains the highlights only and should not be
referenced as a substitute for detailed information contained in the formal policies,
standards and applicable legislation. These reference documents are available on the
government Intranet site at http://iis.peigov/. (Where the policy does not cover a specific
situation, common sense should prevail).
Minimum IT security standards have been formulated by the IT Security
Coordinators Council with input and feedback from Senior Management and
approval of Treasury Board.
You should keep this document readily available during your employment with
government. It has been developed for your convenience and you are encouraged to
refer to it often. Responsible protection of private and confidential information is
essential to maintaining the trust and confidence of Islanders we serve.
Bill Drost, Chief Information Officer
Government of Prince Edward Island
Introduction
The security requirements in this handbook apply to all employees, anyone under
contract to the government or anyone having access to the government-wide
computer network(s). Although this handbook deals primarily with electronic
records, similar safeguards should be in place for recorded information in other
formats, including printouts of electronic information.
Some of the information applies specifically to managers and supervisors and is
highlighted accordingly. If you have any questions regarding security
procedures, endorsed procedures or you need clarification or interpretation of
the contents of this handbook, please contact your manager/supervisor or your
departmental Information Technology Security Coordinator.
Note to Managers/Supervisors______________
As a manager/supervisor, you need to be aware of the contents of
this handbook in order to ensure your staff are aware of and are
following these procedures. You are responsible for the security
within your assigned area.
Information You Need to Safeguard
All government information and assets require good, basic care. There are,
however, certain types of information and assets which are more sensitive or
valuable and these require enhanced safeguarding. We must categorize
information and services that have a confidentiality, integrity or an availability
requirement and protect them accordingly.
Confidentiality
Confidentiality is the expectation of privacy of information. There are three
levels of confidentiality: none, normal and high. The no (none)
confidentiality requirement is for information that is considered public
knowledge, and as such, would not cause any embarrassment to government
or any individual should the information be released.
The normal confidentiality requirement is for information that could cause
embarrassment to government or any individual should the information be
released.
The high confidentiality requirement is for information that could likely
cause significant financial or social hardship or embarrassment to
government or to an individual should the information be released.
Integrity
Integrity is the correctness of the information once it is entered into the
computer system; that is to say, the data or information has not been altered,
except by an authorized individual. Integrity also has three levels: none,
normal and high. No integrity requirement would mean that there would be
no impact if the data were incorrect.
Normal integrity requirement would mean that the information should be
correct and accurate, but the impact of it being incorrect would have minor
consequences.
High integrity requirement would mean that the information must be correct
and accurate, or there could be significant financial or other serious
implications.
Availability
Availability is the maximum acceptable downtime for computer systems that
the organization or government can accept while still maintaining its
objectives and deliverables. More than seven days availability means that
the computerized information or services could be unavailable for at least a
week, with no serious impact to the organizational or governmental
deliverables.
Between one and seven days availability means that the computerized
information or services must be available within this time frame.
Less than one day availability means that the computer information or
service is critical to the programs being delivered by the organization and
government.
Information Classifications
All sensitive government information and systems
must be protected or guarded from unauthorized
access, disclosure, removal, modification and/or
interruption. After information has been
categorized, it must be classified depending on its
sensitivity.
Three classifications determine the level of
sensitivity of information and assets within the
government.
Open or Public Information and Assets
With open or public information and assets, the disclosure or loss would
not be an invasion of privacy, or cause hardship or monetary loss to our
citizens or ourselves, e.g. general policies and procedures and legislation.
Protected Information
With protected information or assets, the disclosure or loss would be
expected to be an invasion of privacy, or cause hardship or monetary loss, or
could be detrimental to relations between governments, i.e. information that
needs to be accurate and correct, such as payroll or accounting data;
information or systems that are essential to the government such as health
information or computer systems. In general, information about individuals
which is not widely available should be protected whether or not such
information would be embarrassing to that person.
Particularly Sensitive Information
With particularly sensitive information, the disclosure would be expected
to be a major invasion of privacy; cause serious harm to either citizens,
corporations or employees; or could be detrimental to relations between
governments, e.g. highly sensitive data such as client health records,
investigative reports of law violations, and pre-release budget information.
This information requires special handling and security procedures to
adequately protect it.
In the absence of legislation, it is difficult to define information which falls
within the protected or particularly sensitive categories. However, the
following classes of information should be adequately protected:
< information which, if disclosed, could be harmful to business
interests; an unreasonable invasion of personal privacy; harmful to
law enforcement; harmful to economic and other interests of a public
body; or harmful to intergovernmental relations; and
< pre-decisional advice and recommendations involving staff and
members of Executive Council or confidences of a public body.
Note to Managers/Supervisors__________________
As a manager/supervisor, you are responsible for ensuring that
information authored in your area of operations is properly
categorized; that all employees are aware of the correct
classification in your area; and that all employees are aware of
the correct classification of information used in your area but
authored elsewhere.
Access to Information
You are entitled to have access to all information and assets needed to perform
your assigned work. Access to information and assets is not permitted to satisfy
your personal interests. You must always be alert and not reveal information to
your co-workers or others unless they specifically require it for their own
assigned tasks. Beware of any attempt by non-authorized personnel to gain
access to sensitive information, and report to your manager/supervisor all such
attempts.
Mailing of Information and Assets
Open or public information and assets can be sent internally and externally in
any manner appropriate, i.e. no special security procedures are necessary.
Protected information and assets (except cash and negotiables) may be mailed
within government by using a reusable (economy) envelope, or externally by
using a properly addressed, single gum-sealed envelope.
Particularly sensitive information is not normally mailed outside of
government. However, it may be mailed within the government by using a single
gum-sealed envelope properly addressed and labelled To be opened by
addressee only. A return address is required. Externally, particularly sensitive
information may only be sent by courier or registered mail with proof-of-mailing.
A record of delivery is required.
Electronic Mail
The government approved e-mail system transmits all its internal messages and
attachments in an encrypted form, i.e. if you are sending a message or document to
someone else within the government, the message or document will be protected within
the system. Therefore, it is permissible to send any category of information via the email system within government.
Messages going to someone outside of the provincial government will be
decrypted and sent without protection when it leaves the control of the
government approved e-mail system. Therefore, messages and documents being
sent to outsiders should not contain sensitive information unless alternate forms
of encryption can be applied.
Here are some general rules to follow regarding the use of e-mail:
< The Internet should not be used for any level of sensitive information,
unless it is encrypted as noted above. Exercise caution.
< Keep attachment size to less than the current government standard. Use
FTP to exchange files greater than the government standard size.
(Contact your system administrator for information on FTP.)
< Don’t carbon copy mail unnecessarily.
< External e-mail accounts provided free by Internet search sites and
engines, e.g. Hotmail, Infoseek mail, Yahoo mail, Hotbot mail, must not
be used to exchange government information.
< E-mail is to be used in direct support of authorized projects and
activities.
< Never abuse the e-mail system by changing the sender’s name.
< Never abuse the system by sending offensive e-mail.
< Never abuse the e-mail system by sending mail to everyone in the Post
Office unless authorized to do so by your deputy.
Storing Information and Assets
Open or public information and assets are to be stored in an appropriate
manner.
Protected information must be secured in a locked cabinet or storage container
when not being accessed or used or when you will be away from your desk for an
extended period of time. Information and assets must be protected from individuals
who do not share your need to access in order to perform their assigned tasks.
Particularly sensitive information, when not being used, is to be stored in a
locked filing cabinet.
Disposing of Information and Assets
All information created by or supplied to government must be regarded as
government records. As such, you are bound by the provisions of the Archives
Act regarding disposal of information. No recorded information should be
disposed of except in accordance with the procedures outlined in the Archives
Act.
Information, including open or public information and assets, must be destroyed
in the manner outlined in the Recorded Information Management Policy which
can be located at the provincial government Intranet site at http:/iis.peigov/. For
information you should contact your department’s Records Management Liaison
Officer.
Due to the potential embarrassment it might create if it were improperly disposed
of, protected and particularly sensitive information is to be destroyed.
Computer storage media, e.g. floppy disks, CDs, and video and audio tapes are
to be disposed of as outlined in the “ Procedures for the Disposal of Government
Information on Computer Media”.
Note to Managers/Supervisors______________________
As a manager/supervisor, you must ensure that your staff know
about the proper procedures for disposal of recorded information
and assets.
Computer Use and Access
Information technology systems include all types of computer systems, such as
the mainframe, servers, workstations, personal computers, laptop/notebook
systems, handhelds and PDAs (Personal Digital Assistants).
The use of these systems and the software and information they contain is
granted on a need-to-know basis only. All systems with access to sensitive
information and assets will require you to identify yourself by a user ID, and to
confirm your identity with a password. You are responsible and accountable for
all activities performed under your user ID and accesses made to computer
systems may be recorded and monitored.
Therefore, you should follow these security guidelines:
Passwords
All users are to be uniquely identified by user ID and verified by password
before being granted access to any sensitive information stored or processed
on departmental computer systems.
Passwords are to be selected by the user, must contain at least one special
character, and should be difficult to guess. Family names, dates, telephone numbers, or
words found in dictionaries should not be used as passwords.
Passwords must be a minimum of five characters in length.
Passwords should be memorized (not written down) and not shared.
Network accounts are to be locked after five login attempts and may only be
re-activated by an authorized person.
Passwords are to be changed at least every 90 days. Passwords should be changes
immediately if compromise is suspected.
Computer Use
When leaving your computer you should log out, lock your workstation or
use a password protected screen saver to prevent others from accessing
information under your user ID. Screen savers with passwords are required
to deactivate the display of a session after five minutes of inactivity unless
exceptions are approved in writing by the Information Technology Security
Coordinator for that department or area. It is good practice to sign off if you
plan to be away from your workstation for more than two hours.
You should position your computer screen in such a way as to minimize the
possibility of others reading the information shown there.
Data Files
Removable media such as tapes, disks and CDS containing software and
government information are to be stored in a locked cabinet or drawer when
not being used.
Do not store sensitive information on your hard drive or removable media
unless it is encrypted by approved software.
Remote access to or from computer systems storing or processing sensitive
government information will only be permitted if it is in accordance with
endorsed guidelines.
If you must store information on your workstation, you are responsible for
making backup copies at regular intervals, and storing them in a secure
place, off-site if necessary. You should be using LAN systems to store
essential information, as they are backed up daily.
Note to Managers/Supervisors___________________
As a manager/supervisor, you should ensure that your staff know
the proper procedures for creating and using passwords, storing
sensitive information and remotely accessing systems. You must
ensure that staff know how to virus scan, store essential
information on LAN systems and backup information on their
workstation.
Software
Removal of or alterations to computer hardware or components and
changing computer system configurations is not permitted unless approved
by the IT Security Coordinator or designate.
Software used on government computer systems must comply with all
copyrights and vendor agreements on use and distribution. Computer
software installed on computer systems must be approved by the IT Security
Coordinator or designate as non-approved software cannot be supported if
problems occur, and can have a negative effect on the performance and
security of all computer systems.
Virus Protection
Computer viruses can infect and destroy valuable information. Your daily
work may be lost or corrupted if your workstation is infected, and
everyone’s daily work may be affected if the LAN system becomes infected.
Therefore, you should scan all data, programs and disks from any outside
sources, as well as new or rented equipment, before use. Endorsed computer
virus protection software must be active on all computer systems.
Note to Managers/Supervisors____________________
As a manager/supervisor, you must ensure that computer
hardware alterations and configurations are handled by IT staff;
that sufficient copies of required software licences are available at
the work site; that copyright agreements are respected; that
unauthorized software is not installed on departmental systems
and that staff know how to virus scan.
Modems
Modems must not be connected to your computer system unless approved
by your IT Security Coordinator. Exceptions may be granted for dial-out
access only under the following conditions:
< the dial-out access is required to conduct government business;
< the service required cannot be provided in any other way;
< the modem must have auto-answer disabled;
< external modems must be powered off when not in use; and
< internal modems must be disconnected from the phone line when not in
use.
Refer to Endorsed Procedures for Remote Access.
Note to Managers/Supervisors____________________
As a manager/supervisor, you must ensure that no modems are
connected to networked computers unless approved by IT Security
Coordinator or designate.
Facsimile Machines
Facsimile machines should not be used to transmit particularly sensitive or protected
information. For open or public information, care must be exercised that the number
dialled is the correct number as the transmission will proceed, even if it is not the
intended destination.
Protecting Information and
Assets Outside the Office
Open or public information requires no special handling procedures or authorizations
when taken outside the office.
Protected information and assets may be taken outside the office provided you have
proper authorization. You must take care to ensure that such information or assets are
not exposed to viewing by unauthorized individuals and that sensitive conversations are
not overheard by others. Such information and assets should be contained in an
appropriate briefcase or container with an identification tag indicating the return address
or telephone number. If you use an automobile, the briefcase or container should be
placed in the trunk or at least out of sight if you leave the locked automobile unattended.
If protected information is in electronic format, e.g. on a laptop computer, it
must be encrypted and all users must adhere to Portable Computer Endorsed
Procedures. Protected information and assets may be left in rental
accommodation or kept at an employee’s residence provided they are returned to
the locked briefcase or container and placed out of sight.
Particularly sensitive information should not normally be taken outside
government offices. If such information must be removed from the office,
approval must be obtained from a manager or supervisor. The information must
be locked in a cabinet or significant sized container when not being worked
upon.
If a computer (laptop, notebook or desktop) is moved offsite, then Portable
Computer Endorsed Procedures must be followed.
Note to Managers/Supervisors___________________
As a manager/supervisor, you should ensure your employees are
aware of security precautions when taking sensitive information or
assets outside the workplace.
Security Incidents
A security incident is any occurrence which did or could compromise the
security of government information, systems or employees. It includes the
unauthorized access or attempts to access sensitive government information or
assets, theft of assets, or contraventions of the security policies and rules. All
such incidents should be reported to your supervisor/manager, and to the IT
Security Coordinator or designate for your area if it involves computer systems.
Good business practices dictate that the department apply sanctions when a
security violation occurs as a result of negligence or misconduct by an employee.
Such circumstances could therefore lead to administrative, disciplinary or
statutory actions. For more information, contact your supervisor/manager.
Note to Managers/Supervisors_____________________
As a Manager/Supervisor, you should investigate every reported
security incident, and implement corrective action as needed. You
are also responsible to report incidents to your IT Security
Coordinator or designate if they involve computer systems.
Business Resumption Planning
Business Resumption Planning is a program designed to prepare managers to
resume the provision of essential services, programs and operations after they
have been disrupted for any reason. A contingency plan to restore computer
services should be included in the business resumption plan.
Note to Managers/Supervisors______________________
As a manager/supervisor, you should ensure that business
resumption plans for areas under your authority which are involved
in essential services, programs and activities, are developed,
implemented and kept up-to-date for use in the event of a disruption.
IT Security Coordinators’ Council
Security and Privacy Officer
Provincial Treasury Garth Matthews
Committee Members
Agriculture and Forestry Catherine Millar
Auditor General’s Office Vaughn Smith
Community and Cultural Affairs Murray Brownell
Development and Technology Charlotte Gorrill
Education Linda Trenton
Fisheries, Aquaculture and Environment Gordon Jenkins
Health and Social Services Faye Campbell
Office of the Attorney General Murray Brownell
PEI Business Development Mark MacBeth
Provincial Treasury Keith Larter
Provincial Treasury ( Taxation ) Sherry McCourt
Public Service Commission Janet McGarry
Tourism Trevor Waugh
Transportation and Public Works Dawn Lund
Transportation and Public Works Rose Gallant
Information on policies or endorsed procedures may be obtained from your
supervisor, departmental IT Security Coordinator or from the Information
Security section on the PEI Government Intranet site at: http://iis.peigov/
___________________References___________________
Organization and Responsibilities (Treasury Board Policy and Procedures
16:01)
Planning and Management of Information Technology (Treasury Board
Policy and Procedures 16:02)
Minimum IT Security Standards (Treasury Board Policy and Procedures
16:02 - III)
Acceptable Use Policy for Computer Systems
Endorsed Procedures for Disposal or Transfer
Endorsed Procedures for Remote Access
Endorsed Procedures for Virus Protection
Endorsed procedures for Encryption
Firewall Rule Change Procedure
Portable Computer Endorsed Procedures
Information Technology Security Handbook
Definitions:
Electronic Data means data that is stored and readable in electronic form without
regard to the hardware or software used to produce the data, excluding computer
software.
Computer Software is defined as written programs, procedures or rules and
associated documentation pertaining to the operation of a computer system, which
includes packaged software, down loadable executables, screen savers, macros,
freeware, and shareware.
Computer Hardware is defined as Workstations, Personal Computers, Network
Computers, Laptops, Notebooks, Servers, Handhelds and any other peripherals.
Computer Systems is a combination of Computer Software and Computer Hardware.
Computer Resources are defined as the Computer Systems and all electronic data.
The following is the Government of Prince Edward Island’s Acceptable Use
Policy for Computer Systems. All computer users are required to sign this
document to acknowledge that they have read and understand this policy. Once
signed it is to be given to your Human Resource Manager or designate.
Government of Prince Edward Island
Acceptable Use Policy for Computer Systems
Policy:
Computer Resources (including those transported and/or used outside the office)
contain client and personal information whose confidentiality, integrity and
availability must be preserved and protected at all times. You have been granted
access to these resources with the understanding that you will observe the
following:
1. Computer Resources will be used only in direct support of authorized
projects and activities.
2. You are responsible and accountable for the use of your user ID,
passwords and access control items in your possession for the computer
systems. They are not to be shared with anyone without the approval of
your IT Security Coordinator or designate.
3. Removal of, or alterations to, computer hardware or components must be
approved by the IT Security Coordinator or designate.
4. Computer software installed on computer systems must be approved by the
IT Security Coordinator or designate.
5. Changing computer systems configuration is not permitted unless approved
by the IT Security Coordinator or designate.
6. Copyright provisions of computer software must be adhered to - no
unauthorized copying.
7. Electronic data received from external sources, including the Internet, must
be scanned for computer viruses before being executed or stored on
computer systems.
8. Computer systems are not to be used for any activity which will cause
embarrassment to you or the government and must not be used to access or
promote pornography, racism, hatred or any illegal activities.
9. Electronic data must be stored on the file server where possible. If
electronic data is not stored on the file server, it is your responsibility to
prepare and maintain backup copies.
10. Any breach of this policy is to be reported immediately to your supervisor
and the IT Security Coordinator or designate.
11. You will be held personally responsible for a violation of this policy,
which can lead to loss of access privilege, or disciplinary actions up to and
including dismissal.
12. Use of computer systems can and will be monitored periodically for
compliance with this policy.
I have read and understand the Information Technology Security Handbook
and The Acceptable Use Policy for Computer Systems.
Date: _______________ Name of User: ________________________
User’s Signature: _____________________________
Witness: ___________________________________
Guide to Information Security
Information Guide for Employees
Contents
Introduction ............................................................................................................................1
Information Security Policies and Procedures ..........................................................................2
Confidentiality, Integrity, Availability ..........................................................................................3
Information Categorization System ..........................................................................................4
Basic Security Principles ..........................................................................................................5
Safe Electronic and Physical Document Handling.................................................................... 6
Passwords ...............................................................................................................................7
Internet, E-mail and Social Media.............................................................................................8
Social Engineering....................................................................................................................9
Authorized and Acceptable Use of Software ......................................................................... 10
Privacy and Access................................................................................................................ 11
Protecting Your Work Space ................................................................................................. 11
Mobile Computing and Working Away from the Office........................................................... 13
Reporting Incidents or Problems ............................................................................................ 14
References ............................................................................................................................. 15
Websites of Interest ............................................................................................................... 15
For further information contact:
[email protected]
T: 620-3600
F: 368-4716
[email protected]
or
T: 569-7509
F: 569-7632
Introduction
Treating information safely and securely, we all help build a stronger PEI based on public
trust and confidence.
We all play an important part securing the information and information technology systems
that we work with every day.
Information and information technology systems are important parts of our work
environment. We all handle documents, enter data into applications, create electronic
messages and post and use content on web sites. Recently, more and more of us are
using mobile computing and wireless technology as part of our daily work. We use
information and information technology systems to analyze and resolve problems make
decisions, plan actions and deliver services to the residents of Prince Edward Island.
Islanders must be able to trust the government to protect the information we collect from
them and rely on the accuracy and quality of information that is provided by government to
make policy decisions and deliver services.
This guide provides a brief overview to all employees
and contractors of the Government`s responsibilities
regarding information security. The guide will help you
understand basic security principles and facts, your role
in protecting information and information technology
systems and how to get the security training that you
need.
It is our goal to have all personnel complete security
awareness training at least annually and upon
commencement with the Provincial Government.
For some employees, reviewing this guide will help you meet the requirements, while others
may require additional training.
As you follow the tips provided in this guide, you will be helping to secure the information
stored across government. By treating information safely and securely, we all help build a
stronger Island based on public trust and confidence. So, whether you have been with the
government for a short period of time or for decades, make information security one of your
top priorities.
Page | 1
Information Security Policies and Procedures
Sensitive information is information that is sensitive to unauthorized disclosure or loss of
confidentiality.
Protecting the personal information of Islanders is a priority for the Government of Prince Edward
Island. All Government of Prince Edward Island employees and contractors must be committed to
protecting client information from unauthorized collection, use and disclosure.
The government’s information security program is directed by
the Office of Information Protection. This office is responsible
for overseeing all aspects of security for the Government of
Prince Edward Island information technology systems. The
Office of Information Protection maintains a manual that helps
complement security directives and provide more detailed
direction on how to handle specific issues such as security
incidents, managing passwords and assessing security risks.
The Office of Information Protection’s main role is to assist
departments in making sound business decisions by providing reliable information about security
threats and risks.
Throughout this guide, you will find references to “sensitive information”. Sensitive information is
information that is sensitive to unauthorized disclosure or loss of confidentiality.
Unrestricted information is not sensitive and includes information that can be routinely shared with
the public including application forms, published news releases, fact sheets, public reports and
policy statements.
Protected information is considered sensitive if shared outside government, but is usually available
within government to employees who need to know the information to do their job. Protected
information can include draft versions of documents and some internal discussion papers intended
to provide options for decision makers.
Confidential information is sensitive even inside the government and is accessible only to
employees in specific functions or roles. This includes information such as personnel files or exam
results.
Restricted information is highly sensitive and only available to specific employees. This includes
investigation documentation, personal medical records, witness protection information and child
abuse records.
Page | 2
Confidentiality, Integrity, Availability
First and foremost, ensuring the security and privacy of sensitive taxpayer information is a must.
We are all accountable for protecting the confidentiality, integrity and availability of information.
Information is a valuable government asset and is essential for the delivery of services and the
development of policy decisions that are in the best interests of Islanders.
Protecting the confidentiality of information includes the sharing of sensitive or proprietary
information with others. Such sharing must only take place if you have been authorized to do so,
and only if there is a need to know or a right to know. It also means taking steps to prevent any
unauthorized disclosure of information.
Leaving files with sensitive information in a public place or storing documents unprotected on a
mobile device such as an iPad is something that causes loss of confidentiality.
The integrity of information is about maintaining the reliability and accuracy of information so it can
be used to make informed business decisions. An unauthorized change of financial information
used for decision making is an example of something that causes loss of integrity.
Ensuring the continued availability of information means it is accessible to those who need the
information when it is required. A system outage is something that causes loss of availability and
depending on how important the system is the more severe the consequences.
When there has been an event that causes loss of confidentiality, integrity or availability, this is a
security incident that will be discussed later in this guide.
We also have obligations to protect personal information under
the Freedom of Information and Protection of Privacy Act
(FOIPP) and other applicable PEI legislation or policies. As
public servants providing a wide range of services, we are
stewards of the personal information Islanders provide to us.
If part of your work includes managing or designing an
information technology system or application, you should
conduct a threat and risk assessment to identify what kinds of
safeguards are needed.
Protecting information at work isn’t much different from protecting valuables in your home. In some
situations, simple locks on doors and closed windows are enough. In others, access passes or
security alarms may be required. Assessing the risk helps you determine the necessary level of
protection.
Page | 3
Information Categorization System
The Government of Prince Edward Island has set out a categorization system which is outlined in
the Treasury Board Manual, section 16, Planning and Management of Information Technology.
iis.peigov/dept/tboard/manual/index
Throughout this guide, you will find references to “sensitive information”. Sensitive information is
information that is sensitive to unauthorized disclosure or loss of confidentiality.
Sensitive Government information and services have three components of security:
Confidentiality is the expectation of privacy of information.
There are three levels of confidentiality requirements for
information: none, normal, and high confidentiality.
Integrity is the correctness of the information once it is entered
into the computer system; that is to say, the data or
information has not been altered, except by an authorized
individual.
Integrity also has three levels or degrees: none, normal and
high.
Availability is the maximum acceptable downtime for computer systems that the organization or
Government can accept while still maintaining its objectives and deliverables. The availability of
computer systems therefore depends on the degree of manual processing that can be done to
deliver departmental or governmental objectives and deliverables. Convenience or effectiveness
should not be a factor. In determining the maximum downtime, the worst-case scenario must be
used. Once again, there are three levels of availability: more than 7 days, between 1 and 7 days,
and less than 1 day.
Page | 4
Basic Security Principles
Directors/Managers should regularly review what sensitive information they collect, use and disclose
and who has access.
There are some basic security principles that you should all be aware of:
Need-to-Know: People should have the minimum amount of sensitive information that they need
to know in order for them to perform their duties. If they aren’t required to know sensitive
information, they shouldn’t be given access to it. From an administrative perspective, managers
should regularly review the kinds of sensitive information that their employees have access to. The
“need-to-know” principle is not intended to limit information sharing across government or among
employees, but it is intended to ensure that the information being shared is being shared with
legitimate need or purpose (such as improving service delivery or creating a new policy).
Segregation of Duties: This means dividing job responsibilities for sensitive job functions between
several individuals in order to provide a check and balance. For example, someone investigating a
security or privacy incident should not be someone who was involved in the incident.
Authorization to Use and Disclose: Once you’ve been given
access to information, you are required to use that information
only during the course of your work for the purpose for which
it was collected and for which you need to know the
information. Using or disclosing that information for personal
gain, for unrelated purposes or outside your responsibility is
prohibited.
Page | 5
Safe Electronic and Physical Document Handling
If there are any questions about securing information, please contact the Office of Information
Protection.
When you are using or handling sensitive or personal information as part of your work, there are
some general guidelines you should follow to keep it secure.
•
Ensure that sensitive information you are working on is not visible to others, whether it is on
your monitor or on your desk.
•
Verify that you are using the correct e-mail address, fax number or printer name before sending
sensitive information.
•
Lock your computer workstation when you need to leave your desk. (Control-Alt-Delete).
•
If you are not sure whether you are authorized to share certain information with someone, be
cautious and ask your supervisor.
Your department or program area may also have specific practices
that you will need to follow, so be aware of them.
The Government of Prince Edward Island retains official records of
information and has records retention and disposition schedules
for handling these records. Draft documents or copies of original
material are referred to as ”transitory records” and can usually be
regularly disposed of when no longer needed for day-to-day work.
Get to know the procedures for properly handling and disposing
of transitory records in your program area. Your Senior Records
Management Liaison Officer can provide you with more
information about records management processes.
Removable storage devices such as CDs or USB drives should be locked away when you leave for
the day. The Service Centre or the Office of Information Protection can tell you what types of
devices are acceptable and the best procedure for disposing of information when you no longer
need it.
Page | 6
Passwords
To err is human….to really foul up you require a password.
Effective passwords protect your computer and other devices, such as mobile devices, from being
used or abused by others. To check your current computer security, ask yourself the following
questions:
Do I use passwords that someone could easily guess, like my pets name or my birthday?
Do I use common words found in the dictionary?
Do I routinely allow my computer to remember passwords so I don’t have to type it in every time?
Do I use the same password elsewhere?
If you answered yes to any of the above questions, the information on your computer could be at
risk. When selecting a password, your goal is to make it as difficult as possible for someone to
guess. This is a small yet critical step in protecting the confidentiality, integrity and availability
within the workplace.
Create a password that is at least eight characters long and is a combination of mixed case letters
and digits.
Create a password that is at least eight characters long and is
a combination of mixed-case letters and digits, for example
AbGrl4498. Consider choosing a line or two from a song or
poem and use the first letter of each word. For example, “I’m
Bud the spud, from the bright red mud” becomes IBtSftbrm.
Then take a random number and insert it so it becomes
IBtS65ftbrm.
Examples of effective passwords include: We2raed? (Who
eats two red apples every day?) Gt%Real2dY! (Get real
today!). Intentionally misspelling a word is even better, such as:
Git@Rele2dY.
Examples of weak passwords include: Bbrown123 (user name and simple number) Scuba41
(hobby with user’s age).
It is also very important not to share your ID and password with others, even your supervisor. Your
User ID identifies you as the person accessing a desktop, network or website. Allowing others to
use your User ID (and password) put you at risk. You are accountable for all activities that occur
under your User ID.
Page | 7
Internet, E-mail and Social Media
DO NOT post anything you wouldn’t want your Mother to hear at your trial.
The Government of Prince Edward Island has an Acceptable Use Agreement which provides a
directive on what is appropriate in nature and will not incur additional cost or increased risk to the
Government. Technology that is provided by the Government of Prince Edward Island should not
be used for any personal activity that may cause embarrassment to the user or the Government
and must not be used to access or promote inappropriate sites.
Remember, information you send or attach to your e-mail can be intercepted, misused, stolen or
altered if sent to an address outside Government. Only the information that is sent within the
government network is encrypted. This could lead to the accidental release of sensitive
information. E-mail exchanged between two Government of PEI e-mail accounts remains within
our corporate computing network and is protected from disclosure.
Here are some general guidelines to follow:
• Don’t carbon copy mail unnecessarily.
• External e-mail accounts provided free by Internet search sites and engines, e.g., Hotmail,
Gmail, Yahoo mail, must not be used to exchange Government information.
• E-mail messages, once received or sent, are Government records; as such, users should
not have an expectation of privacy.
• Sending e-mail to all users in the system can only be done under the signature of your
deputy minister and must be sent at the end of the business day.
Social media networking sites such as Facebook, YouTube,
Twitter, Flickr and blogs are being utilized more and more to
communicate with citizens and stakeholders. Employees, acting
as private citizens, must use a private e-mail when posting
material to social media sites and ensure that they respect the
confidentiality of the Government of Prince Edward Island and
do not do anything that could harm the reputation of the
Government.
One major thing to remember: when you post something to a
website, it is immediately public and there is no way to change
that.
Also, information you send or attach to your electronic
messages can be intercepted, misused, stolen or altered if sent
to an address outside government. This could lead to the
accidental release of sensitive information. Messages exchanged between Government of Prince
Edward Island e-mail accounts remain within our corporate computing network and are protected
from disclosure. You should also take into consideration that your electronic messages may get
forwarded to another person or location by the person who received your e-mail.
Page | 8
Social Engineering
Check the bottom of your browser for the lock icon when considering providing personal or
sensitive information.
You may have heard the term social engineering; a technique used to try and trick users into
divulging information they should not. This can transpire on the phone, an e-mail or by having a
casual conversation with someone.
One form of social engineering is phishing, a term derived from the phrase password harvesting. A
phishing e-mail tries to trick you into disclosing a password or other sensitive information.
An example is an e-mail which tells you to update your online banking information. This e-mail will
include a link to a phishing website that looks very much like your bank’s website – but isn’t a
legitimate site – and asks you to enter your online banking password. By typing in your password,
a malicious party operating the phishing website now has access to your online banking. Banks
never use e-mail to contact their customers to update any information. Read the e-mail carefully,
as you can often identify it as malicious through spelling errors, web addresses that are very similar
to a legitimate website but with small changes or any items that seem out of place. The Province
of Prince Edward Island’s e-mail is filtered for spam and potentially threatening e-mails and a great
majority of the incoming e-mails are blocked. Some spam or phishing e-mails will get past the
filters. If you get an e-mail that appears to be spam or phishing, delete it.
Another way to avoid phishing attacks is to not click on any links
within the body of an e-mail. Your best bet is to type the web
address, like gov.pe.ca, into the address bar. Sometimes
phishing websites have names similar to the name of a legitimate
site to try and trick users. Check the bottom of the browser to
see if the lock icon is present when providing personal or
sensitive information. If you still have doubts, pick up the phone
and call the Service Centre or the Office of Information Protection
and ask whether this is something that you should be doing.
Think before you “click”. Before you click on a link, check
whether it is actually connected to the address it claims to be. Move your cursor over the link
without clicking and the address will be displayed. Familiarize yourself with the addresses of the
site(s) you often use.
Page | 9
Authorized and Acceptable Use of Software
Programs for sale: fast, reliable, cheap – choose two.
Malware is short for malicious software. It is software specifically designed to damage or disrupt a
computer system. A computer virus, for example, is malware that spreads rapidly through the
Internet and e-mail attachments. It often hits without warning and when you least suspect it.
Malware might be disguised as appealing software such as a game, a toolbar or a screen saver
and you might not notice any immediate effect.
Spyware is a form of malware that captures information about you or your computer use habits
and sends that information over the Internet to a third party. Some spyware captures your
passwords or credit card information. Some reads your personal files or anything that you type
into your computer. Other forms of spyware monitor the websites you visit. It then uses this
information to market products or service(s) to you. Spyware almost always collects this
information without your consent. It may try to get you to consent to the collection by hiding it
within an agreement.
What can you do about malware? Be careful; if you are not
certain what the attachment is or who it is from, do not open
it. Do not attempt to change the settings of the virus
protection software installed on your computer.
It is
configured to regularly scan for viruses and other malicious
software. And last but not least, contact the Service Centre
immediately if you suspect your computer has a virus.
Never download and install untested programs. In fact, most
government employees do not have administrative rights on
their computers, and are unable to install programs directly
from the Internet. It is for your protection and ultimately, for the
protection of all Islanders.
Page | 10
Privacy and Access
Questions regarding FOIPP? Check out gov.pe.ca/foipp
Government employees also have an obligation to protect personal information under the Freedom
of Information and Protection of Privacy (FOIPP) Act. All departments, agencies, boards, crown
corporations and commissions are bound by FOIPP. The act provides rules regarding the provision
of access to records and for protecting the privacy of all Islanders. Administering PEI’s FOIPP
legislation is an important part of the Government’s commitment to openness and accountability –
balanced by our responsibility to guard the personal information entrusted to us.
Privacy
Personal privacy is protected by legislation that outlines the
rules that must be followed when collecting, using and
disclosing personal information. No personal information may
be collected by or for a public body unless the collection is
expressly authorized by or under an enactment of Prince
Edward Island or the information is collected for the purpose
of law enforcement, or the information relates directly to and
is necessary for an operating program or activity of the
Government. When collecting information directly from an
individual, we need to tell that person why we’re collecting it,
under what authority, who their information will be shared
with and a contact if they have any questions.
All information collected can only be used or disclosed for the purpose for which it was collected
unless authorized. We must ensure that personal information is kept secure and confidential.
Access to Personal Records
Everyone has the right to see their own personal information – with few exceptions. Everyone also
has the right to request corrections to factual information to ensure accuracy. Opinions can’t be
changed. An annotation can be attached to the file stating that someone disagreed with the
opinion but the original record can’t be altered. Although legislation sets out a single process for
anyone to access records, it does not replace existing practices or limit alternative procedures for
providing access to information. Rather, the Act complements existing practices by establishing a
procedure for providing access where none exists.
Access to Information
You are entitled to have access to all information and assets needed to perform your assigned
work. Access to information and assets is not permitted to satisfy your personal interests. You
must always be alert and not reveal information to your co-workers or others unless they
specifically require it for their own assigned tasks. Beware of any attempt by non-authorized
personnel to gain access to sensitive information, and report to your manager or supervisor all
such attempts.
Page | 11
Protecting Your Work Space
Ask for ID, legitimate visitors won’t mind.
Keeping your work space protected is another important part of information security.
Here are a few general practices:
•
Keep your desk or work area clear of papers or other materials when you are out.
•
Lock all sensitive information in your desk or a filing cabinet.
•
Lock any portable computing and storage devices in your desk or filing cabinet.
•
Ensure access to areas where sensitive information is processed or stored is controlled and
restricted to authorized personnel only.
•
Promptly retrieve any sensitive documents that are sent to centralized printers.
•
Consider whether you really need to print a document. If you do not print a confidential document,
it is not going to get lost and you will not have a document to
securely dispose of when you are finished.
•
Keep aware of the people who are around your work space. Are
they authorized to be in the area?
Page | 12
Mobile Computing and Working Away from the Office
As valuable as the equipment is, the information is the true valuable asset.
Portable devices such as laptops, personal digital assistants (PDAs), cell phones and Blackberries
are convenient and provide us with options to work outside the office. As our desire for a flexible
workplace grows, so does the potential of portable computing equipment being lost or stolen. As
valuable as the equipment is, the information stored on it may well be more valuable.
If you’ve received authorization to take sensitive information home or access it from another
location, ensure that the information is safe. Treat it like you would your wallet or credit card. Some
additional suggestions and tips for keeping your laptop or portable computing equipment secure
are:
• Use a locking cable or device to secure your laptop to your workspace.
• Store your laptop in a locked drawer or cabinet or in a locked office.
• Avoid leaving your portable computing device in a vehicle. If you do so, ensure that it is locked
in the trunk out of sight.
• Store personal or confidential information on your portable computing device only if you have
permission to do so and only for as long as you need it. Store only the minimum amount you
require.
• Always ensure that you use a password or other form of authentication to access information on
your portable computing device.
• If you discover your mobile computing device is missing, report it to your Supervisor and the
Service Centre immediately.
Remember, these are general suggestions and your specific circumstances may require different
protection. Discuss your situation with your supervisor and contact the Service Center to determine
what will meet your specific needs.
You should follow similar steps to protect paper-based information. Don’t leave files in plain sight in
your car or review confidential files in a public place such as an airplane or coffee shop.
If you need to work on your laptop or portable computer
outside the office, contact the Service Centre, the support staff
can help outline what services are available and provide
direction on how to manage information safely.
Page | 13
Reporting Incidents or Problems
Report any incidents to the Service Centre and your Departmental Manager immediately.
Imagine someone breaking into your computer or account and using your Government e-mail
address. You have no control over the message being sent, yet every indication is that the e-mail
came from you. Eventually, you may be able to identify who sent the message, but this situation
can be avoided by taking effective information security precautions.
Other indicators of potential incidents might include files on your
computer that you’re not familiar with, changes to your hardware
or software configurations, services that are no longer accessible
or if your computer shuts down for no apparent reason. If
something seems amiss with your computer, notify your
supervisor or the Service Centre immediately.
Personal or sensitive information may also be lost if you forget
your briefcase while travelling, or your car, hotel room or home is
broken into, or your laptop, cell phone or Blackberry is lost or
stolen. Whether the sensitive information is paper-based or
electronic, it is still a security incident.
If you think personal or sensitive information has been accidentally disclosed, you must notify your
supervisor and the Service Centre immediately.
This will allow:
•
your information security staff to review the facts and determine what needs to be corrected to
ensure it doesn’t happen again; and
•
department’s to take steps to minimize any harm to individuals that may result from the loss of
their personal information.
We learn from our mistakes. The objective of reporting and reviewing incidents is not to place
blame but to make improvements to better manage information security in the future.
If your computer or electronic device has been lost or stolen, you must report this incident to the
Service Center and your supervisor immediately. There is a User Check list located at
insite.gov.pe.ca/group/itss-community/documents-and-forms.
.
Page | 14
References
Information about Freedom of Information and Protection of Privacy (FOIPP)
gov.pe.ca/jps/index.php3?number=1024336&lang=F
Office of the Information and Privacy Commissioner of Prince Edward Island
assembly.pe.ca/index.php3?number=1013943&lang=E
Websites of Interest
•
•
•
Canadian Anti-Fraud Call Centre – antifraudcentre.ca
Public Safety Canada - publicsafety.gc.ca/index-eng.aspx
RCMP Scams - rcmp-grc.gc.ca/scams-fraudes/index-eng.htm
Useful Websites for Home Internet Users
•
AVG Free AntiVirus Software: grisoft.com/
•
Ad-Aware Free AntiSpyware Software: lavasoftusa.com/
Page | 15
Acceptable Use Agreement for Government-Provided
Computer Technology
Introduction:
This agreement is in place to protect employees, the employer and the information in the Governments custody or
under the control of a public body. It applies to all employees, independent contractors, temporary workers and all
other individuals using Government owned electronic information resources.
The confidentiality, integrity and availability of computer technology used inside or outside the work place,
that contains client and personal information, must be preserved at all times. Access to this Governmentprovided technology is granted under the following conditions:
1.
2.
Government-provided computer technology is to be used to support authorized programs and services.
Users must use only system information technology they are authorized to use and use them only in the manner and to
the extent authorized. Ability to access information technology resources does not, by itself, imply authorization to do so.
3. Changing the Government –provided computer system configuration is not permitted unless approved by End User
Support.
4. Personal use of Government-provided computer technology is to be of an appropriate nature that will not incur additional
cost or increased risk to the Government. Such technology is not to be used for any personal activity that may cause
embarrassment to you or the Government and must not be used to access or promote inappropriate sites, including but
not limited to pornography, racism, hatred, gambling, obscenity or any illegal activities.
5. You are responsible and accountable for the use of your user ID, passwords and other access control items in your
possession for computer technology. They are not to be shared.
6. The bandwidth available to Government is limited. Therefore the use of streaming audio and video (e.g. Online radio,
YouTube, etc.) should be limited to a work related need.
7. Removal of, or alterations to, Government-provided computer hardware or components must be approved by End User
Support.
8. Prior to downloading or installing software on Government-provided hardware confirmation of acceptability must be
obtained from your Departmental Information Technology Architect (ITA).
9. You must not violate the privacy of other users and their accounts, regardless of whether those accounts are securely
protected. Technical ability to access other’s accounts does not, by itself, imply authorization to do so.
10. You should not leave your computer unattended while logged on to the network. A password protected screen saver is
required to reactivate a session after 5 minutes of inactivity.
11. Work related electronic data must be stored on the Government-provided file server where possible. If work related
electronic data is not stored on the file server it is your responsibility to prepare and maintain backup copies in
accordance with Government Policies, the Archives and Records Act and the Freedom of Information and Protection of
Privacy Act.
12. Wilful or intentional violations of this agreement will be considered to be misconduct and violators of this agreement may
be denied access to the Government-provided computer technology and may be subject to other penalties and
disciplinary action in accordance with the Civil Service Act and Regulations. Violation of this Agreement may result in
discipline that may include but not be limited to termination or employment and/or other legal action.
I have read and understand “The Acceptable Use Agreement for Government –Provided Computer
Technology” and recognize that technical monitoring takes place to protect the system and ensure users are
complying with this policy. I agree to access and use the Government-provided computer technology only in
accordance with the terms and conditions set out in this Agreement.
Date: ___________________________
Name of User: __________________________
(Please Print)
Witness: _________________________
User Signature: _________________________
Definitions:
Acceptable Use Policy (AUP) is a written agreement all users of the Government-provided computer technology
adhere to for the common good. An AUP defines the intended uses of the network including unacceptable uses and
the consequences for non-compliance.
Computer Hardware refers to workstations, stand alone computers, network computers, laptops, notebooks,
servers, PDAs, Blackberries and any other peripherals.
Computer Software refers to written programs, procedures or rules and associated documentation pertaining to the
operation of a computer system, which includes packaged software, downloadable executables, screen savers,
macro, freeware and shareware.
Computer Technology, for the purpose of this agreement, is Computer Systems and all electronic data.
Electronic Data is data that is stored and readable in electronic form without regard to the hardware or software
used to produce the data, excluding computer software.
Office of Information is the designated authority responsible for maintaining and monitoring compliance with
Government Security Policies and Directives.
SecurID: is a mechanism developed for performing two-factor authentication for a user to a network resource.
Token: are used to prove one's identity electronically. The token is used in addition to or in place of a password to
prove that the employee is who they claim to be. The token acts like an electronic key to access something.
Virtual Private Network (VPN): is a network that uses primarily public telecommunication infrastructure, such as
the Internet, to provide remote offices or traveling user’s access to a central organizational network.
Disciplinary Action:
Please take the time to peruse the following two links. It will be useful in explaining where the discipline
consequence arise from any violation.
1. Treasury Board – Section 16.02 – Security Policies: http://iis.peigov/dept/tboard/manual/pdf/sec1602.pdf
2. Civil Service Act and Regulations :
Section 31 – 33 of the CSA Regulation: http://www.gov.pe.ca/law/regulations/pdf/C&08G.pdf
Acceptable Use Agreement for Government-Provided
Computer Technology for External Contracts
Introduction:
This agreement is in place to protect employees, the employer and the information in the Governments custody or
under the control of a public body. It applies to all employees, independent contractors, temporary workers and all
other individuals using Government owned electronic information resources.
The confidentiality, integrity and availability of computer technology used inside or outside the work place,
that contains client and personal information, must be preserved at all times. Access to this Governmentprovided technology is granted under the following conditions:
1.
2.
Government-provided computer technology is to be used to support authorized programs and services.
Users must use only system information technology they are authorized to use and use them only in the manner and to
the extent authorized. Ability to access information technology resources does not, by itself, imply authorization to do so.
3. Changing the Government –provided computer system configuration is not permitted unless approved by End User
Support.
4. Personal use of Government-provided computer technology is to be of an appropriate nature that will not incur additional
cost or increased risk to the Government. Such technology is not to be used for any personal activity that may cause
embarrassment to you or the Government and must not be used to access or promote inappropriate sites, including but
not limited to pornography, racism, hatred, gambling, obscenity or any illegal activities.
5. You are responsible and accountable for the use of your user ID, passwords and other access control items in your
possession for computer technology. They are not to be shared.
6. The bandwidth available to Government is limited. Therefore the use of streaming audio and video (e.g. Online radio,
YouTube, etc.) should be limited to a work related need.
7. Removal of, or alterations to, Government-provided computer hardware or components must be approved by End User
Support.
8. Prior to downloading or installing software on Government-provided hardware confirmation of acceptability must be
obtained from your Departmental Information Technology Architect (ITA).
9. You must not violate the privacy of other users and their accounts, regardless of whether those accounts are securely
protected. Technical ability to access other’s accounts does not, by itself, imply authorization to do so.
10. You should not leave your computer unattended while logged on to the network. A password protected screen saver is
required to reactivate a session after 5 minutes of inactivity.
11. Work related electronic data must be stored on the Government-provided file server where possible. If work related
electronic data is not stored on the file server it is your responsibility to prepare and maintain backup copies in
accordance with Government Policies, the Archives and Records Act and the Freedom of Information and Protection of
Privacy Act.
12. Wilful or intentional violations of this agreement will be considered to be misconduct and violators of this agreement may
be denied access to the Government-provided computer technology and may be subject to other penalties and
disciplinary action. Violation of this Agreement may result in discipline that may include but not be limited to termination
or employment and/or other legal action.
I have read and understand “The Acceptable Use Agreement for Government –Provided Computer
Technology” and recognize that technical monitoring takes place to protect the system and ensure users are
complying with this policy. I agree to access and use the Government-provided computer technology only in
accordance with the terms and conditions set out in this Agreement.
Date: ___________________________
Name of User: __________________________
(Please Print)
Witness: _________________________
User Signature: _________________________
Definitions:
Acceptable Use Policy (AUP) is a written agreement all users of the Government-provided computer technology
adhere to for the common good. An AUP defines the intended uses of the network including unacceptable uses and
the consequences for non-compliance.
Computer Hardware refers to workstations, stand alone computers, network computers, laptops, notebooks,
servers, PDAs, Blackberries and any other peripherals.
Computer Software refers to written programs, procedures or rules and associated documentation pertaining to the
operation of a computer system, which includes packaged software, downloadable executables, screen savers,
macro, freeware and shareware.
Computer Technology, for the purpose of this agreement, is Computer Systems and all electronic data.
Electronic Data is data that is stored and readable in electronic form without regard to the hardware or software
used to produce the data, excluding computer software.
Office of Information is the designated authority responsible for maintaining and monitoring compliance with
Government Security Policies and Directives.
SecurID: is a mechanism developed for performing two-factor authentication for a user to a network resource.
Token: are used to prove one's identity electronically. The token is used in addition to or in place of a password to
prove that the employee is who they claim to be. The token acts like an electronic key to access something.
Virtual Private Network (VPN): is a network that uses primarily public telecommunication infrastructure, such as
the Internet, to provide remote offices or traveling user’s access to a central organizational network.
Disciplinary Action:
Please take the time to peruse the following link. It will be useful in explaining where the discipline consequence
arise from any violation.
Treasury Board – Section 16.02 – Security Policies: http://iis.peigov/dept/tboard/manual/pdf/sec1602.pdf