19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- access to the actual terminal device, i.e. the mobile phone,<br />

- access to certain functions of the mobile phone, e.g. the telephone<br />

directory,<br />

- access to the mailbox, i.e. to the answer phone function, or to other<br />

services of the network provider,<br />

- access to data held by the network provider (e.g. when a caller queries the<br />

hotline about billing, sometimes a password has to be given).<br />

All these security mechanisms should be used (see also S 4.114 Use of the<br />

security mechanisms provided on mobile phones). Under no circumstances<br />

should the personal identification number (PIN) be kept in the same place as<br />

the SIM card for the mobile phone.<br />

If the SIM card is lost, arrangements should be taken immediately for the<br />

network provider to block the card so as to prevent possible misuse and any<br />

resulting financial loss (see S 2.189 Blocking of the mobile phone in the event<br />

of its loss).<br />

To ensure that misuse of the SIM card is noticed promptly, the itemised call<br />

breakdown should always be checked for inexplicable charges and destination<br />

numbers.<br />

Itemised call breakdowns<br />

<strong>The</strong> network provider stores the call data for billing purposes. In Germany,<br />

under the directive concerning data protection for companies which provide<br />

telecommunications services (TDSV) the network provider is only allowed to<br />

retain this data up to the date on which an invoice is prepared, but no longer<br />

than 80 days. However, it can be appropriate for the customer to allow the<br />

network provider to store the call data for longer in case any problems should<br />

subsequently occur in connection with invoicing.<br />

Every customer should demand itemised call breakdowns in order to be able<br />

to review mobile phone usage. In Germany customers are entitled to receive<br />

itemised call breakdowns free of charge. <strong>The</strong> following data can be obtained<br />

from this source:<br />

- invoice date,<br />

- numbers called (full number or else the last numbers may be unavailable)<br />

- beginning, end and duration of the call,<br />

- cost of the call.<br />

All users who share the telephone must be informed of the fact that an<br />

itemised call breakdown has been requested and what data will be collected by<br />

this means.<br />

If an organisation maintains and analyses itemised call breakdowns for cost<br />

control reasons, the procedure must be agreed with the works council or staff<br />

council, and the Data Privacy Officer and users must be advised.<br />

<strong>The</strong> itemised call breakdowns should always be checked following receipt to<br />

ensure that they are correct. This will provide insight into possible ways of<br />

reducing costs.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!