19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- When mobile phones or SIM cards are passed around a circle of users, it<br />

requires a lot of effort to intercept telephone calls in a targeted manner. It<br />

may therefore be appropriate to employ such means when highly sensitive<br />

information or data is to be transmitted.<br />

Itemised call breakdowns should be examined for unknown call numbers.<br />

- A check should be made as to whether all call charges are billed to the<br />

subscriber. If certain connections do not incur any charges, this could be a<br />

sign that interception is taking place.<br />

Raising the awareness of users<br />

Because people are often careless about the danger of communications being<br />

intercepted, organisations should check that existing measures aimed at<br />

creating staff awareness of the relevant dangers are sufficient. If necessary it<br />

may be appropriate to inform staff at regular intervals about the dangers of<br />

having their calls intercepted and of making them fully aware.<br />

Employees should also be briefed on the requirement not to disclose<br />

confidential information on the telephone without taking additional<br />

precautions. In particular, checks should be made as to the identity of callers<br />

before giving out any detailed information (see also T 3.45 Inadequate<br />

checking of the identity of communication partners). Where mobile phones are<br />

used, care should also be taken to ensure that confidential information is not<br />

discussed in public.<br />

Spectacular but false warning messages are always in circulation (see also<br />

T 5.80 Hoaxes). To avoid wasting valuable working time checking whether<br />

such messages are true or not, all staff should be informed as soon as possible<br />

following the occurrence of a new hoax. <strong>The</strong>re are various information<br />

services which send out appropriate warnings.<br />

Rules on the use of mobile phones<br />

Where mobile phones are used in an organisation, a number of aspects needs<br />

to be subject to control. <strong>The</strong>se concern the use of both private and also work<br />

mobile phones.<br />

Use of private mobile phones<br />

If there are not enough mobile phones to go round within the organisation, it is<br />

possible that private mobile phones could be used for business purposes.<br />

However, the following aspects must be settled in advance:<br />

- Who pays for business calls and how will they be settled?<br />

- Modern mobile phones contain diaries, address books, e-mail support and<br />

other functions. To make the most of these functions it is usually necessary<br />

to synchronise the phone with a PC. <strong>The</strong>refore the issue of whether<br />

installation of the hardware and software necessary for this is permitted<br />

must be resolved.<br />

Use of business mobile phones<br />

Similarly, a number of items need to be regulated with regard to the use of<br />

mobile phones belonging to the company/organisation:<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Circumspection in the<br />

disclosure of information

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!