19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- A policy must be established as to whether private calls may be made with<br />

work mobile phones and, if so, to what extent.<br />

- Consideration should be given to whether only calls to certain<br />

communication partners should be allowed, e.g. to avoid unnecessary<br />

expense and/or restrict the disclosure of information (see also S 2.42<br />

Determination of potential communications partners). This can be<br />

achieved through either an organisational procedure or technical means, as<br />

described below under the keywords "Call restrictions" and "Closed User<br />

Group".<br />

- Even where work mobile phones are used, users should be informed of the<br />

related costs in order that these can be kept as low as possible. Thus, users<br />

should be informed of the tariff structure and roaming agreements in order<br />

that, for example, they can select the most favourable network provider<br />

when making calls abroad.<br />

- Users should be informed as to the care they should take with their mobile<br />

phones to avoid loss or theft and to ensure that the equipment has a long<br />

useful life (e.g. looking after batteries, care of phones outside office or<br />

living rooms, sensitivity of equipment to excessively high or low<br />

temperatures).<br />

- <strong>The</strong> administration, maintenance and issue of mobile phones should be<br />

controlled. For this purpose it is recommended that a mobile phone pool is<br />

set up (see S 2.190).<br />

- Every time a change of user occurs, all the necessary PINs must be passed<br />

on securely (see S 2.22 Escrow of passwords).<br />

General rules<br />

Irrespective of whether the mobile phones used have been purchased privately<br />

or by the business, the employer should issue the following rules in writing:<br />

- Anyone driving a vehicle on business must not make any calls during the<br />

journey, as otherwise in the event of an accident the organisation could be<br />

held jointly liable.<br />

- Business secrets must not be disclosed over the mobile phone. <strong>The</strong> threat<br />

here is not so much that the communication will be intercepted on the<br />

communications link (over the network) as that it will be overheard by<br />

persons in the immediate environment.<br />

- Users should satisfy themselves as regards the identity of the person they<br />

are talking to and should not jump to hasty conclusions before passing on<br />

information that is internal to the organisation.<br />

As far as possible, a mobile phone should never be left unattended. If a mobile<br />

phone has to be left behind in a motor vehicle, then the device must not be<br />

visible from outside. Alternatives are to cover the device or to lock it up in the<br />

boot. Mobile phones have a certain value which could attract potential thieves.<br />

If the mobile phone is used on-site in offices which do not belong to the<br />

organisation, then the security rules in force in the organisation being visited<br />

must be observed.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!