19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Other <strong>IT</strong> Components Mobile Telephones<br />

_________________________________________________________________________________________<br />

Organisation:<br />

- S 2.4 (2) Maintenance/repair regulations<br />

- S 2.22 (3) Escrow of passwords<br />

- S 2.188 (1) Security guidelines and rules for the use of mobile phones<br />

- S 2.189 (1) Blocking of the mobile phone in the event of its loss<br />

- S 2.190 (2) Setting up a mobile phone pool (optional)<br />

Hardware and Software:<br />

- S 4.114 (1) Use of the security mechanisms provided on mobile phones<br />

- S 4.115 (2) Safeguarding the power supply of mobile phones<br />

Communications:<br />

- S 5.78 (3) <strong>Protection</strong> against mobile phone usage data being used to create movement profiles<br />

(optional)<br />

- S 5.79 (3) <strong>Protection</strong> against call number identification during use of mobile phones (optional)<br />

- S 5.80 (3) <strong>Protection</strong> against bugging of indoor conversations using mobile phones (optional)<br />

- S 5.81 (2) Secure transmission of data over mobile phones<br />

Contingency Planning:<br />

- S 6.72 (2) Precautions relating to mobile phone failures<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!