19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.23 Issue of PC Use Guidelines<br />

Initiation responsibility: Agency/company management; <strong>IT</strong> Security<br />

Management; Head of <strong>IT</strong> Section<br />

Implementation responsibility: Head of <strong>IT</strong> Section; <strong>IT</strong> users<br />

In order to promote the secure and proper use of personal computers in largersize<br />

companies/agencies, PC Use Guidelines should be prepared which lay<br />

down mandatory provisions on what general requirements must be met and<br />

which <strong>IT</strong> security measures will have to be taken. As a minimum, such PC<br />

Use Guidelines are to regulate the use of non-networked PCs; if PCs are<br />

operated within a network or are used as intelligent terminals, these aspects<br />

will have to be covered by the Guidelines. <strong>The</strong> following is to give a broad<br />

outline of the items which might expediently be included in such PC Use<br />

Guidelines.<br />

<strong>The</strong> contents of PC Use Guidelines may be structured as follows:<br />

- Objectives and definitions<br />

This introductory part of the PC Use Guidelines serves to raise the <strong>IT</strong><br />

security awareness and motivation of PC users. At the same time, the<br />

concepts required for shared understanding are defined, such as PC, users,<br />

objects requiring protection.<br />

- Scope of application<br />

In this part, the units of the company/agency to which the PC Use<br />

Guidelines are to apply must be laid down in a binding form.<br />

- Legislation and in-house regulations<br />

Here, information is given on the legal provisions to be complied with, e.g.<br />

the Federal Data <strong>Protection</strong> Act and the Copyright Act. In addition, all<br />

relevant in-house regulations can be listed in this section.<br />

- Distribution of responsibilities<br />

This section defines what function will be associated with what<br />

responsibility in the context of PC use. In particular, a distinction will have<br />

to be made between the functions of user, superior, auditing officer,<br />

departmental data privacy officer, and <strong>IT</strong> Security Management.<br />

- <strong>IT</strong> security measures to be implemented and observed<br />

In the final section of the PC Use Guidelines, those <strong>IT</strong> security measures<br />

which are to be observed and implemented by the <strong>IT</strong> user must be laid<br />

down. Depending on the required level of protection the measures can<br />

exceed the <strong>IT</strong> base protection.<br />

If telecommuters are employed by an enterprise or agency, the PC usage<br />

guidelines should be extended by rules pertaining to telecommuting<br />

workstations. Also refer to Chapter 9.3.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!