Information Security Handbook For Employees
Information Security Handbook For Employees
Information Security Handbook For Employees
Security Handbook
for Employees
Contents
Confidential Information ......................................................... 1
Access Privileges ................................................................... 1
User IDs ................................................................................. 2
Password Protection and Creation ......................................... 3
Computer Workstations .......................................................... 4
Personally Owned Devices .................................................... 4
Working from Home ............................................................... 5
Personal Use ......................................................................... 5
Email ...................................................................................... 5
Internet Access ...................................................................... 6
Inappropriate Activity .............................................................. 6
Individual Fines for Willful Intent ............................................. 7
Auditing and Monitoring.......................................................... 7
Reporting Security Incidents................................................... 8
Backups ................................................................................. 8
Protecting Media .................................................................... 8
Mobile and Portable Devices .................................................. 9
Installing Software .................................................................. 9
Confidential Information
Confidential information is any information considered to
be private and sensitive.
Here are some examples of confidential information:
Financial records
Access Privileges
To obtain access to an application or computer system, an
access request form must be completed and submitted to
the Information Technology (IT) department. Contact the IT
Service Desk at (extension #) for assistance with the
request form.
Page 1
User IDs
Your user ID uniquely identifies you. You are responsible
for all actions associated with your user ID; therefore, it is
important to ensure that your user ID is used only by you
and no one else.
You will be held responsible for the actions of another
individual if you allow them to obtain and use your user ID
and password or allow them access to patient information
in a clinical application while you are logged on.
Page 2
Computer Workstations
Position workstation monitors to be facing away from the
public view. Log off or lock your computer workstation
whenever leaving it unattended. Also, log off when you are
leaving your work area, especially at the end of your shift.
Leaving a workstation logged on and unattended could lead
to an unauthorized access of confidential information.
Page 4
Personal Use
Computer systems are intended for business purposes.
Limited personal use is permissible as long as it is approved
by your supervisor and is on your own personal time.
Email
Organizational email is for conducting work-related
communications. Incidental (personal) use is permitted if
approved by your supervisor.
You are responsible for all activity on your
assigned email account.
Exercise good judgment when reading
email. The IT department has employed
security controls to prevent most of the unwanted emails
from reaching our systems.
However, avoid opening any suspicious emails and
attachments from unknown senders. Be aware of
hypertext links within an email; it may be a scam.
Secure web mail has been implemented by IT and is used to
encrypt outbound email containing confidential
information. Contact the IT Service Desk at (extension #) if
you need help using this important tool.
Page 5
Internet Access
Internet access is provided to authorized
individuals who have a legitimate business
need. The IT department filters and monitors
all Internet connectivity. The ability to connect
with a specific website does not in itself imply that it is
permitted. If you discover that you have inadvertently
connected to an inappropriate website please disconnect
from that site and notify the IT Service Desk at (extension
#).
Additionally, streaming audio or video is prohibited without
management approval.
Inappropriate Activity
Under no circumstances should organization-owned (or
hospital-owned) systems be used for gambling,
personal profit, or to download, distribute
materials, comments, pictures, or other forms
of communication of a sexual nature or which
are otherwise obscene, intimidating, offensive,
or create a hostile work environment. Misuse
of privileges which exceeds the bounds of our values and
generally accepted standards of good taste may result in
disciplinary action and in some cases, termination of your
relationship with our organization. Additionally, violations
of federal, state, and local laws and regulations may result
in civil or criminal penalties.
You must not post work-related information to a personal
(non-work related) social networking website.
Page 6
Page 7
Policy violations
Backups
Store files on a network file server (such as the Z: drive)
which is backed up daily by IT. Important information
should be stored on a network drive and not on an internal
hard drive.
Protecting Media
Due to the risks and penalties associated with a disclosure,
confidential information that is stored on portable media
must be encrypted and securely handled. Confidential
Page 8
Installing Software
Only licensed and authorized software approved by IT can
be installed on organizational computers.
No software from home is allowed.
Unauthorized software found on your
computer will be removed. Obtain
permission from the IT department before
downloading or installing any software to your computer.
Contact the IT Service Desk at (extension #) for assistance.
Page 9