Security Policies and Procedures
Security Policies and Procedures
WorldEscrow N.V./S.A.
protection-informatio
n-assets-594.pdf
3) Disclosure
i) Disclosure includes both written and verbal communication, by means of all channels, including e-mail,
internet and social media, (for example, Facebook, Twitter, Linkedin).
ii) WorldEscrow internal disclosures of sensitive information may be provided to people within WorldEscrow
only for valid business purposes.
iii) WorldEscrow external disclosures of sensitive information may be provided to a customer, channel
partner, supplier, other business partner or anyone else outside WorldEscrow only when business needs
to require WorldEscrow to make such a disclosure. The identity of the receiving party needs to be verified
and an authorized Confidential Disclosure Agreement (CDA) executed by the receiving party – see Non
disclosure_WE_EN.pdf.
iv) Confidential Disclosure Agreements (CDAs) are designed for use in situations where it becomes
necessary for WorldEscrow to disclose confidential information to, or receive confidential information from,
someone outside WorldEscrow (the “software suppliers”).
v) This Agreement should be used if it becomes necessary for WorldEscrow to disclose confidential
information (such as product design) to anyone outside WorldEscrow.
vi) It is the responsibility of every employee and authorized external party to understand WorldEscrow's policy
with respect to the receipt or disclosure of sensitive information and to know the basics of when and how
to use a CDA appropriately.
1
4) WorldEscrow labels
i) WorldEscrow information assets must be identified, handled, labeled, and disposed of in accordance with
the sensitivity of the content, as defined by WorldEscrow policies and procedures, available at: Protecting
WorldEscrow 's Information Assets.
ii) WorldEscrow's Labels are:
WorldEscrow Confidential is the label for any information that is to be restricted within WorldEscrow to only
those internal parties receiving the information with a “need to know". Information that is labeled
WorldEscrow Confidential must be properly protected to avoid unauthorized access to the information and
will only be posted on the Intranet or internet if it is password protected or otherwise placed in a way (that
is, encryption) that it cannot readily be accessed by unauthorized parties.
WorldEscrow sensitive information labeled as Private will be safeguarded through secure communications
and authentication in the case of electronically posted information.
Recycling of hardcopy sensitive information is not an acceptable form of disposal unless the sensitive
information is crosscut according to the specifications above prior to recycling.
5) Digital Media
i) All digital media must be securely erased electronically by overwriting or physically destroyed prior to
disposal or reassignment of the system.
ii) The following media types are used in process of the escrow depositing : CD, DVD, USB stick, external
drive, HD, ftp. For the ftp the zip, tar file is encrypted or password protected.
iii) WorldEscrow always recommends to use the encryption to transmit the data. The public PGP key is
available on the website www.worldescrowdeposits.biz in order to encrypt the escrow deposit.
2
iii) Keys (or combinations) are issued on the regular basis only by 2 people authorized people within the
company who are authorized to collect sensitive material.
iv) Sensitive information is not allowed to be left in a state or position where it can be accessed without
detection by unauthorized individuals.
3
12) Special Events
i) Sensitive material identification and markings are to be used for event handouts, printed material, visual
projections and other presentation material.
ii) Unwanted information assets must be controlled and secured until they can be disposed of as required by
this standard.
iii) All information assets are to be removed from conference rooms after meetings by the host.
iv) Whiteboards are to be erased.
v) Flip chart papers are to be destroyed.
vi) Mobile phones are to be turned off during sensitive meetings to prevent unintended transmissions.
vii) Avoid discussing or working on sensitive information in common areas.
viii) When traveling, maintain visual control of mobile equipment.