Grit It Information Security and Acceptable Use Policy
Grit It Information Security and Acceptable Use Policy
Information Security and Acceptable Use Policy
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
1. INTRODUCTION
1.1 Purpose
The purpose of this policy is to outline the acceptable use of computer equipment and
information assets at the Company. These rules are in place to protect GRIT and all
employees/contractors. Inappropriate use exposes the Company to risks including
unauthorised disclosure of information, virus attacks, compromise of network systems and
services, and potential legal issues.
1.3 Scope
This policy applies to employees, contractors, consultants, temporaries, and other workers at
the Company, including all personnel affiliated with third parties. This policy applies to all
equipment that is owned or leased by the Company.
1.4 Communication
Awareness of this policy will be included in all induction training for new GRIT staff and will be
included as appropriate on refresher training courses for existing staff.
All employees will be requested to sign-off this policy on an annual basis (unless otherwise
determined by executive management) and copies will be placed on personal files for record
keeping purposes.
All new employees will receive a copy of this document together with the job offer and non-
disclosure agreement and be requested to hand over a signed copy on the first day of
employment.
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
The Internet is a very large, publicly accessible network that has millions of connected users
and organisations worldwide. One popular feature of the Internet is e-mail.
2.1 Policy
Access to the Internet is provided to employees for the benefit of GRIT and its customers.
Employees are able to connect to a variety of business information resources around the
world. GRIT provides its users with Internet access and electronic communications services as
required for the performance and fulfilment of job responsibilities. These services are for the
purpose of increasing productivity and not for non-business activities.
In order to ensure the continuous availability and usability of the e-mail system, it is necessary
to implement the following controls:
a) Mailbox sizes are limited to 50GB per e-mail account. Users will be informed
automatically when they reach 50GB in capacity. Once the threshold is reached, sending
of e-mails will not be allowed. On reaching 50GB both sending and receiving facilities will
be suspended. Please note that this is a system enforced policy and therefore all
employees should manage their e-mail accounts (download to workstation for regular
back-ups). All members of the executive team will be treated on an individual basis.
b) All emails are processed and stored by an external mail solution for security, archiving,
compliance and other required corporate purposes. The current solution is provided by
MimeCast.
c) Outgoing mails will be limited to 25Mb per mail no matter when it is send. Only the
Corporate Dropbox and the local authorized user computers may be used for storing
company data. Any synchronisation of personal files while on the corporate network is
may be monitored.
The Internet is also replete with risks and inappropriate material. To ensure that all employees
are responsible and productive Internet users and to protect the company’s interests, the
following guidelines have been established for using the Internet and e-mail.
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
Information passing through or stored on company equipment and infrastructure can and will
be monitored. Examples of acceptable use are:
a. Using Web browsers to obtain business information from commercial Web sites.
b. Accessing databases for information as needed.
c. Using e-mail for business contacts.
d. Using company issued mobile devices and smart phones for business purposes.
a. Sending or forwarding chain e-mail, i.e., messages containing instructions to forward the
message to others.
b. Create and/or send "spam." Spam is defined as any unsolicited electronic communication
that is sent to any number of recipients who did not specifically request or express an
interest in the material advertised in the communication. It will be considered a greater
offence if the company's electronic communications resources are exploited to amplify
the range of distribution of these communications.
c. Conducting personal business using company resources. Internet banking is considered
acceptable use.
d. Accessing, downloading, uploading, saving, receiving, or sending material that includes
sexually explicit content or other material using vulgar, sexist, racist, threatening, violent,
or defamatory language.
e. Accessing and or listening to radio and streaming non work related content over the
Internet, as such activities severely degrade bandwidth and in so doing hampers the
overall productivity of the company.
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
f. Using your own personal computer or mobile device on the GRIT network for whatever
purposes (this may pose a serious risk as your computer may not be up to date with the
latest patches and anti-virus signatures).
g. “Testing” the security configuration of GRIT in any way whatsoever (vulnerability scans by
itself may contain harmful code thus exposing GRIT to serious breaches in security).
h. Bypass the proxy server that provides access to the Internet (this may introduce malicious
code and breach the security setting of GRIT)
i. Have simultaneous dual connections for example through the network cable and a
wireless modem (such connection will bypass the GRIT firewall, interconnecting the GRIT
secure network with the non-secure Internet).
a. Ensure that no one other than the user will have access to that mailbox.
b. Ensure that the format of the e-mail address is consistent with the company standards
e.g. [email protected]
c. GRIT aligns itself to the latest compliance as provided in Mauritius and also in line with
the appropriate legislation and regulations of Mauritius, or other locations as it may
deem relevant. Upon written approval from the CEO and/or Head of Human Capital, The
IT Department will be allowed access to any employee’s e-mail, internet usage logs, or
other historic electronic information.
d. Implement technical controls to enforce the policy requirements as stipulated above.
e. Mauritius regulation as per point c) above applies to all employees operating under the
jurisdiction of Mauritius legislation. However, the same principle will apply in all other
countries where there is a valid legal requirement (e.g. a police investigation) that
requires access to a specific individual’s computer or mobile device and the information
stored on it.
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
2.7 Copyrights
Employees using the Internet are not permitted to copy, transfer, rename, add, or delete
information or programs belonging to others unless given express permission to do so by the
owner. Failure to observe copyright or license agreements may result in disciplinary action by
the organisation and/or legal action by the copyright owner. Please bear in mind that
approval has to be obtained from the IT Department to load/save any software not forming
part of the GRIT standard.
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
2.8 Monitoring
All messages created, sent, or transferred over the Internet and/or Intranet is the property of
the company. GRIT reserves the right to access the contents of any messages sent over its
facilities if the company believes, in its sole judgment, that it has a business need to do so or
where there is suspicion of abuse.
All communications, including text and images, can be disclosed to law enforcement or other
third parties without prior consent of the sender or the receiver.
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
3.1 Background
The general use of mobile devices for business purposes has increased considerably over the
recent past. Mobile devices include, but are not limited to, notebook computers, Tablet PCs,
smart phones, compact discs, DVD discs, memory sticks, USB drives, and other similar devices.
Small, powerful and connected to essential enterprise information, mobile devices have been
embraced by professionals and are fast becoming a standard enterprise productivity tool. It is
precisely this small size and enterprise connectivity, however, that make the mobile device a
potential risk to the enterprise. While they may contain vital data similar to a desktop or
laptop, mobile devices are far more vulnerable to loss, theft or malicious use.
3.2 IT Responsibilities
a. Provide mechanisms and procedures to protect mobile devices against a breach of
confidentiality (encryption, authentication and self-destruct function).
b. Establish reporting channels and incident handling in the event of a compromise.
c. Ensure that all devices are cleaned (data removed) before disposal or when switching
users.
d. Provide mechanisms to protect against malicious code and general viruses.
e. Ensure that all devices are scanned before being allowed access to the GRIT network.
f. Provide user education on the secure use of mobile devices.
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
There are mainly three types of computer viruses: true viruses, Trojan horses, and worms.
True viruses actually hide themselves, often as macros, within other files, such as
spreadsheets or Word documents. When an infected file is opened from a computer
connected to GRIT’s network, the virus can spread throughout the network and may do
damage. A Trojan horse is an actual program file that, once executed, doesn't spread but can
damage the computer on which the file was run. A worm is also a program file that, when
executed, can both spread throughout a network and do damage to the computer from which
it was run. Viruses can enter GRIT’s network in a variety of ways, such as:
a) E-mail: By far, most viruses are sent as e-mail attachments. These attachments could
be working documents or spreadsheets, or they could be merely viruses disguised as
pictures, jokes, etc. These attachments may have been knowingly sent by someone
wanting to infect GRIT’s network or by someone who does not know the attachment
contains a virus. However, once some viruses are opened, they automatically e-mail
themselves, and the sender may not know that his or her computer is infected.
b) Disk, CD, USB flash disk, or other media: Viruses can also spread via various types of
storage media. As with e-mail attachments; the virus could hide within a legitimate
document or spreadsheet or simply be disguised as another type of file.
c) Software downloaded from the Internet: Downloading software via the Internet
can also be a source of infection. As with other types of transmissions, the virus
could hide within a legitimate document, spreadsheet, or other type of file.
d) Instant messaging attachments: Although less common than e-mail attachments,
more viruses are taking advantage of instant messaging software. These
attachments work the same as e-mail viruses, but they are transmitted via instant
messaging software. It is important to know that:
• Computer viruses are much easier to prevent than to cure.
• Defences against computer viruses include protection against unauthorised
access to computer systems, using only trusted sources for data and programs,
and maintaining virus-scanning software.
10
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
4.1 IT Responsibilities
The IT Department shall:
11
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
4.3 Spyware
Spyware and adware can compromise system performance and allow sensitive information to
be transmitted outside the organisation. Spyware installation programs can launch even when
users are performing legitimate operations, such as installing a company-approved
application. As a result, combating spyware requires user vigilance as well as IT management
and control.
4.4 IT Responsibilities
The IT Department shall:
12
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
5. SOFTWARE POLICY
5.2 Software
All software acquired for or on behalf of the company or developed by company employees or
contract personnel on behalf of the company, is and shall be deemed company property. All
such software must be used in compliance with applicable licenses, notices, contracts, and
agreements.
5.3 Purchasing
All purchasing of company software shall be centralised with the IT Department to ensure that
all applications conform to corporate software standards and are purchased at the best
possible price. All requests for corporate software must be submitted to the IT Department
for approval. The IT Department will determine the standard software that best
accommodates the desired request.
5.4 Licensing
Each employee is individually responsible for reading, understanding, and following all
applicable licenses, notices, contracts, and agreements for software that he or she uses or
seeks to use on company computers. Unless otherwise provided in the applicable license,
notice, contract, or agreement, any duplication of copyrighted software, except for backup
and archival purposes, may be a violation of local and or national legislation. In addition to
violating such laws, unauthorised duplication of software is a violation of the company’s
policy.
13
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
• Corporate Anti-Virus
• Microsoft Windows Defender
• Dropbox for Business
• Sage Pastel
• Sage Evolution
• Broll Online
• Adobe DC
• LifeSize Cloud Communication System
• Skype for Business
Employees needing software other than those listed above must request such software from
the IT Department. Each request will be considered in conjunction with the requesting users
Manager and in accordance with the software-purchasing section of this policy.
a) Not copy, load or run any software that is not properly licensed.
b) Not load their own software onto a GRIT computer, whether they own the license or
not, without prior permission from IT.
c) Not load any software onto a GRIT computer. This must always be carried out by the
IT Department. This includes downloading any program files from the Internet - and
games.
d) Not allow third parties to install software on GRIT computers without the
authorisation of the IT Department.
5.7 IT Responsibilities
The IT Department shall:
a) Install and configure all GRIT computers with the standard operating system and office
suite.
b) Store and protect all the GRIT software.
c) Ensure that all the GRIT software is licensed.
d) Periodically check GRIT computers to ensure this policy is enforced.
14
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
routers) devices. All hardware purchased shall comply with the minimum specifications as
recommended by the IT Department in consultation with GRIT Management.
5.9 Purchasing
All purchasing of company computer hardware devices shall be centralised with the IT
Department to ensure that all equipment conforms to corporate hardware standards and is
purchased at the best possible price. All requests for corporate computing hardware devices
must be submitted to the IT Department, which will then in conjunction with the direct report
determine standard hardware that best accommodates the desired request.
• Desktops
• Laptops
5.11 IT responsibilities
The IT Department shall:
15
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
This access shall be restricted to only those capabilities that are appropriate to each
employee’s job duties. All passwords used in order to gain access to the organisation’s data
must comply with the GRIT Password Policy.
6.1 IT Responsibilities
The IT Department shall:
a) Shall be responsible for all computer transactions that are made with his/her User ID
and password (passwords should therefore never be shared).
b) Shall not disclose passwords to others. Passwords must be changed immediately if it
is suspected that they may have become known to others. Passwords should not be
recorded where they may be easily obtained.
c) Will change passwords at most every 90 days.
d) Shall use passwords that will not be easily guessed by others.
e) Shall log out when leaving a workstation for an extended period.
f) Shall not attempt to access the accounts of other users unless she/he has been
authorised to do so by the line manager.
16
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
terminations must be reported concurrent with the termination. Managers shall authorise in
writing, the granting of access of another employee’s network account.
17
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
7. PASSWORD POLICY
7.1 Overview
Passwords are an important aspect of computer security. They are the front line of protection
for user accounts. A poorly chosen password may result in the compromise of GRIT’s entire
corporate network. As such, all GRIT employees (including contractors and vendors with
access to GRIT systems) are responsible for taking the appropriate steps, as outlined below, to
select and secure their passwords.
a. They contain both upper and lower case characters (e.g., a-z, A-Z)
b. They have digits and punctuation characters as well as letters e.g., 0-9,
!@#$%^&*()_+|~-=\`{}[]:";'<>?,./)
c. They are at least seven alphanumeric characters long.
d. They are not a word in any language, slang, dialect, jargon, etc.
e. They are not based on personal information, names of family, etc.
f. NOTE: Do not use either of these examples as passwords!
18
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
19
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
8. PHYSICAL SECURITY
It is company policy to protect computer hardware, software, data, and documentation from
misuse, theft, unauthorised access, and environmental hazards. The entire organisation’s
important hardware e.g. servers will be locked away. The server room shall at all times be
locked. Only authorised personnel will be allowed into the server room. Third party
maintenance personnel shall at all time by supervised by the GRIT IT representative whilst in
the server room.
a) Each employee is responsible for the security of the PC (including screen, keyboard,
mouse and any other peripheral such as a printer) provided by the GRIT to him or her.
b) Any item missing or damaged must be reported by the employee to the IT
Department without delay, and followed up with a written communication outlining
all the circumstances.
c) Disks and portable storage devices should be stored out of sight when not in use. If
they contain highly sensitive or confidential data, they must be locked away.
d) Environmental hazards to hardware such as food, smoke, liquids, high or low
humidity, and extreme heat or cold should be avoided.
e) Since the IT Department is responsible for all equipment installations, disconnections,
modifications, and relocations, employees are not to perform these activities unless
authorisation is given by the IT Department. This does not apply to temporary moves
of portable computers for which an initial connection has been set up by IT.
f) Employees shall not take shared portable equipment such as laptop computers out of
the office without the informed consent of their department manager. Informed
consent means that the manager knows what equipment is leaving, what data is on it,
and for what purpose it will be used.
g) Employees should exercise care to safeguard the valuable electronic equipment
assigned to them. Employees who neglect this duty may be held accountable for any
loss or damage that may result.
h) Laptop users shall, at all times, use cable locks supplied by the organisation to secure
their laptops.
i) Employees who share offices (and so cannot lock their office when leaving it) are
expected to make use of the lock computer option on their computer by pressing the
CTRL+ALT+DEL key combination on their keyboard and selecting the lock computer
option. Where possible, the IT Department will set a policy that will automatically
disable (lock) computers where no keyboard activity has been detected for a period
of five (5) minutes.
j) Visitors should be received at reception and always be escorted by a GRIT employee.
20
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
8.2 IT Responsibilities
The IT Department shall:
21
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
a) Employees will use the e-mail facilities or the provided helpdesk system (phone call)
to log their problems and request service from the IT Department. Employees must
record exactly what has happened, and write down any error message(s) appearing
on the screen.
b) No person may request the IT Department to fix a problem (hardware or software) on
any equipment not owned by the GRIT.
c) Request for the creation or deletion of new users must be submitted to the IT
Department with the relevant documentation 2 working days prior to the employee
starting in his/her position.
9.2 IT Responsibilities
The IT Department shall:
a) Acknowledge all queries and problems and give an estimate of when the problem will
be addressed.
b) Respond timorously to all user queries and problems.
22
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
10.2 IT Responsibilities
IT Department shall backup all the information on the servers in accordance to the Business
Continuity and Disaster Recovery Plan.
23
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
Term Description
Access Control Access Controls provide the means of establishing and enforcing rights and
privileges allowed to entities
Accountability Auditability ensures protected and reliable records of system activity with
or Auditability security significance (e.g. logins, logouts, file accesses, security violations) are
available. This is a key element for after-the-fact detection of and recovery
from security breaches. I.e. being able to determine who is responsible for
what action(s), from where and when.
Adware Adware is any software program in which advertising banners are displayed
while the program is running.
Awareness Actions taken to address knowledge, attitude and behaviour as the key
components of culture. Changing the Security culture to suit the business
objectives.
Information This takes many forms and includes data stored on computers, servers,
Assets transmitted across networks, Intranet, printed out or written on paper, sent by
fax/e-mail, stored on tapes/diskettes, or spoken in conversations and over the
telephone.
24
INFORMATION SECURITY AND ACCEPTABLE
USE POLICY
Term Description
Non- Non-Repudiation protects against any attempt by the sender to falsely deny
repudiation sending information, or subsequent attempts by the recipient to falsely deny
receiving this information.
25