Removable storage media are designed to process data and information, and hence would usually maintain these data and information on its own storage, e.g. laptop computers, personal digital assistants (PDAs), mobile/smart phones and tablet computers. Removable storage media are convenient devices for storing data, e.g. external hard drives, memory card, CDs, DVDs and universal serial bus flash drives (a.k.a. memory sticks and thumb drives).
Both mobile computing devices and removable storage media (thereafter called portable devices) have common characteristics that they are small and easily transportable. However, they have the drawbacks of being easily lost or stolen. This document is to communicate to all staff and students the policies and guidelines in securely managing their portable devices which are used for storing sensitive and restricted information.
|1.||Storage and processing of sensitive and restricted data on portable devices should be avoided or restricted to the minimal quantity required for research, teaching, learning or administrative purposes. If portable devices have to be used for the storage of personal data, feasibility of using internal identifiers instead of HKID Card number merely for purposes of identification should be considered. Scope and level of details of the data to be stored should be justified. For example, why is it necessary to store the entire database when only part of the records will be used? In other cases, why is it necessary to store all the details of an individual from a database when only some skeleton information of any individual is needed?||Business process owner, project staff, etc. to assess. Department Chairmen / School Directors / Unit Heads / principal investigators to monitor.|
|2.||Use a strong password to protect the access to the portable devices. Although a strong password could not stop a determined hacker from gaining access to your device, it will make reading your data difficult and may deter a less skillful hacker.||Business process owner, project staff, device custodian, etc. to apply password.|
|3.||Encrypt the sensitive and restricted data stored in portable devices to lower the risk of disclosing the data. For more information about encryption software or secure portable devices, please click here.||Business process owner, project staff, device custodian, etc. to apply encryption.|
|4.||Care should be taken when using portable devices in public places such as meeting rooms, libraries and computer rooms. All portable devices should not be left unattended or be shared with unauthorized persons. They should be in the possession of an authorized person at all times or be physically locked away.||Device custodian.|
|5.||Data stored on portable devices should not be the only copy. Back-ups of the data to another secure media such as a secure server should be carried out regularly.||Business process owner, project staff, device custodian, etc. to take action.|
|6.||In addition to the primary connectivity, some portable devices have other means of connectivity, such as Wi-Fi, Bluetooth or mobile network, available to them. To avoid accidental disclosure to or malicious attacks from these means of connectivity, storage and processing of sensitive and restricted data on portable devices with other means of connectivity should be restricted to the minimal quantity required for research, teaching, learning or administrative purposes.||Business process owner, project staff, device custodian, etc. to take action.|
|7.||The practice of securely erasing data in portable devices after each and every use will ensure that data cannot be recovered by others who subsequently use or have access to the portable devices. (Guidelines for erasing data on portable devices will be provided by ITSC.)||Business process owner, project staff, device custodian, etc. to take action.|
|8.||Obsolete portable devices should be securely disposed of to minimize the risk of information leakage to unauthorized persons, e.g. by degaussing the devices, physically destroying them, or by using a data cleaner to erase data inside. For more information about encryption software or secure portable devices. For more information about “Guidelines for securely remove data and dispose of storage devices”, please click here.||Business process owner, project staff, device custodian, etc. to take action.|
|9.||Only use a reliable service provider in case maintenance service is needed for the portable devices. Erase all sensitive and restricted data inside the portable devices if possible before sending the portable device to the service provider. Otherwise, request the service provider to sign a non-disclosure agreement for the service to demonstrate your due diligence. Please click here to get the non-disclosure agreement.||Business process owner, project staff, device custodian, etc. to take action.|
|10.||Use anti-virus and malicious code detection software, with latest virus signatures and malicious code definition files, to regularly scan the portable devices to ensure they are free of computer viruses and malicious code.||Device custodian to take action.|
|11.||Some portable devices, such as smart phones and tablet computers, support inactivity passwords which serve as access control. They should be enabled wherever possible to deter any unauthorized access attempts.||Device custodian to take action.|
|12.||Various ways to closely protect the portable devices should be considered. For example, portable devices can be labeled with the identity of the department/school/unit; cable locks can be used for laptop computers.||Device custodian to take action.|
|13.||Portable devices provided by the University should be subject to inventory checks performed by respective departments/schools/units. Spot checks should be conducted to confirm that the custodian is keeping the portable devices provided.||Business process owner, principal investigators and project staff to take action.|
|14.||Users must be trained to follow the relevant guidelines and procedures, and made accountable for non-compliance.||Department Chairmen / School Directors / Unit Heads / principal investigators to take action.|
|15.||To keep pace with technological developments, there should be a formal mechanism to re-assess regularly the risk associated with the use of Portable Storage Devices and to review the relevance and scope of the established policies on Portable Storage Devices.||Department Chairmen / School Directors / Unit Heads / principal investigators / ITSC to take action.|
|16.||The implementation and compliance level of portable device policies should be audited regularly to gauge its effectiveness.||Department Chairmen / School Directors / Unit Heads / principal investigators / ITSC to take action.|
|17.||If any portable devices containing sensitive and restricted data is lost, stolen or appears to have been accessed without permission, you should immediately report this to the Director of IT Services (via email email@example.com) and the Department Chairmen/School Directors/Unit Heads concerned so that remedial actions can be taken to prevent or minimize the damages caused. Please click here to get the Incident Report Form.||Business process owner, project staff, device custodian, etc. to take action.|
|18.||The above guidelines focus on the direct protection of portable devices. For a more complete protection, you should also refer to good practices of information security in other areas and ITSC Policies and Guidelines.||All concerned staff members and students|
The abbreviations and terms used in this document have the following meaning:
This document is prepared by the Information Security Section (ISS) of the University Information Technology Services Centre. For any comments and enquiries regarding the content of this document, please send to ITSC servicedesk http://servicedesk.itsc.cuhk.edu.hk/
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.