Call or Text (845) 265-2220 ☰ ˟
Manage Policy File a Claim
Logo
Call or Text
(845) 265-2220
  • Página de inicio
  • Cotizaciones
    • Automovil Image of right arrow
      • Cotización de Auto
      • Auto Cotización Forma (corto)
    • Fianza
    • Business & CommercialImage of right arrow
      • Cotización Seguros Auto Comercial
      • Cotización Responsabilidad Publica
      • Business Owners (BOP) Quote Form
      • Builders Risk
      • Liquor Liability Quote Form
      • Cotización Seguro de Compensación Al Trabajador
      • Community Association Quote Form
      • Community Association Workers Compensation Quote Form
    • Granja
    • Inundación
    • Salud
    • Hogar Image of right arrow
      • Cotización Seguros de Hogar
      • Cotización Casera Manufacturada
      • Dueño de Una Casa de Inundación Cotización Formulario
      • Community Association Unit Owners (HO-6) Quote Form
    • Vida Image of right arrow
      • Presupusto de Seguro de Vida
      • Cotización Del Seguro de Vida de Término
    • LimousineImage of right arrow
      • Limousine Quote
      • Bond Request Form (TLC)
      • Workers Compensation Quote Form (Livery)
      • General Liability Quote Form (Livery)
    • Motocicleta
    • Vehículos Recreacionales
    • Alquileres
    • Camiones
    • Embarcacion / Yate
  • Servicio al Cliente
    • Automovil Image of right arrow
      • Requiere Tarjeta de Seguro de Auto
      • Requiere Pagina de Declaracion Y Coberturas Para El Auto
      • Mandar Pagina de Declaracion Y Coberturas Al Banco Financiero
      • Agregar Vehiculo A Poliza Personal de Auto
      • Remover Vehiculo de Poliza de Auto
      • Agregar Conductor A Poliza de Auto
      • Remover Conductor de Poliza de Auto
    • Business & CommercialImage of right arrow
      • Requiere Tarjeta de Seguro de Auto Comercial
      • Requiere Pagina de Declaracion Y Coberturas Para Auto Comercial
      • Agregar Vehiculo A Poliza Comercial
      • Remover Vehiculo de Poliza de Comercial
      • Agregar Conductor A Poliza Comercial
      • Remover Conductor de Poliza de Comercial
      • Certificado General de La Responsabilidad de La Petición Del Seguro
      • A Community Association Certificate Request Form
      • Request a General Liability Certificate of Insurance with Additional Insured
    • Hogar Image of right arrow
      • Declaración Y Coberturas de La Petición Para La Cobertura de Seguro Existente de Los Dueños de Una Casa
      • Request Evidence of Insurance
    • Motocicleta Image of right arrow
      • Requiere Tarjeta de Seguro de Motocicleta
      • Agregar Motocicleta A La Poliza
      • Quite La Motocicleta de La Política Existente
    • OtherImage of right arrow
      • Policy Review Request
      • Consent to Receive Electronic Records
    • Embarcacion / Yate Image of right arrow
      • Tarjeta de La Identificación de La Petición Para La Política de Watercraft
      • Agregue Watercraft A La Política Existente
      • Quite Watercraft de La Política Existente
  • Presentar una reclamación
    • Automovil
    • Business & Commercial
    • Inundación
    • Hogar
    • Motocicleta
    • Alquileres
    • Embarcacion / Yate
  • Blog
  • Hacer un Pago
  • Recursos
    • Archivo de zona segura
    • Refiera a un amigo
    • Enlaces Importantes
    • Calculadoras
    • Archivos importantes
    • Informes libre
    • Glosario de Seguros
    • Preguntas más frecuentes
    • Centro de noticias
  • Acerca de Nosotros
    • Acerca de Nosotros
    • Nuestra Ubicación
    • Directorio de empleados
    • Testimonios de clientes
    • Política de privacidad
  • Contáctenos
    • Contáctenos
    • Únete a nuestro boletín de noticias
Icon Icon Icon Icon Icon Icon
Home > Es-Us > Blog > 9 Key Elements of a Data Security Policy
TUESDAY, FEBRUARY 25, 2020

9 Key Elements of a Data Security Policy

essential elements of a data security policy

9 Key Elements of a Data Security Policy

     
By Travelers Risk Control
 

While the conversation around the water cooler may be about the latest cyber breach, protecting your data against cyber attacks requires much more than words. Walk the talk to help protect your data with a documented data security policy.

Every employee needs to understand his or her obligation to protect company data. Employees also need clear expectations about behavior when it comes to their interaction with data. For that to happen, your data security policy needs to be published, understandable and enforceable. It should outline practices that help safeguard employee, customer, company and third-party business data and sensitive information.

As with many complex programs that deal with sophisticated products or topics, there are usually essential elements that form the foundation of a plan.

Essential Elements of a Data Security Policy

  1. Safeguard Data Privacy: Employees must understand that your privacy policy is a pledge to your customers that you will protect their information. Data should only be used in ways that will keep customer identity and the confidentiality of information secure. Of course, your employees and organizations must conform to all applicable laws and regulations.
  2. Establish Password Management: A password policy should be established for all employees or temporary workers who will access corporate resources. In general, password complexity should be established according to the job functions and data security requirements. Passwords should never be shared.
  3. Govern Internet Usage: Most people use the internet without a thought to the harm that can ensue. Employee misuse of the internet can place your company in an awkward, or even illegal, position. Establishing limits on employee internet usage in the workplace may help avoid these situations. Every organization should decide how employees can and should access the web. You want employees to be productive, and this may be the main concern for limiting internet usage, but security concerns should also dictate how internet guidelines are formulated.
  4. Manage Email Usage: Many data breaches are a result of employee misuse of email that can result in the loss or theft of data and the accidental downloading of viruses or other malware. Clear standards should be established regarding use of emails, message content, encryption and file retention.
  5. Govern and Manage Company-Owned Mobile Devices: When organizations provide mobile devices for their employees to use, a formal process should be implemented to help ensure that mobile devices are secure and used appropriately. Requiring employees to be responsible for protecting their devices from theft and requiring password protection in accordance with your password policy should be minimum requirements.
  6. Establish an Approval Process for Employee-Owned Mobile Devices: With the increased capabilities of consumer devices, such as smart phones and tablets, it has become easy to interconnect these devices to company applications and infrastructure. Use of these devices to interconnect to company email, calendaring and other services can blur the lines between company controls and consumer controls. Employees who request and are approved to have access to company information via their personal devices should understand and accept the limitations and controls imposed by the company.
  7. Govern Social Media: All users of social media need to be aware of the risks associated with social media networking. A strong social media policy is crucial for any business that seeks to use social networking to promote its activities and communicate with its customers. Active governance can help ensure employees speak within the parameters set by their company and follow data privacy best practices.
  8. Oversee Software Copyright and Licensing: There are many good reasons for employees to comply with software copyright and licensing agreements. Organizations are obliged to adhere to the terms of software usage agreements and employees should be made aware of any usage restrictions. Also, employees should not download and use software that has not been reviewed and approved by the company.
  9. Report Security Incidents: A procedure should be in place for employees or contractors to report malicious malware in the event it is inadvertently imported. All employees should know how to report incidents of malware and what steps to take to help mitigate damage.
Posted 11:37 AM

Share |


No Comments


Post a Comment
Required
Required (Not Displayed)
Required


All comments are moderated and stripped of HTML.

NOTICE: This blog and website are made available by the publisher for educational and informational purposes only. It is not be used as a substitute for competent insurance, legal, or tax advice from a licensed professional in your state. By using this blog site you understand that there is no broker client relationship between you and the blog and website publisher.
Blog Archive
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012

  • directors and officers liability(1)

View Mobile Version
Facebook
LinkedIn
Twitter
Google+
Get Directions
Contact Us Today
Resources
Products
Customer Service
Payment Options
Report a Claim
News
About Us
Refer A Friend
Our Carriers
Blog
Contact Us
Contact us PO Box 362
Cold Spring, NY 10516

Ph: (845) 265-2220
Fx: (845) 265-4754
E: plservice@Gerelli-Insurance.com
© Copyright. All rights reserved. Powered by Insurance Website Builder.