S 2.36 Orderly issue and retrieval of a portable (laptop) PC

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: User, Administrator

Depending on the purpose, laptops and other portable IT systems are only used by one employee, e.g. as workstation computer also used in a portable manner. However, they may also be used by different employees in an alternating manner, e.g. for presentations. Depending on the type of use, there are different security requirements. Therefore, the purpose and the type of use should be planned carefully in advance.

When used as workstation computers, these computers are typically used in a mobile and stationary manner alternately. In this, access to different networks is possible. For this, the laptops must be protected in such a way that the mobile use may not result in the important data of the laptops being compromised, manipulated, or lost on the one hand. On the other hand, the laptops must not introduce any threats into the internal networks.

If laptops are used alternately by different persons, controlled transfer is extremely important. In order to ensure this, a laptop pool should be established (see S 1.35 Pooled storage of portable IT systems).

The following items must be taken into consideration when issuing and retrieving a portable IT system:

Issue:

Retrieval and/or forwarding:

The intended types of use of the laptops must be documented.

Review questions: