S 2.304 Security policy and rules governing PDA usage

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Head of IT

Once the decision has been taken to use PDAs in an organisation, these must be integrated into the general security strategy.

A number of different ways of protecting PDAs against misuse are available. In order to ensure that these possibilities are actually used, a security policy specifying all security mechanisms to be implemented should be drawn up. Every organisation should make a point of knowing the opportunities and risks posed by the use of PDAs. There are two primary security aspects here:

In addition, a short, clear instruction sheet covering the secure use of PDAs and based on the PDA security policy should be prepared for the users.

Protection against misuse

The fact that PDAs are easy to transport and inconspicuous is an advantage not just for the owner but also for a thief. Hence, PDAs must always be kept secure. They should never be left unsupervised during business trips. In particular, they should not be left in vehicles.

Virtually every variant of PDAs and organisers can be protected against unauthorised access through PINs or passwords. Unfortunately, not all the security mechanisms offered by the manufacturer are as secure as one might wish. Hence, PDA users should find out how reliable the security mechanisms provided are, for example, over the internet.

As long as no better security tools are installed, however, the security mechanisms that are provided should always be used (see also S 4.228 Using the built-in security mechanisms on PDAs). All the users should be clear about how effective these mechanisms are and especially about their limitations. Passwords and PINs should be chosen carefully, i.e. should be long enough to ensure that they cannot be easily defeated. Under no circumstances should passwords be kept together with the PDAs.

Raising user awareness

All PDA users should be informed not only about the benefits of PDAs but also about potential risks and problems relating to their use and about both the benefits and limitations of the security safeguards used.

New security gaps in the operating systems used on PDAs (for example Palm OS, Windows CE, Windows Mobile, Symbian OS) are constantly coming to light, so the IT security management should stay informed about the latest risks. If necessary, it may be appropriate to inform the employees at regular intervals about the latest dangers that have been published and thus to make them fully aware of the issues.

Rules on the use of PDAs

General rules

Usually data is less well protected on a PDA than on the regular IT systems within the organisation. Irrespective of whether the PDAs used have been purchased privately or by the business, the employer should issue rules in writing on the following topics:

If possible, PDAs should not be left unattended. If a PDA must be left in a vehicle, the device should not be visible from the outside. The device can be covered or locked up in the boot. A PDA is of sufficient value to attract potential thieves.

If PDAs are used on site in third party offices, the security policies of the visited organisation must be observed.

PDAs should not be left unprotected in external premises such as hotel rooms. All password protection mechanisms should be enabled at this point, at the latest. Locking the device up in a cabinet will discourage casual thieves.

Use of private PDAs

When private PDAs are used in a government agency or company, the following points need to be regulated amongst others:

Use of work PDAs

Where work PDAs are used, the following are some of the points that need to be regulated:

Integration into other security solutions

Where PDAs are used, it is not only necessary to consider whether the use of security software to protect the PDAs would be a good idea, but also how the PDAs will interact with the security software of the operational environment. Two examples will illustrate some of the issues:

It is therefore imperative that such cases, and also the integration of PDA applications into other security software in the company, are dealt with in the PDA security policy so as to avoid the situation where the prescribed security level is reduced as a result of PDA usage.

Where necessary, ban the use of PDAs

The question of whether the use or even the carrying of PDAs should be restricted in all or certain areas of the company/agency should be considered. This could be sensible, for example, if the recording of conversations or taking photographs is to be banned.

If the organisation's IT security policy does not allow extraneous IT systems such as PDAs to be brought into the building, clear notices to this effect must be placed on all the entrances. Checks should then be made at regular intervals to ensure that the policy is adhered to. In this case, facilities should be provided allowing mobile phones, PDAs or notebooks that visitors have bought with them to be securely held. For example, lockers could be provided at the entrances.

Review questions: