S 2.309 Security policies and rules for the use of mobile IT

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Head of IT, IT Security Officer

IT systems used outside one's own organisation are exposed to more risks than those operated inside protected premises. But there are many means to protect mobile IT systems when travelling. In order to ensure that these means are also used, a security policy specifying all the security mechanisms to be implemented should be drawn up. In addition, a brief and clearly laid out leaflet on the secure use of mobile IT systems should be drawn up for the users.

Raising user awareness

Experience has shown that the smaller and lighter IT systems become, the more thoughtlessly they are handled. The employees' awareness of the value of mobile IT systems and the value of the information stored on them should therefore be raised. Since mobile IT systems offer a broad range of variants and combination possibilities (from mobile phones to PDA to laptops with WLAN interfaces), employees should be informed, in particular, of the specific threats and safeguards pertaining to the devices they use.

It should also be pointed out to the employees that they should not pass on confidential information to arbitrary persons when travelling and that the exchange of information should not be performed within hearing or viewing distance of third parties. In particular, the communication partner must be asked to identify himself before providing detailed information (see also T 3.45 Inadequate checking of the identity of communication partners).

Rules on using mobile IT systems

A number of issues need to be clarified when using mobile IT systems:

If possible, mobile IT systems should not be left unattended. If a mobile IT system must be left in a vehicle, the device should not be visible from the outside. The device can be covered or locked up in the boot. A mobile IT system is of sufficient value to attract potential thieves.

If mobile IT systems are used on location in other offices, the security regulations of the visited organisation must be observed.

Mobile IT systems should not be left unprotected in external premises such as hotel rooms. All password protection mechanisms should be enabled at this point, at the latest. Locking the device up in a cabinet will discourage casual thieves.

Disposal of data media and documents

Even when travelling, an employee will often need to dispose of material, even if it is just to keep luggage light and bearable. While there are practised procedures available in the employee's organisation for disposing of old or unusable data media and documents (see also S 2.13 Correct disposal of resources requiring protection), it is not always possible to follow these procedures while travelling. For this reason, the data media and documents must be examined closely to determine if they contain any sensitive information before they are disposed of. If they do contain sensitive information, then the data media and documents should be transported back to the organisation, if necessary. This also applies if data media are defective, because experts can extract valuable information from them as well. Even the use of shredder devices in outside organisations should be considered carefully because it is usually not totally clear who disposes of the shreds or how reliable they are.

Ban on the use of mobile IT systems

Whether there ought to be restrictions on the use of mobile IT systems, or even on taking them along to all or certain areas of a government agency or a company should be considered.

For example, this could make sense for meeting rooms (see also, for example S 5.80 Protection against bugging of indoor conversations using mobile phones). If the organisation's IT security policy does not allow bringing
along mobile IT systems, this must be clearly indicated at all entrances. Checks should then be made at regular intervals to ensure that the policy is adhered to.

Review questions: