Objective
To ensure that company and project-related records are accessible, easily retrieved, and disposed of once the retention period is reached. This policy is also intended to help team members determine what information can be disclosed to non-team members and determine the relative sensitivity of information that should not be disclosed outside Infinit Outsourcing, Inc. without proper authorization.
Scope
This procedure covers the identification of records, updating of the Master List of Records, and disposal of obsolete records. The information covered in these guidelines includes, but is not limited to, information that is either stored or shared via any means. This includes electronic information, information on paper, and information shared orally or visually (such as telephone and video conferencing).
Provisions
General
3.1.1 Master List of Records must contain the type of records, location/storage, and retention period.
3.1.2 Master List of Records that are stored in an offsite location is maintained for easy identification and retrieval from the offsite storage provider.
Data Classification
Restricted - Restricted data includes data that if compromised or accessed without authorization, could lead to criminal charges and massive legal fines or cause irreparable damage to the company.
Examples include but are not limited to
Client Information/Data
Personal Identifiable Information/201 Files
Credit card PAN (Primary Account Numbers), CVV
Trade secrets
Critical infrastructure details
Trade secrets
Confidential - Confidential data is generally restricted to smaller teams within an organization. This data, such as pricing information or key marketing strategies, should be kept within the respective team. If data that is classified as confidential is not kept secure, it could harm the organization, such as reputational risk.
Examples include but are not limited to
Contracts, Service Agreements, and Statement of Work
Business Leads
Financial Reports
Private data or information is considered internal only to an organization, such as policies and memos distributed amongst employees. Although this type of data may not pose a severe risk if leaked, it should still be kept somewhat protected as there is some risk if disclosed.
Examples include
Team-Centric Operational Procedures
Intranet
3.2.2.3 Company Policies and Procedures
3.2.2.4 ISO processes
Public information is the data declared public knowledge by Execom and given to anyone without any possible damage to Infinit-O.
Examples include but are not limited to
Brochures
Posters
Flyers
Company Website
Labeling
Data must be labeled or accessed only by authorized people to prevent mishandling that may result in information leakage.
Data should have markings or labeling located at a very conspicuous place on or in the information in question.
When applicable, confidential electronic data are encrypted.
When labeling is not feasible, other controls such as the Access Control List, and handling procedures stated in Section 3.4 of this document shall be applied.
Handling
Public
Data should only be distributed to intended recipients.
Data may be distributed using public or private carriers and approved electronic file transmission methods.
Private
Data should only be distributed to authorized recipients.
Data may be distributed using public or private carriers (please see 3.5) and approved electronic file transmission methods employing strong encryption methods if available and required.
Data should be stored to physically or electronically access controlled locations or servers.
Access restrictions to data must be in place.
Confidential/Restricted
Data should only be distributed to authorized recipients.
Data may be distributed using public or private carriers (please see 3.5) and approved electronic file transmission methods employing strong encryption methods when applicable.
Data should be stored in physically or electronically access-controlled locations or in servers employing encryption when available.
Access restrictions to data must be in place.
Data masking should be applied when possible if sharing to or viewing of unauthorized parties is inevitable such as credit card numbers of team members' personally identifiable information.
Removable Media
Removable media include but are not limited to tapes, disks, flash drives, removable hard drives, CDs, DVDs, and printed media.
All media should be stored in accordance with manufacturer specifications.
Removable media must not be removed from office premises without proper authorization.
Physical Media in transit
Approved external courier services are used only when an internal courier is not available or is not capable of such transmittal requirements.
Only company-approved courier service providers are authorized to deliver.
Tamper-evident packaging should be used for media containing private, restricted, and confidential information.
Packaging must comply with the Manufacturer's specifications.
Media must have password protection and/or encryption in place when available.
Electronic media in transit
Information shall only be transmitted electronically through company-approved/supplied electronic transmittal systems such as electronic mail, instant messaging, VPN and remote desktop connection, and File Transfer Protocol (FTP) over VPN/SSL.
Use of non-company email accounts or file transfer systems for sending work-related data is prohibited.
Encryption technologies must be implemented, whenever available when sending private, restricted, and confidential data.
Attachment must be compressed and password-protected when applicable.
Emails should have the appropriate company-approved disclaimer notice.
Information exchange with new parties
A signed Non-Disclosure agreement must be completed when exchanging private, restricted, and confidential information with new parties.
Sections 3.5 and 3.6 must be enforced.
Retention and Storage
Data retention must conform to the agreed retention period.
Original copies of corporate files are stored in a bank safety deposit box.
Other pertinent corporate financial files/records and some project records are stored in an approved offsite storage provider.
Disposal
Media containing information, regardless of classification, must be disposed of securely and reliably. (i.e., shredding, destruction)
Records that are discarded after the retention schedule shall be permanently destroyed.
Verbal Information
Verbal Information or verbal data are also covered by the protection of this policy. Hence, when communication involves private, confidential, and restricted information. Team members need to follow ensure the following:
The exchange of information should only happen within a secure location where team members or individuals not privy to the relevant information are unable to hear or listen.
The secure location should allow minimal to no sound leakage when conveying the aforementioned type of information.
Since the organization promotes hybrid work setups, team members are required to have a secure location described prior when attending meetings.
Only approved software/applications for meetings will be used during meetings.
Team members must use headsets for online meetings conducted outside the meeting room or the IO offices.
At any point, team members shall not conduct any meetings discussing restricted, confidential, and private data or information in public.
Protection of Records during Incidents:
General Considerations
Digital evidence is defined as information and data of potential value to an investigation that is stored or transmitted in digital form. Digital evidence differs from traditional evidence in multiple ways:
It is often highly complex, frequently scattered among different physical or virtual locations, and requires expertise and tools to collect.
It can easily be altered, accidentally or intentionally, possibly without leaving any trace.
It can easily be copied and distributed, presenting challenges to preserving confidentiality.
It can be temporary: network logs, Internet browsing history, social media posts, instant messages, cached data, and deleted data can be lost if not preserved promptly.
As a result, special consideration is necessary to establish authenticity, protect integrity and maintain the confidentiality of digital evidence. These considerations include:
Ensuring that the collection of digital evidence is properly authorized, documented, and conducted in compliance with Organisational policies.
Backing up the digital evidence and only working with copies.
Ensuring that evidence and all copies are securely stored, transported, and disposed of.
Identification
At the beginning of an investigation, all possible sources of digital evidence potentially relevant to the investigation should be identified and preserved immediately or 5 hours upon discovery.
In the event of an incident, team members/leaders who have identified the incident should contact IT to take over the issue.
Physical Evidence Protection/Collection
To ensure the reliability of digital evidence, do not modify the evidence. Any action on the evidence should only be undertaken by a person specifically trained to do so and be documented.
Interactions with live (powered-on) devices should be kept to a minimum. Mobile devices should be disconnected from all networks to prevent remote wipes.
If the device is powered on, it should be turned off as soon as possible. For live data where encryption is enabled, or a passcode is required and cannot be obtained, the device should be kept powered on and a digital forensic expert should be consulted.
Do not perform a proper shutdown to prevent data from being overwritten, a device can be powered off by removing the power cord and/or batteries.
Examination
Examination of digital evidence should only be performed on work copies.
Computers, mobile devices, and original external storage media should only be examined by trained digital forensic examiners.
For data and network security reasons, digital evidence is examined on a dedicated computer isolated from all networks.
Storage, Transport, and Disposal
Ensure that all evidence are identified uniquely, labelled (if possible) and securely stored for review by authorized personel.
To maintain confidentiality, access to all digital evidence (including work copies) should be limited to authorized personnel only.
If evidence is stored on networked servers, or is being transmitted through networks, strict access control and encrypted transmissions should be used. Portable storage devices used to transport evidence should be encrypted.
Digital evidence should be transported in appropriate packaging and protected from extreme temperatures or damage.
Every computer and storage device used to store or view digital evidence should be properly sanitized before it is transferred to another user or recycled.
Responsibility
It is the responsibility of the asset owner and/or team leader to define the classification and sensitivity of the information asset.
The asset owner and/or team head are responsible for identifying the records for filing and safekeeping as well as determining the retention period of each record type.
Protection of the confidentiality, integrity, and availability of the asset information is the responsibility of each team member.
Frequency – n/a
Distribution – Refer to respective Master List Of Records
Usage – n/a
8.0 References
QISM-INFINIT-O-0001
9.0 Records
Master Lists of records of each team
Various records of each team