Information Security Policy
Information Security Policy
Information Security Policy
Information security
policy for Manipal
Hospitals” a chain of
multi-specialty hospitals
India.
Group 4
MIS 6130
RESTRICTED
Contents
1.0 Overview of Information Security Governance.................................................................................2
1.1 The Desired Outcomes..................................................................................................................2
1.2 Knowledge and protection of information assets...........................................................................3
1.3 Benefits of information security governance for the hospital.........................................................3
1.4 Process integration.........................................................................................................................3
1.5 Information Security Structure......................................................................................................3
3.0 INFORMATION SECURITY POLICIES.............................................................................................5
3.1 Technical Security.............................................................................................................................6
3.1.1 Access Control Policy:................................................................................................................6
3.1.2 Patching Policy:..........................................................................................................................6
3.1.3Antivirus Malware Policy:...........................................................................................................6
3.1.4 Identification and Authentication Policy:....................................................................................6
3.1.5 Secure Configuration Policy:......................................................................................................6
3.1.6 Network Security Policy:............................................................................................................7
3.2 Operational Security..........................................................................................................................8
3.2.1 Acceptable Use Policy................................................................................................................8
3.2.2 Clear Desk and Screen Policy.....................................................................................................9
3.2.3 Data Handling Policy..................................................................................................................9
3.2.4 Removable Media Policy..........................................................................................................11
3.2.5 Sanitization, Reuse, Disposal and Destruction Policy...............................................................12
3.2.6 Business Continuity / Disaster Recovery..................................................................................12
2.2.7 Bring Your Own Device Policy................................................................................................13
2.2.8 Social Media Policy..................................................................................................................13
2.3. Security Management.....................................................................................................................13
2.3.1 Education and Awareness Policy..............................................................................................13
2.3.2 Incident Management Policy....................................................................................................15
2.3.3 Audit and Vulnerability Assessment Policy..............................................................................15
2.3.4 System Acquisition Policy........................................................................................................16
2.3.5 Personnel security Policy..........................................................................................................16
Enforcement..............................................................................................................................................19
1|Page
RESTRICTED
RESTRICTED
Desired outcome of information security for the governance for the hospitals
Knowledge and protection of information assets
Benefits of information security governance for the hospital
Process integration
This document has been developed to address the following information security issues:
• All information systems belonging to the Manipal Hospital are properly assessed for
security;
• The maintenance of confidentiality, integrity and availability;
• Staff are aware of their roles, responsibilities, and are accountable; and
• Procedures to detect and resolve security breaches are in place.
Strategic alignment of information security with business strategy to support the objectives of
the hospitals
Risk management by executing appropriate measures to measure and manage risks.
Resource management by utilizing information security knowledge and infrastructure
efficiently and effectively
2|Page
RESTRICTED
RESTRICTED
3|Page
RESTRICTED
RESTRICTED
4|Page
RESTRICTED
RESTRICTED
5|Page
RESTRICTED
RESTRICTED
6|Page
RESTRICTED
RESTRICTED
7|Page
RESTRICTED
RESTRICTED
information owner shall be responsible for such information. Information flowing outward from
the Hospitals shall be highly filtered to ensure it complies with this policy.
Access to Network resources from outside the Hospitals shall be limited to fewest users possible
and shall be enabled through Virtual Private Network (VPN) technology.
All Network devices must be disposed of in a secure manner. Hard disks and other storage
devices must be securely erased or destroyed before disposal.
A yearly Network security Testing exercise must be conducted to ensure that policy is complied
with.
Any person found to be contravening these requirements shall face disciplinary action.
8|Page
RESTRICTED
RESTRICTED
Monitoring
Manipal hospital accepts that the use of the internet is a valuable business tool. However, misuse
of this facility can have a negative impact upon employee productivity and the reputation of the
business.
In addition, all of the company's internet-related resources are provided for business purposes.
Therefore, the Hospital maintains the right to monitor the volume of internet and network traffic,
together with the internet sites visited. The specific content of any transactions will not be
monitored unless there is a suspicion of improper use.
Sanctions
Where it is believed that an employee has failed to comply with this policy, they will face the
company's disciplinary procedure. If the employee is found to have breached the policy, they will
face a disciplinary penalty ranging from a verbal warning to dismissal. The actual penalty applied
will depend on factors such as the seriousness of the breach and the employee's disciplinary
record.
Agreement
All company employees, contractors or temporary staff who have been granted the right to use
the company's internet access are required to sign this agreement confirming their understanding
and acceptance of this policy.
9|Page
RESTRICTED
RESTRICTED
Users shall ensure data is transferred only to named individuals and those who need to know and
that data shall be kept to the minimum required.
Any mishandling of data in transfer or at rest shall be reported as an incident.
Users shall have authority (in writing) from the Information Asset Owner (IAO) to undertake the
transfer.
A Data Access Agreement (DAA) or Data Sharing Agreement (DSA) or Non-Disclosure
Agreement (NDA) should be produced, agreed and signed by all parties prior to any Manipal
Hospitals’ data containing Personally Identifiable Information (PII) or OFFICIAL-SENSITIVE
data/information being passed or shared with any non-government or non-public authority body.
The Manipal Hospitals Security Team should be approached where there is difficulty identifying
a suitable method of transfer.
Data Classification:
Manipal Hospitals has classified its data/applications/systems in two categories in critical
data and non-critical data.
Critical data is considered a system or systems that are paramount to the effective operation
of resolution and those if impacted will have catastrophic impact to the business.
These systems are our medical management system with its dependencies as well as the
general business system with its dependencies.
Non critical is considered a system or systems that are important to the effective operation of
resolution but those if impacted will not cause a major impact to the business and maybe
rebuilt over time without drastically impacting processes.
To ensure business continuity Manipal Hospitals has to have multiple levels of viable data
redundancy that ensure operational recovery in the case of a logical or physical incident
impacting systems.
Safe Havens
The term ‘Safe Haven’ is used to denote either a secure physical location or the agreed set of administrative
arrangements that are in place to ensure security classified, personal or other sensitive information is
communicated safely and securely.
Safe Havens should be established, where:
10 | P a g e
RESTRICTED
RESTRICTED
An approved method of encryption shall be used for the transfer of OFFICIAL – SENSITIVE
data that is sent outside the secure network.
An approved method of encryption should be used for the transfer of OFFICIAL data that is sent
outside the secure network.
Where possible data transfers should always be carried out over existing, protected and trusted NHS
networks, however, there may be occasions where data will need to be transferred over other networks.
On these occasions the data files must be protected by encryption in order to protect the data should it fall
in to the hands of unauthorized persons.
Physical Data Transfers
Physical transfers include paper and portable physical media (USB, hard disks, CDs, DVDs, etc.) In
addition to the general principles above, physical transfers shall adhere to the following,
A Manipal Hospitals management approved method of transfer shall be determined for the type
of data being transferred.
A record of custody of transfers shall be kept.
All data (with the exception of hard copy transfers) shall be stored encrypted (using a Manipal
Hospitals approved method) for transfer regardless of classification.
An approved method of transfer shall be determined for the type of data being transferred.
Portable media shall only be authorized when there is a valid business requirement.
Only official Manipal Hospitals’ approved removable media shall be used.
Where information is transferred via mail the outer envelope/package shall not be marked with its
Security Classification.
Transfers of data in hard copy form will need to be protected, by using such methods as approved couriers
or Royal Mail Track and Trace. Where data is to be transferred by memory stick, CD/DVD or removable
hard drive, the media should be encrypted, which will provide adequate protection should it become lost
or fall in to the hands of unauthorized persons.]
Data Disposal
Information held on ICT systems shall be securely erased in accordance with HMG mandated
requirements and the Manipal Hospitals’ Sanitization, Reuse, Disposal and Destruction Policy.
Information held in paper form shall be securely destroyed in accordance with the company’s
Records Management Policy.
Other Data Handling
Where there are occasions when new pieces of work require one time only data transfers or data
storage, Manipal Hospitals staff should request guidance from a member of the Information
Security Team
3.2.4 Removable Media Policy
For the purposes of definition, the following items shall fall under the category of removable
media:
a. Flash (Jump) Drives and flash memory storage
b. SD Storage
11 | P a g e
RESTRICTED
RESTRICTED
Address the evaluation and final disposition of sensitive information, hardware, or electronic
media regardless of media format or type.
Authorize personnel to dispose of sensitive information or equipment. Such procedures may
include shredding, incinerating, or pulp of hard copy materials so that sensitive information
cannot be reconstructed. Approved disposal methods include:
Physical Print Media shall be disposed of by one (or a combination) of the following methods:
a. Shredding - Media shall be shredded using issued cross-cut shredders
b. Shredding Bins - Disposal shall be performed using locked bins located on-site using a
licensed and bonded information disposal contractor
c. Incineration – Materials are physically destroyed using licensed and bonded information
disposal contractor
d. Electronic Media (physical disks, tape cartridge, CDs, printer ribbons, flash drives,
printer and copier hard-drives, etc.) shall be disposed of by one of the methods:
e. Overwriting Magnetic Media - Overwriting uses a program to write binary data sector by
sector onto the media that requires sanitization
f. Degaussing - Degaussing consists of using strong magnets or electric degaussing
equipment to magnetically scramble the data on a hard drive into an unrecoverable state
g. Physical Destruction – implies complete destruction of media by means of crushing or
disassembling the asset and ensuring no data can be extracted or recreated
IT documentation, hardware, and storage that have been used to process, store, or transmit
Confidential Information or PII shall not be released into general surplus until it has been
sanitized and all stored information has been cleared using one of the above methods
12 | P a g e
RESTRICTED
RESTRICTED
13 | P a g e
RESTRICTED
RESTRICTED
All Hospital Staff attend an approved security awareness training class within 30 days of
being granted access to the hospital’s resources.
Staff receive training appropriate for specific job roles and responsibilities. After such
training, staff must verify through certificate completion and assessment that he or she
received the training, understood the material presented, and agrees to comply with it.
Staff are trained on how to identify, report, and prevent security incidents and data breaches.
Appropriate security policies, procedures, and manuals are readily available for reference and
review.
Staff annually attend security awareness refresher training.
Users sign an acknowledgement stating they have read and understand the hospital’s
acceptable use requirements regarding computer and information security policies and
procedures.
Staff must be provided with sufficient training and supporting reference materials to allow
them to protect the hospital’s data and assets.
The CISO or his/her designee shall prepare, maintain, and distribute an information security
manual that concisely describe information security policies and procedures.
14 | P a g e
RESTRICTED
RESTRICTED
Cloud computing and outsourcing security awareness training shall address multi-tenant,
nationality, and cloud delivery models.
Staff are aware and accept the risks, responsibilities, and limitations related to the Bring Your
Own Device (“BYOD”) Policy.
Management Implementation
The CISO or his/her designee shall:
Develop and maintain a communications process to communicate new security programs and
items of interest.
Ensure that staff responsible for implementing IT security controls safeguards receive
training in security best practices.
Ensure periodic security reminders (flyers or posters, emails, verbal updates at meetings)
keep the hospital’s staff up-to-date on new and emerging threats and security best practices.
The frequency and method of delivery of such reminders shall be determined by the [Insert
Appropriate Role].
Audit Controls and Management
On-demand documented procedures and evidence of practice should be in place for this operational
policy as part of the hospital’s internal operations. Examples of management controls include:
Documented information security training plan with evidence of consistent update and version
control of the document
On-demand review of existing training program information and implementation within the
organization
15 | P a g e
RESTRICTED
RESTRICTED
Security Events should be assessed, and it should be decided if they are to be classified as
Security Incidents. This can be decided by the Security Operations Officer
Knowledge gained from analyzing and resolving Security Incidents should be used to reduce the
likelihood or impact of future incidents.
Develops, documents, and disseminates to hospital personnel a Personnel Security policy that addresses
purpose, scope, roles, responsibilities, management commitment, coordination among hospital entities,
and compliance; and Procedures to facilitate the implementation of the personnel security policy and
associated personnel security controls; and Reviews and updates the current Personnel security policy and
Personnel security procedures.
16 | P a g e
RESTRICTED
RESTRICTED
The Hospital:
Have valid access authorizations that are demonstrated by assigned official hospital duties; and
Satisfy the hospital’s-defined additional personnel screening criteria.
2.3.5.7 Personnel Termination
17 | P a g e
RESTRICTED
RESTRICTED
The Hospital:
The hospital employs automated mechanisms to notify hospital staff upon termination of an individual.
The Hospital:
Reviews and confirms ongoing operational need for current logical and physical access
authorizations to information systems/facilities when individuals are reassigned or transferred to
other positions within the hospitals;
Initiates defined staff transfer or reassignment action within a defined time period following the
formal transfer action;
Modifies access authorization as needed to correspond with any changes in operational need due
to reassignment or transfer; and
Notifies the hospital staff within a defined time period.
2.3.5.11 Access Agreements
The hospital:
Develops and documents access agreements for the hospital’s information systems;
Reviews and updates the access agreements and
Ensures that individuals requiring access to the hospital’s information and information systems:
Sign appropriate access agreements prior to being granted access; and
Re-sign access agreements to maintain access to the hospital’s information systems when access
agreements have been updated.
The hospital ensures that access to classified information requiring special protection is granted only to
individuals who:
Have a valid access authorization that is demonstrated by assigned official hospital duties;
Satisfy associated personnel security criteria; and
Have read, understood, and signed a nondisclosure agreement.
18 | P a g e
RESTRICTED
RESTRICTED
The hospital:
The Hospital:
Establishes personnel security requirements including security roles and responsibilities for third-
party providers;
Requires third-party providers to comply with personnel security policies and procedures
established by the hospital;
Documents personnel security requirements;
Requires third-party providers to notify the hospital of any personnel transfers or terminations of
third-party personnel who possess the hospital’s credentials and/or badges, or who have
information system privileges within a defined time period; and
Monitors provider compliance.
The Hospital:
Employs a formal sanctions process for individuals failing to comply with established
information security policies and procedures; and
Notifies hospital staff member within a defined time period when a formal employee sanctions
process is initiated, identifying the individual sanctioned and the reason for the sanction.
Enforcement
An employee found to have violated provisions of this guideline policy will be subject to disciplinary
action, up to and including termination of employment. A violation of this policy by a temporary worker,
contractor or vendor may result in the termination of their contract or assignment with Manipal Hospital
Data leakage incidents such as disclosure of non-public information, or making inappropriate public
statements about or for Manipal Hospital, or using the hospital’s resources for personal uses, and
harassing or inappropriate behavior toward another employee can be grounds for reprimand or dismissal.
Any employee found to have violated any provisions of this policy may be subject to disciplinary action,
up to and including termination of employment. Deliberate, unauthorized disclosure of non-public
information may result in civil and/or criminal penalties.
19 | P a g e
RESTRICTED