Laserfiche WebLink
Security Policies and Procedures <br />VII. Handling Rules for the Information Classifications <br />A. Overview <br />This section outlines the basic rules for handling information types according to the <br />classifications. More specific standards for platforms, processes and networks appear <br />in each topic section of this standards document. <br />B. Inventory of Information Assets and Electronic Asset Management Log <br />An inventory is maintained of all significant information assets belonging to, or used by <br />Virtru. This inventory includes: <br />1. Serial numbers/license numbers <br />2. MAC Addresses <br />3. Model <br />4. Device Type <br />5. Manufacturer <br />6. The information owner <br />7. Username <br />8. Location <br />9. OS Version <br />10. The custodian of the information and repository location (database, file <br />cabinet, etc.) <br />11. Purpose in our systems <br />12. Asset value in dollars or other suitable measurement <br />13. The sensitivity of the asset, due to regulations, laws, customer expectations <br />or other requirements <br />14. Requirements for the asset regarding availability, uptime, etc. <br />15. Contact information for one or more parties who can repair, restore, replace, <br />or recover this asset. Examples are hardware/software vendors, IT support <br />vendors, and/or staff members <br />This asset list contains information that is restricted to executives and super-admins, <br />and therefore is stored securely on the Synology NAS, which itself is backed up to AWS <br />Glacier. <br />This inventory will be reviewed and updated quarterly, or as new assets and devices <br />are added. Logs are maintained as the Inventory of Information Assets Log and the <br />Rev.2015.8.6 <br />18 <br />