Laserfiche WebLink
Security Policies and Procedures <br />E. Password testing <br />Password cracking software shall be run periodically to validate the enforcement of <br />password rules. <br />F. 3rd Party Security Management <br />A comprehensive list of 3rd parties with which the company does business with shall <br />be maintained. Any 3rd party who handles or holds sensitive data or who provides a <br />service which is critical to operations shall be required to assert that their own security <br />practices and procedures meet or exceed that of the company's. Each 3rd party shall be <br />assessed for conformance annually. <br />XXII. Use of Email, Internet, Messaging, Public Sites, Blogs, Social Media <br />A. Policy <br />Confidential, Private or Protected information and Internal Use information must not <br />be transmitted across any unsecured outside network or path without proper controls. <br />Virtru requires encryption for files and emails, or secured packaging for paper copies. <br />Users are responsible for ensuring that their use of these tools complies with all of <br />Virtru's policies, and with applicable laws and regulations. This includes all <br />employment policies such as sexual harassment, stalking, ethics and appropriate use. <br />These tools may not be used to access, send or receive, store or display: <br />1. Sexually explicit material <br />2. Confidential, Private or Protected Information or Internal Use material, <br />except as meets the Handling Rules section <br />3. Viruses <br />4. Threats <br />5. Inappropriate or unlawful language, including: <br />a. Offensive language <br />b. Language inappropriate for the Company environment <br />6. Discriminatory or harassing language <br />7. Tools usable for hacking, password cracking, vulnerability scanning or <br />penetration testing <br />These tools are the property of Virtru and are to be used only for Virtru's business. <br />Access may be unavailable at any time, at the Company's discretion. Users must not <br />assume that access to these tools will be available for incidental personal use. <br />Rev.2015.8.6 <br />44 <br />