Laserfiche WebLink
Security Policies and Procedures <br />All content transmitted over these tools is the property of Virtru. Content, including <br />emails, may be inspected by Virtru. Such inspections will occur with the approval of <br />the ISO or of the Company legal department. Virtru may monitor, filter or block <br />content on these tools. <br />Users of blogs, social media sites such as Facebook, and other such tools must follow <br />the guidelines outlined in Virtru's Social Media Policy. See Social Media Policy. <br />Users of blogs, social media sites such as Facebook, and other such tools must not <br />represent their comments as coming from, or being representative of, the business or <br />opinions of Virtru. <br />XXIII. Hardware <br />A. Definitions <br />Workstations: PCs, desktop computers, tablets and mobile computing devices that are <br />located at Virtru's home office, or at remote locations. These devices are easily <br />attacked and therefore must have access controls and anti-malware as specified in <br />those sections of this document. <br />Servers: Devices that may or may not be housed at Virtru locations. Regardless of their <br />location, these must secured in a manner that prevents them from being physically <br />accessed without the appropriate level of security clearance. <br />B. Policy <br />A current copy of the Organizational Chart/Electronic Asset Management Log (Risk <br />Assessment) will be kept at an off site location so it can be accessed quickly in the case <br />of theft, fire, flood or other events that may make inventory information useful. <br />The ISO will keep a log of events noting when a physical security mechanism is <br />repaired, replaced, installed, removed, modified, or maintained. This Maintenance Log <br />will contain the: who, what, when, where, and why of the change and be kept in the <br />Security Documentation Library. <br />Users of these devices are required to ensure that all appropriate protections are in <br />place, including: <br />1. Physical security to prevent theft or misuse <br />2. Access controls suitable for the class of information on the device <br />3. Anti-malware <br />4. Keeping the devices locked to a desk or other secure location when outside <br />Rev.2015.8.6 <br />45 <br />