Laserfiche WebLink
Security Policies and Procedures <br />J. Enforcement <br />Any workforce member found to have violated these policies may be subject to <br />disciplinary action, up to and including termination of employment. See Sanction Policy. <br />XXVIII. Removable Media Device Policy <br />A. Purpose <br />The purpose of this policy is to minimize the risk of loss or exposure of Confidential or <br />Protected Information maintained by Virtru when it is stored, transferred or accessed <br />on a removable media device. This policy also aims to reduce the risk of acquiring <br />malware infections on computers operated by Company. Any questions or comments <br />about this policy should be directed to the ISO <br />B. Scope <br />This policy covers all removable media that contains Virtru's data or that is connected <br />to Virtru's network. <br />C. Definitions <br />Removable media: devices or media that is readable and/or writable by the end user <br />and are able to be moved from computer to computer without modification to the <br />computer. This includes flash memory devices such as thumb drives, SD cards, cameras, <br />MP3 players or any other storage medium; removable hard drives (including hard <br />drive -based MP3 players); optical disks such as CD and DVD disks. <br />Encryption: a procedure used to convert data from its original form to a format that is <br />unreadable and/or unusable to anyone without the tools/information needed to <br />reverse the encryption process. <br />Malware: software of malicious intent/impact such as viruses, worms, and spyware. <br />D. Policy <br />Workforce members may use removable media in their work computers if they take all <br />reasonable and prudent measures to ensure the safety and confidentiality of all <br />information that is downloaded to any removable media or portable device <br />E. Using Removable Media Devices <br />PHI should be stored on removable media only when required in the performance of <br />assigned duties or when responding to legitimate requests for information. When <br />Rev.2015.8.6 <br />57 <br />