Many businesses are now completely reliant on the data stored on their Network Servers, PCs, laptops, mobile devices and cloud service providers or internet service providers. Some of this data is likely to contain either personal information and/or confidential company information.
Here we look at some of the issues to consider when reviewing the security of your computer systems with respect to access controls, and to ensure compliance with Principle 7 of the Data Protection Act. This states that -
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Good access controls to the computers and the network minimise the risks of data theft or misuse.
Access controls can be divided into two main areas:
As well as having physical access controls such as locks, alarms, security lighting and CCTV there are other considerations such as how access to the premises is controlled.
Visitors should not be allowed to roam unless under strict supervision.
Ensure that computer screens are not visible from the outside.
Use network policies to ensure that workstations and/or mobile devices are locked when they are unattended or not being used.
Ensure that if a mobile device is lost it can be immobilised remotely.
Mobile devices being small are high risk items so sensitive data should always be encrypted and access to the service should be controlled via a pin number or password.
It may be necessary to disable or restrict access to USB devices and Optical readers and writers.
Finally, information on hard-copy should be disposed of securely.
Logical access techniques should be employed to ensure that personnel do not have more access than is necessary for them to perform their role.
Sensitive data should be encrypted and access to this data controlled via network security and user profiles.
Access to certain applications and certain folders may also need to be restricted on a user by user basis.
Finally, it may be necessary to lock down certain devices on certain machines.
It is accepted, universally, that a password policy consisting of a username and password is good practice.
These help identify a user on the network and enable the appropriate permissions to be assigned.
For passwords to be effective, however, they should:
and should NOT
We can provide help in the following areas:
Please contact us if you would like any help in any of these areas.
Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, mobile devices and on data stored in the cloud. Some of this data is likely to contain either personal information and/or confidential company information.
Here we look at some of the issues to consider when reviewing the security of your computer systems and data.
Data backup is an essential security procedure and needs to be undertaken on a regular basis. A business should view the undertaking regular backups as a form of insurance policy. There are a number of points to consider.
Ideally, once software has been installed, the original media (unless the software was downloaded) should be stored securely off-site. Any activation keys/codes should be similarly stored securely.
In a network environment some data files might be stored on the server and other data files stored on local drives. In which case separate backups may be required for both the server and one or more PCs.
Ideally, a network solution should be provided which ensures that all data is re-copied back to the server from local drives.
There is likely to be a need for two parallel backup procedures; one to cover a complete systems backup of the server(s) and another to incrementally (or differentially) backup data files which have been updated since the previous backup.
The most common backup cycle is the grandfather, father, son method. With this, there is a cycle of 4 daily backups, 4/5 weekly backups and 12 monthly backups.
Remember that some data has to be preserved for many years - for example accounting records for need to be kept for a minimum of 6 years.
Backup media can be re-used many times, but they do not have a finite life and will need replacing after 2-10 years depending on quality and number of times used. Some additional points are made on this issue in the section on backup media degradation.
Someone should be given responsibility for the backup procedures. This person needs to be able to:
Many accounting and payroll applications have their own backup routines. It is a good idea to use these on a regular basis (as well as conventional server backups) and always just before critical update routines. These backup data files should be stored on the server drive so that they are backed up.
Certain users will have applications data files exclusively on their local drives (such as payroll data for example) and these will require their own regular backup regime which as mentioned in the previous paragraph may consist of a combination of backing up to media and backing up to the server.
Selecting the right media to use for backups depends on budget, how much data there is and the networking operating software. External hard disks or a NAS box with cloud backup may provide a good solution . If an external service provider is used, or perhaps a cloud option, they should have their own backup regime – but don’t totally rely on this.
Optical storage such as CD/DVD, or Blu-Ray may also be considered as a cheaper alternative, but capacity and life may be limited.
Backups should be stored in a variety of both on-site and off-site locations. On-site backups are easily accessible when data has to be restored quickly, but are at risk from either fire or other disaster.
A large number of businesses use an on-site safe, however, this will be useless if it’s buried under tons of rubble, or the premises otherwise become inaccessible.
Off-site backups have the advantage that they can be recovered in an emergency, but
a) they still need to be stored securely; and
b) need to be reasonably accessible.
Finally, certain type of records, such as accounting records for example, need to be kept for a minimum period of time and this must be considered when developing the data backup strategy (also see below regarding degradation).
Backup media degrades and the data stored on them decomposes over a period of time.
Optical media such as CD/DVD and Blu-Ray are particularly sensitive to light (photosensitive), so ensure that they are stored in a dark environment. They are also prone to physical damage when being handled. Finally, this type of media is not designed for long-term storage - lasting possibly as little as 2 years.
Backups should be checked on a regular basis for signs of digital decomposition, and tested to check that data can be successfully restored.
Many internet service providers and third-party IT service organisations, now offer, either as standard or as a chargeable extra, off-site data repositories and also complete online application solutions. The immediate appeal is that there is no need to internally support a server and its operating and applications software. However, there are a significant number of key security issues which should be covered as part of the contract/service level agreement (SLA). These should include level of encryption , the countries in which the data is processed and stored (as this has potential issues with Data Protection laws), data deletion and retention periods, the availability of audit trails of who is accessing the data and finally, who has ownership of the data if the provider goes into administration/receivership.
We would always recommend therefore that if a third-party is used, that the business uses a combination of both traditional in-house backup solutions, and cloud backup services. Where data is stored in the cloud, try to ensure that as little personal data as possible is processed and stored in this way.
We can provide help in the following areas:
Please do contact us if we can be of further help.
Many businesses are totally reliant on the data stored on their PCs, laptops, networks, mobile devices and in the cloud. Some of this data is likely to contain either personal information and/or confidential company information.
Here we look at some of the key compliance issues surrounding data protection and the Data Protection Act (the Act).
Most businesses process personal data to a greater or lesser degree. If this is the case, compliance with the Act is required unless one of the exemptions applies (see below).
Complying with the Act includes a notification process, handling data according to the principles of data protection and dealing with subject access requests.
In the UK, the Information Commissioner (ICO) is responsible for the public Data Protection Register and for enforcing the Data Protection Act.
There are 5 main categories of exemption -
There are a number of more specific exemptions. However, most companies find the exemptions are too narrow, and opt to notify (see below).
Notification is the method by which a company’s usage of personal data is added to the public Data Protection register maintained by the ICO. The process starts by completing the notification documentation (available from www.ico.gov.uk) and sending this back with the annual notification fee (currently £35 for the small business).
Notification needs to be performed annually (even if there are no changes).
N.B. Be wary of organisations who say they represent the ICO and who charge more than the standard £35 fee.
Individuals have rights under the Act to find out whether you are processing their personal data, and to provide them with a copy of the data which is stored about them.
Most SARs must be responded to within 40 days.
An individual has the right to ask you to:
A fee can be levied for dealing with an SAR - but only up to £10 (except for health or education records).
If a fee is levied, the access request does not have to be complied with until the fee has been received.
Secondly, the Act makes it clear that the SAR must contain enough information to validate that the person making the request is the individual to whom the personal data relates. So it may be necessary and is legitimate to ask for further identification from the originator of the SAR.
The Act says there should be security that is appropriate to:
The Act does not define “appropriate" - but it does say that “an assessment of the appropriate security measures in a particular case should consider technological developments and the costs involved".
So, there a number of key areas to concentrate on -
Someone in the organisation should be given overall responsibility for data security.
Staff need to understand the importance of protecting personal data, that they are familiar with the organisation’s security policy, and that they put security procedures into practice.
Technical security measures to protect computerised information are of obvious importance. However, many security incidents relate to the theft or loss of equipment, or to the disposal of old equipment and old printouts.
As well as a comprehensive backup regime, appropriate access controls and mechanisms need to be in place. Websites in particular need sophisticated security measures in place.
As well as the Data Protection Act there are various other Acts and regulations which have a bearing on data security. These include:
We can provide help in the following areas:
Please do not hesitate to contact us if we can be of further assistance.
For information of users: This material is published for the information of clients. It provides only an overview of the regulations in force at the date of publication, and no action should be taken without consulting the detailed legislation or seeking professional advice. Therefore no responsibility for loss occasioned by any person acting or refraining from action as a result of the material can be accepted by the authors or the firm.