Computer Security for users of small computer systems Crime Prevention Bureau

advertisement
Computer Security
for users of small computer systems
Crime Prevention Bureau
If you have any queries regarding the contents of this booklet, or require further information, then
please contact:
Royal Hong Kong Police
Computer Security Unit
Crime Prevention Bureau
5th Floor Empire Centre
Tsim Sha Tsui East
Kowloon
Hong Kong
Telephone: 2301 1654
KPMG Peat Marwick
Computer Audit Department
8th Floor Prince's Building
Central
Hong Kong
Telephone: 2522 6022
Computer Security
for users of small computer systems
2nd Edition
© Crime Prevention Bureau
January 1997
Sections © Office of the Privacy Commissioner for Personal Data
1st Edition jointly published by KPMG Peat Marwick, Certified Public Accountants, and The Royal
Hong Kong Police Crime Prevention Bureau.
Preface
This booklet forms part of the Crime Prevention Bureau's effort to improve the general awareness
on computer security. The purpose of this booklet is to set out guidelines on improving computer
security, specifically within a small business environment where resources are often limited.
However, the policies and procedures outlined in this booklet are equally applicable to all users of
small computer systems.
The guidelines in this booklet are advisory and represent what is regarded as best practice. They are
not intended to be definitive and should always be applied with regard to practical business
requirements and individual circumstances. By using a few simple and inexpensive measures,
management can significantly reduce many computer-related risks. However, it must be stressed
that there is no such thing as total security, even for large organisations.
The information presented in this booklet is general in nature and will not provide detailed rules on
which to make specific plans. If management are in any doubt in a specific instance, they should
seek proper professional advice.
This booklet is printed in English and Chinese. If there is any conflict in the booklet between the
meaning of Chinese words or terms in the Chinese language version and English words in the English
language version, the meaning of the English words should prevail.
CONTENTS
1. INTRODUCTION
1
2. ORGANISATIONAL AND MANAGEMENT CONTROLS
3
3. SEPARATION OF DUTIES
4
4. PROTECT YOUR ASSETS
5
5. PROTECT YOUR DATA AND NETWORK
7
6. END USER COMPUTING
9
7. USE OF PACKAGED SOFTWARE
10
8. BACKUP AND RECOVERY
11
9. VIRUS PROTECTION
13
10. COPYRIGHT
15
11. THE INTERNET
16
12. LEGAL IMPLICATIONS
17
GLOSSARY
21
Chapter 1
Introduction
1.1 Background
In the past, only large organisations could afford to invest in computer equipment. However,
technological advances in recent years have made it possible to build computers that are smaller,
cheaper, more powerful and easier to use.
Microcomputer networks are now slowly replacing many systems that previously ran on mini, or
even mainframe, computers. The advent of inexpensive business software, computer games and the
graphical user interface increases the popularity of microcomputers, and the marriage of computer
and telecommunication technology signifies a new age in personal computing. Nowadays few
businesses, large or small, operate without a computer, and management increasingly rely on
computer generated information for decision making.
As more than one person can access computer data and resources, the system, however small,
becomes more difficult to control. This booklet sets out some of the key issues regarding computer
security; and recommends ways by which management can minimise the potential risks that arise
when data is stored on or processed by computers, and when computer data and resources are
shared.
The recommended procedures set out in this booklet are intended for users of small computer
systems, such as standalone personal computers (PCs) or small PC networks. Such operating
environments are commonly found in smaller organisations, however, the recommendations in this
booklet may also be relevant for users of small computer networks in larger organisations, and for
individual users of personal computers.
1.2 Small business environment
A small business environment usually has limited resources in terms of staff and computer
knowledge. The owners of the business are often actively involved in business affairs. Controls are
often informal and there is limited scope for separation of duties. The business most probably uses
microcomputers and off-the-shelf software, such as an integrated accounts package or payroll
software. Word processing and general purpose spreadsheet and database packages may also be
used to analyse data and to produce management information.
Control weaknesses in such an environment often result from a combination of factors: users may be
unaware of security issues; management may take the view that controls are unnecessary, disruptive
and costly to implement; and the implications of a breach in computer security are not fully appreciated.
Such weaknesses may give rise to a number of concerns:
Page 1
•
poor business decisions because management rely on inaccurate financial or managerial
information;
•
the business may not be able to recover from a loss of data or computer facilities caused by,
for example, a fire;
•
accidental disclosure or theft of confidential or sensitive business or personal information;
•
possible breach of current legislation, such as copyright law or the Personal Data (Privacy)
Ordinance;
•
possibility of fraud; and
•
risk of computer abuse, such as computer related crime.
These concerns may result in financial losses, damage to customer relations and a business' reputation
and, in extreme cases, the collapse of the business. It is therefore essential for management to understand
these risks and hence the need for computer security.
This booklet provides a number of recommendations relating to each key area of computer control. One
or more of the suggested techniques may be used according to the specific circumstances of the business
to minimise its exposure to the risks discussed above. Management may also find it helpful to seek
impartial advice from independent advisers.
Page 2
Chapter 2
Organisational and management controls
Principle
Management should establish policies regarding the acquisition and use of microcomputers; and
should also ensure that only suitably qualified staff are responsible for operating the computer
system.
Suggested procedures
•
Management should establish an appropriate strategy regarding the acquisition of computer
hardware and software. This would ensure that the computer facilities are able to meet and to
support the business operations.
•
Management should establish policies and supporting procedures regarding the use of
computers and computer information. For example, policies regarding the handling of
confidential, sensitive and proprietary data, as well as the implications of a breach of these
policies, such as disciplinary actions. Such policies and procedures provide a means to ensure
the integrity, accuracy and completeness of the data being processed.
•
A senior and key individual in the business should be allocated the responsibility for ensuring
that appropriate policies and procedures are developed and applied and that computer security
is taken seriously.
•
Management should set out clear policies on the recruitment, assessment, training and dismissal
of staff. Bona fide references should be taken up for all recruits, including temporary and
contract staff, to ensure that they are adequately qualified and that they do not present a security
risk to the company.
•
All members of staff, including temporary and contract staff, who are required to operate
computer equipment should be adequately trained.
Benefits
The policies and procedures identified above should be sufficient to address the potential risks faced
by smaller organisations. By establishing a clear policy on the use of computers, management can
ensure that the importance of computer security is communicated to all members of staff. Appropriate procedures for the recruitment, assessment, training and dismissal of staff will help to ensure
that staff are committed and that the computer, the data and the systems are handled efficiently,
effectively and responsibly.
Page 3
Chapter 3
Separation of duties
Principle
Ideally, no single individual should be able to exercise control over more than one functional or
business area. Within the context of a small organisation, however, a formal separation of duties is
often not possible due to the limited number of staff available, particularly in respect of computer
systems. Management should instead ensure that adequate alternative procedures and controls are
in place to safeguard the organisation.
Suggested procedures
•
Management should ensure that there are adequate audit trails in respect of computerised
transactions.
•
Specific procedures and controls should be put in place concerning the handling of tangible and
mobile assets, such as cash and stock. These may take the form of regular bank reconciliations,
cash counts and stock counts.
•
Management should take steps to ensure that detailed knowledge of the computer system is not
lost as a result of key staff being unavailable or leaving the organisation by maintaining up-todate system and user documentation.
Benefits
Separation of duties reduces the risk of fraudulent activities as controls are easily bypassed when a
single individual is empowered to control several functional areas. Separation of duties also reduces
an organisation's dependence upon key staff.
Where separation of duties is not practicable, compensating controls should be put in place to
safeguard the assets of the business.
Page 4
Chapter 4
Protect your assets
Principle
All computer equipment and resources should be adequately protected. Access should be restricted
to only those staff who are properly authorised. Security precautions should not, however, impede
the efficient running of the business.
Suggested procedures
Physical access controls are usually applied at two levels: access to the organisation's offices or
premises and access to the area within the offices/ premises where the computer equipment is
located. Since microcomputers are usually scattered around the office, some of the main controls
are at the offices/premises level.
•
Guards or receptionists should ensure that only authorised persons may enter the office. If there
is more than one entrance to the office, access to all entrances should be controlled.
•
Access to the office outside office hours should also be regulated. In particular, it may not be
desirable for certain grades of staff to have unrestricted access to the premises.
•
Key computer equipment should be physically secured. If, however, it is not practical to keep
key computer equipment, such as the network server, in a secure area, then it should be located
where it is clearly visible, and where access can be observed (rather than in a secluded area
where tampering with the equipment may go unnoticed).
•
In many cases, management may wish to physically safeguard portable or movable (but
nevertheless expensive) equipment, such as most PCs, by securing them to desks.
•
Staff should not leave computers unattended whilst switched on and logged on to a specific
application.
•
There should be adequate protection against risks such as fire and flood, for example,
conveniently placed and adequately maintained fire extinguishers.
•
Offices should be kept tidy; food, and in particular drinks, should not be allowed near computer
equipment.
•
Management should ensure that computer equipment is adequately insured. Where necessary,
insurance cover should extend to the data and information held on the computer as well.
Page 5
Benefits
Appropriate physical access controls will reduce the risk of computer equipment being stolen or
accidentally or deliberately damaged. It will also help to prevent accidental disclosure or theft of
sensitive or confidential information. Adequate insurance can help to reduce the economic impact on
the organisation in the event that data or computer equipment is lost or damaged.
Page 6
Chapter 5
Protect your data and network
Principle
Access to data and software on standalone PCs and on PC networks should be selectively
restricted to those who are authorised by management. Access should only be granted that is
sufficient to enable staff to perform their duties.
Suggested procedures
•
Management should identify data and programs critical to the business and determine who
should have access to these.
•
Privileged access such as supervisor authority should be restricted to one or at most two senior
and responsible individuals. This access can potentially be used to delete and corrupt data
without leaving any audit trail and therefore should be strictly controlled.
•
A suitably senior member of staff should be responsible for enforcing, and for ensuring
compliance with, the security policies set out by management.
•
A suitable person should be designated Network Security Officer to control and monitor
network security and activities, for example, ensuring the list of network users is up-to-date, and
following up any unauthorised access attempts.
•
Each network user should be assigned a unique identifier, often referred to as a user ID that has
an associated user profile and an associated password. Users should change their initial
passwords immediately when they log on to the network for the first time.
•
Users should keep their IDs, profiles and passwords secret, and should regularly change their
passwords.
•
Management should set out guidelines concerning passwords. For example, the frequency of
password change; the length of the password, which should ideally be at least eight characters
long; and guidance regarding the format to ensure that the passwords cannot be easily guessed,
such as requiring all passwords to be a mixture of letters, numbers and symbols
•
Special security features provided by a network operating system should be applied where
appropriate. For example, user profiles can and should be disabled after a certain number of
unauthorised access attempts; or the date and time of when each user is able to log on to the
system should, if possible, be pre-defined.
•
Management should consider installing special password protection software on
microcomputers containing sensitive data, such as certain financial and personnel information.
Page 7
Such software may, for example, request a password before a PC can be started up.
Management should seek professional advice before installing such software to ensure compatibility with existing software and hardware.
•
Management should monitor the use of powerful user profiles, such as the network
administrator profile. It is also advisable to keep passwords of key users in sealed envelopes for
emergency use. The envelopes should be securely stored and passwords should be changed immediately after each emergency access.
•
Data, including backup copies, held on magnetic media such as diskettes or cartridges should
be properly labelled and locked away when not in use.
•
Printouts containing confidential or sensitive information should be filed away and, when no
longer required, should be carefully disposed of to prevent accidental disclosure of such
information. Organisations should however take care to ensure that they do not violate the
Companies Ordinance, Personal Data (Privacy) Ordinance or any other Ordinance with respect
to the retention of records.
•
Where dial-up access is permitted using modems and telephone lines, management should
consider the use of dial-back or other additional authentication procedures thus exercising some
degree of control over telephone access.
•
Management should adequately control and supervise the maintenance of hardware and
software applications, especially when this work is performed by the respective vendors. This is
to prevent accidental corruption or disclosure of sensitive data and applications.
Benefits
Management can only rely on the system if they can be sure that the system is free from
unauthorised changes to either the data or the programs. Adequate safeguards over unauthorised
access will protect confidential and sensitive information and prevent unauthorised modifications or
corruption of data. They will also reduce the risk of viruses or other malicious programs being
introduced into the system.
Page 8
Chapter 6
End user computing
Principle
Management should ensure that applications developed to run on PCs are adequately controlled. In
particular appropriate standards covering testing, and system and user documentation should be
implemented.
Suggested procedures
•
Management should issue written procedures that should be followed when developing PC
applications. Applications in this context include computer programs as well as financial or nonfinancial models, budgets, forecasts, etc, developed using software applications, such as a
spreadsheet. As a rule, these procedures should apply to all applications, whether routine or
one-off, that produce management information.
•
Software needs should be identified and fully specified in advance. These should include
requests for new applications, as well as requests for modifications to existing applications.
•
Staff should seek management approval prior to developing their own applications as they may
not be aware of other existing applications that can perform, or can be adapted to perform, the
required tasks.
•
New or enhanced applications should be independently reviewed and tested before being
accepted and going live. This should include functionality tests as well as volume tests to ensure
that the software can perform all that is expected of it and can cope with the required transaction volumes. This will reduce the number of errors or "bugs" in the system. Users should be
heavily involved in this process to ensure that the system meets their requirements.
•
Where appropriate, system compatibility tests should be carried out to ensure that new or
modified applications can function with existing software and hardware.
•
System and user documentation should be prepared or amended to reflect all changes to
application programs.
Benefits
By adopting a structured approach, management can ensure that application software fulfils the
needs of the business, and that any tailoring or modifications are properly tested and function as
intended and are error free. This will ensure that the vital information flow is not disrupted when it is
most needed.
Page 9
Chapter 7
Use of packaged software
Principle
Management should ensure that all packaged software is able to support the business activities, and
is adequate for users' needs. Management should also ensure that the packages can be adequately
maintained, either in-house or by the respective software house, so that future enhancements can be
made.
Suggested procedures
•
There should be formal procedures addressing the required controls over the selection, testing
and acceptance of packaged software.
•
Users should be actively involved in the selection process, particularly where enhancements or
changes to the packaged software are undertaken on the users' behalf.
•
Control over the release and implementation of new software, or enhancements to existing
software, should be centrally co-ordinated to ensure that appropriate versions of the software
are used.
•
Management should consider the use of "escrow" arrangements, especially where software has
been purchased from a smaller software house, or where the software has been customised. An
escrow agreement usually involves the software house, the user business and an independent
third party. The software house lodges the source code of the software package with the
independent third party such as a bank or a legal firm. When a pre-determined event takes
place, such as the software house ceasing operations or ceasing to support that particular
package, the source code will be released to the user business according to the terms of the
agreement, thus ensuring that the user can obtain future support for the package elsewhere.
Benefits
The application systems in use are able to meet the users' needs and are able to support the current
and future business requirements.
Page 10
Chapter 8
Backup and recovery
Principle
Data and programs are usually held on hard disks, diskettes, magnetic tape or cartridges. These
media are susceptible to damage, theft or loss and consequently the data held on them are
vulnerable. Further, the computer itself can be damaged, perhaps through failure of a significant
component of the system or an external factor such as a fire. Management should ensure that should
the organisation suffer an accident or a "computer disaster", then it can recover its data, application
programs and computer facilities with minimum disruption to the business.
Suggested procedures
•
Management should determine which files, application programs and documentation are critical
to the running of the business. They should then establish an appropriate backup strategy based
on the findings. Backup and recovery procedures should then be documented and staff
instructed on their implementation.
•
Adequate and frequent backups of data and programs should be taken to ensure that the
system can be recovered after a "computer disaster" and before the business is disrupted.
•
Management should assign responsibility for taking backups. For example, an organisation may
require that backups be taken by a specific individual, such as the network supervisor or that
specific users backup their own files.
•
At least three generations of the backups should be kept. However if daily backups are taken it
may be easier administratively to retain six or seven generations, for example Monday's daily
backup should be kept until the following Monday when it can be overwritten, etc. Month end
and year end copies of files may be retained for longer periods as required.
•
At least one copy of the most recent backup should be kept off-site and should be securely
stored, for example in a fireproof safe.
•
Magnetic tapes, diskettes or cartridges used for backup should be clearly and accurately
labelled. Backups should be tested periodically to ensure that they can be restored when
ultimately needed.
•
Copies of essential documents, such as user manuals, systems and applications documentation,
should also be kept off-site.
•
Where necessary, a stock of special pre-printed stationery, such as customer statements,
invoices, etc, should also be kept off-site in case of emergency.
Page 11
•
For those organisations that rely heavily on their computer system, management should develop
a formal recovery plan setting out specifically what to do in the event of a disaster which results
in a prolonged disruption of computing facilities. For those organisations that are not so
dependent on their computer system, management should also consider the impact of such a
disaster on their business and outline the necessary recovery procedures.
Benefits
Management will be able to recover, promptly and effectively, computing facilities following a
"computer disaster" and minimise the economic impact on the business. This is particularly important
in a network environment where the effect of a loss of computing capabilities may have a serious
impact over the entire organisation.
Page 12
Chapter 9
Virus protection
Principle
A computer virus is a set of computer program instructions designed to duplicate and spread itself.
Once a program or system file has been infected, whenever that software is subsequently used the
virus will duplicate itself and infect other programs or system files.
In addition to duplication and infection, viruses may corrupt or delete programs and data, or cause
unusual messages to be displayed. This may occur immediately following infection, at some random
future date, or may be triggered by some event such as a particular date or the passage of time.
Management should take steps to minimise the risk of damage to data and programs caused by
computer viruses using a combination of preventive and detective methods.
Suggested procedures
Taking adequate and frequent backups is an essential step in protection against virus attacks. Whilst
the use of anti-virus software can protect the organisation from virus attacks, such software is most
effective only when identifying known viruses. Therefore if the anti-virus software is not regularly
updated, it will not be able to provide effective protection against new viruses.
•
Management should issue a written policy on the use of microcomputers and communicate this
to all members of staff. No games or other unauthorised software should be used, and staff
should be made aware of their responsibilities in helping to protect against virus attacks.
•
Establish a quarantine system for diskettes received from external sources, such as samples or
demonstration disks, or diskettes that have been used on PCs not belonging to the organisation.
For instance these diskettes could be tested on a standalone PC that has no other live or key
applications before being loaded onto the main computer.
•
Anti-virus (preventive) software should be installed on all microcomputers. Management should
ensure that they receive regular updates of the software from the supplier. This software can be
programmed to scan all floppy disks and to alert users of an infection.
•
All microcomputers, including the network server, should be periodically scanned for viruses
using the latest virus checking software.
•
Restrict access to, and especially downloading from, the Internet and electronic bulletin board
services.
•
Written policy should include procedures to be followed subsequent to the discovery of a
suspected virus. Such procedures should include the isolation of infected machines and the
Page 13
notification of the Network Security Officer. Only properly trained staff should remove viruses
from infected files, since such action could also result in the corruption of data.
Benefits
The business will be able to limit the risk of virus infection. Should the system be infected by a virus,
infected data and programs can be recovered in a timely and co-ordinated manner.
Page 14
Chapter 10
Copyright
Principle
Computer software in Hong Kong is protected in the same way as other literary works, such as
books and plays. The government is currently reviewing the law on copyright, and aims to draft a
Hong Kong Ordinance dealing comprehensively with the laws of copyright.
The law as it stands prohibits persons who are not the copyright owner from performing certain acts,
such as reproducing or publishing the copyright work. Further, the mere possession of an infringing
copy of copyright subject matter for any purpose, including business and trade, is a criminal offence
and can result in severe penalties.
Management should therefore ensure that staff only use licensed software on their computer,
according to the terms of that licence.
Suggested procedures
•
Staff should read and observe the terms of the licence with respect to all purchased software.
•
Staff generally should only load microcomputer software and updates to software according to
the terms of the licence. This in most cases will mean loading one software package on one
machine.
•
Management should not allow unauthorised copying of software for use on any other machine.
•
Management should develop and issue to all members of staff policies and procedures to ensure
compliance with all software licences. This will include procedures to ensure that a record of all
software and associated licence numbers is retained by the business.
Benefits
By establishing proper policies and procedures over the use computer software, management can
ensure compliance with existing legislation on copyright.
Page 15
Chapter 11
The Internet
Principle
Use of the world-wide computer network known as “the Internet” has increased exponentially in
recent years to the point where Internet access is now considered a basic business necessity. The
Internet is frequently used as an information source, a marketing tool and an important means of
communication. However, the connection of a corporate network to the Internet can leave a
business exposed to various security threats unless such a connection is properly configured and
maintained.
Suggested Procedures
•
Formal procedures should be set in place addressing the allocation of Internet access to staff.
Such access should be provided only as strictly necessary and should not be provided
company-wide as a matter of course. In addition, policies outlining correct Internet usage should
be communicated to staff.
•
Ideally, Internet access should be limited to machines which do not form part of the company
network. An Internet e-mail gateway may be considered as an alternative to full Internet access
for most users.
•
Strict anti-virus measures should be implemented on all machines with Internet access.
•
The use of developing Internet technologies should be restricted until the full security
implications of such technologies are known. The use of ‘beta’ software should be restricted.
•
Any gateway between the company network and the Internet should be protected by a properly
configured and maintained ‘firewall’ (a system which analyses traffic between the two networks
to ensure proper authorisation). No unprotected access (including dial-up access using modems)
should be allowed from the network.
Benefits
Appropriate controls on the use of the Internet and proper monitoring of network traffic will reduce
the risk of unauthorised network intrusions and possible theft or corruption of sensitive or
confidential information. In addition, the likelihood of legal liability being caused by a staff member’s
abuse of such Internet access will be minimised.
Page 16
Chapter 12
Legal implications
This section briefly describes some of the key legal implications over the use of computers and
computer information having regard to current and proposed computer-related legislation in Hong
Kong. If management require guidance over a specific issue, they should consult their legal advisor.
12.1 Computer Crimes Ordinance
The Computer Crimes Ordinance became law in April 1993. The objective of the Ordinance was
to "clarify and amend the criminal law relating to the misuse of computers". The Ordinance defines
"Misuse of a computer" as:
•
causing a computer to function other than it has been established to function, regardless
of whether or not the misuse impairs the operation of the computer or the reliability of
data held in the computer; or
•
altering or erasing any computer program or data; or
•
adding any program or data to a computer.
It is now an offence for anyone to obtain unauthorised access to a computer by telecommunication,
more commonly known as hacking. The intent of the person obtaining such access need not be
directed at a particular computer, or at any specific program or data held within a computer.
The Ordinance provides a means for organisations to prosecute those who access or damage the
information held on their computer without proper authority. However, one of the obstacles against
successful prosecution of a computer related crime is the need to prove the intention of the person
committing the offence. Management should therefore take steps to guard against computer misuse
and in this regard a well-defined set of computer security policies and procedures can be helpful.
Such policies should clearly define the responsibilities of everyone within an organisation for
maintaining proper security over the organisation's data. It should define the extent of access rights
for members of staff and, where appropriate, members of the public. It should also document the
procedures for assigning these access rights.
12.2 Data protection
The Personal Data (Privacy) Ordinance became law in December 1996. The objective of the
Ordinance was to protect the privacy interests of living individuals in relation to personal data.
Generally, the Ordinance covers any data relating directly or indirectly to a living individual (data
subject), from which it is practical to ascertain the identity of the individual and which are in a form
in which access or processing is practicable. It applies to any person (data user) that controls the
collection, holding, processing or use of personal data.
Page 17
Data users must follow the fair information practices stipulated in the data protection principles in
Schedule I of the Ordinance (see below for more detail).
The Ordinance gives rights to data subjects. They have the right to confirm with data users whether
their personal data are held, to obtain a copy of such data, and to have personal data corrected.
Any charge for providing a copy of personal data to a data subject may not be excessive. They may
complain to the Privacy Commissioner for Personal Data about a suspected breach of the
Ordinance's requirements and claim compensation for damage caused to them as a result of a
contravention of the Ordinance through civil proceedings.
The Ordinance establishes an independent statutory office to enforce and promote compliance with
provisions of the Ordinance. It is headed by the Privacy Commissioner for Personal Data who is
appointed by the Governor. His duties and powers include:
•
promoting the awareness and understanding of the Ordinance's requirements;
•
approving and issuing codes of practice giving practical guidance on compliance with
the Ordinance;
•
approving requests from data users on automated matching of personal data;
•
specifying classes of data users required to submit annual returns and to compile a
register of data users for public inspection;
•
inspection of personal data systems and making recommendations for compliance with
provisions of the Ordinance; and
•
investigation of suspected breaches of the Ordinance's requirements and issuing
enforcement notices to data users as appropriate.
Schedule 1 sets out six data protection principles. In line with international practice. They are:Principle 1 - Purpose and manner of collection - this provides for the lawful and fair
collection of personal data and sets out the information a data user must give to a data
subject when collecting personal data from that subject.
Principle 2 - Accuracy and duration of retention - this provides that personal data should be
accurate, up-to-date and kept no longer than necessary.
Principle 3 - Use of personal data - this provides that unless the data subject gives consent
otherwise personal data should be used for the purposes for which they were collected or a
directly related purpose.
Page 18
Principle 4 - Security of personal data -this requires appropriate security measures to be
applied to personal data (including data in a form in which access to or processing of the
data is not practicable).
Principle 5 - Information to be generally available - this provides for openness by data users
about the kinds of personal data they hold and the main purposes for which personal data
are used.
Principle 6 - Access to personal data -this provides for data subjects to have rights of
access to and correction of their personal data.
The Ordinance provides specific exemptions from the requirements of the Ordinance. They include:
•
a broad exemption from the provisions of the Ordinance for personal data held for
domestic or recreational purposes;
•
exemptions from the requirements on subject access for certain employment related
personal data (see paragraph below for details); and
•
exemptions from the subject access and use limitation requirements of the Ordinance
where their application is likely to prejudice certain competing public or social interests,
such as : security, defence and international relations; prevention or detection of crime;
assessment or collection of any tax or duty; news activities; and health.
Data users should bear in mind that the Ordinance also covers employment personal data under
their control. This includes the provisions of the Ordinance requiring data users to provide access to
personal data held by them. However, the Ordinance provides for the following exemptions from
the right of subject access for employment-related personal data:
•
data relating to staff planning;
•
data generated by certain evaluative processes, including a recruitment or promotion
exercise, prior to a decision being taken and where an appeal can be made against such
a decision;
•
a personal reference for an appointment up to the time when the position is filled;
•
employment-related personal data provided prior to the commencement of the
Ordinance on a basis that data subject would not be allowed access are exempt from
subject access until 3 August 2002;
•
employment-related personal data which are provided prior to the commencement of
the Ordinance other than on the basis that data subject would not be allowed access or
Page 19
which are provided after the commencement of the Ordinance are exempt from subject
access until 1 July 1996.
Section 64 provides for a variety of offences, for example non-compliance with an enforcement
notice served by the Privacy Commissioner carries a penalty of a fine at Level 5 (at present
$25,001 to $50,000) and imprisonment for 2 years.
Section 66 provides for an individual who suffers damage, including injured feeling, by reason of a
contravention of the Ordinance in relation to his or her personal data to obtain compensation from
the data user concerned.
Further details concerning the Personal Data (Privacy) Ordinance and advice on how to comply
with the Ordinance may be obtained from:
The Office of the Privacy Commissioner for Personal Data,
Unit 2001, 20th Floor, Office Tower,
Convention Plaza,
1 Harbour Road,
Wan Chai,
Hong Kong.
Page 20
Glossary
This glossary explains some of the more common computing terms used in this booklet or
that users may come across in their day to day work.
access
privileges
The privileges to read and make changes to data held on a computer;
they are given to or withheld from users. By setting appropriate access
privileges, you can control access to confidential information stored on
a computer or on a network server.
application
program
A program that performs a specific task, such as sales invoicing word
processing, or database management.
backup
A copy of a disk or of a program or data file
beta software
Pre-release versions of software programs which are made available
to the public for testing before commercial release. Such programs
often contain potentially dangerous ‘bugs’ or errors
bulletin boards
An electronic notice boards that could be for use within an
organisation or made available to the public. Bulletin board messages
are accessed over a network or with the use of a modem and a
telephone line and can usually be read by a wide body of people.
Bulletin boards can contain anything from technical hints and tips to
advertisements but have also been known to spread viruses and illegal
software.
byte, kilobyte,
megabyte
Bytes are the binary representation of information such as decimal
numbers or characters. A byte is a unit of information consisting of
eight bits; a bit is a unit of information that a computer can hold. The
value of a bit (1 or 0) represents a simple two-way choice, such as yes
or no. A kilobyte(Kb) consists of 1,024 bytes, that is (210) bytes, and
a megabyte (Mb) consists of 1,024 kilobytes, or 1,047,576 bytes.
CD-ROM
Stands for Compact Disc Read-Only Memory; a compact laser disc,
similar in appearance to an audio CD, that can store approximately
600Mb of information. The information is designated as read-only
because a CD drive can read the information but cannot record new
information.
Page 21
central processing unit
(CPU)
computer viruses
The “brain” of the computer; the microprocessor that performs the
actual computations.
A computer virus is a set of computer program instructions designed to
duplicate itself. It can be introduced to a computer or a computer
network without the user being aware to it, typically by loading a
previously infected disk, for example a game disk. Viruses may
corrupt or delete programs and data across the PC or on an entire PC
network. These actions may not always occur at random or be
triggered by some event such as a particular data.
E-Mail
Electronic mail (E-Mail) is a facility that allows users to send messages
to, and receive messages from, other users. This can be set up
internally within an organization or it can utilise external E-Mail services
to communicate with external users. E-Mail systems allow data, files,
spreadsheet documents, etc, to be sent along with a text message to
another computer. E-Mail requires software and a modem or a
network.
encryption
A method of encoding data such that it cannot be read even if
intercepted by unauthorized users. Encryption is often used when
transmitting sensitive or confidential information.
Ethernet
An industry-standard method of transporting data over a network.
Ethernet is currently the most common method of linking a PC
network.
file-server
A computer, usually with a high processing power and a large amount
of disk storage capacity, that is available to users on a network and
controls access to that network. Programs and data which network
users need to share are stored on file-servers.
firewall
A system consisting of hardware and/or software designed to monitor
and regulate network traffic. Most often used to protect networks
from Internet-based intrusions.
Page 22
floppy disk, hard disk
A floppy disk is made of flexible plastic, as opposed to a hard disk,
which is made of metal and sealed into a case or cartridge. The term
floppy originally applied to disks with thin, flexible disk jackets, such
as 5.25-inch disks, which were literally floppy and could be easily
bent. With 3.5-inch disks, the disk itself is flexible, but the jacket is
made of hard plastic. Both kinds, however, are called floppy disks. A
hard disk can store very large amounts of information compared to
3.5-inch or 5.25-inch disks.
grandfather, father,
son
A backup procedure consisting of three sets of backup, with the “son”
being the most recent, and the “grandfather” being the oldest backup
copy. When a backup routine is performed, the storage device used
for the “grandfather” is reused and becomes the “son”, the “son”
becomes the “father”, and the “father” becomes the “grandfather”. In
this way, three generations of backup are maintained at all times,
thereby minimising the risk of complete data loss.
LAN
Local Area Network(LAN) is a group of computers connected for the
purpose of sharing resources. The computers on a LAN are typically
joined by a single transmission cable and are located within a small
area such as a single building or section of a building.
log off
To indicate to a system or network that you have completed your
work and are terminating interaction.
log on/log in
To identify yourself to a system or network and start to use it. usually
logging on requires a password, depending on the system.
magnetic tapes
A plastic tape coated on one side with a substance suitable for storage
of large quantities of programs and data. They range in appearance
from traditional computer tapes on a reel to smaller tapes resembling
audio cassette tapes. Tapes are mainly used for archival storage of
data and are not suitable for routine of frequently used data.
main memory
The part of a computer’s memory whose contents are directly
accessible to the microprocessor; usually synonymous with RandomAccess Memory (RAM). Programs are loaded into main memory,
where the computer keeps information while you are working.
Page 23
memory
A hardware component of a computer system that can store
information for later retrieval.
modem
MOdulator-DEModulator. A “Black box” between a device and a
communication line, converting a digital signal into one or more suited
to telephone transmission, or vice versa.
mouse
A small device that can be moved around on a flat surface next to the
computer. The mouse controls a pointer on the screen whose
movements correspond to those of the mouse and is used to select
operations, to move data, and to draw within graphics programs.
network
administrator
The person who sets up a network file server, registers users and their
passwords, and maintains the file server.
PC
Personal Computer (PC) initially referred to the IBM
Personal Computer but is now extended to include other
microcomputers whether or not they are compatible with IBM PCs.
RAM
Random Access Memory (RAM) is transient memory that is
addressed directly by the computer’s central processing unit (CPU).
RAM is used to temporarily store data that they CPU is waiting to
process, is processing, or has just processed. Any information held in
RAM is lost if the computer’s power is switched off, or if another
piece of information uses that area of memory.
ROM
Read Only memory (ROM) is used to store the program instructions
required for all the computer’s basic operations. Any data or program
instructions held in ROM chips are permanent. The computer reads
information from ROM but cannot store any information there.
software
A collective term for programs, the instructions that tell the computer
what to do.
TCP/IP
(Transmission Control Protocol/Internet Protocol): the protocols that
define the rules governing how messages are exchanged on the Internet
and many corporate networks.
user
A person operating or controlling a computer system and who has a
specific use for the computer.
user ID
A unique name assigned to a registered user and used to identify that
user on the network. it is commonly used together with a password.
Page 24
user profile
WAN
A set of permissions allocated to a user controlling that person’s
access to application programs, data files and directories on a
computer system.
Wide Area Network (WAN) is a system of interconnected local area
networks that span a wide geographical area.
Page 25
Download